Search For:

Displaying 1-19 out of 19 total
Cyberwarfare: Western and Chinese Allegations
Found in: IT Professional
By Nir Kshetri
Issue Date:January 2014
pp. 16-19
A large proportion of China-originated cyberattacks are allegedly aimed at extracting high-value intellectual property such as trade secrets. Senior government officials from China and the US have made frequent verbal and written allegations that their cou...
 
Japan's Changing Cybersecurity Landscape
Found in: Computer
By Nir Kshetri
Issue Date:January 2014
pp. 83-86
Japan's cybersecurity efforts have been lacking compared to other advanced economies, but the country is now taking more aggressive steps to address this deficiency.
 
Cloud Computing in Sub-Saharan Africa
Found in: IT Professional
By Nir Kshetri
Issue Date:November 2013
pp. 64-67
Cloud-related innovations and services are becoming fundamental sources of economic and societal changes in Sub-Saharan African economies, which are embracing cloud computing. This analysis of the cloud market examines both driving and constraining factors...
 
EU and US Cybersecurity Strategies and Their Impact on Businesses and Consumers
Found in: Computer
By Nir Kshetri,San Murugesan
Issue Date:October 2013
pp. 84-88
To secure information systems and protect vital national and global infrastructure, IT professionals need to understand key elements of national cybersecurity strategies and their impact and coordinate their efforts at local, national, and global levels.
 
Cloud Computing and EU Data Privacy Regulations
Found in: Computer
By Nir Kshetri,San Murugesan
Issue Date:March 2013
pp. 86-89
To leverage the cloud's power, EU authorities must revisit policies related to various types of personal data and their associated privacy risks.
 
IT in the Chinese Healthcare Industry
Found in: IT Professional
By Nir Kshetri
Issue Date:January 2013
pp. 12-15
China is leveraging the cloud and mobile computing to enable doctors and other healthcare professionals to collaborate, share information, and more easily access reports, scans, EMRs, lab reports, prescriptions, and medical histories. China is also garneri...
 
Cloud Computing in India
Found in: IT Professional
By Nir Kshetri
Issue Date:September 2012
pp. 5-8
Cloud computing is still in its infancy in India, but as economic and institutional factors improve, it could greatly accelerate India's digitization and transform how cell phones are used. If appropriate measures are adopted at various levels, the cloud m...
 
Mobile Payments in Emerging Markets
Found in: IT Professional
By Nir Kshetri,Sharad Acharya
Issue Date:July 2012
pp. 9-13
Mobile payments have been a key driver of socio-economic development in emerging markets. Factors such as advancements in technology, socioeconomic conditions, and the high penetration rate of mobile devices are driving m-payment development in certain eme...
 
Mobile Payments in Emerging Markets
Found in: IT Professional
By Nir Kshetri,Sharad Acharya
Issue Date:July 2012
pp. 9-13
Mobile payments have been a key driver of socio-economic development in emerging markets. Factors such as advancements in technology, socioeconomic conditions, and the high penetration rate of mobile devices are driving m-payment development in certain eme...
 
Mobile Payments in Emerging Markets
Found in: IT Professional
By Nir Kshetri,Sharad Acharya
Issue Date:July 2012
pp. 9-13
Mobile payments have been a key driver of socio-economic development in emerging markets. Factors such as advancements in technology, socioeconomic conditions, and the high penetration rate of mobile devices are driving m-payment development in certain eme...
 
Cloud Computing in Developing Economies
Found in: Computer
By Nir Kshetri
Issue Date:October 2010
pp. 47-55
The developing world must exploit the opportunities afforded by cloud computing while minimizing the associated risks to allow access to advanced IT infrastructure, data centers, and applications and protect sensitive information.
 
The Economics of Click Fraud
Found in: IEEE Security and Privacy
By Nir Kshetri
Issue Date:May 2010
pp. 45-53
Click fraud is arguably the cyberworld's biggest scam. The author examines the contexts, mechanisms, and processes associated with the click-fraud industry from an economics standpoint. The nature of electronic channels, characterized by asymmetric hyperme...
 
Increasing Returns and the Diffusion of Linux in China
Found in: IT Professional
By Nir Kshetri
Issue Date:November 2007
pp. 24-29
China's unique combination of institutions, industries, and markets has fostered the generation and use of Linux-related innovations. Analyzing increasing returns provides key insight into this proliferation.
 
The Simple Economics of Cybercrimes
Found in: IEEE Security and Privacy
By Nir Kshetri
Issue Date:January 2006
pp. 33-39
Cybercrimes are becoming increasingly pervasive and sophisticated, and can have more severe economic impact than many conventional crimes. Technology and skill intensiveness, a high degree of globalization, and their newness make cybercrimes structurally d...
 
Structural Shifts in the Chinese Software Industry
Found in: IEEE Software
By Nir Kshetri
Issue Date:July 2005
pp. 86-93
Although China has left India far behind in terms of most economic and technological indicators, China has failed to catch up in one area: the commercial software industry. While India's development has been one-dimensional and has focused on the skill bas...
 
Economics of Linux Adoption in Developing Countries
Found in: IEEE Software
By Nir Kshetri
Issue Date:January 2004
pp. 74-81
<p>Since the 1980s, software development has gone from a specialised and esoteric discipline concentrated primarily among American and European white-collar workers to a significant global driver of emerging national economies. Software managers and ...
 
China's Data Privacy Regulations: A Tricky Trade-Off between ICT's Productive Utilization and Cyber-Control
Found in: IEEE Security & Privacy
By Nir Kshetri
Issue Date:August 2013
pp. 1
This article analyzes key features of China's data privacy regulations. It also discusses how the contexts, mechanisms and consequences associated with China's data privacy regulations contrast sharply with other major economies. Also explained in the arti...
 
Cyber-victimization and cybersecurity in China
Found in: Communications of the ACM
By Nir Kshetri
Issue Date:April 2013
pp. 35-37
Seeking insights into cyberattacks associated with China.
     
Positive externality, increasing returns, and the rise in cybercrimes
Found in: Communications of the ACM
By Nir Kshetri
Issue Date:December 2009
pp. 141-144
Introduction The meteoric rise in cybercrime has been an issue of pressing concern to our society. According to Federal Bureau of Investigation (FBI), nine out of 10 U.S. companies experienced computer security incidents in 2005 which led to a loss of $67....
     
 1