Open Access
Issue
E3S Web Conf.
Volume 389, 2023
Ural Environmental Science Forum “Sustainable Development of Industrial Region” (UESF-2023)
Article Number 07022
Number of page(s) 25
Section IT in Environmental Science
DOI https://doi.org/10.1051/e3sconf/202338907022
Published online 31 May 2023
  1. O.E. Akinbowale, H.E. Klingelhöfer, M.F. Zerihun, Journal of Financial Crime, 1-14 (2020) [Google Scholar]
  2. M. Antonescu, R. Birau, Procedia Economics and FInance, 618-621. (2015) [Google Scholar]
  3. BangBit Technologies. What is Consensus Algorithm In Blockchain & Different Types Of Consensus Models. Retrieved from Bang Bit Tech (2018) DOI: https://medium.com/@BangBitTech/what-is-consensus-algorithm-in-blockchain-different-types-of-consensus-models-12cce443fc77 [Google Scholar]
  4. A. Bayramova, D.J. Edwards, C. Roberts, The Role of Blockchain Technology in Augmenting SupplyChain Resilience to Cybercrime, 1-19 (2021) [Google Scholar]
  5. Bernama Malaysia. (28 February, 2022). Ministry of Commuications and Multimedia Malaysia. Retrieved from 2020 DOI: https://www.kkmm.gov.my/index.php/en/privacy-policy/233-kpkk-news/16471-bernama-11-feb-2020-gov-t-actively-addressing-cyber-threats-crimes-dpmhttps://www.kkmm.gov.my/index.php/en/privacy-policy/233-kpkk-news/16471-bernama-11-feb-2020-gov-t-actively-addres [Google Scholar]
  6. R. Bevans,. One-way ANOVA | When and How to Use It (With Examples). Retrieved from Scribbr (2022) DOI: https://www.scribbr.com/statistics/one-way-anova/ [Google Scholar]
  7. BIS Quarterly Review. What is distributed ledger technology, Retrieved from BIS (2017) DOI: https://www.bis.org/publ/qtrpdf/r_qt1709y.htm [Google Scholar]
  8. O. Boireau, Securing the blockchain against hackers, 8-11, (2018) [Google Scholar]
  9. C. Komalavalli, D. Saxena, C. Laroiya, Overview of Blockchain Technology Concepts, 349-371 (2020) [Google Scholar]
  10. F. Casino, E. Politou, E. Alepis, C. Patsakis, Analysis of Emerging Threats. IEEE Access, 4737-4745 (2019) [Google Scholar]
  11. W. Chen, X. Guo, Z. Chen, Towards Financial Security for Blockchain Ecosystem, 4506-4513 (2020) [Google Scholar]
  12. C.C. Nwabuike, V.A. Onodugo, A. Arachie, U.C. Nkwunonwo, International Journal of Scientific &Technology, 1-10 (2020) [Google Scholar]
  13. N. Chinyamunjiko, F. Makudza, L. Mandongwe, International Journal of Financial,Accounting and Management, 17-30 (2022) [Google Scholar]
  14. Europol. Mastermind behind EUR 1 billion cyber bank robbery arrested in Spain. Retrieved from Europol (2018) DOI: https://www.europol.europa.eu/media-press/newsroom/news/mastermind-behind-eur-1-billion-cyber-bank-robbery-arrested-in-spain [Google Scholar]
  15. Geeks for Geeks. Consensus Algorithms in Blockchain. Retrieved from Geeks for Geeks (2022)DOI: https://www.geeksforgeeks.org/consensus-algorithms-inblockchain/ [Google Scholar]
  16. E. Ghosh, B. Das, (2020). A study on the issue of blockchain’s energy consumption. 1-15. [Google Scholar]
  17. P. Gottschalk, Convenience in white-collar crime: a case study of corruption among friends in Norway. Taylor&Francis Online, 413-424. (2020). [Google Scholar]
  18. J. Hammond, (9 September, 2021). Financial Cybercrime: Why Cryptocurrency is the Perfect ‘Getaway Car’. Retrieved from ThreatPost: https://threatpost.com/financial-cybercrime-cryptocurrency/169327/ [Google Scholar]
  19. A.B. Haque, M. Rahman, (2020). Blockchain Technology: Methodology,Application and Security Issues. IJCSNS International Journal of Computer Science and Network Security, 21-30. [Google Scholar]
  20. S. Hasham, S. Joshi, D. Mikkelsen, (1 October, 2019). Financial crime and fraud in the age of cybersecurity. Retrieved from Mc Kinsey&Company: https://www.mckinsey.com/business-functions/risk-and-resilience/ourinsights/financial-crime-and-fraud-in-the-age-of-cybersecurity [Google Scholar]
  21. Identity Theft Resource Centre. (2021). Retrieved from Insurance Theft Resource Centre: https://www.iii.org/fact-statistic/facts-statistics-identity-theft-andcybercrime#:~:text=Of%20the%202.2%20million%20fraud,lost%2C%20totaling%20a bout%20%241.2%20billion. [Google Scholar]
  22. G. Kitteringham, L.J. Fennelly, (2020). Chapter 19 - Environmental crime control. 207-222 [Google Scholar]
  23. S. Li, S. Zhao, P. Yang, P. Andriotis, L. Xu, Distrubuted Consensus Algorithm for Events Detection in Cyber Physical Systems. 2299-2308. (2019) [Google Scholar]
  24. A. Litke, D. Anagnostopoulos, T. Varvarigou, (2019). Blockchains for Supply Chain Management:Architectural Elements and Challenges Towards a Global Scale Deployment. 1-17. [Google Scholar]
  25. M, L. (7 December, 2021). What Is a Smart Contract and How Does it Work? Retrieved from BitDegree: https://www.bitdegree.org/crypto/tutorials/what-is-a-smart-contract [Google Scholar]
  26. A. M. Bossler, T. Brenblum, (2019). Introduction: new directions in cybercrime research. Journal of Crime and Justice, 495-499. [Google Scholar]
  27. M.S. Malik, U. Islam, (2019). Cybercrime: an emerging threat to the banking sector of Pakistan. Journal of Financial Crime, 50-60. [Google Scholar]
  28. L. Mathews, (7 September, 2017). Equifax Data Breach Impacts 143 Million Americans. Retrieved from Forbes: https://www.forbes.com/sites/leemathews/2017/09/07/equifax-data-breach-impacts-143-million-americans/?sh=1bd9eb5d356f [Google Scholar]
  29. D. Meyer, (26 March, 2018). A Cyber Gang Stole $1 Billion by Hacking Banks and ATMs. Now Police Say They’ve Caught the Mastermind. Retrieved from Fortune: https://fortune.com/2018/03/26/carbanak-europol-arrest-spain-malware-banks/ [Google Scholar]
  30. H. Min, (2019). Blockchain technology for enhancing supply chain resilience. Science Direct, 35-45. [Google Scholar]
  31. I.K. Miyashiro, (30 April, 2021). Case Study: Equifax Data Breach. Retrieved from Seven Pillars Institute: https://sevenpillarsinstitute.org/case-study-equifax-data-breach/ [Google Scholar]
  32. E.S. Negara, A.N. Hidyanto, R. Andryani, D. Erlan, (2021). A Survey Blockchain and Smart Contract Technology in Government Agencies. International Conference on Advanced Science and Technology, 1-8. [Google Scholar]
  33. V. Ngo-Lam, (24 December, 2019). Cyber Crime: Types, Examples, and What Your Business Can Do. Retrieved from Exabeam: https://www.exabeam.com/information-security/cyber-crime/ [Google Scholar]
  34. J. Nicholls, A. Kuppa, N.A. Le-Khac, (2016). Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape. IEEE Access, 1-23. [Google Scholar]
  35. C. Nickerson, (11 January, 2022). Routine Activities Theory. Retrieved from Simply Psychology: https://www.simplypsychology.org/routine-activities-theory.html [Google Scholar]
  36. O.Vashchuk, R. Shuwar. (2018). Pros and Cons of Consensus Algorithm Proof Of Stake. 106-112. [Google Scholar]
  37. Y. Okazaki, (2018). Unveiling the Potential of Blockchain for Customs. 1-24. [Google Scholar]
  38. S. Patil, S. Kadam, J. Katti, (2021). Security Enhancement of Forensic Evidences Using Blockchain. IEEE Xplore, 263-269. [Google Scholar]
  39. S. Ramadan, A. Putera, Sutrisno, et al, (2018). Impact of Cybercrime on Technological and Financial Developments. International Joural For Innovative Research In Multidisciplinary Field, 341-344. [Google Scholar]
  40. Raosoft. (n.d.). Retrieved from Raosoft Calculator: http://www.raosoft.com/samplesize.html [Google Scholar]
  41. M.A. Richardson, (21 February, 2022). Why Distributed Ledger Technology Is the Next Battleground for Hacker? Retrieved from Spiceworks: https://www.spiceworks.com/it-security/data-governance/articles/distributed-ledger-technology-cyber-threat/ [Google Scholar]
  42. S. Sayeed,, H. Marco-Gisbert, T. Caira, (2016). Smart Contract: Attacks and Protections. 1-13. [Google Scholar]
  43. ShaunTurney. (13 May, 2022). Pearson Correlation Coefficient (r) | Guide & Examples. Retrieved from Scribbr: https://www.scribbr.com/statistics/pearson-correlation-coefficient/ [Google Scholar]
  44. R. Shrestha, S.Y. Nam, (2019). Regional Blockchain for Vehicular Networks to Prevent 51% Attacks. IEEE Access, 95033-95045. [Google Scholar]
  45. Simply Explained. (7 August, 2018). What Is Blockchain Technology? How Does It Work? Retrieved from Builtin: https://builtin.com/blockchain [Google Scholar]
  46. A. Sirohi, (2021). Relevance of Blockchain Technology in The Scenario of Escalating Cybercrime in Banking Sector in the UK. ResearchGate, 1-6. [Google Scholar]
  47. Stephanie. (9 November, 2016). Beta Weight: Definition, Uses. Retrieved from Regression Analysis: https://www.statisticshowto.com/beta-weight/ [Google Scholar]
  48. C. Stouffer, (26 July, 2021). Blockchain security: How safe blockchain really is. Retrieved from Norton: https://us.norton.com/internetsecurity-privacy-how-toblockchain-security.html [Google Scholar]
  49. N. Tariq, (2018). Impact of Cyberattattacks on Financial Institutions. Journal of Internet Banking and Commerce, 1-11. [Google Scholar]
  50. Tarr, Julie-Anne. (2018). Distributed ledger technology, blockchain and insurance:Opportunities, risks and challenges. Insurance Law Journal, 254-268. [Google Scholar]
  51. A. Trozze, J. Kamps, E.A. Akartuna, et al., (2022). Cryptocurrencies and future fnancial crime. Crime Science, 1-35. [Google Scholar]
  52. J. Tuwiner, (15 July, 2022). 79+ Blockchain Statistics, Facts, and Trends. Retrieved from Buy Bitcoin Worldwide: https://www.buybitcoinworldwide.com/blockchain-statistics/ [Google Scholar]
  53. D. Unal, M. Hammoudeh, M.S. Kiraz, (2020). Policy specification and verification for blockchain and smart contracts in 5G. Science Direct, 43-47. [Google Scholar]
  54. V. Venkatesh, S. R.Gordon, (2020). The Intersection of Cybercrime and the Blockchain. ResearchGate, 676-699. [Google Scholar]
  55. J. Vijayan, (4 June, 2019). Carbanak Attack: Two Hours to Total Compromise. Retrieved from DarkReading: https://www.darkreading.com/attacks-breaches/carbanak-attack-two-hours-to-total-compromise [Google Scholar]
  56. A.L. Vivar, A. Turegano, A. Lucila, et al., (2020). An Analysis of Smart Contracts Security Threats Alongside Existing Solutions. 1-29. [Google Scholar]
  57. S. Vujicic, Nermin, Maro, Leo (2020). Distributed Ledger Technology as a Tool for Environment Sustainability in the Shipping Industry. Journal of Marine Science and Engineering, 1-14. [Google Scholar]
  58. Wadha, Somaya, Abdulghani, Ali, Muhammad. (2020). Comprehensive Review of Cybercrime Detection Techniques. Special Section on Emerging Approaches to Cybersecurity, 1-19. [Google Scholar]
  59. Q. Wang, R.Y. Lau, X. Mao, (2019). Blockchain-Enabled Smart Contracts for Enhancing Distributor-to-Consumer Transactions. IEEE Consumer Electronics Magazine, 22-29. [Google Scholar]
  60. M. Xu, X. Chen, G. Kou, (2019). A systematic review of blockchain. Springer Open, 1-14. [Google Scholar]
  61. Zach. (24 March, 2022). How to Interpret Adjusted R-Squared (With Examples). Retrieved from Statology: https://www.statology.org/adjusted-r-squared-interpretation/ [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.