Skip to main content


Future Methods Of Managing Privacy And Data Security At The Technical Age-Cashless Society

Issue Abstract

Abstract
Financial transactions in a cashless global are carried out the usage of virtual statistics in place of real banknotes or coins (commonly an digital illustration of cash). [1] Cashless civilizations have existed for the reason that sunrise of human civilization, primarily based totally on barter and different varieties of exchange, and cashless transactions at the moment are possible utilizing credit score playing cards, debit playing cards, cellular bills, and virtual currencies which include bitcoin. However, this newsletter makes a speciality of the term "cashless society" withinside the feel of a motion toward, and implications of, a society wherein coins is changed with the aid of using its virtual equal—in different words, criminal tender (cash) exists, is recorded, and is most effective traded in digital virtual form. A few publications of movement may be coupled to attain a everlasting and applicable result for customers in a cashless society to boom privateness: A new kind of banking carrier that assigns randomised numbers to credit score playing cards, using blockchain to song all man or woman transactions, and a marketing campaign to train and tell key stakeholders approximately safety and privateness dangers so that they have got the gear and historical past expertise to guard their personal statistics earlier than coping with a overseas entity or different 1/3 events (i.e. cybersecurity departments, IT technicians, etc). Both blockchain and card variety randomization are liable to zero-day vulnerabilities, flaws, and ranging ranges of social acceptance. This exploratory observe makes use of a structures evaluation of cashless structures to perceive and have a look at a fixed of social and technical alternatives for a robust cashless gadget that protects customers' privateness even as keeping gadget safety. The statistics amassed and evaluated may be beneficial in uncovering flaws in present day facts integrity and safety procedures. In order to create preemptive countermeasures, it might be useful to study gift and destiny strategies of dealing with privateness and facts safety withinside the contemporary-day age. In a cashless gadget, this studies identifies essential techniques to keep away from the loss of private privateness.
Keywords: cashless, society, privacy, security, data, system


Author Information
Anuradha Reddy
Issue No
9
Volume No
4
Issue Publish Date
05 Sep 2022
Issue Pages
39-43

Issue References

References 
1. “Bitcoin - Open Source P2P Money.” n.d. Accessed December 12, 2019. https://bitcoin.org/en/.
2. Wolters, Timothy. ”‘Carry Your Credit in Your Pocket’: The Early History of the Credit Card at Bank of America and Chase Manhattan.” Enterprise & Society 1.2 (2000): 315-54. Print.
3. Mercer, Christina. n.d. “History of PayPal: 1998 to Now.” Techworld. Accessed December 12, 2019. https://www.techworld.com/picturegallery/ business/history-of-paypal-1998-now-3630386/.
4. Meadows, Donella H., and Diana Wright. Thinking in Systems: a Primer. Chelsea Green Publishing, 2015.
5. Andrew Ferguson, The rise of big data policing: surveillance, race, and the future of law enforcement,” New York; New York University Press,2017.
6. “The Rise of Big Data Policing — TechCrunch.” n.d. Accessed February 5, 2020. https://techcrunch.com/2017/10/22/the-rise-of-bigdata-

7. policing/.
8. Symanovich, Steve. “What Is a VPN?” Official Site,
9. us.norton.com/internetsecurity-privacy-what-is-a-vpn.html.
10. Swan, M. (2015). Blockchain: Blueprint for a New Economy. Sebastopol,
11. CA: OReilly Media, Inc.
12. 2019 Data Breaches - Identity Theft Resource Center. (2020). Retrieved
13. 27 March 2020, from https://www.idtheftcenter.org/2019-data-breaches/
14. ”Leverage Points: Places To Intervene In A System.” The Academy for Systems Change. N. p., 2020. Web. 3 Feb. 2020.
15. ”What’s New In The 2019 Cost Of A Data Breach Report.” Security Intelligence. N. p., 2020. Web. 6 Feb. 2020.
16. Arthur, W. (2018, March 23). Lawsuits may be key to tighter US data privacy rules. Retrieved March 26, 2020, fromhttps://dailybrief.oxan.com/Analysis/DB230635/Lawsuits-may-bekey- to-tighter-US-data-privacy-rules
17. “Leverage Points: Places to Intervene in a System.” The Academy for Systems Change, donellameadows .org/archives/leverage-points-placesto-
18. intervene-in-a-system/.
19. Singh, Simon. The Code Book: the Secrets behind Codebreaking. Ember, 2016.
20. Marwick, Alice E. “How Your Data Are Being Deeply Mined.” The New York Review of Books, www.nybooks.com/articles/2014/01/09/howyour-
21. data-are-being-deeply-mined/.
22. Jaganathan, M., Sabari, A. An heuristic cloud based segmentation technique using edge and texture based two dimensional entropy. Cluster Computing Vol 22, PP 12767–12776(2019). https://doi.org/10.1007/s10586-018-1757-3
23. Senthil kumar, V., Prasanth, K. Weighted Rendezvous Planning on Q-Learning Based Adaptive Zone Partition with PSO Based Optimal Path Selection. Wireless Personal Communications 110, 153–167 (2020). https://doi-org.libproxy.viko.lt /10.1007/s11277-019-06717-z.
24. Vignesh Janarthanan, A.Viswanathan, M. Umamaheswari, “Neural Network and Cuckoo Optimization Algorithm for Remote Sensing Image Classification ", International Journal of Recent Technology and Engineering., vol. 8, no. 4, pp. 1630-1634, Jun. 2019.
25. Dr. V. Senthil kumar, Mr. P. Jeevanantham, Dr. A. Viswanathan, Dr. Vignesh Janarthanan, Dr. M. Umamaheswari, Dr. S. Sivaprakash Emperor Journal of Applied Scientific Research “Improve Design and Analysis of Friend-to-Friend Content Dissemination System ”Volume - 3 Issue - 3 2021
26. J. Vignesh, E. Gajendran, Sameeruddin Khan, N. Balakumar and S. R. Boselin Prabhu, “Design and implementation of hybrid cascaded energy Efficient Kogge Stone Adder” ARPN Journal of Engineering and Applied Sciences Vol 12 Issue no 21 2017.
27. V.Senthilkumar , K.Prashanth” A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks International Journal of communication and computer Technologies, Vol 4 Issue No 1 (2016)
28. Viswanathan, A., Arunachalam, V. P., & Karthik, S. (2012). Geographical division traceback for distributed denial of service. Journal of Computer Science, 8(2), 216.
29. Anurekha, R., K. Duraiswamy, A. Viswanathan, V.P. Arunachalam and K.G. Kumar et al., 2012. Dynamic approach to defend against distributed denial of service attacks using an adaptive spin lock rate control mechanism. J. Comput. Sci., 8: 632-636.
30. Umamaheswari, M., & Rengarajan, N. (2020). Intelligent exhaustion rate and stability control on underwater wsn with fuzzy based clustering for efficient cost management strategies. Information Systems and e-Business Management, 18(3), 283-294.
31. Babu, G., & Maheswari, M. U. (2014). Bandwidth Scheduling for Content Delivery in VANET. International Journal of Innovative Research in Computer and Communication Engineering IJIRCCE, 2(1), 1000-1007.
32. Viswanathan, A., Kannan, A. R., & Kumar, K. G. (2010). A Dynamic Approach to defend against anonymous DDoS flooding Attacks. International Journal of Computer Science & Information Security.
33. Kalaivani, R., & Viswanathan, A. HYBRID CLOUD SERVICE COMPOSITION MECHANISM WITH SECURITY AND PRIVACY FOR BIG DATA PROCESS., International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2,Special Issue 10, ISSN 2395-695X.
34. Ardra, S., & Viswanathan, A. (2012). A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 2(6).