Comprehensive Analysis and Comparison of Leading Cryptocurrencies
DOI:
https://doi.org/10.69591/jcai.v1i1.12Keywords:
risk infiltration, Nintendo, console, cyber, digital assaults.Abstract
With the increasing demand of virtual currency, cryptocurrencies are gaining popularity throughout the world for transactions be it legal or illegal. The yields returned from investment in crypto currency these days are huge but their existence and reliability has always been questioned. A cryptocurrency uses cryptography for implementing security. In spite of several problems in crypto currencies, the growing success of Bitcoin since its launch has emerged in a number of organizations coming forward with substitute cryptocurrencies .This study tries to present a comparison of six famous cryptocurrencies - Bitcoin, Ethereum, Litecoin, Dash, Monero and IOTA in the light of their volatility and strengths in present times and also discusses their current trends. A thorough study of literature showed that no paper has been presented keeping in mind only these six currencies, so this article is the first of its kind to present a comparison of technicalities of these cryptocurrencies.
References
“Pripas, M. (2014). Phishing attack detection and removal. The international journey of information security and cybercrime, 59-64.
P. W. Singer and A. Friedman, Cybersecurity: What everyone needs to know. oup usa, 2014. https://books.google.com/books?hl=en&lr=&id=f_lyDwAAQBAJ&oi=fnd&pg=PP1&dq=2.%09Singer,+Peter+W.,+and+Allan+Friedman.+Cybersecurity:+What+everyone+needs+to+know.+Our+USA,+2014%3B+27-33&ots=Dol1RFACll&sig=ajZ112iJksU6R8IkSq-NkmDmHyc
D. Craigen, N. Diakun-Thibault, and R. Purse, “Defining cybersecurity,” Technology innovation management review, vol. 4, no. 10, 2014. Available: https://www.timreview.ca/article/835
S. Peng, “Cybersecurity threats and the WTO national security exceptions,” Journal of International Economic Law, vol. 18, no. 2, pp. 449–478, 2015.
M. Lněnička, J. Čapek, J. Komárková, R. Máchová, and I. Čermáková, “A solution to combat cybersecurity threats involving big data analytics in the Hadoop ecosystem,” in Proceedings of the 30th International Business Information Management Association Conference, International Business Information Management Association-IBIMA, 2017. Available: https://dk.upce.cz/handle/10195/69945
“Latest in phishing 2016". Available: https://info.wombatsecurity.com/blog/the-latest-in-phishing-first-of-2016.
“Malware statistics. Available: https://www.av-test.org/en/statistics/malware/ - Google Search.”
C. S. Lee and Y. Wang, “Typology of cybercrime victimization in Europe: A multilevel latent class analysis,” Crime & Delinquency, vol. 70, no. 4, pp. 1196–1223, 2024.
I. Bernik, K. Prislan, and A. Mihelič, “Country Life in the Digital Era: Comparison of Technology Use and Cybercrime Victimization between Residents of Rural and Urban Environments in Slovenia,” Sustainability, vol. 14, no. 21, p. 14487, 2022.
R. Mokhtar and A. Rohaizat, “Cybercrimes and Cyber Security Trends in the New Normal,” in The New Normal and Its Impact on Society: Perspectives from ASEAN and the European Union, Springer, 2024, pp. 41–60.. Available: https://link.springer.com/chapter/10.1007/978-981-97-0527-6_4
K. Lin, Y. Wu, I. Y. Sun, and J. Qu, “Telecommunication and cyber fraud victimization among Chinese college students: An application of routine activity theory,” Criminology & Criminal Justice, p. 17488958221146144, 2023.
H. T. N. Ho, H. T. Luong, and Q. A. Phan, “Mapping the Influences of Social Network Site Use on Cybercrime Victimization: Trends and Recommendations,” Asian Communication Research, vol. 21, no. 1, pp. 80–106, 2024.
S. Srivastava and S. Raj, “Cyber Security Assessment and Awareness: A Statistical Modelling Approach,” in 2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC), IEEE, 2024, pp. 1–6. Available: https://ieeexplore.ieee.org/abstract/document/10482035/
M. Mikkola et al., “Cyberharassment victimization on three continents: an integrative approach,” International journal of environmental research and public health, vol. 19, no. 19, p. 12138, 2022.
B. Dupont, F. Fortin, and R. Leukfeldt, “Broadening our understanding of cybercrime and its evolution,” Journal of Crime and Justice, pp. 1–5, Feb. 2024, doi: 10.1080/0735648X.2024.2323872.
C. E. Griffith, M. Tetzlaff-Bemiller, and L. Y. Hunter, “Understanding the cyber-victimization of young people: A test of routine activities theory,” Telematics and Informatics Reports, vol. 9, p. 100042, 2023.
J. E. Ntsama et al., “Determinants of Cybercrime Victimization: Experiences and Multi-stage Recommendations from a Survey in Cameroon,” in Towards new e-Infrastructure and e-Services for Developing Countries, vol. 499, R. A. Saeed, A. D. Bakari, and Y. H. Sheikh, Eds., in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 499. , Cham: Springer Nature Switzerland, 2023, pp. 317–337. doi: 10.1007/978-3-031-34896-9_19.
R. Rughiniș, E. Bran, A. R. Stăiculescu, and A. Radovici, “From Cybercrime to Digital Balance: How Human Development Shapes Digital Risk Cultures,” Information, vol. 15, no. 1, p. 50, 2024.
S. L. Clevenger and C. D. Marcum, The Link between Specific Forms of Online and Offline Victimization: A Collaboration Between the ASC Division of Victimology and Division of Cybercrime. Taylor & Francis, 2023. Available: https://books.google.com/books?hl=en&lr=&id=QObLEAAAQBAJ&oi=fnd&pg=PT10&dq=Cyber+Risk+and+Cyber+Crimes+on+User%27s+Online+Victimization+2021+to+2024&ots=oBAD2CddWV&sig=ryj0mVsi7vKmqgNis7KLPR55BDg
F. T. Johora, M. S. I. Khan, E. Kanon, M. A. T. Rony, M. Zubair, and I. H. Sarker, “A Data-Driven Predictive Analysis on Cyber Security Threats with Key Risk Factors.” arXiv, Mar. 28, 2024. Available: http://arxiv.org/abs/2404.00068
R. Raju, N. H. Abd Rahman, and A. Ahmad, “Cyber security awareness in using digital platforms among students in a higher learning institution,” Asian Journal of University Education, vol. 18, no. 3, pp. 756–766, 2022.
J. Herrero, A. Torres, P. Vivas, A. Hidalgo, F. J. Rodríguez, and A. Urueña, “Smartphone addiction and cybercrime victimization in the context of lifestyles routine activities and self-control theories: The user’s dual vulnerability model of cybercrime victimization,” International journal of environmental research and public health, vol. 18, no. 7, p. 3763, 2021.
M. S. Van ’T Hoff-de Goede, E. R. Leukfeldt, R. Van Der Kleij, and S. G. A. Van De Weijer, “The Online Behaviour and Victimization Study: The Development of an Experimental Research Instrument for Measuring and Explaining Online Behaviour and Cybercrime Victimization,” in Cybercrime in Context, vol. I, M. Weulen Kranenbarg and R. Leukfeldt, Eds., in Crime and Justice in Digital Society, vol. I. , Cham: Springer International Publishing, 2021, pp. 21–41. doi: 10.1007/978-3-030-60527-8_3.
M. Vale, F. Pereira, B. H. Spitzberg, and M. Matos, “Cyber‐harassment victimization of Portuguese adolescents: A lifestyle‐routine activities theory approach,” Behavioral Sci & The Law, vol. 40, no. 5, pp. 604–618, Sep. 2022, doi: 10.1002/bsl.2596.
M. Özaşçılar, C. Çalıcı, and Z. Vakhitova, “Examining cybercrime victimisation among Turkish women using routine activity theory,” Crime Prev Community Saf, vol. 26, no. 1, pp. 112–128, Mar. 2024, doi: 10.1057/s41300-024-00201-y.
J. Curtis and G. Oxburgh, “Understanding cybercrime in ‘real world’ policing and law enforcement,” The Police Journal: Theory, Practice and Principles, vol. 96, no. 4, pp. 573–592, Dec. 2023, doi: 10.1177/0032258X221107584.
R. Ch, T. R. Gadekallu, M. H. Abidi, and A. Al-Ahmari, “Computational system to classify cyber crime offenses using machine learning,” Sustainability, vol. 12, no. 10, p. 4087, 2020.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Hadiya Sultan, Zoha Nasim

This work is licensed under a Creative Commons Attribution 4.0 International License.
This work is licensed under a Creative Commons Attribution 4.0 International License. Authors retain copyright and grant the journal the right of first publication, with the work simultaneously licensed under a CC-BY 4.0 License.