Cyberspace Challenges and Law Limitations
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 8
Abstract
Privacy and Data security are heating topic in the modern technologically advanced economy. Technological Innovations have created new forms of electronic data which are more vulnerable to theft or loss when compared to tradi-tional data storage. Moreover, the recent advances in internet technologies have exacerbated the risk of security threats. The Internet brings a whole new set of challenges in terms of data protection. Considering the complexities of modern technological advancements and its impact on data security, this study examines the Irish laws and EU directives for privacy and data security, its effectiveness in managing large scale data breaches and limitations. This paper also simulates attack scenarios that can be done by anonymous users in a complex cyberspace environment and explains how a digital evidence related to the attack scenario can be tracked down.
Authors and Affiliations
Aadil Al-Mahrouqi, Cormac Cianain, Tahar Kechadi
An Improved Bat Algorithm based on Novel Initialization Technique for Global Optimization Problem
Bat algorithm (BA) is a nature-inspired metaheuristic algorithm which is widely used to solve the real world global optimization problem. BA is a population-based intelligent stochastic search technique that emerged from...
Multi-Agent System Testing: A Survey
In recent years, agent-based systems have received considerable attention in both academics and industry. The agent-oriented paradigm can be considered a natural extension to the object-oriented (OO) paradigm. Agents di...
The Impact of Learning Styles on Learner's Performance in E-Learning Environment
Due to growing popularity of E-Learning, personalization has emerged as important need. Differences of learners' abilities and their learning styles have affected the learning outcomes significantly. Meanwhile, with the...
Data Center Governance Information Security Compliance Assessment Based on the Cobit Framewok
One of control domain of Cobit describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain...
Handling Class Imbalance in Credit Card Fraud using Resampling Methods
Credit card based online payments has grown intensely, compelling the financial organisations to implement and continuously improve their fraud detection system. However, credit card fraud dataset is heavily imbalanced a...