49,015 research outputs found
Cyber Security Challenges, its Emerging Trends on Latest Information and Communication Technology and Cyber Crime in Mobile Money Transaction Services
This paper investigates the challenges emerging trends on latest Information and Communication Technology and cybercrime in mobile money transaction services in Tanzania. The objective of this is to evaluate the challenges associated with this rapid growth in ICT and to determine factors influencing Cybersecurity readiness and Cybercrimes in mobile money transaction services. Cyber Security plays a significant role in the field of Information and Communication Technology especially on mobile money transaction services. The study recognizes the provision of mobile money services by both telecommunication companies and local banks, the fact is that whenever we think about the cyber security, the first thing that comes to our mind is âcybercrimesâ which are increasing extremely day to day and become a threat. Cybercrimes are mostly practiced through both internet and mobile money services. Securing the information has become one of the major challenges in the present day. Various Governments and companies are taking measures in order to prevent these cybercrimes. Besides cyber security remains concern to many. This paper mainly focuses on challenges faced by cyber security on the latest information and communication technology and cybercrime especially in mobile money transaction services in Tanzania. Its latest techniques, ethics and trends that change the face of cyber security. Relevant data was collected from the Forensic Section of the Tanzania Police Force, Mobile banking mobile money agents and users of the mobile-money services. This study also used the Pearson correlation and analysis of variance (ANOVA) to establish different facts and determine whether the independent variables had a combined effect on the dependent variable. The findings of the study revealed that there is a positive and significant correlation between usersâ awareness, mobile money agents training, top management support, technical and logical controls and cybersecurity readiness. The study also concluded that effective training programs aimed to enlighten the users and mobile money agents on cybersecurity issues are an important ingredient for cybersecurity readiness in cybercrime in mobile money transaction services
Terrorist Use of the Internet and Cyberspace: Issues and Responses, in: Terrorists' Use of the Internet, pp. 1-21
The authors of this paper consider recent developments involving terrorist use of the internet and cyberspace for a range of purposes, as well as renewed concerns relating to potential terrorist attacks against critical infrastructure and their control systems. Following from an overview of recent trends, they discuss public and private efforts to respond to existing and emerging threats. The authors anchor these within the context of current efforts to manage a range of interrelated cyber security challenges, focusing predominantly on the international and regional response, as well as efforts by industry actors to deal with terrorist use of their products and services
The Global Risks Report 2016, 11th Edition
Now in its 11th edition, The Global Risks Report 2016 draws attention to ways that global risks could evolve and interact in the next decade. The year 2016 marks a forceful departure from past findings, as the risks about which the Report has been warning over the past decade are starting to manifest themselves in new, sometimes unexpected ways and harm people, institutions and economies. Warming climate is likely to raise this year's temperature to 1° Celsius above the pre-industrial era, 60 million people, equivalent to the world's 24th largest country and largest number in recent history, are forcibly displaced, and crimes in cyberspace cost the global economy an estimated US$445 billion, higher than many economies' national incomes. In this context, the Reportcalls for action to build resilience â the "resilience imperative" â and identifies practical examples of how it could be done.The Report also steps back and explores how emerging global risks and major trends, such as climate change, the rise of cyber dependence and income and wealth disparity are impacting already-strained societies by highlighting three clusters of risks as Risks in Focus. As resilience building is helped by the ability to analyse global risks from the perspective of specific stakeholders, the Report also analyses the significance of global risks to the business community at a regional and country-level
Cyber Diplomacy: A New Frontier for Global Cooperation in the Digital Age
As the world evolves, becoming increasingly interconnected through digital technologies, there is a growing need for global collaboration in addressing the challenges of cyberspace. Cyber diplomacy, the use of diplomatic means to manage international relations in cyberspace, is emerging as a new field of international relations. With the advancement of cybercrime, cyberspace actors â governments, organizations, corporations, the private sector, and civil society need to collaborate, negotiate and develop cyber capabilities to ensure a safe digital space through cyber diplomacy. The article outlines the current state of cyberspace and critical threats to global security and stability, examining cybercrime, state-sponsored cyberattacks, cyberespionage, cyberterrorism, and trends in cybercrime. It focuses on the concept of cyber diplomacy and its expansion as a field of international relations, noting key developments that have contributed to this aspect. At the same time, the role of cyber diplomacy in shaping global norms, standards, and regulations for cyberspace is mentioned, and the potential advantages of better international cooperation in this field are explored
Global Risks 2014, Ninth Edition.
The Global Risks 2014 report highlights how global risks are not only interconnected but also have systemic impacts. To manage global risks effectively and build resilience to their impacts, better efforts are needed to understand, measure and foresee the evolution of interdependencies between risks, supplementing traditional risk-management tools with new concepts designed for uncertain environments. If global risks are not effectively addressed, their social, economic and political fallouts could be far-reaching, as exemplified by the continuing impacts of the financial crisis of 2007-2008
Global Risks 2015, 10th Edition.
The 2015 edition of the Global Risks report completes a decade of highlighting the most significant long-term risks worldwide, drawing on the perspectives of experts and global decision-makers. Over that time, analysis has moved from risk identification to thinking through risk interconnections and the potentially cascading effects that result. Taking this effort one step further, this year's report underscores potential causes as well as solutions to global risks. Not only do we set out a view on 28 global risks in the report's traditional categories (economic, environmental, societal, geopolitical and technological) but also we consider the drivers of those risks in the form of 13 trends. In addition, we have selected initiatives for addressing significant challenges, which we hope will inspire collaboration among business, government and civil society communitie
Recommended from our members
Cyber insurance of information systems: Security and privacy cyber insurance contracts for ICT and helathcare organizations
Nowadays, more-and-more aspects of our daily activities are digitalized. Data and assets in the cyber-space, both for individuals and organizations, must be safeguarded. Thus, the insurance sector must face the challenge of digital transformation in the 5G era with the right set of tools. In this paper, we present CyberSure-an insurance framework for information systems. CyberSure investigates the interplay between certification, risk management, and insurance of cyber processes. It promotes continuous monitoring as the new building block for cyber insurance in order to overcome the current obstacles of identifying in real-time contractual violations by the insured party and receiving early warning notifications prior the violation. Lightweight monitoring modules capture the status of the operating components and send data to the CyberSure backend system which performs the core decision making. Therefore, an insured system is certified dynamically, with the risk and insurance perspectives being evaluated at runtime as the system operation evolves. As new data become available, the risk management and the insurance policies are adjusted and fine-tuned. When an incident occurs, the insurance company possesses adequate information to assess the situation fast, estimate accurately the level of a potential loss, and decrease the required period for compensating the insured customer. The framework is applied in the ICT and healthcare domains, assessing the system of medium-size organizations. GDPR implications are also considered with the overall setting being effective and scalable
Addressing the cyber safety challenge: from risk to resilience
Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each groupâs unique cyber safety needs.
Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ârisk and protectionâ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to:
Address the needs of populations often neglected by current policies and programs â including adults, seniors, parents, and small to medium enterprises
Continue to build the digital literacy skills of all populations, because digital literacy strongly influences usersâ ability to engage safely online â this is best achieved by a hands-on learning approach
Keep risk in perspective â the risks and benefits of digital participation go hand in hand
Broaden the focus from awareness-raising to long-term behaviour change.
As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved.
Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services
- âŠ