Securing Enterprises: Harnessing Blockchain Technology Against Cybercrime Threats

Authors

  • Fallen Zidan Darmajaya Institute of Informatics and Business
  • Dimas Nugroho Darmajaya Institute of Informatics and Business
  • Baskara Adi Putra Darmajaya Institute of Informatics and Business

DOI:

https://doi.org/10.34306/ijcitsm.v3i2.120

Keywords:

Corporate Cybersecurity, Blockchain Technology, Digital Era, Cyber Crime

Abstract

 In the face of increasingly sophisticated cybercrime threats, large companies now need innovative solutions to protect their data and interests. Blockchain technology, which is based on the principles of decentralization and strong encryption, offers great potential in improving corporate cybersecurity. This research investigates the implementation of blockchain technology in the context of enterprise security by developing a blockchain-based dynamic system model. These findings make an important contribution in changing the way audits and general accounting operations are carried out, presenting fundamental changes in the profession. This new approach integrates blockchain technology into various aspects of cybersecurity, embracing innovation and creativity in the face of current challenges. By creating accurate computer models, this research brings a breakthrough in understanding system responses to employee fraud in corporate environments that adopt blockchain technology. This research aims to explore the potential of blockchain technology in improving corporate cybersecurity by identifying security gaps and designing effective updates, creating a safe and trustworthy digital environment for companies in this digital era. The findings of this research highlight the importance of integrating blockchain technology in auditing and general accounting operations, creating a foundation for the development of robust cybersecurity systems. In the context of companies using blockchain technology, this research reveals improved system responsiveness to employee fraud, indicating positive potential in mitigating security risks. This research provides a solid foundation for further development in the field of enterprise cybersecurity, inspiring innovation in protecting businesses and digital assets in a rapidly evolving cyberspace.

References

S. Namasudra, G. C. Deka, P. Johri, M. Hosseinpour, and A. H. Gandomi, “The revolution of blockchain: State-of-the-art and research challenges,” Arch. Comput. Methods Eng., vol. 28, pp. 1497–1515, 2021.

L. Koh, A. Dolgui, and J. Sarkis, “Blockchain in transport and logistics–paradigms and transitions,” International Journal of Production Research, vol. 58, no. 7. Taylor & Francis, pp. 2054–2062, 2020.

H. Tabrizchi and M. Kuchaki Rafsanjani, “A survey on security challenges in cloud computing: issues, threats, and solutions,” J. Supercomput., vol. 76, no. 12, pp. 9493–9532, 2020.

J. R. Biden, “Interim national security strategic guidance,” The White House, p. 8, 2021.

A. Bayramova, D. J. Edwards, and C. Roberts, “The role of blockchain technology in augmenting supply chain resilience to cybercrime,” Buildings, vol. 11, no. 7, p. 283, 2021.

P. Zhuang, T. Zamir, and H. Liang, “Blockchain for cybersecurity in smart grid: A comprehensive survey,” IEEE Trans. Ind. Informatics, vol. 17, no. 1, pp. 3–19, 2020.

D. Levis, F. Fontana, and E. Ughetto, “A look into the future of blockchain technology,” PLoS One, vol. 16, no. 11, p. e0258995, 2021.

M. H. P. Rizi and S. A. H. Seno, “A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city,” Internet of Things, vol. 20, p. 100584, 2022.

S. Mahmood, M. Chadhar, and S. Firmin, “Cybersecurity challenges in blockchain technology: A scoping review,” Hum. Behav. Emerg. Technol., vol. 2022, pp. 1–11, 2022.

E. Toufaily, T. Zalan, and S. Ben Dhaou, “A framework of blockchain technology adoption: An investigation of challenges and expected value,” Inf. Manag., vol. 58, no. 3, p. 103444, 2021.

R. Dillon, P. Lothian, S. Grewal, D. Pereira, and A. Kuah, “Cyber Security: Evolving Threats in an Ever Changing World,” in Digital Transformation in a Post-Covid World: Sustainable Innovation, Disruption and Change, CRC Press, 2021, pp. 129–154.

A. Tezel, E. Papadonikolaki, I. Yitmen, and M. Bolpagni, “Blockchain Opportunities and Issues in the Built Environment: Perspectives on Trust, Transparency and Cybersecurity,” in Industry 4.0 for the Built Environment: Methodologies, Technologies and Skills, Springer, 2021, pp. 569–588.

J. Leng et al., “Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: A survey,” Renew. Sustain. energy Rev., vol. 132, p. 110112, 2020.

C. Huang, F. T. S. Chan, and S. H. Chung, “Recent contributions to supply chain finance: towards a theoretical and practical research agenda,” Int. J. Prod. Res., vol. 60, no. 2, pp. 493–516, 2022.

F. Alfiana et al., “Apply the Search Engine Optimization (SEO) Method to determine Website Ranking on Search Engines,” Int. J. Cyber IT Serv. Manag., vol. 3, no. 1, pp. 65–73, 2023.

S. Balasubramanian, V. Shukla, J. S. Sethi, N. Islam, and R. Saloum, “A readiness assessment framework for Blockchain adoption: A healthcare case study,” Technol. Forecast. Soc. Change, vol. 165, p. 120536, 2021.

S. Fedushko and T. Ustyianovych, “E-commerce customers behavior research using cohort analysis: A case study of COVID-19,” J. Open Innov. Technol. Mark. Complex., vol. 8, no. 1, p. 12, 2022.

H. S. Lallie et al., “Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic,” Comput. Secur., vol. 105, p. 102248, 2021.

N. Huaman et al., “A {Large-Scale} Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises,” in 30th USENIX Security Symposium (USENIX Security 21), 2021, pp. 1235–1252.

J. Lohmer and R. Lasch, “Blockchain in operations management and manufacturing: Potential and barriers,” Comput. Ind. Eng., vol. 149, p. 106789, 2020.

D. R. E. Ewim et al., “Survey of wastewater issues due to oil spills and pollution in the Niger Delta area of Nigeria: a secondary data analysis,” Bull. Natl. Res. Cent., vol. 47, no. 1, p. 116, 2023.

P. Dutta, T.-M. Choi, S. Somani, and R. Butala, “Blockchain technology in supply chain operations: Applications, challenges and research opportunities,” Transp. Res. part e Logist. Transp. Rev., vol. 142, p. 102067, 2020.

K. Kano and E. Dolan, “Data Compression Analysis of Multimedia Video on Demand and DEMAND TV Broadcast Systems on the Network,” Int. J. Cyber IT Serv. Manag., vol. 3, no. 1, pp. 48–53, 2023.

C. Öztürk and A. Yildizbaşi, “Barriers to implementation of blockchain into supply chain management using an integrated multi-criteria decision-making method: a numerical example,” Soft Comput., vol. 24, pp. 14771–14789, 2020.

A. Shahaab, I. A. Khan, R. Maude, C. Hewage, and Y. Wang, “Public service operational efficiency and blockchain–A case study of Companies House, UK,” Gov. Inf. Q., vol. 40, no. 1, p. 101759, 2023.

A. Fernanda, M. Huda, and A. R. F. Geovanni, “Application of Learning Cloud Computing Technology (Cloud Computing) to Students in Higher Education,” Int. J. Cyber IT Serv. Manag., vol. 3, no. 1, pp. 32–39, 2023.

Downloads

Published

2023-10-31

How to Cite

Zidan, F. ., Nugroho, D. ., & Putra, B. A. . (2023). Securing Enterprises: Harnessing Blockchain Technology Against Cybercrime Threats. International Journal of Cyber and IT Service Management, 3(2), 168–173. https://doi.org/10.34306/ijcitsm.v3i2.120

Issue

Section

Articles