Research Article

Internet Threats and Mitigation Methods in Electronic Businesses Post Covid-19

by  E.E. Odokuma, M.O. Musa
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Issue 19
Published: Jun 2022
Authors: E.E. Odokuma, M.O. Musa
10.5120/ijca2022922195
PDF

E.E. Odokuma, M.O. Musa . Internet Threats and Mitigation Methods in Electronic Businesses Post Covid-19. International Journal of Computer Applications. 184, 19 (Jun 2022), 1-4. DOI=10.5120/ijca2022922195

                        @article{ 10.5120/ijca2022922195,
                        author  = { E.E. Odokuma,M.O. Musa },
                        title   = { Internet Threats and Mitigation Methods in Electronic Businesses Post Covid-19 },
                        journal = { International Journal of Computer Applications },
                        year    = { 2022 },
                        volume  = { 184 },
                        number  = { 19 },
                        pages   = { 1-4 },
                        doi     = { 10.5120/ijca2022922195 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2022
                        %A E.E. Odokuma
                        %A M.O. Musa
                        %T Internet Threats and Mitigation Methods in Electronic Businesses Post Covid-19%T 
                        %J International Journal of Computer Applications
                        %V 184
                        %N 19
                        %P 1-4
                        %R 10.5120/ijca2022922195
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

With the advent of COVID-19 and the imposed lockdowns, many businesses were forced online. A number of these business owners had no prior knowledge of internet technology use and were therefore devoid of the knowledge of internet security threats. Many businesses still operate the e-business model even after the restrictions were lifted, due to the merits of the model. E-Business organizations were one of the main victims of internet fraud during the pandemic for various reasons. In this work, the most common threats and their mitigation measureshave been presented using the semi-systematic literature review method. Knowledge and adherence to these mitigation measures, especially education of staff and customers will save electronic business owners from falling victim to internet fraud.

References
  • Tedros, A. G. (2020). Retrieved May 19, 2022, from Who.int website: https://www.who.int/director-general/speeches/detail/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-19---11-march-2020
  • Pranggono, B., and Arabo, A. (2020). COVID‐19 pandemic cybersecurity issues. Internet Technol. Lett. Doi: 10.1002/itl2.247
  • Walker, A. (2021). What Is Threat Modelling? Retrieved 19th May, 2022, from https://learn.g2.com/threat-modeling
  • Nigeria 2020 Crime & Safety Report: Abuja. (2021). Retrieved 19th May, 2022, from https://www.osac.gov/Content/Report/04a87fa7-8575-4ce1-b5bb-188e5cb9d1d8
  • Max, D. (2020). What is E-Business: Meaning, Types, Components, Model and Features. Temok Hosting Blog. Retrieved 17th May, 2022, from https://www.temok.com/blog/what-is-e-business/
  • Nigeria – e-Commerce. (2021). Retrieved from https://www.trade.gov/knowledge-product/nigeria-ecommerce
  • Furnell S, and Shah J. N. (2020) Home working and cyber security–an outbreak of unpreparedness? Computer Fraud and Security. (8):6-12.
  • Samuel Adu-Gyimah, George Asante and Oliver Kufuor Boansi. Social Engineering Attacks: A Clearer Perspective. International Journal of Computer Applications184(8):53-62, April 2022
  • Ahmad, T. (2020, April 05). Corona Virus (COVID-19) Pandemic and Work from Home: Challenges of Cybercrimes and Cybersecurity. Doi: 10.2139/ssrn.3568830
  • Summer, A. and Yuan X. (2019) Mitigating Phishing Attacks: An Overview Publication: Proceedings of the 2019 ACM Southeast Conference April 2019. Pages 72–77 https://doi.org/10.1145/3299815.3314437
  • De Bona M. and Paci F. 2020 Real world study on employees' susceptibility to phishing attacks. Proceedings of the 15th International Conference on Availability, Reliability and Security. August 2020 Article No.: 4 Pages 1–10 https://doi.org/10.1145/3407023.3409179
  • Madsen, P., Koga, Y., & Takahashi, K. (2005). Federated identity management for protecting users from ID theft. Association for Computing Machinery. Proceedings of the 2005 workshop on Digital identity management, November 2005 Pages 77–83 https://doi.org/10.1145/1102486.1102500
  • Zou, Y., Roundy, K., Tamersoy, A., Shintre, S., Roturier, J., and Schaub, F. (2020). Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices. Association for Computing Machinery. CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems April 2020 Pages 1–15. Doi: 10.1145/3313831.3376570.
  • Malecki F. Overcoming the National Cyber Security Centre (NCSC) and Cybersecurity and Infrastructure Security Agency (CISA) (2020). Advisory: COVID-19 exploited by malicious cyber actors. https://www.ncsc.gov.uk/news/covid-19-exploited-by-cyber-actors-advisory
  • Ali, M., Qaseem, Dr. M., and Rahman, M. (2020). A Survey on Deceptive Phishing Attacks in Social Networking Environments. Doi: 10.1007/978-981-15-1480-7_37
  • National Cyber Security Centre (NCSC), and Cybersecurity and Infrastructure Security Agency (CISA), (2020). Advisory: APT groups target healthcare and essential services. https://www.ncsc.gov.uk/news/apt-groups-target-healthcare-essential-services-advisory.
  • FraudWatch. (2019, February 25). Retrieved May 19, 2022, from Digital Brand Protection – FraudWatch website: https://fraudwatch.com/what-is-vishing-voice-phishing-scams-explained-how-to-prevent-them/
  • How To Spot, Avoid, and Report Fake Check Scams. (2020, January 29). Retrieved 19th May, 2022, from Consumer Advice website: https://consumer.ftc.gov/articles/how-spot-avoid-report-fake-check-scams
  • Pedley D, Borges T, Bollen A (2020, March 12). Cyber Security Skills in the UK Labour Market 2020. Retrieved May 19, 2022, from GOV.UK website: https://www.gov.uk/government/publications/cyber-security-skills-in-the-uk-labour-market-2020
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Internet eCommerce Security Threats Fraud Mitigation

Powered by PhDFocusTM