CompSciRN: Other Cybersecurity最新文献

筛选
英文 中文
A Critical Take on the Policy Recommendations of the EU High-Level Expert Group on Artificial Intelligence 对欧盟人工智能高级别专家组政策建议的批判性看法
CompSciRN: Other Cybersecurity Pub Date : 2019-10-28 DOI: 10.31228/osf.io/dvx4f
Michael Veale
{"title":"A Critical Take on the Policy Recommendations of the EU High-Level Expert Group on Artificial Intelligence","authors":"Michael Veale","doi":"10.31228/osf.io/dvx4f","DOIUrl":"https://doi.org/10.31228/osf.io/dvx4f","url":null,"abstract":"The European Commission recently published the policy recommendations of its “High-Level Expert Group on Artificial Intelligence”: a heavily anticipated document, particularly in the context of the stated ambition of the new Commission President to regulate in that area. This article argues that these recommendations have significant deficits in a range of areas. It analyses a selection of the Group’s proposals in context of the governance of artificial intelligence more broadly, focusing on issues of framing, representation and expertise, and on the lack of acknowledgement of key issues of power and infrastructure underpinning modern information economies and practices of optimisation.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
A Study on Blockchain Technology 区块链技术研究
CompSciRN: Other Cybersecurity Pub Date : 2019-10-15 DOI: 10.2139/ssrn.3477373
Satarupa Saha, Bappaditya Jana, Jayanta Poray
{"title":"A Study on Blockchain Technology","authors":"Satarupa Saha, Bappaditya Jana, Jayanta Poray","doi":"10.2139/ssrn.3477373","DOIUrl":"https://doi.org/10.2139/ssrn.3477373","url":null,"abstract":"The Blockchain is the newest and perspective technology in modern economy. A blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating parties. It provides provenance, immutability and finality for the transfer of value within a business network. - It enables value exchange in real time, reducing costs and errors. Based on a network consensus approach, whereby trust between the parties involved in a transaction is provided by cryptography. This paper aims to show brief overview of Blockchain Technology, applications and have discussed limitations in the perspective of future research on security in fanatical transaction.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129415971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Introduction to Blockchain Technology From a Legal Perspective and Its Tensions With the GDPR 从法律角度介绍区块链技术及其与GDPR的紧张关系
CompSciRN: Other Cybersecurity Pub Date : 2019-09-30 DOI: 10.2139/ssrn.3545331
Diogo Duarte
{"title":"An Introduction to Blockchain Technology From a Legal Perspective and Its Tensions With the GDPR","authors":"Diogo Duarte","doi":"10.2139/ssrn.3545331","DOIUrl":"https://doi.org/10.2139/ssrn.3545331","url":null,"abstract":"In this paper, we provide a brief overview of blockchain technology from a legal perspective and its legal tensions with the General Data Protection Regulation (GDPR). The purpose of our study is to provide a first approach to help legal professionals, researchers, and students to better understand what is the blockchain technology and how it works, and what are its implications on data protection requirements, particularly in the allocation of responsibilities and in the data subject’s rights. This study primarily focusses on the decentralized and immutable features of blockchain technology and the complexities and uncertainties it creates with respect to the centralized way in which the GDPR operates. Consequently, we also present a few solutions that can be implemented into the design of blockchain-based applications to achieve some of the GDPR’s objectives.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121894160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Collaborative Enforcement Mechanism for Spectrum Sharing Using Blockchain and Smart Contracts: An Application for the 1695-1710MHz Band 使用区块链和智能合约的频谱共享协同执行机制:1695-1710MHz频段的应用
CompSciRN: Other Cybersecurity Pub Date : 2019-07-26 DOI: 10.2139/ssrn.3427469
Pedro J. Bustamante, Marcela M. Gomez, M. Weiss, T. Znati, Debarun Das, J. Stephanie Rose
{"title":"A Collaborative Enforcement Mechanism for Spectrum Sharing Using Blockchain and Smart Contracts: An Application for the 1695-1710MHz Band","authors":"Pedro J. Bustamante, Marcela M. Gomez, M. Weiss, T. Znati, Debarun Das, J. Stephanie Rose","doi":"10.2139/ssrn.3427469","DOIUrl":"https://doi.org/10.2139/ssrn.3427469","url":null,"abstract":"Traditionally, spectrum allocation has been governed by centralized schemes (e.g., command-and-control). Nonetheless, other mechanisms, such as collaborative enforcement, have proven to be successful in a variety of scenarios. In Collaborative enforcement (i.e., collective action), the stakeholders agree on decision-making arrangements (i.e., access, allocation and control of the resources) while being involved in monitoring the adherence to the rules as a shared effort. \u0000 \u0000Blockchain is a distributed ledger of records/transactions (i.e., database) that brings many benefits such as decentralization, transparency, immutability, etc. One of the most notable characteristics of blockchain-based platforms is their definition as trustless environments, as there is no central entity in charge of controlling the network interactions. Instead, trust is a group effort, achieved through repeated interactions, consensus algorithms, and cryptographic tools; therefore, converting blockchain systems into prominent examples of collaborative governance regimes. \u0000 \u0000In this paper, our goal is to analyze a particular application of blockchain and smart contracts for the 1695-1710MHz sharing scenario. In this way, we provide a theoretical analysis of the feasibility and the required characteristics to implement such a system. In addition, through the implementation of a Proof of Concept, we evaluate how the implementation of a blockchain-based organization can be the motor to build a collaborative governance scheme in the spectrum sharing arrangement of the 1695-1710MHz band.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126413578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision-Making with Technology 科技决策
CompSciRN: Other Cybersecurity Pub Date : 2019-05-25 DOI: 10.2139/ssrn.3393984
Sourav Mukherjee
{"title":"Decision-Making with Technology","authors":"Sourav Mukherjee","doi":"10.2139/ssrn.3393984","DOIUrl":"https://doi.org/10.2139/ssrn.3393984","url":null,"abstract":"In every organization decision-making is an integral part of the management process. Technology is booming and in decision-making, it is taking key responsibilities. Every company deals with a huge amount of data from various sources daily and operating with the volume of data is absolutely astounding compared to what the organizations used to do decades ago. In today’s world, business intelligence tools are very important components of any successful business strategy. These tools allow users to modernize the effort needed to search for, combine and query data to obtain the information required for good decisions. In this article, we will discuss the technology trends in decision-making, the capabilities of technology in managerial decision-making and the cognitive ability of decision-making. We will also discuss supervised and unsupervised learning of machine learning techniques, how artificial neural nets (ANNs) use supervised learning to predict outcomes in decision-making with real-world examples.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed Ledger Technology: Secuirty Threats in Cryptography 分布式账本技术:密码学中的安全威胁
CompSciRN: Other Cybersecurity Pub Date : 2019-05-24 DOI: 10.2139/ssrn.3393539
Farhan Anwar Ghumman
{"title":"Distributed Ledger Technology: Secuirty Threats in Cryptography","authors":"Farhan Anwar Ghumman","doi":"10.2139/ssrn.3393539","DOIUrl":"https://doi.org/10.2139/ssrn.3393539","url":null,"abstract":"DLT has become an important topic of the world in recent years. Today Distributed Ledger Technology is growing famous among transactions and storing data between organizations. It has given an economic boom to many businesses and industries. DL technology brings a revolutionary change in maintaining secure transactions and storing data on a network of machines. The data stored use crypto technology to make it secure. Although this technology brings a revolutionary change and more convenient services, the security issues of crypto technology is also a very important discussion which we need to concern. This paper discusses the security threats, deficiencies and weaknesses of Crypto Technology. Security issues is discussed which might occurred in systems, networks, transaction etc.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131216824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Regulating Bitcoin: A Tax Case Study 监管比特币:税收案例研究
CompSciRN: Other Cybersecurity Pub Date : 2019-05-20 DOI: 10.2139/ssrn.3402260
Margaret Ryznar
{"title":"Regulating Bitcoin: A Tax Case Study","authors":"Margaret Ryznar","doi":"10.2139/ssrn.3402260","DOIUrl":"https://doi.org/10.2139/ssrn.3402260","url":null,"abstract":"This chapter adapts the Coffee bonding theory to the modern context of bitcoin, using tax as a case study. As the theory predicts, tax authorities may be able to increase the legitimacy of bitcoin by improving tax compliance and reducing tax evasion. Thus, while the Coffee theory arose two decades ago to explain the cross-listing of foreign company shares, it has implications for the modern context of bitcoin.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132971985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain and Smart-Contract: A Pioneering Approach of Inter-Firms Relationships? The Case of Franchise Networks 区块链和智能合约:企业间关系的开创性方法?特许经营网络案例
CompSciRN: Other Cybersecurity Pub Date : 2019-04-26 DOI: 10.2139/ssrn.3378477
R. Baron, Magali Chaudey
{"title":"Blockchain and Smart-Contract: A Pioneering Approach of Inter-Firms Relationships? The Case of Franchise Networks","authors":"R. Baron, Magali Chaudey","doi":"10.2139/ssrn.3378477","DOIUrl":"https://doi.org/10.2139/ssrn.3378477","url":null,"abstract":"This paper is interested in the analysis of Blockchains and Smart-contracts applied to inter-firms relationships, in particular the franchise networks. After defining the Blockchain technology and the Smart-contract as a particular type of contract stored in blockchains, we question the theory of contracts and its conception(s) of transactions, information asymmetries, firm or inter-firm relations. To better understand the challenges of blockchain for franchise networks and identify opportunities for implementation in these networks, we present some relevant applications of this technology. We identify different ways where blockchain technology could improve the network management and therefore their performance: the supply-chain, the brand-name protection, security and transparency in the payment of fees and royalties, access to reliable information via an oracle.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122809543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Data Security in Mobile Cloud Computing 移动云计算中的数据安全
CompSciRN: Other Cybersecurity Pub Date : 2019-03-14 DOI: 10.2139/ssrn.3352362
Rashmi P. Sarode, S. Bhalla
{"title":"Data Security in Mobile Cloud Computing","authors":"Rashmi P. Sarode, S. Bhalla","doi":"10.2139/ssrn.3352362","DOIUrl":"https://doi.org/10.2139/ssrn.3352362","url":null,"abstract":"Mobile Cloud Computing (MCC) is a rapid growing technology these days as number of mobile users are increasing day by day. Data privacy and security due to the use of mobile devices is an aspect of major concern. MCC can offer infrastructure, computational power, software and platform services to any ordinary smartphone. There are several issues regarding the security of MCC such as network security, web application security, data access, authentication, authorization, data confidentiality, and data breach. Mobile devices do not have enough storage and CPU speed so data storage capacity in these devices is less. To achieve a secure MCC environment, security threats have to be studied and analyzed accordingly. We propose an algorithm to enhance the security of the mobile cloud which will ensure data integrity and confidentiality. This mechanism uses AES and RSA to provide better security. We also discuss the security threats in MCC environments and propose solutions for these.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121652664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
[H]ERC The Human Protocol: A MultiLayered Interoperable Supply Chain Management Software With Decentralized, Incentivized, Gamified Internal Controls [H]李建平。基于供应链管理的企业内部控制机制研究
CompSciRN: Other Cybersecurity Pub Date : 2018-10-29 DOI: 10.2139/ssrn.3442334
Hercules Core Team
{"title":"[H]ERC The Human Protocol: A MultiLayered Interoperable Supply Chain Management Software With Decentralized, Incentivized, Gamified Internal Controls","authors":"Hercules Core Team","doi":"10.2139/ssrn.3442334","DOIUrl":"https://doi.org/10.2139/ssrn.3442334","url":null,"abstract":"Hercules Supply Chain Blockchain Protocol discussed at length by the Hercules Core team. This academic format was edited by Mike McRoberts Founder of McS LLC and reviewed by Lyle Paczkowski Senior Technology Strategist at Sprint Global.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123969511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信