Impact of using Cryptocurrency to Maintain Cyber Security Blockchain Innovations and Applications
Keywords:
Authentication, blockchain, cryptocurrency, cyber security, cyber threats, transparencyAbstract
Purpose: Cryptocurrency has been identified as a form of currency that can be transferred through a “Digital platform.” Such “cryptocurrencies” are presented in the form of a large amount of data that can be leveraged through networks. Due to the presence of key gaps and a lack of strong authentication of these networks, both the data and the transaction details of the users are easily available and accessible to the hackers. Methodology: A deductive approach has been used in the present study to generate hypotheses and variables from the previous studies. For this study, the authors developed a survey questionnaire and collected data from 50 potential respondents sampled through simple random sampling method. After the data were collected, the researcher analyzed the data using paired sample test, correlation, one-sample T test, and F-test Findings: The present study findings infer that cryptocurrency has a positive impact on development and innovation of blockading technologies and cybersecurity. Most of the participants were unaware that clicking on malicious websites may provide accessibility to hackers. The study found that there is a huge increase experienced in the number of malicious actions, phishing attacks, cyber threats, scams, and financial frauds. Henceforth, the growth of cryptocurrency has enforced companies to develop and innovate blockchain applications to increase the integrity and security of transactions. Implications: Cyber security plays a key role in ensuring the integrity, transparency, authentication, and reliability of the data and networks, especially in the case of Fintech organizations. The primary aim of the study was to analyze the impact of using cryptocurrencies to achieve cyber security, maintain blockchain innovations, and secure other technological applications. Originality: The originality of the study is fully authentic.
References
Batubara, F., Ubacht, J., & Janssen, M. (2018). Challenges of Blockchain Technology Adoption for E-government: A Systematic Literature Review. In: Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age. doi: 10.1145/3209281.3209317
Bhardwaj, J., Negi, R., Nagrath, P., & Mittal, M. (2022). Applications of Blockchain in Various Domains. Cham: Springer Nature. p. 1-30. doi: 10.1007/978-3-030-71485-7_1
Caporale, G. M., Kang, W. Y., Spagnolo, F., & Spagnolo, N. (2020). Non-linearities, cyber attacks and cryptocurrencies. Finance Research Letters, 32, 101297. doi: 10.1016/j.frl.2019.09.012
Choithani, T., Chowdhury, A., Patel, S., Patel, P., Patel, D., & Shah, M. (2022). A comprehensive study of artificial intelligence and cybersecurity on bitcoin, crypto currency and banking system. Annals of Data Science, ???, doi: 10.1007/s40745-022-00433-5
Debajyoti, S. (2023). Impact of using crypto currency to maintain cyber security blockchain innovations and applications. International Journal of Science and Research, 12(5), 319-325. doi: 10.21275/SR23414204106
Deshmukh, A., Sreenath, N., Tyagi, A. K., & Abhichandan, U. V. E. (2022). Blockchain Enabled Cyber Security: A Comprehensive Survey. In: 2022 International Conference on Computer Communication and Informatics (ICCCI). p. 1-6. doi: 10.1109/ICCCI54379.2022.9740843
Fahmi, N., Hastasakti, D. E., Zaspiagi, D., & Saputra, R. K. (2023). A comparison of blockchain application and security issues from Bitcoin to Cybersecurity. Blockchain Frontier Technology, 3(1), 81-88. doi: 10.34306/bfront.v2i2.231
Garg, R. (2022). Ethereum based smart contracts for trade and finance. International Journal of Economics and Management Engineering, 16(11), 619-629. doi: 10.5281/zenodo.5854730
Mohammad, A., & Vargas, S. (2022). Challenges of using blockchain in the education sector: A literature review. Applied Sciences, 12(13), 6380. doi: 10.3390/app12136380
Onyekwere, E., Ogwueleka, F. N., & Irhebhude, M. E. (2023). Adoption and sustainability of bitcoin and the blockchain technology in Nigeria. International Journal of Information Technology, 15, 1-12. doi: 10.1007/s41870-023-01336-1
Ramos, S., Mélon, L., & Ellul, J. (2022). Exploring Blockchains Cyber Security Techno-Regulatory Gap. An Application to Crypto-Asset Regulation in the EU. In: 10th Graduate Conference in Law and Technology, Sciences Po (2022).
Research and Markets. (2022). Cryptocurrency Market Size, Market Share, Application Analysis, Regional Outlook, Growth Trends, Key Players, Competitive Strategies and Forecasts, 2022 to 2030. Ireland: Research and Markets.
Sailaja, P., & Thamodaran, V. (2016). Customer perception on security system in E-banking services with special references to EDC. Indian Journal of Commerce and Management Studies, 7(2), 66-72.
Sakas, D. P., Giannakopoulos, N. T., Kanellos, N., & Migkos, S. P. (2022). Innovative cryptocurrency trade websites’ marketing strategy refinement, via digital behavior. IEEE Access, 10, 63163-63176. doi: 10.1109/ACCESS.2022.3182396
Statista. (2023). Overall Cryptocurrency Market Capitalization Per Week from July 2010 to June 2023. Hamburg: Statista.
Tibrewal, I., Srivastava, M., & Tyagi, A. (2022). Blockchain Technology for Securing Cyber-Infrastructure and Internet of Things Networks. Singapore: Springer. p. 337-350. doi: 10.1007/978-981-16-6542-4_17
Varghese, H. M., Nagoree, D. A., Anshu, & Jayapandian, N. (2021). Cryptocurrency Security and Privacy Issues: A Research Perspective. In: 2021 6th International Conference on Communication and Electronics Systems (ICCES). p. 902-907. doi: 10.1109/ICCES51350.2021.9489254
Weichbroth, P., Wereszko, K., Anacka, H., & Kowal, J. (2023). Security of cryptocurrencies: A view on the state-of-the-art research and current developments. Sensors (Basel), 23(6), 3155. doi: 10.3390/s230631553
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Çetin, F., & Basım, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. doi: 10.1080/08874417.2020.1712269