Call for Papers
Quick Links
April, 2024 | Volume 03 | Issue 02
Cybersecurity Paradigms: Trends, Threats and Solutions
Mr. Amit Srivastava
Professor in Department of Computer Science, National Post Graduate College, Lucknow, India
Author
Ridhima Manni
Student, Department of Computer Science, National Post graduate College, Lucknow, India
Author
Ankita Pawar
Student, Department of Computer Science, National Post graduate College, Lucknow, India
Author
Doi: https://doi.org/10.63920/tjths.32011
Keywords: Cyber Security; Cyber Crime; Social media; Cyber ethics; Digital Interactions; Ethical Considerations; Online Behavior; Data Breaches; Online Privacy; Cyber Law
Abstract:
In an era dominated by digital interactions, this research delves into the intricate web of cyber security, cybercrime, and the pivotal role of social media, with a keen eye on ethical considerations. As cyber threats continue to evolve, understanding the dynamics of cyber security becomes imperative. The study explores the escalating landscape of cybercrime, particularly in the context of social media platforms, which serve as breeding grounds for diverse cyber threats. Additionally, it investigates the ethical dimensions of cybersecurity, emphasizing the importance of responsible online behavior and adherence to ethical standards. This interdisciplinary exploration aims to unravel the complexities of safeguarding digital spaces, balancing technological fortification with ethical principles. In navigating the digital realm, the synergy of cyber security, cyber ethics, and social media resilience emerges as a linchpin for a secure and trustworthy online environment.
Download Full PDF Paper
References
[1] S. Belapure and N. Godbole, Cyber Security: Understanding Cyber Crimes.
[2] A. Krause, “Computer security practices in non-profit organisations,” NetAction Report.
[3] J. Lyne, “Eight trends changing network security,” Sophos Article 04.12v1.dNA.
[4] NATO CCDCOE, “Cyber definitions.” [Online]. Available: https://ccdcoe.org/cyber-definitions.html
[5] “Malware,” Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/Malware
[6] “Phishing,” Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/Phishing
[7] R. S. Shaw, C. C. Chen, A. L. Harris, and H. J. Huang, “The impact of information richness on information security awareness training effectiveness,” Comput. Educ., vol. 52, no. 1, pp. 92–100, 2009.
[8] GDS, “6 cybersecurity threats to watch out for in 2021.” [Online]. Available: https://www.getgds.com/resources/blog/cybersecurity/6-cybersecurity-threats-to-watch-out-for-in-2021
[9] L. Corrons, “A look back on cyber security 2012,” Panda Labs.
[10] “Programme for the development of electronic information security (cyber security) for 2011–2019.”
[11] “Cyber security strategy for Germany,” 2011.
[12] Z. Pawlak, “Rough sets,” Int. J. Comput. Inf. Sci., vol. 11, pp. 341–356, 1982.
[13] “Today’s youth: How much knowing about cyber crime and its protection.” [Online]. Available: https://www.academia.edu/38020134/Today_s_youth_How_much_knowing_about_cyber_crime_and_its_protection_docx
[14] “A sociological analysis of cyber crime security awareness among teenagers.” [Online]. Available: https://www.academia.edu/30941159/A_SOCIOLOGICAL_ANALYSIS_OF_CYBER_CRIME_SECURITY_AWARENESS_AMONG_TEENAGERS
[15] “A seminar paper on cyber crime.” [Online]. Available: https://www.academia.edu/30020488/A_SEMINAR_PAPER_ON
[16] M. Zwilling, G. Klien, D. Lesjak, Ł. Wiechetek, F. Cetin, and H. N. Basim, “Cyber security awareness, knowledge and behaviour: A comparative study,” 2020.
