2021 6th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE) 2021
DOI: 10.1109/icraie52900.2021.9703957
|View full text |Cite
|
Sign up to set email alerts
|

Into the Look: Security Issues, Crypto-Hygiene, and Future Direction of Blockchain and Cryptocurrency for Beginners in Malaysia

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…The interview method was used in 6.58% of studies undertaken to investigate the BCT suitability or to analyze hurdles and adoption needs or potentials of the technology (e.g., [8], [50]). Conceptual studies were 5.26% which illustrated the early stage of research on BCT by developing an initial conceptual framework and recommended decisionmakers and academics to test these frameworks and further develop BCT-based systems (e.g., [39], [45], [91], [101]. Case studies are further applied in 2.63% of studies to generate insights into successful BCT projects (e.g., [95], [96].…”
Section: ) Research Methodologymentioning
confidence: 99%
“…The interview method was used in 6.58% of studies undertaken to investigate the BCT suitability or to analyze hurdles and adoption needs or potentials of the technology (e.g., [8], [50]). Conceptual studies were 5.26% which illustrated the early stage of research on BCT by developing an initial conceptual framework and recommended decisionmakers and academics to test these frameworks and further develop BCT-based systems (e.g., [39], [45], [91], [101]. Case studies are further applied in 2.63% of studies to generate insights into successful BCT projects (e.g., [95], [96].…”
Section: ) Research Methodologymentioning
confidence: 99%
“…Physical threats: Physical threats to the wallet and the smartphone include losing and theft (credentials and backups) [35,97,132,133]. Additionally, Fröhlich et al [131] name the variants of vandalism, extortion, and abduction.…”
Section: Wallet Threatsmentioning
confidence: 99%
“…Malware: Generally, malware can be an issue [35,49,133]. Fröhlich et al [131] differentiate wallet/key extraction malware, transaction manipulation malware, credential extraction malware, and ransomware.…”
Section: Wallet Threatsmentioning
confidence: 99%
See 1 more Smart Citation