International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

Archives

TuEngr+Logo
:: International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

http://TuEngr.com



ISSN 2228-9860
eISSN 1906-9642
CODEN: ITJEA8


FEATURE PEER-REVIEWED ARTICLE

Vol.15(4)(2024)

  • Modeling a Digital Trust Framework to Address Cybersecurity Issues in Malaysia's Digital Economy

    Aumuhaimi Md. Yusof (Royal Malaysian Customs Department, Putrajaya, MALAYSIA),
    Muhamad Khairulnizam Zaini, Irni Eliana Khairuddin, and Noraayu Ahmad Uzir (Faculty of Information Management, Universiti Teknologi MARA, 40150 Shah Alam, Selangor, MALAYSIA).

    Discipline: Information Science & Cybersecurity, Digital Economy.

    ➤ FullText

    DOI: 10.14456/ITJEMAST.2024.21

    Keywords: Cybersecurity; Digital Economy; Digital Trust, Data security; Cyber threats; Cybercrimes; Digital businesses; Data privacy; Cybersecurity challenges; Security risk management.

    Abstract
    Embracing the concepts of cybersecurity in the digital economy is critical for overcoming security concerns in this new economic era. This article provides a review of significant work on cybersecurity and its technology, especially in the digital economy, and critically analyses its usefulness in understanding how it may overcome certain challenges in the ecosystems of the digital economy. Several advantages and limitations of current cyber-related trust models and theories are identified, and a conceptual framework for research on ways to explore some specific cybersecurity challenges raised by the digital economy's ecosystems, as well as how a digital trust model could address such challenges, is proposed and discussed.

    Paper ID: 15A4B

    Cite this article:

    Md Yusof, A., Zaini, M. K., Khairuddin, I. E., and Ahmad Uzir, N. (2024). Modeling a Digital Trust Framework to Address Cybersecurity Issues in Malaysia's Digital Economy. International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies, 15(4), 15A4B, 1-12. http://TUENGR.COM/V15/15A4B.pdf DOI: 10.14456/ITJEMAST.2024.21

References

  1. Arora, B. (2016). Exploring and analyzing Internet crimes and their behaviours. Perspectives in Science, 8, 540-542. DOI: 10.1016/j.pisc.2016.06.014
  2. Carpenter, D., McLeod, A., Hicks, C., & Maasberg, M. (2016). Privacy and biometrics: An empirical examination of employee concerns. Information Systems Frontiers, 20(1), 91-110. DOI: 10.1007/s10796-016-9667-5
  3. Chen, L., Lee, W. K., Chang, C. C., Choo, K. K. R., & Zhang, N. (2019). Blockchain-based searchable encryption for electronic health record sharing. Future Generation Computer Systems, 95, 420-429. DOI: 10.1016/j.future.2019.01.018
  4. Chen, Y. (2017). Service-Oriented Computing and System Integration: Software, IoT, Big Data, and AI as Services. 6th Ed., Kendall Hunt Publishing.
  5. Chernyakov, M., & Chernyakova, M. (2018). Technological Risks of the Digital Economy. Journal of Corporate Finance Research, 12(4), 99-109. DOI: 10.17323/j.jcfr.2073-0438.12.4.2018.99-109
  6. Crosby, M., Nachiappan, P. P., Verma, S., & Kalyanaraman, V. (2015). BlockChain Technology. Sutardja Center for Entrepreneurship & Technology, Technical Report, 16.
  7. Duah, F. A., & Kwabena, A. M. (2015). The impact of cybercrime on the development of electronic business in Ghana. European Journal of Business and Social Sciences, 4(1), 22-34. http://www.ejbss.com
  8. EPU. (2021). Malaysia Digital Economy Blueprint. https://www.epu.gov.my/sites/default/files/2021-02/malaysia-digital-economy-blueprint.pdf
  9. Ferrari, E., & Thuraisingham, B. (2020). Digital Trust: Trust Management in Cyberspace. IEEE Internet Computing, 24(6), 6-7. DOI: 10.1109/mic.2020.3028898
  10. Fortinet. (2019). Three Key Strategies for Securing Digital Business. Fortinet Blog. https://www.fortinet.com/blog/industry-trends/transforming-security-using-three-basic-principles
  11. Hanna, N. K. (2020). Assessing the digital economy aims, frameworks, pilots, results, and lessons. Journal of Innovation and Entrepreneurship, 9(1). DOI: 10.1186/s13731-020-00129-1
  12. Hathaway, M., Demchak, C., Kerben, J., McArdle, J., & Spidalieri, F. (2013). Cyber readiness index 1.0. Great Falls, VA: Hathaway Global Strategies LLC.
  13. Ibrahim, U. (2020). The Impact of Cybercrime on The Nigerian Economy and Banking System. https://ndic.gov.ng/wp-content/uploads/2020/08/NDIC-Quarterly-Vol-34-No-12-2019-Article-The-Impact-Of-Cybercrime-On-The-Nigerian-Economy-And-Banking-System.pdf
  14. Kende, M. (2020). Internet governance in international Geneva: The observatory of the foundation pour Geneve. http://www.graduateinstitute.ch/sites/internet/files/2020-09/FPG_Bulletin%20Internet%20Governance-DIGITAL.pdf
  15. Liu, S., Huang, W. W., Lu, H., & Watson, R. (2021). PACIS 2019: Emerging technology, business, and application in digital economy. Information & Management, 58(6), 103466. DOI: 10.1016/j.im.2021.103466
  16. McDaniel, B. (2018). An In-Depth Look into Cybercrime. Themis Research Journal of Justice Studies and Forensic Science, 6(1). DOI: 10.31979/themis.2018.0610
  17. Muslim, A. K., Mohd Dzulkifli, D. Z., Nadhim, M. H., & Abdellah, R. H. (2019). A Study of Ransomware Attacks: Evolution and Prevention. Journal of Social Transformation and Regional Development, 1(1), 18-25. https://publisher.uthm.edu.my/ojs/index.php/jstard/article/view/5503
  18. Nurse, Jason. (2018). Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. 10.1093/oxfordhb/9780198812746.013.35 Peter, A. S. (2017). Cyber resilience preparedness of Africa's top-12 emerging economies. International Journal of Critical Infrastructure Protection, 17, 49-59. DOI: 10.1016/j.ijcip.2017.03.002
  19. Rosadi, S. (2018). Protecting Privacy on Personal Data in Digital Economic Era: Legal Framework In Indonesia. Brawijaya Law Journal, 5(2), 143-157. DOI: 10.21776/ub.blj.2018.005.01.09
  20. Sas, C., & Khairuddin, I.E. (2017). Design for Trust: An Exploration of the Challenges and Opportunities of Bitcoin Users. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems.
  21. Srinivasan, C. (2017). Hobby hackers to billion-dollar industry: the evolution of ransomware. Computer Fraud & Security, 11, 7-9. DOI: 10.1016/s1361-3723(17)30081-7
  22. The Economist. (2018). America should borrow from Europe's data-privacy law. https://www.economist.com/leaders/2018/04/05/america-should-borrow-from-europes-data-privacy-law
  23. Trendmicro. (2016). Why Ransomware Works: The Psychology and Methods Used to Distribute, Infect, and Extort. Security News. https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/why-ransomware-works-psychology-and-methods-to-distribute-infect-and-extort
  24. Wall, D. S. (2015). The Internet as a Conduit for Criminal Activity. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=740626
  25. World Bank Group. (2019). Malaysia's Digital Economy: A New Driver of Development 2019. https://openknowledge.worldbank.org/bitstream/handle/10986/30383/129777.pdf
  26. Zaini, M. K., Masrek, M. N., & Abdullah Sani, M. K. J. (2020). The impact of information security management practices on organisational agility. Information & Computer Security, 28(5), 681-700. DOI: 10.1108/ics-02-2020-0020
  27. Zhao, H., Cui, W., Li, S., & Xu, R. (2019). Token Economy: A New Form Economy with Decentralized Mutual Trust and Collective Governance. 2019 IEEE 14th International Symposium on Autonomous Decentralized System (ISADS). DOI: 10.1109/isads45777.2019.9155592
  28. Zimba, A., & Chishimba, M. (2019). On the Economic Impact of Crypto-ransomware Attacks: The State of the Art on Enterprise Systems. European Journal for Security Research, 4(1), 3-31. DOI: 10.1007/s41125-019-00039-8


Other issues:
Vol.15(3)(2024)
Vol.15(2)(2024)
Archives




Call-for-Papers

Call-for-Scientific Papers
Call-for-Research Papers:
ITJEMAST invites you to submit high quality papers for full peer-review and possible publication in areas pertaining engineering, science, management and technology, especially interdisciplinary/cross-disciplinary/multidisciplinary subjects.

To publish your work in the next available issue, your manuscripts together with copyright transfer document signed by all authors can be submitted via email to Editor @ TuEngr.com (please see all detail from Instructions for Authors)



Publication and peer-reviewed process:
After the peer-review process, articles will be on-line published in the available next issue. However, the International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies cannot guarantee the exact publication time as the process may take longer time, subject to peer-review approval and adjustment of the submitted articles.