1,681 research outputs found

    Distributed Random Process for a Large-Scale Peer-to-Peer Lottery

    Get PDF
    Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of protocols with no trusted third party. We argue that the security requirements of online lotteries are similar to those of online voting, and propose a novel distributed online lottery protocol that applies techniques developed for voting applications to an existing lottery protocol. As a result, the protocol is scalable, provides efficient verification of the random process and does not rely on a trusted third party nor on assumptions of bounded computational resources. An early prototype confirms the feasibility of our approach

    Media corruption and issues of journalistic and institutional integrity in post-communist countries: the case of Bulgaria

    Get PDF
    From a normative standpoint the media are usually seen as one of the pillars of a national integrity system, entrusted with the tasks of exposing and preventing acts of corruption and educating the public of the harm caused by corruption. Nevertheless, corruption continues to be one of the most significant challenges that Europe faces, undermining citizens' trust in democratic institutions and weakening the accountability of political leadership. Evidence suggests that in fragile EU democracies such as Bulgaria, despite more than eight years of full membership and numerous preventive measures, corruption is rife and the press is hardly capable of exposing abuses of power or authority. On the contrary - drawing on in-depth interviews with 35 Bulgarian journalists - this paper argues that since communism collapsed in the late 1980s the media in post-communist societies such as Bulgaria has gradually become an instrument to promote and defend private vested interests, and is plagued by corruption. Senior journalists and editors cast serious doubt over the ability of the post-communist free press and journalism to act as a watchdog for society

    Towards Sustainable Cryptocurrency: Risk Mitigations from a Perspective of National Security

    Get PDF
    Cryptocurrency market is developing fast during the past few years. Cryptocurrency now is available as a form of payment for retail goods, as an instrument for a wholesale international transaction a mean of exchange for whatever goods and is available through ATM’s. Moreover, it is developing as a possibility for fundraising a) as a private debt b) as seed capital. Companies like Facebook are discussing launching own cryptocurrency. Bank UBS is developing its blockchain based virtual currency as well. However, scientist agrees that cryptocurrency has an important impact to national security. It became a relevant instrument for illegal good transactions, a mean of exchange in the darknet and an instrument for money laundering or infrastructure for new kind of money-laundering practices (for example- “Smurfing” phenomena (EU Observer, 2019)) European Union is launching AML and KYC procedures for the cryptocurrency market. Would it be efficient? Why are we implementing KYC and AML procedures for cryptocurrency? Is it able to minimize risks

    Protecting Speech, Protecting Privacy: The Future Costs of U.K. Libel Claims

    Get PDF

    Social Engineering: The Art of Attacks

    Get PDF
    The correct management of information systems security is often over looked in technological measures and management efforts, and although there are now many tools to address security threats, the human aspect has been neglected. This paper discusses the human factors that could potentially lead to in trusions with social engineering. Social engineering is a method used by hackers to obtain access to systems by manipulating flaws in behavior known as mental preconceptions. Social engineering is a risk to security information and must be considered just as important as in technological areas. In this paper we also aprproach social engineering, taking an introductory brief in its history, what is psychological manipulation and human weaknesses, what are the social engineering attacks, how they use authority and fear establishment, it is also approached how a social engineering attack is executed, providing value monetizing the scam, and identity exploration.info:eu-repo/semantics/publishedVersio

    Coping with precarisation. Employees' responses to flexiblity and control in Milanese large scale retailing

    Get PDF
    This dissertation deals with retail employees' everyday experiences of precarisation, flexibilisation and labour control. Based on labour process theory and critical psychology, it asks for how workers cope with emerging conflicts, how the construction of both work place consent and conflict capacities passes through workers' own common sense, and how they could increase their disposal over working and living conditions. Empirical analysis relies on qualitative, problem-centred interviews. It points to experiences of forced availability and management's fake participation offers as central, interlinked conflict fields. For all four coping patterns of happy integration, border drawing, personal strike and conflictive negotiation, practices of adaptation and appropriation result as closely connected and reflected in contradictory common sense constructions. Moreover, employees' conflict capacities remain limited due to lacking collective resources and capacities. Enhancing agency potentials in face of precarisation thus requires a reconstruction of collective experiences and strategies as well as a critical analysis of common sense

    The Importance and Implications of Forensic Accounting in the Financial World

    Get PDF
    This thesis thoroughly explores fraud and the forensic accounting profession. It details the education, training, and careers of forensic accountants; and why demand for this profession has suddenly spiked. The necessary skills of forensic accountants and why these skills are valuable is explored; a need for better education and training is also proposed. It also details popular forensic accounting methods and how these may be used to detect fraud. This thesis explains several fraud schemes and famous frauds that were contributors to the growing demand of forensic accountants. The fraud triangle and other contributing factors are explored. This thesis also emphasizes the importance of strong internal controls and explains the COSO internal control framework; several important internal controls are listed and explained. Cybersecurity is also explained; including why it has become an absolute necessity and how businesses can better enforce cybersecurity measures. This thesis also explains the changes that were made following the Enron and WorldCom scandals and details the Sarbanes-Oxley Act of 2002. Explanations for the relevant changes and why they were necessary are included. The purpose of this thesis is to demonstrate the importance of forensic accounting and to thoroughly explain the facets of fraud and forensic accounting

    The Paradox of Czech Crusaders: Will They Ever Learn the Corruption Lesson? (Corruption and Anticorruption in the Czech Republic)

    Get PDF
    Corruption has a negative impact on society and economy. The transition process in Central and Eastern Europe (CEE) uncovered dormant possibilities for corruption and necessity for appropriate steps to be taken. We document the state of corruption in the Czech Republic and the measures introduced to fight it. We cover sectors of society and economy according to their importance of a consequential corruption hazard. We also described the government's program of anticorruption and its achievements and failures. The state of corruption in the country, measured by the Corruption Perception Index, presents a serious problem since the index does not improve as the transition process advances. Numerous comparative studies, however, suggest that corruption is more prominent feature in a number of other transition countries. We believe that the substantial change of approach to the institutional framework is necessary in order to prevent and fight corruption successfully.corruption; institutions; transition; hidden economy; state administration

    Security Economics in the European Context: Implications of the EUSECON Project

    Get PDF
    This paper presents key aspects and policy implications of a multi-annual research project on economic analyses of European security issues (EUSECON), with an emphasis on intentional threats of organised crime, piracy and terrorism. The first part argues that rational models can provide significant insights on the emergence and current patterns of terrorism and piracy. These findings could lead to new priorities or to more nuanced interventions in response to these threats. The second part focuses on the direct and indirect costs of both terrorism and organised crime. EUSECON provided new data about the scope of related illegal economic activities and explored the sensitivity of markets, societies and polities in the aftermath of terrorist attacks. It emerges that political actors are at greatest risk of over-responding, whereas mature economies display a high degree of resilience. Finally, the third part discusses economic approaches to policy evaluation. EUSECON clarified the benefits of transnational security cooperation, but also highlights the difficulties of rigorous costeffectiveness and cost-benefit calculations. Therefore, a more evidence-based approach to security policymaking, which is increasingly touted by EU decision-makers, remains elusive. In conclusion, European security policy needs further scrutiny from an economic perspective, in order to answer the increasing complexity of security challenges under the increasing financial or political constraints.

    The Paradox of Czech Crusaders: Will They Ever Learn the Corruption Lesson? (Corruption and Anticorruption in the Czech Republic)

    Get PDF
    Corruption has a negative impact on society and economy. The transition process in Central and Eastern Europe (CEE) uncovered dormant possibilities for corruption and necessity for appropriate steps to be taken. We document the state of corruption in the Czech Republic and the measures introduced to fight it. We cover sectors of society and economy according to their importance of a consequential corruption hazard. We also described the government's program of anticorruption and its achievements and failures. The state of corruption in the country, measured by the Corruption Perception Index, presents a serious problem since the index does not improve as the transition process advances. Numerous comparative studies, however, suggest that corruption is more prominent feature in a number of other transition countries. We believe that the substantial change of approach to the institutional framework is necessary in order to prevent and fight corruption successfully.corruption, institutions, transition, hidden economy, state administration
    • …
    corecore