scholarly journals Cybercrimes: Threats, Challenges, Awareness, and Solutions in Sierra Leone

2020 ◽  
Vol 3 (1) ◽  
pp. 185-195
Author(s):  
Ibrahim Abdulai Sawaneh

The internet hosts all online activities either for public or private usage. It is a powerful online podium where people socialize, make new friends, conduct academic research, perform online business transactions, share sensitive data, communication over the internet, surveillance purpose by security agencies, monitor climatic condition, used in e-healthcare system, online banking, online pay, e-commerce, defense system, and host of others critical infrastructures are the new order of the day. This has attracted online criminals to diverse numerous malicious techniques to invade people’s privacy and also exploit those data. A new game has resulted in these online malicious activities are known as “cybercrime or internet crime” which is a rewarding business as of today. Therefore, it has become difficult to protect those online activities as cybercrimes are growing daily, which suggests that effective and appropriate countermeasures are needed to combat those threats and make online activities more secure. The research paper presents the various types of cybercrime activities, countermeasures, and suggestions for online users.

Author(s):  
Ahamed Lebbe Mohamed Ayoobkhan ◽  
David Asirvatham

With the rapid growth of processing and storage technologies and the success of the Internet, system resources are cheaper, more powerful and more advanced than ever. This technology helps to achieve a new computer model known as cloud computing, in which resources are provided as Internet applications that can be accessed and released from users on the Internet. Business organizations are increasing the cloud experience and they begin to change more important business functions onto cloud platforms. Cloud computing has been growing for companies around the world, but many are finding higher costs and more obstacles to cloud computing adoption than organization anticipated. As this is the latest trend in information technology, some companies are moving toward cloud computing. On the other hand, other companies cannot even take into consideration the idea of having their sensitive data outside their premises. Both of these cases represent companies that are just not very well informed. Over the past two decades, the online business organizations have been facing many commercial problems and challenges in their businesses such as managing available resources effectively, security threats in managing IT resources and high implementation cost. Therefore, this study reveal the literature review of the benefits can be served by cloud computing and the issues and challenges that Online business organizations (SME) faced, and how cloud computing is useful in solving these issues in Sri Lanka.


2019 ◽  
Vol 17 (1) ◽  
pp. 73
Author(s):  
Albert Christie Giovani ◽  
Yustina Retno Wahyu Utami ◽  
Teguh Susyanto

The development of internet has become one of the most popular data communication media. The ease of use and complete facilities are the advantages possessed by the internet. However, along with the development of internet media and applications that use the Internet,  crime on information system increases as well. With various illegal information-gathering techniques developing, many are trying to access information that is not their right. There are several security techniques for sending messages confidentially and securedly, one of which is known as steganography. This study combined steganography and cryptography. The message was encrypted first using base64 then inserted using the LSB Crossed method. This method was aimed at making the process of extracting messages by unauthorized ones not easy. Embedding message into images was using the last binary number of the RGB value of an image by randomizing the placement of binary numbers by integrating base64 coding so that it combined base64 messages which next the text messages would be encrypted. The measurement results in the stego image using PSNR (Peak Signal to Noise Ratio) showed that the image quality after the insertion process was > 50 db


Telecom ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 108-140
Author(s):  
Paulo Álvares ◽  
Lion Silva ◽  
Naercio Magaia

It had been predicted that by 2020, nearly 26 billion devices would be connected to the Internet, with a big percentage being vehicles. The Internet of Vehicles (IoVa) is a concept that refers to the connection and cooperation of smart vehicles and devices in a network through the generation, transmission, and processing of data that aims at improving traffic congestion, travel time, and comfort, all the while reducing pollution and accidents. However, this transmission of sensitive data (e.g., location) needs to occur with defined security properties to safeguard vehicles and their drivers since attackers could use this data. Blockchain is a fairly recent technology that guarantees trust between nodes through cryptography mechanisms and consensus protocols in distributed, untrustful environments, like IoV networks. Much research has been done in implementing the former in the latter to impressive results, as Blockchain can cover and offer solutions to many IoV problems. However, these implementations have to deal with the challenge of IoV node’s resource constraints since they do not suffice for the computational and energy requirements of traditional Blockchain systems, which is one of the biggest limitations of Blockchain implementations in IoV. Finally, these two technologies can be used to build the foundations for smart cities, enabling new application models and better results for end-users.


Author(s):  
S. Gopikrishnan ◽  
P. Priakanth ◽  
Gautam Srivastava ◽  
Giancarlo Fortino

2021 ◽  
Vol 51 (1) ◽  
pp. 26-31
Author(s):  
Massimo Candela ◽  
Antonio Prado

Since the beginning of the COVID-19 pandemic, governments introduced several social restrictions. As of 18 March 2020, more than 250 million people were in lockdown in Europe. This drastically increased the number of online activities. Due to this unprecedented situation, some concerns arose about the suitability of the Internet network to sustain the increased usage. Italy was severely hit by the first wave of the pandemic and various regions underwent a lockdown before the main country-wide one. The Italian network operators started sharing information about improvements carried out on the network and new measures adopted to support the increase in Internet usage. In this report, by means of a questionnaire, we collect information and provide a quantitative overview of the actions undertaken by network operators in Italy. The attitude of Italian operators was synergic and proactive in supporting the changed market conditions caused by the public health emergency.


Compiler ◽  
2013 ◽  
Vol 2 (2) ◽  
Author(s):  
Saryanto Saryanto ◽  
Sumarsono Sumarsono ◽  
Nurcahyani Dewi Retnowati

Data communication in the internet today is so complex as an example of the speed factor becomes very important in communicating, everyone wants fast data communication services provided in order to maximum. In relation to the application as a communication liaison with client server applications, web service using a data serialization format to transmit the data. Before the data is sent, either fromthe client to the server or vice versa, should be modified in a specific data format beforehand according to the web service is used. Types of data serialization format used in the web service such as XML and JSON. The method used for testing include data serialization method, data measurement method and data parsing method. Data serialization method is used to calculate the time serialization of data from the database to the form of XML and JSON in applications with PHP platform. Data measurement method used to measure the size of the XML and JSON data which based on many fields of data serialization process. Data parsing method is used to calculate the processing time and JSON parsing XML data. Results o f comparative analysis o f XML and JSON in PHP applications using thearchitecture Rest can be concluded that the test result o f the difference in time and time serialization and JSON parsing XML data is influenced by the number o f records, if the number of records the greater the difference in eating time data serialization and parsing the data the greater the time also itcan be concluded that the faster the process JSON serialization and parsing XML data is compared. Testing results o f the JSON data size is smaller than the size of XML. Data exchange using XML format has a size limit of up to 31456.31 KB while JSON XML exceeds the size limit. Testing results on the Internet when the number o f records up to 50,000 data when the data serialization and parsing time data can not be detected in the database.


2021 ◽  
Vol 10 (1) ◽  
pp. 16-26
Author(s):  
Juan Carlos Campaña ◽  
Raquel Ortega

Internet use reduces the isolation or exclusion of individuals in specific socio-economic groups and, consequently, increases the quality of life, with this being especially the case for the elderly. Knowing that the elderly are becoming particularly active in dedicating time to the Internet, we provide evidence of the time that Spanish individuals aged 65 and older dedicate to two online activities: search and communications. We estimate a SUR model with data from the STUS for 2009-2010. Our main results indicate that being male has a positive influence on the time devoted to search on the Internet. Furthermore, time devoted to both Internet activities increases with higher levels of education and at the highest level of individual health.


2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


2021 ◽  
Author(s):  
Christine Feraday

Non-cisgender and non-straight identity language has long been a site of contention and evolution. There has been an increase in new non-cisgender, non-straight identity words since the creation of the internet, thanks to social media platforms like Tumblr. Tumblr in particular has been host to many conversations about identity and self-naming, though these conversations have not yet been the subject of much academic research. Through interviews and analysis of Tumblr posts, this thesis examines the emergence of new identity words, or neo-identities, used by non-cisgender and non-straight users of Tumblr. The work presents neo-identities as strategies for resisting and challenging cisheteronormative conceptions of gender and attraction, as well as sources of comfort and relief for non-cisgender/non-straight people who feel ‘broken’ and excluded from mainstream identity categories. This thesis also posits that Tumblr is uniquely suited for conversations about identity because of its potential for self-expression, community, and anonymity.


Sign in / Sign up

Export Citation Format

Share Document