645 research outputs found

    Crypto Tokens and Token Systems

    Get PDF

    Accounting in the fourth industrial revolution: Exploration of digital currency exchanges using AHP method

    Get PDF
    Purpose: The present study aimed to analyze and select the best exchange in the field of digital currencies with a futuristic perspective. Research methodology: The research method in this article is to use Analytic Hierarchy Process (AHP) to identify the strengths and weaknesses of each of these exchanges and analyze their coefficients according to the criteria of security, support, commission, number of currency codes, authentication, and trading volume. Results: The most important criteria in choosing the best digital currency exchange are: security, support, commission, number of currency codes, authentication and trading volume. Limitations: The limitations of this research can be the characteristics of digital exchanges in the field of providing digital currency cryptographic services in accordance with the framework of the Fourth Industrial Revolution. Contribution: According to the weight of the obtained criteria will be prioritized, which from the results and analysis obtained in this research can be used to invest in the field of currency cryptography and select the top exchange

    Hidden in Plain Sight: Exploring Encrypted Channels in Android apps

    Full text link
    As privacy features in Android operating system improve, privacy-invasive apps may gradually shift their focus to non-standard and covert channels for leaking private user/device information. Such leaks also remain largely undetected by state-of-the-art privacy analysis tools, which are very effective in uncovering privacy exposures via regular HTTP and HTTPS channels. In this study, we design and implement, ThirdEye, to significantly extend the visibility of current privacy analysis tools, in terms of the exposures that happen across various non-standard and covert channels, i.e., via any protocol over TCP/UDP (beyond HTTP/S), and using multi-layer custom encryption over HTTP/S and non-HTTP protocols. Besides network exposures, we also consider covert channels via storage media that also leverage custom encryption layers. Using ThirdEye, we analyzed 12,598 top-apps in various categories from Androidrank, and found that 2887/12,598 (22.92%) apps used custom encryption/decryption for network transmission and storing content in shared device storage, and 2465/2887 (85.38%) of those apps sent device information (e.g., advertising ID, list of installed apps) over the network that can fingerprint users. Besides, 299 apps transmitted insecure encrypted content over HTTP/non-HTTP protocols; 22 apps that used authentication tokens over HTTPS, happen to expose them over insecure (albeit custom encrypted) HTTP/non-HTTP channels. We found non-standard and covert channels with multiple levels of obfuscation (e.g., encrypted data over HTTPS, encryption at nested levels), and the use of vulnerable keys and cryptographic algorithms. Our findings can provide valuable insights into the evolving field of non-standard and covert channels, and help spur new countermeasures against such privacy leakage and security issues.Comment: Extended version of an ACM CCS 2022 pape

    Predicting Bitcoin Returns Using Artificial Neural Networks - An Application of Large Datasets to Convolutional Neural Networks and Long Short-Term Memory Based Artificial Neural Networks in Finance.

    Get PDF
    Time series forecasting is one of the foremost challenges studied in finance. In this thesis various Convolutional Neural Network and Long Short Term Memory Artificial Neural Network models are used to predict Bitcoin returns. Previous literature has explored using data from Sentiment analysis of Social Media, and Blockchain information in isolation. This thesis seeks to combine the predictive power of earlier smaller models into a larger model that better utilizes a broader category of features in time series prediction. The resulting models are able to predict Bitcoin returns well, beating out simpler methods that do not utilize Artificial Neural Networks

    Hybrid genetic algorithms in agent-based artificial market model for simulating fan tokens trading

    Get PDF
    In recent years cryptographic tokens have gained popularity as they can be used as a form of emerging alter- native financing and as a means of building platforms. The token markets innovate quickly through technology and decentralization, and they are constantly changing, and they have a high risk. Negotiation strategies must therefore be suited to these new circumstances. The genetic algorithm offers a very appropriate approach to resolving these complex issues. However, very little is known about genetic algorithm methods in cryptographic tokens. Accordingly, this paper presents a case study of the simulation of Fan Tokens trading by implementing selected best trading rule sets by a genetic algorithm that simulates a negotiation system through the Monte Carlo method. We have applied Adaptive Boosting and Genetic Algorithms, Deep Learning Neural Network-Genetic Algorithms, Adaptive Genetic Algorithms with Fuzzy Logic, and Quantum Genetic Algorithm techniques. The period selected is from December 1, 2021 to August 25, 2022, and we have used data from the Fan Tokens of Paris Saint-Germain, Manchester City, and Barcelona, leaders in the market. Our results conclude that the Hybrid and Quantum Genetic algorithm display a good execution during the training and testing period. Our study has a major impact on the current decentralized markets and future business opportunitiesThis research was funded by the Universitat de Barcelona, under the grant UB-AE-AS017634

    Blockchain Value Creation Logics and Financial Returns

    Get PDF
    With its complexities and portfolio-nature, the advent of blockchain technology presents several use cases to stakeholders for business value appropriation and financial gains. This 3-essay dissertation focuses on three exemplars and research approaches to understanding the value creation logics of blockchain technology for financial gains. The first essay is a conceptual piece that explores five main affordances of blockchain technology and how these can be actualized and assimilated for business value. Based on the analysis of literature findings, an Affordance-Experimentation-Actualization-Assimilation (AEAA) model is proposed. The model suggests five affordance-to-assimilation value chains and eight value interdependencies that firms can leverage to optimize their value creation and capture during blockchain technology implementation. The second essay empirically examines the financial returns of public firms\u27 blockchain adoption investments at the level of the three main blockchain archetypes (private-permissioned, public-permissioned and permissionless. Drawing upon Fichman\u27s model of the option value of innovative IT platform investments, the study examines business value creation through firm blockchain strategy (i.e., archetype instances, decentralization, and complementarity), learning (i.e., blockchain patents and event participation), and bandwagon effects using quarterly data of firm archetype investments from 2015 to 2020. The study\u27s propensity score matching utilization and fixed-effects modeling provide objective quantification of how blockchain adoption leads to increases in firm value (performance measured by Tobin\u27s q) at the archetype level (permissionless, public permissioned, and private permissioned). Surprisingly, a more decentralized archetype and a second different archetype implementation are associated with a lower Tobin\u27s q. In addition, IT-option proxy parameters such as blockchain patent originality, participation in blockchain events, and network externality positively impact firm performance, whereas the effect of blockchain patents is negative. As the foremost and more established use case of blockchain technology whose business value is accessed in either of the five affordances and exemplifies a permissionless archetype for financial gains, bitcoin cryptocurrency behavior is studied through the lens of opinion leaders on Twitter. The third essay this relationship understands the hourly price returns and volatility shocks that sentiments from opinion leaders generate and vice-versa. With a dynamic opinion leader identification strategy, lexicon and rule-based sentiment analytics, I extract sentiments of the top ten per cent bitcoin opinion leaders\u27 tweets. Controlling for various economic indices and contextual factors, the study estimates a vector autoregression model (VAR) and finds that finds that Bitcoin return granger cause Polarity but the influence of sentiment subjectivity is marginal and only stronger on bitcoin price volatility. Several key implications for blockchain practitioners and financial stakeholders and suggestions for future research are discussed

    RFID Technology in Intelligent Tracking Systems in Construction Waste Logistics Using Optimisation Techniques

    Get PDF
    Construction waste disposal is an urgent issue for protecting our environment. This paper proposes a waste management system and illustrates the work process using plasterboard waste as an example, which creates a hazardous gas when land filled with household waste, and for which the recycling rate is less than 10% in the UK. The proposed system integrates RFID technology, Rule-Based Reasoning, Ant Colony optimization and knowledge technology for auditing and tracking plasterboard waste, guiding the operation staff, arranging vehicles, schedule planning, and also provides evidence to verify its disposal. It h relies on RFID equipment for collecting logistical data and uses digital imaging equipment to give further evidence; the reasoning core in the third layer is responsible for generating schedules and route plans and guidance, and the last layer delivers the result to inform users. The paper firstly introduces the current plasterboard disposal situation and addresses the logistical problem that is now the main barrier to a higher recycling rate, followed by discussion of the proposed system in terms of both system level structure and process structure. And finally, an example scenario will be given to illustrate the system’s utilization

    EDI control : management and audit issues

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1419/thumbnail.jp
    corecore