{"title":"A Critical Take on the Policy Recommendations of the EU High-Level Expert Group on Artificial Intelligence","authors":"Michael Veale","doi":"10.31228/osf.io/dvx4f","DOIUrl":"https://doi.org/10.31228/osf.io/dvx4f","url":null,"abstract":"The European Commission recently published the policy recommendations of its “High-Level Expert Group on Artificial Intelligence”: a heavily anticipated document, particularly in the context of the stated ambition of the new Commission President to regulate in that area. This article argues that these recommendations have significant deficits in a range of areas. It analyses a selection of the Group’s proposals in context of the governance of artificial intelligence more broadly, focusing on issues of framing, representation and expertise, and on the lack of acknowledgement of key issues of power and infrastructure underpinning modern information economies and practices of optimisation.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Blockchain Technology","authors":"Satarupa Saha, Bappaditya Jana, Jayanta Poray","doi":"10.2139/ssrn.3477373","DOIUrl":"https://doi.org/10.2139/ssrn.3477373","url":null,"abstract":"The Blockchain is the newest and perspective technology in modern economy. A blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating parties. It provides provenance, immutability and finality for the transfer of value within a business network. - It enables value exchange in real time, reducing costs and errors. Based on a network consensus approach, whereby trust between the parties involved in a transaction is provided by cryptography. This paper aims to show brief overview of Blockchain Technology, applications and have discussed limitations in the perspective of future research on security in fanatical transaction.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129415971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Introduction to Blockchain Technology From a Legal Perspective and Its Tensions With the GDPR","authors":"Diogo Duarte","doi":"10.2139/ssrn.3545331","DOIUrl":"https://doi.org/10.2139/ssrn.3545331","url":null,"abstract":"In this paper, we provide a brief overview of blockchain technology from a legal perspective and its legal tensions with the General Data Protection Regulation (GDPR). The purpose of our study is to provide a first approach to help legal professionals, researchers, and students to better understand what is the blockchain technology and how it works, and what are its implications on data protection requirements, particularly in the allocation of responsibilities and in the data subject’s rights. This study primarily focusses on the decentralized and immutable features of blockchain technology and the complexities and uncertainties it creates with respect to the centralized way in which the GDPR operates. Consequently, we also present a few solutions that can be implemented into the design of blockchain-based applications to achieve some of the GDPR’s objectives.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121894160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pedro J. Bustamante, Marcela M. Gomez, M. Weiss, T. Znati, Debarun Das, J. Stephanie Rose
{"title":"A Collaborative Enforcement Mechanism for Spectrum Sharing Using Blockchain and Smart Contracts: An Application for the 1695-1710MHz Band","authors":"Pedro J. Bustamante, Marcela M. Gomez, M. Weiss, T. Znati, Debarun Das, J. Stephanie Rose","doi":"10.2139/ssrn.3427469","DOIUrl":"https://doi.org/10.2139/ssrn.3427469","url":null,"abstract":"Traditionally, spectrum allocation has been governed by centralized schemes (e.g., command-and-control). Nonetheless, other mechanisms, such as collaborative enforcement, have proven to be successful in a variety of scenarios. In Collaborative enforcement (i.e., collective action), the stakeholders agree on decision-making arrangements (i.e., access, allocation and control of the resources) while being involved in monitoring the adherence to the rules as a shared effort. \u0000 \u0000Blockchain is a distributed ledger of records/transactions (i.e., database) that brings many benefits such as decentralization, transparency, immutability, etc. One of the most notable characteristics of blockchain-based platforms is their definition as trustless environments, as there is no central entity in charge of controlling the network interactions. Instead, trust is a group effort, achieved through repeated interactions, consensus algorithms, and cryptographic tools; therefore, converting blockchain systems into prominent examples of collaborative governance regimes. \u0000 \u0000In this paper, our goal is to analyze a particular application of blockchain and smart contracts for the 1695-1710MHz sharing scenario. In this way, we provide a theoretical analysis of the feasibility and the required characteristics to implement such a system. In addition, through the implementation of a Proof of Concept, we evaluate how the implementation of a blockchain-based organization can be the motor to build a collaborative governance scheme in the spectrum sharing arrangement of the 1695-1710MHz band.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126413578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision-Making with Technology","authors":"Sourav Mukherjee","doi":"10.2139/ssrn.3393984","DOIUrl":"https://doi.org/10.2139/ssrn.3393984","url":null,"abstract":"In every organization decision-making is an integral part of the management process. Technology is booming and in decision-making, it is taking key responsibilities. Every company deals with a huge amount of data from various sources daily and operating with the volume of data is absolutely astounding compared to what the organizations used to do decades ago. In today’s world, business intelligence tools are very important components of any successful business strategy. These tools allow users to modernize the effort needed to search for, combine and query data to obtain the information required for good decisions. In this article, we will discuss the technology trends in decision-making, the capabilities of technology in managerial decision-making and the cognitive ability of decision-making. We will also discuss supervised and unsupervised learning of machine learning techniques, how artificial neural nets (ANNs) use supervised learning to predict outcomes in decision-making with real-world examples.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Ledger Technology: Secuirty Threats in Cryptography","authors":"Farhan Anwar Ghumman","doi":"10.2139/ssrn.3393539","DOIUrl":"https://doi.org/10.2139/ssrn.3393539","url":null,"abstract":"DLT has become an important topic of the world in recent years. Today Distributed Ledger Technology is growing famous among transactions and storing data between organizations. It has given an economic boom to many businesses and industries. DL technology brings a revolutionary change in maintaining secure transactions and storing data on a network of machines. The data stored use crypto technology to make it secure. Although this technology brings a revolutionary change and more convenient services, the security issues of crypto technology is also a very important discussion which we need to concern. This paper discusses the security threats, deficiencies and weaknesses of Crypto Technology. Security issues is discussed which might occurred in systems, networks, transaction etc.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131216824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Regulating Bitcoin: A Tax Case Study","authors":"Margaret Ryznar","doi":"10.2139/ssrn.3402260","DOIUrl":"https://doi.org/10.2139/ssrn.3402260","url":null,"abstract":"This chapter adapts the Coffee bonding theory to the modern context of bitcoin, using tax as a case study. As the theory predicts, tax authorities may be able to increase the legitimacy of bitcoin by improving tax compliance and reducing tax evasion. Thus, while the Coffee theory arose two decades ago to explain the cross-listing of foreign company shares, it has implications for the modern context of bitcoin.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132971985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain and Smart-Contract: A Pioneering Approach of Inter-Firms Relationships? The Case of Franchise Networks","authors":"R. Baron, Magali Chaudey","doi":"10.2139/ssrn.3378477","DOIUrl":"https://doi.org/10.2139/ssrn.3378477","url":null,"abstract":"This paper is interested in the analysis of Blockchains and Smart-contracts applied to inter-firms relationships, in particular the franchise networks. After defining the Blockchain technology and the Smart-contract as a particular type of contract stored in blockchains, we question the theory of contracts and its conception(s) of transactions, information asymmetries, firm or inter-firm relations. To better understand the challenges of blockchain for franchise networks and identify opportunities for implementation in these networks, we present some relevant applications of this technology. We identify different ways where blockchain technology could improve the network management and therefore their performance: the supply-chain, the brand-name protection, security and transparency in the payment of fees and royalties, access to reliable information via an oracle.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122809543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Security in Mobile Cloud Computing","authors":"Rashmi P. Sarode, S. Bhalla","doi":"10.2139/ssrn.3352362","DOIUrl":"https://doi.org/10.2139/ssrn.3352362","url":null,"abstract":"Mobile Cloud Computing (MCC) is a rapid growing technology these days as number of mobile users are increasing day by day. Data privacy and security due to the use of mobile devices is an aspect of major concern. MCC can offer infrastructure, computational power, software and platform services to any ordinary smartphone. There are several issues regarding the security of MCC such as network security, web application security, data access, authentication, authorization, data confidentiality, and data breach. Mobile devices do not have enough storage and CPU speed so data storage capacity in these devices is less. To achieve a secure MCC environment, security threats have to be studied and analyzed accordingly. We propose an algorithm to enhance the security of the mobile cloud which will ensure data integrity and confidentiality. This mechanism uses AES and RSA to provide better security. We also discuss the security threats in MCC environments and propose solutions for these.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121652664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[H]ERC The Human Protocol: A MultiLayered Interoperable Supply Chain Management Software With Decentralized, Incentivized, Gamified Internal Controls","authors":"Hercules Core Team","doi":"10.2139/ssrn.3442334","DOIUrl":"https://doi.org/10.2139/ssrn.3442334","url":null,"abstract":"Hercules Supply Chain Blockchain Protocol discussed at length by the Hercules Core team. This academic format was edited by Mike McRoberts Founder of McS LLC and reviewed by Lyle Paczkowski Senior Technology Strategist at Sprint Global.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123969511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}