You are here: Home Contents V17 N3 V17N3_Dhillon.html
Personal tools

Zoombombing: Hype and Reality

 

 

Full text
View
Purchase

Source
Journal of Information System Security
Volume 17, Number 3 (2021)
Pages 189197
ISSN 1551-0123
Authors
Simran Dhillon — Virginia State University, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

With the rapid penetration of the Internet and other information and communication technology worldwide, cyber-crime is emerging as a threat to personal data stored in computers and is likely to affect the entire data systems. Even the United States, one of the most technologically advanced countries, is also subjected to such crimes. Bangladesh, being a less developed country, is also under the risk of cyber-crimes that could jeopardize the country’s national security. As the incumbent government aims to ensure Internet connectivity in all government institutions by 2021, upholding the motto of ‘Digital Bangladesh’, more and more national and multinational companies are offering online services for their services through the Internet as they follow the government’s agenda. From shopping to banking, all are just a click away with a higher rate of Internet penetration. However, criminals are also using the same online platform where they are committing various sorts of criminal activities, including phishing, hacking and stealing personal data. Hence both state-owned and private organizations could fall prey to cyber-attacks which can affect the lives of the entire population. Furthermore, 90% of the country’s software is unlicensed, which also intensifies the risk of cybercrimes due to their compromised security. In addition, the recent tug of war between Bangladeshi and Indian hackers has impacted the diplomatic relations between the two nations. More importantly, scores of media reports have been saying that terror groups use the online platforms for financing and maintaining intra-group communications. In this context, the existing laws and government measures against cyber-crimes are very weak to combat the burgeoning threat. This study attempts to shed light upon the threat posed by cyber-crimes in the context of the global village, with an emphasis on the perspective of Bangladesh.

 

 

Keywords

Zoombombing; Technical, Formal and Informal Controls; Security Breaches.

 

 

References

Chauvidul, N. 2003. Formality and Informality in Internal Control Systems: A Comparative Study of Control in Different Social and Cultural Environments in a Global Bank. London School of Economics and Political Science (United Kingdom).

Dhillon, G. 2007. Principles of Information Systems Security: Text and Cases. Hoboken, NJ: John Wiley & Sons.

Dhillon, G. 2018. Information Security. Text and Cases. VT: Prospect Press.

Dhillon, G., and Backhouse, J. 1996. "Risks in the Use of Information Technology within Organizations," International Journal of Information Management (16:1), pp. 65-74.

Dhillon, G., and May, J. 2006. "Interpreting Security in Human-Computer Interactions. A Semiotic Analysis," in Human-Computer Interaction and Management Information Systems: Foundations, P. Zhang and D. Galletta (eds.). Armonk: New York: M E Sharpe, pp. 281-291.

Dhillon, G., Oliveira, T., Susarapu, S., and Caldeira, M. 2016. "Deciding between Information Security and Usability: Developing Value Based Objectives," Computers in Human Behavior (61), pp. 656-666.

Liebenau, J., and Backhouse, J. 1990. Understanding Information. Basingstoke: Macmillan.

Samonas, S., and Coss, D. 2014. "The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security," Journal of Information System Security (10:3).