Vibhushinie Bentotahewa

Vibhushinie Bentotahewa
Cardiff Metropolitan University | cardiffmet · School of Technologies

PhD

About

20
Publications
2,024
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
14
Citations
Citations since 2017
20 Research Items
14 Citations
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468
Introduction
Vibhushnie Bentotahewa is a Cyber Security Researcher attached to Cardiff School of Technologies (CST) at Cardiff Metropolitan University (UK). She has completed her Bachelor of Arts (BA) in International Relations at the University of Colombo (Sri Lanka) and Masters in Art (MA) in Security, Intelligence and Diplomacy at the University of Buckingham (UK). Her research interests are nation state attacks, regulations and laws on cyber security and cyber diplomacy.

Publications

Publications (20)
Chapter
Full-text available
The malware can threaten personal privacy by opening backdoors for attackers to access user passwords, IP addresses, banking information, and other personal data, whilst some malware extracts personal data and sends them to people unknown to the users. In this chapter, the authors will present recent case studies and discuss the privacy and securit...
Article
Full-text available
The increased dependency on technology brings national security to the forefront of concerns of the 21st century. It creates many challenges to developing and developed nations in their effort to counter cyber threats and adds to the inherent risk factors associated with technology. The failure to securely protect data would potentially give rise t...
Chapter
The prevailing COVID-19 pandemic has put IoT-based technologies to the test. It has given rise to diverse predictions for the future, and the expectations are that IoT-inspired technologies will play a significant role in the new normal. However, one of the key challenges for the success of IoT is its privacy and security issues. This chapter prese...
Article
Full-text available
The growing dependency on digital technologies is becoming a way of life, and at the same time, the collection of data using them for surveillance operations has raised concerns. Notably, some countries use digital surveillance technologies for tracking and monitoring individuals and populations to prevent the transmission of the new coronavirus. T...
Chapter
The urgency of the need to manage and find a cure for the COVID-19 has made it necessary to share information. However, sharing information involves potential risks that are inevitably likely to infringe individual privacy. Therefore, whether permissible under extenuation circumstances or not, sharing and handling of information for medical diagnos...
Poster
Full-text available
The COVID-19 pandemic has induced an unprecedented environment for spreading online misinformation, manipulation, and abuse, that will have dramatic real-world consequences. Contrary to the positive use of social media, it has become the driving force for spreading fake news and disinformation, to the extent that it has become difficult for people...
Conference Paper
The urgency of the need to manage and find a cure for the COVID-19 has made it necessary to share information. However, sharing information involves potential risks that are inevitably likely to infringe individual privacy. Therefore, whether permissible under extenuation circumstances or not, sharing and handling of information for medical diagnos...
Poster
Full-text available
Sri Lanka has made impressive strides in the field of evolving technology and its increasing reliance on modern computers and Information Technology feature prominently right across the government and the private sector alike. The use of ICT has inherent risk factors too, in so far as data security and privacy, and they pose significant threats to...
Experiment Findings
Full-text available
Objective: 1. Spread Awareness about a growing number of cyber-attacks. 2. Understanding the available options to defend cyber-attacks and other myths 3. Guidelines to protect the vulnerable population. 4. Help those who already faced a threat. We made a survey on 200 people and by analyzing the data, we made many understandings depend upon sp...
Data
The table contain 5 different questions which are Platform, Use digital payment systems?, Cyber-attacks observed, In which time of a day you mostly use the internet?, Did you face any cyber-attack.
Article
Full-text available
In this paper the researcher will focus on challenges that the big data is faced with under the umbrella of General Data Protection Regulation (GDPR) and, whether there is a necessity to revisit GDPR to meet emerging challenges. Data protection law has become not only a safety screen for protecting citizens and consumers but also play part in inter...
Article
Full-text available
COVID-19 outbreak has become an unprecedented global pandemic that is threatening every aspect of human life, our security and most of all our livelihoods. There are also other unconventional threats in the form of cyber criminal activities. This article focuses on what we know as hacking by criminals, looking to exploit and take advantage of Coron...
Article
Full-text available
The use of hard power, the military option, in the first instance of a dispute has shifted from battle field to the cyber space. That has made the use of Cyber space by individual state actors and groups an effective means to engage in espionage and a wide range of criminal activities. The terrorists are one particular group that have taken advanta...
Presentation
Full-text available
The increased incidents of cyber-attacks launched and the identification of those responsible had been hard to trace, and that has called for urgent action to deter escalation of such activities. Therefore, the need for a collective mechanism to tackle cyber-attacks cannot, and should not be underestimated. The data sharing between nations and orga...
Poster
Full-text available
The increased incidents of cyber-attacks launched and the identification of those responsible had been hard to trace, and that has called for urgent action to deter escalation of such activities. Therefore, the need for a collective mechanism to tackle cyber-attacks cannot, and should not be underestimated. The data sharing between nations and orga...
Poster
Full-text available
Abstract Huawei is a Chinese based major high-tech company trading in more than 70 countries providing telecommunications products and services. In the smartphone circuit, it has surpassed Apple to become the world’s second largest smartphone seller and only behind Samsung. In recent months, the company has been subjected to a barrage of accusation...
Poster
Full-text available
The increased dependency on modern technology and cyber space has allowed nations to reach all corners of the world, whilst the same space is used by states, individuals and third parties for unethical purposes. Cyber by definition is not owned by anyone and can be used from unknown locations without borders. In such instances intelligence agencies...
Poster
Full-text available
Abstract The framework proposals for UK exit have been agreed in principle, but the process is at an impasse due to serious concerns raised by a majority of UK Government. Cyber security is one of the issues amongst other constitutional issues that has drawn the attention of the public because of potential security implications. What all this adds...

Network

Cited By