Results for 'Blockchain Security'

970 found
Order:
  1. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  24
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Blockchain dando respuesta a la contabilidad y la contabilidad dando respuesta a blockchain.Flavia M. Fernandez, Martín Núñez, Gabriel Budiño & Carolina Asuaga - 2021 - Dissertation, Universidad de Buenos Aires (Uba)
    The 21st century is undergoing an unprecedented productivity shift due to the use of disruptive technologies, including artificial intelligence, cloud computing, blockchain, big data, robotics, and augmented reality, among others. The use of these technologies is expanding across all sectors of the economy, blurring the boundaries between different activities, and digital systems are permeating them, leading to a reevaluation of knowledge and techniques in various fields of study. Accounting is not exempt from this reality, and blockchain technology is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Auditable Blockchain Randomization Tool.Julio Michael Stern & Olivia Saa - 2019 - Proceedings 33 (17):1-6.
    Randomization is an integral part of well-designed statistical trials, and is also a required procedure in legal systems. Implementation of honest, unbiased, understandable, secure, traceable, auditable and collusion resistant randomization procedures is a mater of great legal, social and political importance. Given the juridical and social importance of randomization, it is important to develop procedures in full compliance with the following desiderata: (a) Statistical soundness and computational efficiency; (b) Procedural, cryptographical and computational security; (c) Complete auditability and traceability; (d) (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  22
    AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  27
    ntelligent Hybrid Cloud Data Deduplication for Optimized Storage Utilization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-633.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated environment. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Digital Inheritance in Web3: A Case Study of Soulbound Tokens and the Social Recovery Pallet within the Polkadot and Kusama Ecosystems.Justin Goldston, Tomer Jordi Chaffer, Justyna Osowska & Charles von Goins Ii - manuscript
    In recent years discussions centered around digital inheritance have increased among social media users and across blockchain ecosystems. As a result digital assets such as social media content cryptocurrencies and non-fungible tokens have become increasingly valuable and widespread, leading to the need for clear and secure mechanisms for transferring these assets upon the testators death or incapacitation. This study proposes a framework for digital inheritance using soulbound tokens and the social recovery pallet as a use case in the Polkadot (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  66
    IT & C, Volumul 3, Numărul 1, Martie 2024.Nicolae Sfetcu - 2024 - It and C 3 (1).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Challenges and Limitations in the Use of Artificial Intelligence Provocări și limitări în utilizarea inteligenței artificiale -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Impact of Big Data Technology on Contemporary Society Impactul tehnologiei Big Data asupra societății contemporane -/- Methods, Techniques and Patterns of Advanced Persistent Threats – APT Lifecycle Metode, tehnici și (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. New Financial Technologies: Understanding the Revolution on the Move, SciencesPo, 24h, 2018.Jean Langlois-Berthelot - unknown
    By the end of the course students will be able to: - Analyze the issues caused by anonymization and financial virtualization -Develop a clear understanding of Digital Identity and the legal aspects of it - Identify the functioning of cryptocurrencies, blockchain and « digital cash » - Understand the reconfiguration of the balance of power between "traditional" financial actors and new financial players. - Assess the latest developments in cryptocurrency law - Explain new risks in terms of financial (...) - Develop a prospective analysis on new financial technologies. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  24
    Innovative Deduplication Strategies for Cost-Effective Data Management in Hybrid Cloud Models.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  21
    Smart Deduplication Framework for Optimized Data Management in Hybrid Cloud.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework achieves significant storage savings without compromising data integrity. Real-time testing on a hybrid cloud setup demonstrated a 65% reduction in storage needs and a 40% improvement in data retrieval times. Additionally, the system employs blockchain for immutable logging of deduplication activities, enhancing transparency and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. (1 other version)Cunoașterea Științifică, Volumul 1, 2022.Nicolae Sfetcu - 2022 - Cunoașterea Științifică 1.
    Revista Cunoașterea Științifică este o publicație trimestrială din domeniile științei și filosofiei, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE Cunoașterea, de Nicolae Sfetcu Cuvânt introductiv pentru (și despre) „Cunoașterea Științifică”, de Adrian Klein Viitorul științei – Știința științelor, de Nicolae Sfetcu -/- ȘTIINȚE NATURALE Teste gravitaționale, de Nicolae Sfetcu Inside, and Beyond „Nothingness”, de Adrian Klein și Robert Neil Boyd Anomalii ale relativității generale, de Nicolae Sfetcu -/- ȘTIINȚE SOCIALE Fondarea Uniunii Europene și evoluția tratatelor comunității (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Management of socio-economic transformations of business processes: current realities, global challenges, forecast scenarios and development prospects.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Sofia: Professor Marin Drinov Publishing House of Bulgarian Academy of Sciences.
    The authors of the scientific monograph have come to the conclusion that мanagement of socio-economic transformations of business processes requires the use of mechanisms to support of entrepreneurship, sectors of the national economy, the financial system, and critical infrastructure. Basic research focuses on assessment the state of social service provision, analysing economic security, implementing innovation and introducing digital technologies. The research results have been implemented in the different models of costing, credit risk and capital management, tax control, use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. (1 other version)Pandemic Economic Crisis: Changes and New Challenges to Society: scientific monograph.Maksym Bezpartochnyi (ed.) - 2020 - Sofia, Bułgaria: VUZF Publishing House “St. Grigorii Bogoslov”.
    The current economic crisis caused by the COVID-19 pandemic has created new changes and challenges for society, which has led to a deeper identification of pressing problems and to develop strategies and models for overcoming crises in various countries, industries and businesses. The formation and improvement of modern strategies and models of crisis management is impossible without optimizing the resources of economic entities, providing assistance at various levels of government to support priority sectors of the economy, finding additional sources of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Blockchain Technology as an Institution of Property.Georgy Ishmaev - 2017 - Metaphilosophy 48 (5):666-686.
    This paper argues that the practical implementation of blockchain technology can be considered an institution of property similar to legal institutions. Invoking Penner's theory of property and Hegel's system of property rights, and using the example of bitcoin, it is possible to demonstrate that blockchain effectively implements all necessary and sufficient criteria for property without reliance on legal means. Blockchains eliminate the need for a third-party authority to enforce exclusion rights, and provide a system of universal access to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. Blockchain Identities: Notational Technologies for Control and Management of Abstracted Entities.Quinn Dupont - 2017 - Metaphilosophy 48 (5):634-653.
    This paper argues that many so-called digital technologies can be construed as notational technologies, explored through the example of Monegraph, an art and digital asset management platform built on top of the blockchain system originally developed for the cryptocurrency bitcoin. As the paper characterizes it, a notational technology is the performance of syntactic notation within a field of reference, a technologized version of what Nelson Goodman called a “notational system.” Notational technologies produce abstracted entities through positive and reliable, or (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. Tehnologia blockchain.Nicolae Sfetcu - manuscript
    Blockchain, denumit inițial lanț de blocuri, este o listă în continuă creștere de înregistrări numite blocuri, care comunică între ele prin mesaje criptografiate. Fiecare bloc conține un hash criptografic al blocului anterior, un marcaj de timp și datele tranzacției. Prin proiectare, un blockchain este "un registru deschis, distribuit, care poate înregistra tranzacțiile între două părți eficient și într-un mod verificabil și permanent", de obicei gestionat de o rețea peer-to-peer care aderă la un protocol pentru comunicarea între noduri și (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Blockchain Design and Modelling.Nicolae Sfetcu - manuscript
    Ontology engineering, along with semantic Web technologies, allow the semantic development and modeling of the operational flow required for blockchain design. The semantic Web, in accordance with W3C, "provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries" and can be seen as an integrator for various content, applications and information systems. The most widely used blockchain modelling system, by abstract representation, description and definition of structure, processes, information and resources, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Postdigital Prospects for Blockchain-Disrupted Higher Education: Beyond the Theater, Memes and Marketing Hype.Shane J. Ralston - 2020 - Postdigital Science and Education 2 (1):280-288.
    With DLT’s success in driving the development of cryptocurrency (such as Bitcoin), the technology bridged to a myriad of knowledge-based applications, most notably in the areas of commerce, industry and government . In the language of technology sector insiders, these areas were ‘disrupted’ by Blockchain. Some higher education analysts, technology industry insiders and futurists have claimed that Blockchain technology will inevitably disrupt higher education in a similarly dramatic fashion. The aim of this commentary is to introduce a healthy (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. (1 other version)Blockchain Technology in the Fiscal Process of Ukraine.Igor Britchenko & Cherniavska Tetiana - 2019 - Списание «Икономически Изследвания (Economic Studies)» 28 (5):134-148.
    The problem of corruption in Ukraine has been examined, as well as Blockchain technology application feasibility in combating the phenomenon has been analyzed in the article. Blockchain instrumental features and properties, making the technology unique and determining its potential applications in many sectors of the economy, have been covered with much attention. The authors have analyzed both advantages and obstacles for a distributed data registry implementation. Analysis of benchmarks and application of the best practices of Blockchain technology (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Engaging Consumers in Sustainable Behaviors Using Blockchain Applications.S. Amadae - 2024 - 15Th Scandinavian Conference on Information Systems 16:1-15.
    Tracking and goal setting are popular approaches in the personal health and fitness industry. In this paper we use a similar approach to assist users in their journey for a more sustainable lifestyle, starting with food. We employ Action Design Research (ADR) methodology to develop an application and subsequently propose design principles for developing blockchain-based applications for assisting users on their path to eating environmentally friendly food. The path to a sustainable lifestyle can be hard as individuals often do (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Blockchain Enterprise Ontologies: TOVE and DEMO.Nicolae Sfetcu - manuscript
    Enterprise ontology for blockchain transactions includes datalogical, infological and essential levels. OntoClean analyzes ontologies based on formal, domain-independent properties (metaproperties), being the first attempt to formalize the notion of ontological analysis for computer systems. The notions are extracted from the philosophical ontology. In the semantic web, a property is a binary relationship, with a subtle distinction between ownership and class. Thus, a metaproperty is a property of a property or a class. The design of ontology can be done when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Filosofia tehnologiei blockchain - Ontologii.Nicolae Sfetcu - manuscript
    Despre necesitatea şi utilitatea dezvoltării unei filosofii specifice tehnologiei blockchain, accentuând pe aspectele ontologice. După o Introducere în care evidenţiez principalele direcţii filosofice pentru această tehnologie emergentă, în Tehnologia blockchain explicitez modul de funcţionare al blockchain, punând în discuţie direcţiile ontologice de dezvoltare în Proiectarea şi Modelarea acestei tehnologii. Următoarea secţiune este dedicată principalei aplicaţii a tehnologiei blockchain, Bitcoin, cu implicaţiile sociale ale acestei criptovalute. Urmează o secţiune de Filosofie în care identific tehnologia blockchain cu (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  27. Blockchain et l'arbre causal de la référence.Sfetcu Nicolae - manuscript
    Dans un article précédent, The Philosophy of blockchain technology - Ontologies, j'ai parlé de l'application de la théorie narrative de Paul Ricœur dans le développement d'une ontologie de la technologie blockchain. Dans cette section, j'ai l'intention de mettre en évidence l'idée d'une analogie entre la technologie blockchain et les théories causales de la référence. Dans la mesure où la poursuite de l'élaboration de cette idée se révélera viable, je vais essayer de développer une théorie basée sur cette (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Blockchain technology into the logistics supply chain implementation effectiveness.Igor Britchenko, Tetiana Cherniavska & Bogdan Cherniavskyi - 2018 - In Igor Britchenko & Ye Polishchuk (eds.), Development of small and medium enterprises: the EU and East-partnership countries experience: monograph. Wydawnictwo Państwowej Wyższej Szkoły Zawodowej im. prof. Stanisława Tarnowskiego w Tarnobrzegu. pp. 307 - 318.
    Technologies currently have a tremendous impact on all spheres of economy, business and a state. They integrally change people’s conception of trade, property, and market entities interaction. Artificial intelligence, additive, informationommunication, green technologies, biotechnologies, and blockchain technologies development and implementation confirm their leadership importance and inevitability in relation to the activities traditional approaches. In the modern world only the companies with flexible vision, equipment and technologies able to instantly reform, adapt to new conditions and challenges, will benefit. The point (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  87
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Blockchain Philosophy - Bitcoin.Nicolae Sfetcu - manuscript
    State features are affected by the connection with digital coins. Social systems create their own limits and remain alive according to their internal logic, which does not derive from the system environment. So, social systems are operationally and autonomously closed - interacting with their environment and there is a general increase in entropy, but individual systems work to maintain and preserve their internal order. Autopoietic systems (like the state, with the tendency to maintain the inner order with a remarkable degree (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Blockchain Ontologies: OCL and REA.Nicolae Sfetcu - manuscript
    Unified Modeling Language (UML) of Object Management Group, along with Object Constraint Language (OCL), are considered as the best fit for blockchain ontology. OCL is a declarative language that describes the rules applicable to UML models and is part of the UML standard. Initially, OCL was just an extension of the formal specification language for UML. Now, OCL can be used with any meta-model. Enterprise ontology is combined with the business ontology of Resources, Events, Agents (REA) to be used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Blockchain and the causal tree of reference.Nicolae Sfetcu - manuscript
    In a previous article, Philosophy of Blockchain Technology - Ontologies, I talked about applying Paul Ricœur's narrative theory in developing an ontology of blockchain technology. In this article I intend to highlight the idea of an analogy between blockchain technology and the causal theories of reference. Such a theory can be interpreted as a result of syntactic notation in a reference field, based on the narrative theory developed by Paul Ricœur in Time and Narrative. DOI: 10.13140/RG.2.2.26682.95684.
    Download  
     
    Export citation  
     
    Bookmark  
  33. Filosofia blockchain.Nicolae Sfetcu - manuscript
    Conceptul de heterotopie digitală implică o modalitate de a descrie și analiza relația specială și evolutivă dintre statul contemporan și banii digitali, inclusiv criptovalutele derulate prin blockchain. Caracteristicile statului sunt afectate prin conexiunea cu monedele digitale. Sistemele sociale își creează propriile limite și se mențin în viață conform logicii lor interne, care nu derivă din mediul sistemului. Deci, sistemele sociale sunt închise din punct de vedere operațional și autonome - interacționează cu mediul lor și există o creștere generală a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. La technologie blockchain comme hétérotopie et système notationnel - L'ontologie.Nicolae Sfetcu - manuscript
    Le concept d'hétérotopie numérique est un moyen de décrire et d'analyser la relation particulière et évolutive entre l'État contemporain et la monnaie numérique, y compris les crypto-monnaies passant par la blockchain. Les caractéristiques de l'État sont affectées par la connexion avec les monnaies numériques. Les technologies numériques peuvent également être interprétées comme des technologies notationnelles, résultant respectivement de la notation syntaxique dans un champ de référence (système notationnel). L'ontologie sociale s'intéresse à la nature du monde social, aux constituants ou (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Blockchain technology as a panacea for procurement corruption in digital era.Oyebanjo G. Ogunlela, Olabode H. Ojugbele & Robertson K. Tengeh - 2021 - International Journal of Research in Business and Social Science 10 (4):311-320.
    Corruption in public institutions is a significant problem that stifles economic, social and environmental development worldwide. This predominates when there is a lack of transparency, inadequate record-keeping, and low public accountability. Accordingly, the questions this paper intends to provide answers to are two-fold. Firstly, what are the recurring patterns of procurement corruption in the South Africa (SA) public sector? Secondly, how can digital technology deployment assist in checking this trend? Desktop method was adopted through literature examination of studies relating to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  37. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Các nhân tố ảnh hưởng đến khả năng áp dụng Blockchain trong chuyển giao dữ liệu tại các ngân hàng thương mại Việt Nam.Nguyễn Thúy Anh, Lê Phương Huyền, Trần Thu Phương, Nguyễn Thị Hồng Nhung & Nguyễn Trần Khánh Linh - 2024 - Kinh Tế Và Dự Báo.
    Nghiên cứu khảo sát 120 nhân viên và quản lý thuộc 31 ngân hàng thương mại (NHTM) Việt Nam, sử dụng mô hình chấp nhận và sử dụng công nghệ - UTAUT để xác định các nhân tố ảnh hưởng đến việc áp dụng công nghệ chuỗi (Blockchain) trong việc chuyển giao dữ liệu giữa các ngân hàng. Kết quả cho thấy, Sự hỗ trợ pháp lý điều tiết sự ảnh hưởng của nhân tố Niềm tin và sự yêu (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  41. A Thousand Blockchains: Capitalism and Tokenmania.Sebastian Cincelli - 2022 - Erasmus Student Journal of Philosophy 21:8-23.
    Capitalism has become able to appropriate economically and quantitatively our “qualitative field of life” and to destroy and create social relations based on debt mechanisms. In parallel, technologies such as blockchain are expected to disrupt business practices and social interactions as they are currently conceived. For Brian Massumi, blockchain is what we need to resist capitalism and escape its pervasiveness, as it can help us “reinvent” the concept of value within broader collective arrangements. In this article, the author (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  56
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Blockchain Narrative Ontologies.Nicolae Sfetcu - manuscript
    Social ontology is concerned with the nature of the social world, constituents, or building blocks of social entities in general. Some theories claim that social entities are built from people's psychological states, others are built up of actions, others from practice, and other theories deny that even a distinction can be made between social and non-social. There are different philosophical views on how the ontological significance of narrative can contribute to our understanding of the social world and the way in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. (1 other version)Chapter 7 Cryptocurrency, Distributed Ledger Technology and Blockchain Tokens.S. M. Amadae - 2023 - In Sustainable Consumption: Political Economy of Sustainable Food. Aalto University. pp. 199-241.
    This chapter discusses cryptocurrency, distributed ledger technology and blockchain tokens within the context of technological innovation, the history of money and accounting practices, and their multiple functionalities beyond those of standard currencies. This discussion is motivated by the design of cryptocurrencies for specific community needs, and to reflect anti-rival, positive sum value.
    Download  
     
    Export citation  
     
    Bookmark  
  46. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. La technologie blockchain.Nicolae Sfetcu - manuscript
    De par sa conception, une blockchain est "un grand livre ouvert et distribué capable d'enregistrer les transactions entre deux parties de manière efficace, vérifiable et permanente", généralement gérée par un réseau d'égal à égal adhérant à un protocole communication de nœud et validation de nouveaux blocs. Après l'enregistrement, les données de chaque bloc ne peuvent pas être modifiées de manière rétrospective sans modifier tous les blocs suivants, ce qui nécessite un consensus du réseau. La blockchain peut être considérée (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Security Through Mutual Understanding and Co-existence or Military Might?: Somali and U.S. Perspectives.Gail M. Presbey - 2011 - In Elavie Ndura-Ouédraogo, Matt Meyer & Judith Atiri (eds.), Seeds Bearing Fruit: Pan African Peace Action in the 21st Century. Africa World Press. pp. 323-351.
    Download  
     
    Export citation  
     
    Bookmark  
  49.  71
    Freedom, security and justice in the European Union: a short genealogy of the "Security Union".Elisa Orru - 2022 - Eunomia 11 (1):143–162.
    This article focuses on the so-called “Area of Freedom, Security and Justice” (ASFJ), namely the policy field of the European Union (EU) that covers judicial and police cooperation, migration and asylum policies and the control of external borders. The article explores how the AFSJ has emerged and how, within it, the relationship between freedom and security has evolved over time and brought about a shift towards a “Security Union”.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 970