Cybercrime is big business. While reliable statistics are difficult to come by, estimates of the global cost of cybercrimes range from trillions to tens of trillions of dollars annually. Regardless of the precise figure, cybercrime clearly drains significant resources from the global economy and poses a substantial threat to global security and prosperity.
Why has the problem grown so large? Cybercrime has some characteristics that make it difficult for governments to fight.
Read more here.
Haissam Badih PhD, is the Researcher and Professor at the Department of Math and Computer Science at the Lawrence Technological University, Southfield, Michigan, USA. He earned His B.S. degree in Computer Science from the University of Windsor at Ontario Canada, his M.S. Degree from Lawrence Technological University, and a Ph.D. in Computer Science and Informatics from Oakland University in 2020. He will begin his academic career at Lawrence Technological University in 2021. He has worked in various software companies in software engineering and architecture.He authored numerous journal and conference papers that were peer-reviewed. His current research and development interests and activities in Project DIAMOnD for Automation Alley in blockchain for building a 3D printer marketplace for the supply chain to support all kinds of business, including 4.0 Industry. This work on blockchain for autonomous systems design, sensor fusion, intelligent agents, automation, human/machine interaction, robotic programming, and interfacing/coding. His research dissertation, entitled "Advance and specialize our application of blockchain for webcam/microphone access control" and "Add Blockchain in A.I. for communication," has worked within research on the Blockchain and Decoy deception research project. He worked on blockchain and decoy deception using smart contracts. This project utilized a Blockchain application that enforces limited access to webcam and microphone devices. We utilize Blockchain's Smart Contract to form a contract between the user's computer and another party connected via a network.