70 likes | 191 Views
Electronic crime’s effect on data security. By Jim Woodard Texas Tech University. Intro. The purpose of this literature review is to examine the effect that various electronic crimes have on data security in terms of verification systems, complex verification systems, and legislation. .
E N D
Electronic crime’s effect on data security By Jim Woodard Texas Tech University
Intro • The purpose of this literature review is to examine the effect that various electronic crimes have on data security in terms of verification systems, complex verification systems, and legislation.
Simple Verification systems • Current verification techniques that are used by businesses aren’t enough to reliably protect their customers. • Often simple systems can be inaccurate on occasion.
Complex verification systems • Combination of simple verification techniques leads to stronger integrity within the system itself. • Bio-verification are much more reliable than password combination or pin verification systems.
Legislation and regulation • Governments are slow to act on cyber crimes. • More time is needed in order to verify whether or not the legislation is actually effective.
Conclusion • More research is needed on complex verification systems and legislation in order to determine the effectiveness of each against modern day cyber-crimes.
Works • Bilevičienė, Tatjana, and EglėBilevičiūtė. "Dynamics Of Crimes Against The Security Of Electronic Data And Information Systems, And Its Influence On The Development Of Electronic Business In Lithuania." Jurisprudencija 18.2 (2011): 689-702. Academic Search Complete. Web. 24 June 2014. • Cole, Simon A. "More than zero: Accounting for error in latent fingerprint identification." Journal of Criminal Law and Criminology (2005): 985-1078. Web. 24 June 2014. • Jain, Anil, Lin Hong, and SharathPankanti. "Biometric identification."Communications of the ACM 43.2 (2000): 90-98. Web. 24 June 2014. • Lindup, Ken. "Technology And Banking: Lessons From The Past."Digital Evidence & Electronic Signature Law Review 9.(2012): 91-94. Academic Search Complete. Web. 24 June 2014. • Ratha, Nalini K., Jonathan H. Connell, and Ruud M. Bolle. "Enhancing security and privacy in biometrics-based authentication systems." IBM systems Journal40.3 (2001): 614-634. Web. 24 June 2014. • Sinrod, Eric J., and William P. Reilly. "Cyber-crimes: A practical approach to the application of federal computer crime laws." Santa Clara Computer & High Tech. LJ 16 (2000): 177. Web. 24 June 2014. • Yang, Shenglin, and Ingrid Verbauwhede. "Automatic secure fingerprint verification system based on fuzzy vault scheme." Acoustics, Speech, and Signal Processing, 2005. Proceedings.(ICASSP'05). IEEE International Conference on. Vol. 5. IEEE, 2005. Web. 24 June 2014. • Zulhunda, Sonny, Ida Madieha, and Abdul GhaniAzmi. "Security Safeguards on e-Payment Systems in Malaysia: Analysis on the Payment Systems Act 2003." J. Int'l Com. L. & Tech. 6 (2011): 187. Web. 24 June 2014.