Chris Gilbert | William V. S. Tubman University (original) (raw)
Papers by Chris Gilbert
International Research Journal of Advanced Engineering and Science, Volume 9, Issue 4, pp. 316-334, 2024
The increasing prevalence of data breaches and cyberattacks underscores the urgent need for enhan... more The increasing prevalence of data breaches and cyberattacks underscores the urgent need for enhanced security and transparency in database management systems (DBMS). This paper explores the integration of blockchain technology into DBMS to address these challenges, leveraging the inherent features of blockchain-decentralization, immutability, and transparency-to create tamper-proof and trustworthy data environments. Using SQLite as a foundational example, we demonstrate the step-by-step process of blockchain integration and present a practical application through a fitness-based social platform that allows individuals to securely claim and verify personal fitness data. The research extends its implications to diverse fields such as public administration, electronic health records, educational institutions, and social science research, highlighting the versatility and potential of blockchain-enhanced DBMS. We develop a comprehensive taxonomy to classify integration methods, evaluate existing blockchain-integrated DBMS solutions, and identify key benefits and challenges associated with this convergence. Through theoretical models and practical implementations on platforms akin to Bitcoin and Hyperledger Fabric, our findings reveal significant improvements in data integrity, trust, and transparency, while also addressing storage and scalability concerns. Additionally, case studies illustrate real-world applications in e-voting, Industrial Internet of Things (IIoT), and healthcare, demonstrating the practical relevance and transformative potential of blockchain technology in modern data management. The paper concludes by outlining future research directions and emerging trends, emphasizing the critical role of blockchain in advancing secure and transparent database systems.
International Research Journal of Advanced Engineering and Science, Volume 9, Issue 4, pp. 291-315, 2024
The advent of quantum computing presents a transformative challenge to contemporary cryptographic... more The advent of quantum computing presents a transformative challenge to contemporary cryptographic systems, threatening the security of widely used encryption algorithms such as RSA, ECC, and Diffie-Hellman. Leveraging principles like superposition and entanglement, quantum computers can efficiently solve complex mathematical problems that underpin classical cryptographic methods. This paper explores the profound implications of quantum computing on cybersecurity, highlighting quantum algorithms such as Shor's and Grover's, which demonstrate the vulnerabilities of current encryption systems. It reviews advancements in post-quantum cryptography, including lattice-based, code-based, and multivariate approaches, and discusses methodologies for integrating quantum-resistant algorithms into existing infrastructures. Case studies on quantum-safe blockchain solutions and quantumsecure communication networks illustrate practical applications and emerging technologies. By examining the challenges and proposing a framework for transitioning to quantum-safe systems, this study underscores the urgency of adopting proactive strategies to secure digital communications in the quantum era.
International Journal of Research Publication and Reviews, Vol 5, no 12, pp 1174-1191 , 2024
In the digital era, cybersecurity has emerged as a critical challenge for organizations worldwide... more In the digital era, cybersecurity has emerged as a critical challenge for organizations worldwide, underscored by high-profile breaches such as the 2017 Equifax data breach. This research explores the organizational and leadership aspects of cybersecurity governance by integrating agency theory and organizational learning theory. By examining the roles, qualities, and challenges of effective cybersecurity leaders, the study highlights the necessity of strategic vision, adaptability, and strong communication skills in navigating technological vulnerabilities and human factors. A structured framework for developing comprehensive cybersecurity policies is proposed, emphasizing alignment with organizational goals and fostering a security-conscious culture. The research also provides a comparative analysis of prominent cybersecurity governance frameworks-such as ISO/IEC 27001, NIST SP 800-53, and COBIT 2019-and offers practical guidance on integrating these frameworks into existing IT infrastructures across various industries. Furthermore, it underscores the importance of regular audits, performance metrics, and continuous improvement strategies in maintaining and evaluating cybersecurity governance. The study concludes by emphasizing the need for adaptive leadership and proactive measures to enhance organizational resilience against evolving cyber threats, suggesting future research directions focusing on artificial intelligence, machine learning, and fostering a security-centric culture.
International Journal of Research Publication and Reviews, Vol 5, no 12, pp 1149-1173, 2024
The evolution of cryptographic algorithms has been essential in responding to the growing threats... more The evolution of cryptographic algorithms has been essential in responding to the growing threats in the digital age. This paper examines the development of cryptography, starting with ancient methods like the Caesar cipher, and leading to modern algorithms such as RSA, AES, and the emerging field of post-quantum cryptography. Through detailed analysis, including a review of existing literature, case studies, and mathematical modeling, the paper explores how cryptographic techniques have adapted to secure data against increasingly sophisticated cyberattacks. It also addresses vulnerabilities in current systems, such as brute-force and side-channel attacks, and considers the looming threat of quantum computing, which could compromise widely used encryption methods. Finally, the paper looks ahead to new innovations like homomorphic encryption and AI-driven cryptographic solutions, emphasizing the need for ongoing research and development to stay ahead of evolving cyber threats.
The exponential growth of Big Data has revolutionized numerous industries by enabling the extract... more The exponential growth of Big Data has revolutionized numerous industries by enabling the extraction of valuable insights from vast and diverse datasets. However, this advancement is accompanied by significant privacy and security challenges that impede the full potential of data analytics. Privacy-Preserving Data Mining (PPDM) emerges as a critical approach to mitigate these challenges, ensuring individual privacy while maintaining data utility. This paper presents a comprehensive survey of state-of-the-art PPDM methodologies within Big Data environments, encompassing privacy models, data transformation techniques, privacy-preserving machine learning algorithms, and privacy economics. Through an extensive literature review and analysis of real-world applications in healthcare and finance, we identify key challenges and gaps in current practices. Additionally, we propose a cohesive privacy framework aimed at guiding researchers and practitioners in implementing robust privacypreserving mechanisms. The study also explores emerging trends such as advanced cryptographic techniques, privacy-preserving query processing, and the integration of privacy in machine learning. By addressing the balance between data utility and privacy, this research contributes to the advancement of ethical and secure Big Data analytics, paving the way for future innovations and interdisciplinary collaborations in the field.
International Journal of Research Publication and Reviews, Vol 5, no 12, pp 507-533 December , 2024
Critical infrastructure sectors are increasingly vulnerable to sophisticated cyber threats that c... more Critical infrastructure sectors are increasingly vulnerable to sophisticated cyber threats that can disrupt essential services and impact national security. This research provides a comprehensive review of existing cybersecurity risk management frameworks-including NIST (National Institute of Standards and Technology), ISO/IEC 27000 (International Organization for Standardization / International Electrotechnical Commission 27000 series), COBIT (Control Objectives for Information and Related Technology), and ITIL (Information Technology Infrastructure Library)-to evaluate their effectiveness in protecting critical infrastructures. We introduce aerospace methodologies to enhance cybersecurity risk management, improving the reliability and stability of industrial control systems without compromising performance. A decision environment model is developed to assist organizations in selecting the most appropriate frameworks and tools based on their specific needs. The applicability of the NIST Cybersecurity Framework's magic quadrant is demonstrated as an effective tool for risk management across various sectors.Through detailed case studies in the Energy, Healthcare, and Transportation sectors, we highlight the practical challenges and successes in implementing these frameworks. Our findings suggest that integrating the adaptability of the NIST Framework, the governance strengths of COBIT, the comprehensive standards of ISO/IEC 27000, and the service management focus of ITIL results in a balanced and robust approach to cybersecurity risk management. We also address emerging challenges posed by technological innovations such as the Internet of Things (IoT) and artificial intelligence (AI), emphasizing the need for frameworks to evolve accordingly. The paper concludes with recommendations for enhancing collaboration between government and industry stakeholders to strengthen the resilience of critical infrastructures against evolving cyber threats.
International Research Journal of Advanced Engineering and Science
This article explores the role of educational initiatives in enhancing privacy standards within C... more This article explores the role of educational initiatives in enhancing privacy standards within Cardano's blockchain ecosystem, emphasizing the importance of user and developer education in maintaining data security and compliance. Cardano, launched in 2017, distinguishes itself from other blockchains with a unique twolayer architecture and a proof-of-stake consensus model that prioritize scalability, security, and user empowerment. As Cardano's ecosystem grows, the integration of privacy features like Zero-Knowledge Proofs (ZKPs), the Extended UTXO model, and decentralized identity solutions highlights the need for robust privacy education to help users navigate blockchain complexities. Through a comprehensive analysis of academic collaborations, case studies, and educational strategies, this paper demonstrates how Cardano fosters a community of informed users and developers who advocate for privacy standards and responsible data management. Additionally, it discusses the challenges in blockchain privacy education, such as technical
complexity and misinformation, and suggests strategies to address
these issues. By investing in continuous, accessible education,
Cardano aims to build a secure, transparent, and privacy-conscious
blockchain ecosystem that empowers individuals and sets a benchmark
for privacy standards across the blockchain industry.
International Journal of Scientific Research and Modern Technology (IJSRMT), Volume 3, Issue 11, 2024
This study explores the effectiveness and security impact of two pseudorandom number generators (... more This study explores the effectiveness and security impact of two pseudorandom number generators (PRNGs): the Fibonacci Random Number Generator (FRNG) and the Gaussian Random Number Generator (GRNG) in cryptographic systems. By applying statistical tests, the research aims to determine which of these generators provides a more robust level of randomness, thus boosting the security of cryptographic applications. The approach involves generating sequences of
random integers using Java implementations of both FRNG and GRNG, followed by an analysis with the Chi-Square Test and Kolmogorov-Smirnov Test. Results show that the Gaussian PRNG produces numbers that align more consistently with a uniform distribution, while the Fibonacci PRNG shows notable irregularities. This points to the need for rigorous testing
of RNGs to uphold security and reliability in cryptographic systems. The study’s outcomes carry important implications for choosing cryptographic algorithms, emphasizing the crucial role of high-quality RNGs in safeguarding data confidentiality, integrity, and authenticity
International Journal of Scientific Research and Modern Technology (IJSRMT),Volume 3, Issue 11, 2024
With rapid technological advancements, the emergence of deepfakes and digital misinformation has ... more With rapid technological advancements, the emergence of deepfakes and digital misinformation has become both a powerful tool and a formidable challenge. Deepfakes—realistic yet fabricated media generated through artificial intelligence—threaten media credibility, public perception, and democratic integrity. This study explores the intersection of AI technology with these concerns, highlighting AI's role both as a driver of innovation and as a defense mechanism. By conducting an in-depth review of literature, analyzing current technologies, and examining case studies, this research evaluates AI-based strategies for identifying and addressing misinformation. Additionally, it considers the ethical and policy
implications, calling for greater transparency, accountability, and media literacy. Through examining present AI techniques and predicting future trends, this paper underscores the importance of collaborative efforts among tech companies, government agencies, and the public to uphold truth and integrity in the digital age.
Global Scientific Journal, 2024
Blockchain technology, first introduced with Bitcoin, has evolved into a powerful system for secu... more Blockchain technology, first introduced with Bitcoin, has evolved into a powerful system for secure data exchange across numerous industries. Its foundation relies on cryptographic methods like hash algorithms, public key cryptography, and digital signatures to maintain data integrity
and transparency without the need for a central authority. This paper traces the development of blockchain technology, exploring its uses beyond cryptocurrencies, including applications in healthcare, supply chain management, and secure voting systems. The paper also delves into the underlying cryptographic principles, examining the cybersecurity challenges and vulnerabilities associated with blockchain, particularly in the context of quantum computing threats. Through case studies, the paper highlights how blockchain can improve privacy, transparency, and
resilience in practical settings. Finally, the paper discusses future research avenues aimed at enhancing blockchain's efficiency and security in the face of emerging technological advancements.
International Journal of Research Publication and Reviews, Vol 5, no 11, pp 3235-3256 , 2024
As the use of digital services grows, protecting the privacy and integrity of sensitive data, esp... more As the use of digital services grows, protecting the privacy and integrity of sensitive data, especially in fields like healthcare, finance, and secure surveying, has become a critical concern. Homomorphic encryption (HE) offers a solution by allowing computations to be performed on encrypted data without revealing the original information. This paper examines the principles of homomorphic encryption and its applications in privacy-preserving tasks, focusing on its use in cloud computing, healthcare, and cybersecurity. Various types of HE schemes, including Fully Homomorphic Encryption (FHE), Partially Homomorphic Encryption (PHE), and Somewhat Homomorphic Encryption (SHE), are reviewed to assess their performance, efficiency, and real-world use. The paper also discusses the
challenges of implementing HE, such as computational overhead and key management. It suggests directions for future research to improve the scalability and usability of HE in real-time applications. Addressing these challenges will make homomorphic encryption an essential tool for secure, privacy-preserving data processing and sharing in modern digital systems
International Research Journal of Advanced Engineering and Science, Volume 9, Issue 4, pp. 205-219,, 2024
The incorporation of artificial intelligence (AI) into autonomous weapon systems raises significa... more The incorporation of artificial intelligence (AI) into autonomous weapon systems raises significant security concerns and ethical questions regarding international regulation. This paper explores the potential effects of AI-driven autonomous weapons (AI-AWs) on global security, emphasizing the dual-use characteristics of AI technologies and their ability to disrupt military strategies and strategic equilibrium. Through a combination of interdisciplinary workshops, literature reviews, and case studies, the research highlights critical security threats, ethical issues, and the risk of unintended escalation of conflicts linked to AI-AWs. The paper advocates for the creation of comprehensive international policies and regulatory frameworks to tackle these challenges, stressing the importance of human oversight and ethical standards. Policy suggestions include establishing precise definitions, monitoring systems, and international oversight organizations to ensure the responsible use of AI in military applications. The study concludes by calling for global collaboration to reduce the risks associated with AI-AWs and to enhance global security and stability.
International Journal of Research Publication and Reviews, Vol 5, no 11, pp 889-907 November 2024, 2024
As quantum computing starts to pose significant security risks to traditional cryptographic syste... more As quantum computing starts to pose significant security risks to traditional cryptographic systems, quantum cryptography is emerging as a key solution. This paper examines how quantum key distribution (QKD) and other quantum-based cryptographic methods can strengthen cybersecurity. By leveraging principles from quantum mechanics-like superposition and entanglement-quantum cryptography offers the potential to protect communications from highly advanced quantum threats. We delve into various quantum cryptographic protocols, including BB84 and device-independent QKD, exploring them both theoretically and through computational analysis. Real-world applications in sectors such as finance and telecommunications demonstrate the practical value of QKD. However, challenges like high costs, scalability issues, and compatibility with existing systems remain obstacles to broader implementation.Ultimately, this research underscores how quantum cryptography can enhance current security measures and meet the demands of a future shaped by quantum computing.
INTERNATIONAL JOURNAL OF RESEARCH AND INNOVATION IN APPLIED SCIENCE (IJRIAS) ISSN No. 2454-6194 | DOI: 10.51584/IJRIAS |Volume IX Issue X October 2024, 2024
This paper investigates the global ramifications of cybercrime and underscores the essential role... more This paper investigates the global ramifications of cybercrime and underscores the essential role of effective
cybercrime legislation, with a particular emphasis on Liberia. As digital technologies continue to expand,
cybercrime has emerged as a formidable threat, resulting in significant financial losses and jeopardizing the
privacy and security of individuals and organizations across the globe. The study evaluates the existing
cybercrime legislation in Liberia, analyzing its conformity with international standards and pinpointing
deficiencies that impede effective enforcement and protection. By conducting a comparative analysis with
global best practices, the research reveals both the strengths and weaknesses of Liberia's approach to
cybercrime. The paper offers recommendations aimed at strengthening the legal framework, highlighting the
necessity of international collaboration, clear legal definitions, and heightened public awareness. It posits that
a robust legal framework is crucial not only for addressing cyber threats but also for promoting economic
growth and stability in the digital era.
International Journal of Research Publication and Reviews, Vol 5, no 11, pp 620-630 , 2024
This paper examines occupational stress among academic personnel through the framework of Maslow'... more This paper examines occupational stress among academic personnel through the framework of Maslow's hierarchy of needs, highlighting how stress manifests across different career stages in academia. Utilizing historical perspectives and contemporary findings, the study explores how technological advancements have reshaped academic responsibilities but have not alleviated core stressors. Junior academic staff often encounter stress linked to foundational needs, including job security, career development, and community integration. In contrast, senior faculty face stressors associated with self-actualization, administrative responsibilities, and reputation maintenance. The study integrates Selye's General Adaptation Syndrome and Hobfoll's conservation of resources theory to contextualize the
physiological and psychological impacts of prolonged occupational stress in academia. This paper argues that a targeted approach to mental health support, workload management, and institutional resources is essential to addressing academic stress across career levels, ultimately promoting faculty well-being, productivity, and
sustainable career progression.
11.International Journal of Research Publication and Reviews, Vol 5, no 11, pp 219-236., 2024
The rapid proliferation of the Internet of Things (IoT) has introduced significant security chall... more The rapid proliferation of the Internet of Things (IoT) has introduced significant security challenges due to the increasing number of connected devices and the complexity of their architectures. This paper explores the role of Artificial Intelligence (AI) in enhancing IoT security through advanced threat detection methodologies. AI-driven techniques, such as machine learning (ML) and deep learning (DL), provide promising solutions for detecting anomalies, mitigating attacks, and managing cyber risks in real-time IoT environments. By leveraging both supervised and unsupervised learning models, the study highlights the potential of AI to identify and counter both known and unknown threats in IoT networks. Reinforcement learning is also examined as a strategy for adaptive security solutions in dynamic IoT ecosystems. Additionally, blockchain technology is employed to verify communication authenticity and safeguard data integrity across IoT devices. The research discusses case studies, such as smart home and industrial IoT setups, and presents an AI-powered framework for securing critical IoT infrastructures. The paper concludes with a call for further exploration of distributed AI-based threat detection architectures and highlights the importance of privacy and security in the future development of AI-driven IoT systems.
International Research Journal of Advanced Engineering and Science, 2024
The rapid advancement of artificial intelligence (AI) has led to the creation of sophisticated de... more The rapid advancement of artificial intelligence (AI) has led to the creation of sophisticated deepfakes, which pose significant threats to digital authenticity and national security. Deepfakes are manipulated audiovisual content that can deceive even the most discerning individuals, leading to the spread of misinformation and disinformation. This paper discusses the role of AI in combating deepfakes and digital misinformation, highlighting the challenges and limitations of current AI technologies in detecting and preventing these threats. The paper begins by outlining the background and significance of deepfakes, including their definition, types, and impact on various sectors. It then delves into the current AI technologies used for deepfake detection, including model-driven and data-driven methods. The challenges and limitations of these methods are discussed, including the need for more robust and interpretable models that can effectively detect deepfakes. The paper also explores the societal implications of deepfakes and digital misinformation, including the erosion of trust in media and information sources. It highlights the need for new paradigms for using AI and other technologies to induce trustworthiness and media integrity. Finally, the paper discusses the legal and ethical considerations surrounding deepfakes, including regulatory frameworks and compliance. It emphasizes the importance of developing AI quality criteria and evaluation protocols to minimize the impact of deepfakes and digital misinformation. In conclusion, the paper recommends a collaborative effort from experts across disciplines to understand and mitigate the challenges posed by deepfakes and digital misinformation. It suggests that future research should focus on developing more robust AI technologies for deepfake detection and prevention, as well as exploring the potential impacts and implications of deepfakes on societal systems.
Global Scientific Journals, 2024
As blockchain technology continues to evolve, the pursuit of privacy has become a significant cha... more As blockchain technology continues to evolve, the pursuit of privacy has become a significant challenge. Although the transparency and immutability of blockchain are essential features, they can unintentionally expose sensitive information. This paper investigates the potential of Zero-Knowledge Proofs (ZKPs) and Secure Multi-Party Computation (SMPC) as innovative solutions to address these privacy concerns. ZKPs facilitate the verification of information without disclosing the underlying data, thereby enhancing privacy in transactions and identity verification processes. Meanwhile, SMPC enables collaborative computations while preserving the confidentiality of inputs, which is vital for industries such as finance and healthcare. Despite their potential, these technologies encounter challenges related to complexity, scalability, and regulatory compliance. This study offers a thorough analysis of ZKPs and SMPC, their applications, and the ethical implications involved, providing valuable insights into their role in creating a secure and privacy-conscious blockchain ecosystem.
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING, MANAGEMENT & APPLIED SCIENCE (IJLTEMAS), 2024
This research investigates the transformative potential of incorporating blockchain technology in... more This research investigates the transformative potential of incorporating blockchain technology into computer science education. In light of the rapid evolution of the digital landscape, traditional educational frameworks often fail to meet the demands of the industry, resulting in a significant skills gap among graduates. This paper analyzes how the integration of blockchain can revolutionize computer science curricula by enhancing learning experiences and equipping students to navigate future technological challenges. The study highlights the advantages of blockchain in educational contexts, including increased security and transparency of academic records, streamlined credentialing processes, and the establishment of decentralized learning platforms that promote collaboration and innovation. It presents case studies of institutions that have successfully implemented blockchain, along with strategies for educators to effectively integrate this technology into their pedagogical approaches. Additionally, the research addresses the challenges and limitations associated with blockchain integration, such as the requisite learning curve and infrastructure demands. The findings indicate that the incorporation of blockchain in computer science education can significantly boost student engagement, provide verifiable skill sets, and align academic outcomes more closely with industry requirements. This study contributes to the ongoing discourse on educational innovation and offers a strategic framework for institutions aiming to utilize blockchain technology in preparing students for the future job market.
International Research Journal of Advanced Engineering and Science, Volume 9, Issue 4, pp. 316-334, 2024
The increasing prevalence of data breaches and cyberattacks underscores the urgent need for enhan... more The increasing prevalence of data breaches and cyberattacks underscores the urgent need for enhanced security and transparency in database management systems (DBMS). This paper explores the integration of blockchain technology into DBMS to address these challenges, leveraging the inherent features of blockchain-decentralization, immutability, and transparency-to create tamper-proof and trustworthy data environments. Using SQLite as a foundational example, we demonstrate the step-by-step process of blockchain integration and present a practical application through a fitness-based social platform that allows individuals to securely claim and verify personal fitness data. The research extends its implications to diverse fields such as public administration, electronic health records, educational institutions, and social science research, highlighting the versatility and potential of blockchain-enhanced DBMS. We develop a comprehensive taxonomy to classify integration methods, evaluate existing blockchain-integrated DBMS solutions, and identify key benefits and challenges associated with this convergence. Through theoretical models and practical implementations on platforms akin to Bitcoin and Hyperledger Fabric, our findings reveal significant improvements in data integrity, trust, and transparency, while also addressing storage and scalability concerns. Additionally, case studies illustrate real-world applications in e-voting, Industrial Internet of Things (IIoT), and healthcare, demonstrating the practical relevance and transformative potential of blockchain technology in modern data management. The paper concludes by outlining future research directions and emerging trends, emphasizing the critical role of blockchain in advancing secure and transparent database systems.
International Research Journal of Advanced Engineering and Science, Volume 9, Issue 4, pp. 291-315, 2024
The advent of quantum computing presents a transformative challenge to contemporary cryptographic... more The advent of quantum computing presents a transformative challenge to contemporary cryptographic systems, threatening the security of widely used encryption algorithms such as RSA, ECC, and Diffie-Hellman. Leveraging principles like superposition and entanglement, quantum computers can efficiently solve complex mathematical problems that underpin classical cryptographic methods. This paper explores the profound implications of quantum computing on cybersecurity, highlighting quantum algorithms such as Shor's and Grover's, which demonstrate the vulnerabilities of current encryption systems. It reviews advancements in post-quantum cryptography, including lattice-based, code-based, and multivariate approaches, and discusses methodologies for integrating quantum-resistant algorithms into existing infrastructures. Case studies on quantum-safe blockchain solutions and quantumsecure communication networks illustrate practical applications and emerging technologies. By examining the challenges and proposing a framework for transitioning to quantum-safe systems, this study underscores the urgency of adopting proactive strategies to secure digital communications in the quantum era.
International Journal of Research Publication and Reviews, Vol 5, no 12, pp 1174-1191 , 2024
In the digital era, cybersecurity has emerged as a critical challenge for organizations worldwide... more In the digital era, cybersecurity has emerged as a critical challenge for organizations worldwide, underscored by high-profile breaches such as the 2017 Equifax data breach. This research explores the organizational and leadership aspects of cybersecurity governance by integrating agency theory and organizational learning theory. By examining the roles, qualities, and challenges of effective cybersecurity leaders, the study highlights the necessity of strategic vision, adaptability, and strong communication skills in navigating technological vulnerabilities and human factors. A structured framework for developing comprehensive cybersecurity policies is proposed, emphasizing alignment with organizational goals and fostering a security-conscious culture. The research also provides a comparative analysis of prominent cybersecurity governance frameworks-such as ISO/IEC 27001, NIST SP 800-53, and COBIT 2019-and offers practical guidance on integrating these frameworks into existing IT infrastructures across various industries. Furthermore, it underscores the importance of regular audits, performance metrics, and continuous improvement strategies in maintaining and evaluating cybersecurity governance. The study concludes by emphasizing the need for adaptive leadership and proactive measures to enhance organizational resilience against evolving cyber threats, suggesting future research directions focusing on artificial intelligence, machine learning, and fostering a security-centric culture.
International Journal of Research Publication and Reviews, Vol 5, no 12, pp 1149-1173, 2024
The evolution of cryptographic algorithms has been essential in responding to the growing threats... more The evolution of cryptographic algorithms has been essential in responding to the growing threats in the digital age. This paper examines the development of cryptography, starting with ancient methods like the Caesar cipher, and leading to modern algorithms such as RSA, AES, and the emerging field of post-quantum cryptography. Through detailed analysis, including a review of existing literature, case studies, and mathematical modeling, the paper explores how cryptographic techniques have adapted to secure data against increasingly sophisticated cyberattacks. It also addresses vulnerabilities in current systems, such as brute-force and side-channel attacks, and considers the looming threat of quantum computing, which could compromise widely used encryption methods. Finally, the paper looks ahead to new innovations like homomorphic encryption and AI-driven cryptographic solutions, emphasizing the need for ongoing research and development to stay ahead of evolving cyber threats.
The exponential growth of Big Data has revolutionized numerous industries by enabling the extract... more The exponential growth of Big Data has revolutionized numerous industries by enabling the extraction of valuable insights from vast and diverse datasets. However, this advancement is accompanied by significant privacy and security challenges that impede the full potential of data analytics. Privacy-Preserving Data Mining (PPDM) emerges as a critical approach to mitigate these challenges, ensuring individual privacy while maintaining data utility. This paper presents a comprehensive survey of state-of-the-art PPDM methodologies within Big Data environments, encompassing privacy models, data transformation techniques, privacy-preserving machine learning algorithms, and privacy economics. Through an extensive literature review and analysis of real-world applications in healthcare and finance, we identify key challenges and gaps in current practices. Additionally, we propose a cohesive privacy framework aimed at guiding researchers and practitioners in implementing robust privacypreserving mechanisms. The study also explores emerging trends such as advanced cryptographic techniques, privacy-preserving query processing, and the integration of privacy in machine learning. By addressing the balance between data utility and privacy, this research contributes to the advancement of ethical and secure Big Data analytics, paving the way for future innovations and interdisciplinary collaborations in the field.
International Journal of Research Publication and Reviews, Vol 5, no 12, pp 507-533 December , 2024
Critical infrastructure sectors are increasingly vulnerable to sophisticated cyber threats that c... more Critical infrastructure sectors are increasingly vulnerable to sophisticated cyber threats that can disrupt essential services and impact national security. This research provides a comprehensive review of existing cybersecurity risk management frameworks-including NIST (National Institute of Standards and Technology), ISO/IEC 27000 (International Organization for Standardization / International Electrotechnical Commission 27000 series), COBIT (Control Objectives for Information and Related Technology), and ITIL (Information Technology Infrastructure Library)-to evaluate their effectiveness in protecting critical infrastructures. We introduce aerospace methodologies to enhance cybersecurity risk management, improving the reliability and stability of industrial control systems without compromising performance. A decision environment model is developed to assist organizations in selecting the most appropriate frameworks and tools based on their specific needs. The applicability of the NIST Cybersecurity Framework's magic quadrant is demonstrated as an effective tool for risk management across various sectors.Through detailed case studies in the Energy, Healthcare, and Transportation sectors, we highlight the practical challenges and successes in implementing these frameworks. Our findings suggest that integrating the adaptability of the NIST Framework, the governance strengths of COBIT, the comprehensive standards of ISO/IEC 27000, and the service management focus of ITIL results in a balanced and robust approach to cybersecurity risk management. We also address emerging challenges posed by technological innovations such as the Internet of Things (IoT) and artificial intelligence (AI), emphasizing the need for frameworks to evolve accordingly. The paper concludes with recommendations for enhancing collaboration between government and industry stakeholders to strengthen the resilience of critical infrastructures against evolving cyber threats.
International Research Journal of Advanced Engineering and Science
This article explores the role of educational initiatives in enhancing privacy standards within C... more This article explores the role of educational initiatives in enhancing privacy standards within Cardano's blockchain ecosystem, emphasizing the importance of user and developer education in maintaining data security and compliance. Cardano, launched in 2017, distinguishes itself from other blockchains with a unique twolayer architecture and a proof-of-stake consensus model that prioritize scalability, security, and user empowerment. As Cardano's ecosystem grows, the integration of privacy features like Zero-Knowledge Proofs (ZKPs), the Extended UTXO model, and decentralized identity solutions highlights the need for robust privacy education to help users navigate blockchain complexities. Through a comprehensive analysis of academic collaborations, case studies, and educational strategies, this paper demonstrates how Cardano fosters a community of informed users and developers who advocate for privacy standards and responsible data management. Additionally, it discusses the challenges in blockchain privacy education, such as technical
complexity and misinformation, and suggests strategies to address
these issues. By investing in continuous, accessible education,
Cardano aims to build a secure, transparent, and privacy-conscious
blockchain ecosystem that empowers individuals and sets a benchmark
for privacy standards across the blockchain industry.
International Journal of Scientific Research and Modern Technology (IJSRMT), Volume 3, Issue 11, 2024
This study explores the effectiveness and security impact of two pseudorandom number generators (... more This study explores the effectiveness and security impact of two pseudorandom number generators (PRNGs): the Fibonacci Random Number Generator (FRNG) and the Gaussian Random Number Generator (GRNG) in cryptographic systems. By applying statistical tests, the research aims to determine which of these generators provides a more robust level of randomness, thus boosting the security of cryptographic applications. The approach involves generating sequences of
random integers using Java implementations of both FRNG and GRNG, followed by an analysis with the Chi-Square Test and Kolmogorov-Smirnov Test. Results show that the Gaussian PRNG produces numbers that align more consistently with a uniform distribution, while the Fibonacci PRNG shows notable irregularities. This points to the need for rigorous testing
of RNGs to uphold security and reliability in cryptographic systems. The study’s outcomes carry important implications for choosing cryptographic algorithms, emphasizing the crucial role of high-quality RNGs in safeguarding data confidentiality, integrity, and authenticity
International Journal of Scientific Research and Modern Technology (IJSRMT),Volume 3, Issue 11, 2024
With rapid technological advancements, the emergence of deepfakes and digital misinformation has ... more With rapid technological advancements, the emergence of deepfakes and digital misinformation has become both a powerful tool and a formidable challenge. Deepfakes—realistic yet fabricated media generated through artificial intelligence—threaten media credibility, public perception, and democratic integrity. This study explores the intersection of AI technology with these concerns, highlighting AI's role both as a driver of innovation and as a defense mechanism. By conducting an in-depth review of literature, analyzing current technologies, and examining case studies, this research evaluates AI-based strategies for identifying and addressing misinformation. Additionally, it considers the ethical and policy
implications, calling for greater transparency, accountability, and media literacy. Through examining present AI techniques and predicting future trends, this paper underscores the importance of collaborative efforts among tech companies, government agencies, and the public to uphold truth and integrity in the digital age.
Global Scientific Journal, 2024
Blockchain technology, first introduced with Bitcoin, has evolved into a powerful system for secu... more Blockchain technology, first introduced with Bitcoin, has evolved into a powerful system for secure data exchange across numerous industries. Its foundation relies on cryptographic methods like hash algorithms, public key cryptography, and digital signatures to maintain data integrity
and transparency without the need for a central authority. This paper traces the development of blockchain technology, exploring its uses beyond cryptocurrencies, including applications in healthcare, supply chain management, and secure voting systems. The paper also delves into the underlying cryptographic principles, examining the cybersecurity challenges and vulnerabilities associated with blockchain, particularly in the context of quantum computing threats. Through case studies, the paper highlights how blockchain can improve privacy, transparency, and
resilience in practical settings. Finally, the paper discusses future research avenues aimed at enhancing blockchain's efficiency and security in the face of emerging technological advancements.
International Journal of Research Publication and Reviews, Vol 5, no 11, pp 3235-3256 , 2024
As the use of digital services grows, protecting the privacy and integrity of sensitive data, esp... more As the use of digital services grows, protecting the privacy and integrity of sensitive data, especially in fields like healthcare, finance, and secure surveying, has become a critical concern. Homomorphic encryption (HE) offers a solution by allowing computations to be performed on encrypted data without revealing the original information. This paper examines the principles of homomorphic encryption and its applications in privacy-preserving tasks, focusing on its use in cloud computing, healthcare, and cybersecurity. Various types of HE schemes, including Fully Homomorphic Encryption (FHE), Partially Homomorphic Encryption (PHE), and Somewhat Homomorphic Encryption (SHE), are reviewed to assess their performance, efficiency, and real-world use. The paper also discusses the
challenges of implementing HE, such as computational overhead and key management. It suggests directions for future research to improve the scalability and usability of HE in real-time applications. Addressing these challenges will make homomorphic encryption an essential tool for secure, privacy-preserving data processing and sharing in modern digital systems
International Research Journal of Advanced Engineering and Science, Volume 9, Issue 4, pp. 205-219,, 2024
The incorporation of artificial intelligence (AI) into autonomous weapon systems raises significa... more The incorporation of artificial intelligence (AI) into autonomous weapon systems raises significant security concerns and ethical questions regarding international regulation. This paper explores the potential effects of AI-driven autonomous weapons (AI-AWs) on global security, emphasizing the dual-use characteristics of AI technologies and their ability to disrupt military strategies and strategic equilibrium. Through a combination of interdisciplinary workshops, literature reviews, and case studies, the research highlights critical security threats, ethical issues, and the risk of unintended escalation of conflicts linked to AI-AWs. The paper advocates for the creation of comprehensive international policies and regulatory frameworks to tackle these challenges, stressing the importance of human oversight and ethical standards. Policy suggestions include establishing precise definitions, monitoring systems, and international oversight organizations to ensure the responsible use of AI in military applications. The study concludes by calling for global collaboration to reduce the risks associated with AI-AWs and to enhance global security and stability.
International Journal of Research Publication and Reviews, Vol 5, no 11, pp 889-907 November 2024, 2024
As quantum computing starts to pose significant security risks to traditional cryptographic syste... more As quantum computing starts to pose significant security risks to traditional cryptographic systems, quantum cryptography is emerging as a key solution. This paper examines how quantum key distribution (QKD) and other quantum-based cryptographic methods can strengthen cybersecurity. By leveraging principles from quantum mechanics-like superposition and entanglement-quantum cryptography offers the potential to protect communications from highly advanced quantum threats. We delve into various quantum cryptographic protocols, including BB84 and device-independent QKD, exploring them both theoretically and through computational analysis. Real-world applications in sectors such as finance and telecommunications demonstrate the practical value of QKD. However, challenges like high costs, scalability issues, and compatibility with existing systems remain obstacles to broader implementation.Ultimately, this research underscores how quantum cryptography can enhance current security measures and meet the demands of a future shaped by quantum computing.
INTERNATIONAL JOURNAL OF RESEARCH AND INNOVATION IN APPLIED SCIENCE (IJRIAS) ISSN No. 2454-6194 | DOI: 10.51584/IJRIAS |Volume IX Issue X October 2024, 2024
This paper investigates the global ramifications of cybercrime and underscores the essential role... more This paper investigates the global ramifications of cybercrime and underscores the essential role of effective
cybercrime legislation, with a particular emphasis on Liberia. As digital technologies continue to expand,
cybercrime has emerged as a formidable threat, resulting in significant financial losses and jeopardizing the
privacy and security of individuals and organizations across the globe. The study evaluates the existing
cybercrime legislation in Liberia, analyzing its conformity with international standards and pinpointing
deficiencies that impede effective enforcement and protection. By conducting a comparative analysis with
global best practices, the research reveals both the strengths and weaknesses of Liberia's approach to
cybercrime. The paper offers recommendations aimed at strengthening the legal framework, highlighting the
necessity of international collaboration, clear legal definitions, and heightened public awareness. It posits that
a robust legal framework is crucial not only for addressing cyber threats but also for promoting economic
growth and stability in the digital era.
International Journal of Research Publication and Reviews, Vol 5, no 11, pp 620-630 , 2024
This paper examines occupational stress among academic personnel through the framework of Maslow'... more This paper examines occupational stress among academic personnel through the framework of Maslow's hierarchy of needs, highlighting how stress manifests across different career stages in academia. Utilizing historical perspectives and contemporary findings, the study explores how technological advancements have reshaped academic responsibilities but have not alleviated core stressors. Junior academic staff often encounter stress linked to foundational needs, including job security, career development, and community integration. In contrast, senior faculty face stressors associated with self-actualization, administrative responsibilities, and reputation maintenance. The study integrates Selye's General Adaptation Syndrome and Hobfoll's conservation of resources theory to contextualize the
physiological and psychological impacts of prolonged occupational stress in academia. This paper argues that a targeted approach to mental health support, workload management, and institutional resources is essential to addressing academic stress across career levels, ultimately promoting faculty well-being, productivity, and
sustainable career progression.
11.International Journal of Research Publication and Reviews, Vol 5, no 11, pp 219-236., 2024
The rapid proliferation of the Internet of Things (IoT) has introduced significant security chall... more The rapid proliferation of the Internet of Things (IoT) has introduced significant security challenges due to the increasing number of connected devices and the complexity of their architectures. This paper explores the role of Artificial Intelligence (AI) in enhancing IoT security through advanced threat detection methodologies. AI-driven techniques, such as machine learning (ML) and deep learning (DL), provide promising solutions for detecting anomalies, mitigating attacks, and managing cyber risks in real-time IoT environments. By leveraging both supervised and unsupervised learning models, the study highlights the potential of AI to identify and counter both known and unknown threats in IoT networks. Reinforcement learning is also examined as a strategy for adaptive security solutions in dynamic IoT ecosystems. Additionally, blockchain technology is employed to verify communication authenticity and safeguard data integrity across IoT devices. The research discusses case studies, such as smart home and industrial IoT setups, and presents an AI-powered framework for securing critical IoT infrastructures. The paper concludes with a call for further exploration of distributed AI-based threat detection architectures and highlights the importance of privacy and security in the future development of AI-driven IoT systems.
International Research Journal of Advanced Engineering and Science, 2024
The rapid advancement of artificial intelligence (AI) has led to the creation of sophisticated de... more The rapid advancement of artificial intelligence (AI) has led to the creation of sophisticated deepfakes, which pose significant threats to digital authenticity and national security. Deepfakes are manipulated audiovisual content that can deceive even the most discerning individuals, leading to the spread of misinformation and disinformation. This paper discusses the role of AI in combating deepfakes and digital misinformation, highlighting the challenges and limitations of current AI technologies in detecting and preventing these threats. The paper begins by outlining the background and significance of deepfakes, including their definition, types, and impact on various sectors. It then delves into the current AI technologies used for deepfake detection, including model-driven and data-driven methods. The challenges and limitations of these methods are discussed, including the need for more robust and interpretable models that can effectively detect deepfakes. The paper also explores the societal implications of deepfakes and digital misinformation, including the erosion of trust in media and information sources. It highlights the need for new paradigms for using AI and other technologies to induce trustworthiness and media integrity. Finally, the paper discusses the legal and ethical considerations surrounding deepfakes, including regulatory frameworks and compliance. It emphasizes the importance of developing AI quality criteria and evaluation protocols to minimize the impact of deepfakes and digital misinformation. In conclusion, the paper recommends a collaborative effort from experts across disciplines to understand and mitigate the challenges posed by deepfakes and digital misinformation. It suggests that future research should focus on developing more robust AI technologies for deepfake detection and prevention, as well as exploring the potential impacts and implications of deepfakes on societal systems.
Global Scientific Journals, 2024
As blockchain technology continues to evolve, the pursuit of privacy has become a significant cha... more As blockchain technology continues to evolve, the pursuit of privacy has become a significant challenge. Although the transparency and immutability of blockchain are essential features, they can unintentionally expose sensitive information. This paper investigates the potential of Zero-Knowledge Proofs (ZKPs) and Secure Multi-Party Computation (SMPC) as innovative solutions to address these privacy concerns. ZKPs facilitate the verification of information without disclosing the underlying data, thereby enhancing privacy in transactions and identity verification processes. Meanwhile, SMPC enables collaborative computations while preserving the confidentiality of inputs, which is vital for industries such as finance and healthcare. Despite their potential, these technologies encounter challenges related to complexity, scalability, and regulatory compliance. This study offers a thorough analysis of ZKPs and SMPC, their applications, and the ethical implications involved, providing valuable insights into their role in creating a secure and privacy-conscious blockchain ecosystem.
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING, MANAGEMENT & APPLIED SCIENCE (IJLTEMAS), 2024
This research investigates the transformative potential of incorporating blockchain technology in... more This research investigates the transformative potential of incorporating blockchain technology into computer science education. In light of the rapid evolution of the digital landscape, traditional educational frameworks often fail to meet the demands of the industry, resulting in a significant skills gap among graduates. This paper analyzes how the integration of blockchain can revolutionize computer science curricula by enhancing learning experiences and equipping students to navigate future technological challenges. The study highlights the advantages of blockchain in educational contexts, including increased security and transparency of academic records, streamlined credentialing processes, and the establishment of decentralized learning platforms that promote collaboration and innovation. It presents case studies of institutions that have successfully implemented blockchain, along with strategies for educators to effectively integrate this technology into their pedagogical approaches. Additionally, the research addresses the challenges and limitations associated with blockchain integration, such as the requisite learning curve and infrastructure demands. The findings indicate that the incorporation of blockchain in computer science education can significantly boost student engagement, provide verifiable skill sets, and align academic outcomes more closely with industry requirements. This study contributes to the ongoing discourse on educational innovation and offers a strategic framework for institutions aiming to utilize blockchain technology in preparing students for the future job market.