1,683 research outputs found

    Contracts Ex Machina

    Get PDF
    Smart contracts are self-executing digital transactions using decentralized cryptographic mechanisms for enforcement. They were theorized more than twenty years ago, but the recent development of Bitcoin and blockchain technologies has rekindled excitement about their potential among technologists and industry. Startup companies and major enterprises alike are now developing smart contract solutions for an array of markets, purporting to offer a digital bypass around traditional contract law. For legal scholars, smart contracts pose a significant question: Do smart contracts offer a superior solution to the problems that contract law addresses? In this article, we aim to understand both the potential and the limitations of smart contracts. We conclude that smart contracts offer novel possibilities, may significantly alter the commercial world, and will demand new legal responses. But smart contracts will not displace contract law. Understanding why not brings into focus the essential role of contract law as a remedial institution. In this way, smart contracts actually illuminate the role of contract law more than they obviate it

    Determination Of The Efficiency Of Implementing Blockchain Technology Into The Logistics Systems

    Get PDF
    In a supply chain, buyers and suppliers usually try to supply goods or services based on medium or long-term contracts. When executing a supply contract, two partners are required to mutually agree on cooperation in order to successfully respond to uncertain market situations or a supply chain failure. The outcome of the partnership is assessing and considering renewal upon termination of the contract. A partnership after several contract renewals is often viewed as a strategic partnership. Strategic partnership can become more effective and show further growth. Blockchain, which has recently gained attention in the digital commerce market, has technical characteristics that can be used in cooperation between partners. The company’s activity is closely related to the need for cargo transportation. Today, the workflow process of delivery is being complicated by the low speed of the logistics cycle, long flow of documents and the presence of errors in them, and security issues. The objective of the research is to define the improvement of the transport logistics system of an industrial enterprise. To define the efficiency, we need to implement blockchain technology, which will solve existing problems in the field of supply management. In this study, the implementation stages of blockchain technology are considered and profitability is defined for future research. Since the analysis revealed the interdependence and mutual influence of transport and information support in the processes of transportation, we recommend using the performance indicators of the processes of transport and information logistics. Using the method of analyzing the types and consequences of potential problems, it was found that the main reason that the management of a chemical enterprise should first of all pay attention to complex with a continuous production cycle, is the timely execution of all operations preceding the shipment of finished products by a vehicle from the manufacturer. In second place in terms of importance and degree of influence on the transportation process is the execution of documentation, which directly affects the timing of transportation. Their delay leads to a delay in the departure of transport from the territory of the plant and, as a result, the financial costs of storing finished products in and out of the warehouse increase. As a result of the study, the logistics system of enterprises is considered to be one of the most complex and well-functioning mechanism. Despite the wide variety of interpretations of the basic concepts, it is concluded that the study will use the interpretation of definitions such as logistics, transport logistics, system, transport and transport logistics system. The orientation of the implementation of blockchain technology to the technological side of logistics reduces risks and significantly increases stability, since it forms its practical orientation

    Algorithmic means of ensuring network security and websites: trends, models, future cases

    Get PDF
    The purpose of the study is to establish probable trends in the development of algorithmic means of network security and the protection of web resources in the future. The research methods used in this publication are a bibliometric analysis of 500 relevant publications, which allowed us to establish probable trends in the future development of the subject field. The study found that currently the most likely algorithmic means of network security and website protection that will be intensively developed in the future are blockchain technologies (to protect inter-resource contact), deep and machine learning (to analyze and detect attacks and digital anomalies), artificial intelligence and neural networks (to develop complex security algorithms), and predictive analysis (to prevent possible attacks and malicious data injections). At the same time, technological development makes it possible to identify alternative security tools, including quantum and post-quantum cryptography (which is possible due to the development of quantum computing), augmented reality (which is the next iteration of the development of the interface between machine-human interaction), biometric identification (which is the next iteration of authentication and recognition systems) and DevSecOps (which is a promising technology for the production of digital tools and systems that have a relatively lower level of vulnerability to known digital threats). The correlative impact of Industry 4.0 technologies and solutions on the studied aspects of the security sector of the World Wide Web has been established. The growth of the network of devices requires the improvement of security algorithms in the paradigm of Industry 4.0 technologies, which will allow more effective detection and prevention of cyberattacks and protection of user data
    • …
    corecore