• Title/Summary/Keyword: Internet Security Readiness

Search Result 6, Processing Time 0.019 seconds

Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure

  • Ryoo, Jung-Woo;Park, Eun-A
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.33-50
    • /
    • 2011
  • In this paper we applied our previously developed assessment framework to the data collected from an internet security readiness survey targeted at households. We used the assessment framework to compute an Internet Security Readiness index for each household, which was in turn derived from Internet Security Readiness capital, skill, and actual uptake/use of infrastructure indices. We then examined the relationships among overall Internet Security Readiness, and the capital, skill, and actual uptake/use of infrastructure related to Internet Security Readiness. In addition, we explored the influence of Internet usage level and experience on Internet Security Readiness.

The Current State of Cyber-Readiness of Saudi Arabia

  • Alhalafi, Nawaf;Veeraraghavan, Prakash
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.256-274
    • /
    • 2022
  • The continuous information technology and telecommunication (ICT) developments inspire several Saudi Arabia citizens to transact and interact online. However, when using online platforms, several people are likely to lose their personal information to cybercriminals. In the survey, 553 Saudi Arabia citizens and 103 information technology (IT) specialists confirm the expansion of digital economy and the need for smart cities with various services, including e-commerce and solid cyber security. 96.6% of the participants believe Saudi Arabia is digitalizing its economy; yet, 33.3% of the participants believe that residents are uninformed about living and operating in smart cities. Several people (47.29%) with medium internet speed are more aware about smart cities than those with fastest internet speed (34%). Besides, online transactions via credit cards subjected 55.5% of the participants to privacy and security issues. These findings validate the essence of cyber security awareness programs among Saudi Arabia citizens and IT professionals to boost public trust and acceptance of cybersecurity frameworks.

The Influence of Consumers' Purchase Experience and Technology Readiness on Risk Perception and Satisfaction in Internet Clothing Shopping (소비자의 인터넷쇼핑 구매경험과 기술준비성이 인터넷 의류쇼핑시 위험지각과 만족도에 미치는 영향)

  • Hong, Keum-Hee
    • Fashion & Textile Research Journal
    • /
    • v.6 no.1
    • /
    • pp.93-101
    • /
    • 2004
  • The purpose of this study is to examine consumers' risk perception in internet clothing shopping and its relation with technology readiness and the frequency of purchase. Thereafter, this study examines how consumers' risk perception affect service quality and satisfaction at the apparel shopping sites. An on-line survey was made to collect data, and the replies from 785 people, who had an experience of apparel shopping on line, were used in data analysis. From factor analyses, risk perception comprised 3 factors of product related risk, delivery related risk, and security related risk, and technology readiness comprised 4 factors of optimism, innovativeness, discomfort, and insecurity. Based on cluster analysis, consumers were classified into 3 types in terms of the internet risk perception: low risk group, medium risk group, and high risk group. From path analysis, risk perception was decreased with high frequency of purchase and low discomfort and insecurity of technology readiness, and risk perception and service quality had an influence on consumers' satisfaction with the shopping sites.

The Smart City: Trends and Evolution, Readiness and Adaptability in Africa

  • Bashir Aliyu Yauri;Ekpobodo Raymond Ovwigho
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.119-126
    • /
    • 2024
  • This paper reviewed and provides clarifications as to the meaning and concept of Smart Cities with particular reference to the Smart City Components. The paper also discusses Internet of Things and the Big Data in relation to the role they played in the development and evolution of smart cities. The paper further provides discussions on the 5G Wireless Networks and Industry 4.0 buttressing their significance in the smart cities concept. The paper as the name implies; discusses on the readiness and adaptability of this trending concept 'Smart City' in the African global space.

Open Source Tools for Digital Forensic Investigation: Capability, Reliability, Transparency and Legal Requirements

  • Isa Ismail;Khairul Akram Zainol Ariffin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.9
    • /
    • pp.2692-2716
    • /
    • 2024
  • Over the past decade, law enforcement organizations have been dealing with the development of cybercrime. To address this growing problem, law enforcement organizations apply various digital forensic (DF) tools and techniques to investigate crimes involving digital devices. This ensures that evidence is admissible in legal proceedings. Consequently, DF analysts may need to invest more in proprietary DF hardware and software to maintain the viability of the DF lab, which will burden budget-constrained organizations. As an alternative, the open source DF tool is considered a cost-saving option. However, the admissibility of digital evidence obtained from these tools has yet to be tested in courts, especially in Malaysia. Therefore, this study aimed to explore the admissibility of digital evidence obtained through open source DF tools. By reviewing the existing literature, the factors that affect the admissibility of the evidence produced by these tools in courts were identified. Further, based on the findings, a conceptual framework was developed to ensure the admissibility of the evidence so that it will be accepted in the court of law. This conceptual framework was formed to outline the factors affecting the admissibility of digital evidence from open source DF tools, which include; 1) The Availability and Capability of open source DF tools, 2) the Reliability and Integrity of the digital evidence obtained from open source DF tools, 3) the Transparency of the open source DF tools, and 4) the Lack of Reference and Standard of open source DF tools. This study provides valuable insights into the digital forensic field, and the conceptual framework can be used to integrate open source DF tools into digital forensic investigations.

A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity (국방 사이버보안을 위한 RMF-CMMC 공통규정준수 메타모델 개발방안 연구)

  • Jae-yoon Hwang;Hyuk-jin Kwon
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.123-136
    • /
    • 2024
  • The U.S. Department of Defense, leading global cybersecurity policies, has two main cybersecurity frameworks: the Cybersecurity Maturity Model Certification (CMMC) for external defense industry certification, and the Risk Management Framework (RMF) for internal organizational security assessments. For Republic of Korea military, starting from 2026, the Korean version of RMF (K-RMF) will be fully implemented. Domestic defense industry companies participating in projects commissioned by the U.S. Department of Defense must obtain CMMC certification by October 2025. In this paper, a new standard compliance meta-model (R3C) development methodology that can simultaneously support CMMC and RMF security audit readiness tasks is introduced, along with the implementation results of a compliance solution based on the R3C meta-model. This research is based on practical experience with the U.S. Department of Defense's cybersecurity regulations gained during the joint project by the South Korean and U.S. defense ministries' joint chiefs of staff since 2022. The developed compliance solution functions are being utilized in joint South Korean-U.S. military exercises. The compliance solution developed through this research is expected to be available for sale in the private sector and is anticipated to be highly valuable for domestic defense industry companies that need immediate CMMC certification.