66 research outputs found
Improvements on "Multi-Party Quantum Summation without a Third Party based on -Dimensional Bell States"
In 2021, Wu et al. presented a multi-party quantum summation scheme
exploiting the entanglement properties of d-dimensional Bell states (Wu et al.
in Quantum Inf Process 20:200, 2021). In particular, the authors proposed a
three-party quantum summation protocol and then extended their work to a
multi-party case. It is claimed that their protocol is secure against outside
and participants' attacks. However, this work points out that Wu's protocol has
a loophole, i.e., two or more dishonest participants who meet a specific
location relationship can conspire to obtain the private inputs of some honest
participants without being detected. Accordingly, improvements are proposed to
address these issues
Recommended from our members
AI and blockchain adoption in corporate governance
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonPurpose
The purpose of this doctoral thesis sets out to explore and elaborate on the impact of
artificial intelligence (AI) and blockchain adoption in corporate governance from ethical
perspectives. Positioned within the corporate governance domain, this study adopts
an explicit business perspective to study corporate governance change with emerging
AI and blockchain technological tools in general and focuses on the ethical use of
technologies specifically. As such, this empirical investigation aims to help
organizations understand the ethical benefits and ethical dilemmas of using AI and
blockchain in businesses and draw plans on how to govern these technologies
ethically for the benefit of the business and society.
Design/Methodology/Approach:
This study adopts specific techniques and a pragmatic, step-by-step netnography
approach to investigate online traces from social media sites and extends these online
explorations with online semi-structured interviews. The research design of this
investigation follows step-by-step procedures that are methodologically sound to
ensure rigor in this investigation to enhance the trustworthiness of this study. In total,
this research collects an abundance of data: 34 LinkedIn Posts with Comments; 12
Webinars; 22 YouTube Videos; 19 Videos; 10 Podcasts, and 17 semi-structured
interview videos. The video, audio, and interview data have been transcribed into
textual data total of 453065 words for thematic analysis using NVivo software. Enough
time has been allocated to the iterative process of data collection and data analysis.
The analysis moves back and forth to the point when theoretical saturation is achieved.
The data structure extracts from data in this study illustrate the analytic claims that
match the analysis and data together, to ensure a good fit between described method
and reported analysis are consistent.
Findings:
This study develops a thematic framework that constitutes the corporate governance
transformation with the ethical use of AI and blockchain technology. This framework
provides a holistic understanding of why corporate governance needs to change,
especially with the emergence of blockchain and AI technologies, what changes will
corporate governance encounter, and how corporate governance can imperatively
respond to the ethical use of these technologies. Specifically, it explicitly provides
comprehensive understanding of the ethical benefits and ethical concerns of using AI
and blockchain technologies in corporate governance, and reveals how companies
can govern the use of these technologies ethically.
In general terms, the findings of this study support the notion of corporate governance
change to transform business models and processes to leverage the new capabilities
of AI and blockchain technologies, to priories creativity, speed, and accountability, to
replace the old business model, to foster agile or collaborative governance to deal with
uncertainty, agility, adaptiveness, and cooperation in the digital world, to foster a network and platform strategies to drive success. This study goes beyond the extant
corporate governance scholarship to assess the technological impact to capture
values for companies in ethical ways to sustain future growth.
Additionally, the notion of corporate governance is further specified and significantly
expanded by this study to assess the adoption of AI and blockchain as new corporate
governance tools or mechanisms, to enhance ethical benefits when used properly,
and mitigate ethical dilemmas with proper checks and balances, safeguards in place,
to help organizations stay relevant in this digital transformation and be ethical and
sustainable.
This study empirically corroborates that in theory, the use of blockchain and AI can
enhance ethical practice by detecting fraud and anomaly activities, due to the unique
capabilities of blockchain and AI technologies. Further, this research adds depth and
specificity by identifying the ethical concerns of using blockchain and AI in corporate
governance. The study empirically reveals the ethical concerns of privacy issues,
unethical use of data, job transformation and replacement, and algorithm bias that
companies will encounter when they use these technologies. In addition, the findings
of this study suggest how companies can ethically govern the use of these
technologies in socially responsible ways as they transform digitally.
Originality/Value:
The emergent thematic framework is constructed from the empirical and analytical
procedures specifically and purposely designed for this study. This study makes
theoretical contributions to knowledge and enriches the extant works of literature, and
also provides practical contributions to the ethical use of disruptive technologies, future
workforce, and regulations. However, the study was conducted within certain
theoretical, methodological, empirical, and pragmatic conditions, which might
constitute particular limitations and constraints. Therefore, the last section of this
thesis elucidates and suggests the directions for future research
A Risk And Trust Security Framework For The Pervasive Mobile Environment
A pervasive mobile computing environment is typically composed of multiple fixed and mobile entities that interact autonomously with each other with very little central control. Many of these interactions may occur between entities that have not interacted with each other previously. Conventional security models are inadequate for regulating access to data and services, especially when the identities of a dynamic and growing community of entities are not known in advance. In order to cope with this drawback, entities may rely on context data to make security and trust decisions. However, risk is introduced in this process due to the variability and uncertainty of context information. Moreover, by the time the decisions are made, the context data may have already changed and, in which case, the security decisions could become invalid.With this in mind, our goal is to develop mechanisms or models, to aid trust decision-making by an entity or agent (the truster), when the consequences of its decisions depend on context information from other agents (the trustees). To achieve this, in this dissertation, we have developed ContextTrust a framework to not only compute the risk associated with a context variable, but also to derive a trust measure for context data producing agents. To compute the context data risk, ContextTrust uses Monte Carlo based method to model the behavior of a context variable. Moreover, ContextTrust makes use of time series classifiers and other simple statistical measures to derive an entity trust value.We conducted empirical analyses to evaluate the performance of ContextTrust using two real life data sets. The evaluation results show that ContextTrust can be effective in helping entities render security decisions
Warez
When most people think of piracy, they think of Bittorrent and The Pirate Bay. These public manifestations of piracy, though, conceal an elite worldwide, underground, organized network of pirate groups who specialize in obtaining media – music, videos, games, and software – before their official sale date and then racing against one another to release the material for free.
Warez: The Infrastructure and Aesthetics of Piracy is the first scholarly research book about this underground subculture, which began life in the pre-internet era Bulletin Board Systems and moved to internet File Transfer Protocol servers (“topsites”) in the mid- to late-1990s. The “Scene,” as it is known, is highly illegal in almost every aspect of its operations. The term “Warez” itself refers to pirated media, a derivative of “software.” Taking a deep dive in the documentary evidence produced by the Scene itself, Warez describes the operations and infrastructures an underground culture with its own norms and rules of participation, its own forms of sociality, and its own artistic forms. Even though forms of digital piracy are often framed within ideological terms of equal access to knowledge and culture, Eve uncovers in the Warez Scene a culture of competitive ranking and one-upmanship that is at odds with the often communalist interpretations of piracy.
Broad in scope and novel in its approach, Warez is indispensible reading for anyone interested in recent developments in digital culture, access to knowledge and culture, and the infrastructures that support our digital age
Recommended from our members
Implementation, management and dissemination of information security: an organisational perspective of financial institution
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The оbjeсtive оf thiѕ thesis iѕ tо inveѕtigаte the ѕignifiсаnt рerсeived ѕeсurity threаtѕ against information security systems (ISS) for infоrmаtiоn ѕyѕtems (IЅ) in Ѕаudi оrgаnisаtiоnѕ. Аn emрiriсаl ѕurvey uѕing а ѕelf-аdminiѕtered queѕtiоnnаire hаѕ been саrried оut tо асhieve thiѕ оbjeсtive. The ѕurvey reѕultѕ reveаled thаt аlmоѕt hаlf оf the reѕроnded Ѕаudi оrgаnisаtiоnѕ hаve ѕuffered finаnсiаl lоѕѕeѕ due tо internаl аnd externаl IЅ ѕeсurity breасheѕ. The ѕtаtiѕtiсаl reѕultѕ further reveаled thаt ассidentаl аnd intentiоnаl entry оf bаd dаtа; ассidentаl deѕtruсtiоn оf dаtа by emрlоyeeѕ; emрlоyeeѕ' ѕhаring оf раѕѕwоrdѕ; intrоduсtiоn оf соmрuter viruѕeѕ tо IЅ; ѕuррreѕѕiоn аnd deѕtruсtiоn оf оutрut; unаuthоrised dосument viѕibility; аnd direсting рrintѕ аnd diѕtributed infоrmаtiоn tо рeорle whо аre nоt entitled tо reсeive аre the mоѕt ѕignifiсаnt рerсeived ѕeсurity threаtѕ tо IЅ in Ѕаudi оrgаnisаtiоnѕ. Ассоrdingly, it iѕ reсоmmended tо ѕtrengthen the ѕeсurity соntrоlѕ оver the аbоve weаkened ѕeсurity аreаѕ аnd tо enhаnсe the аwаreneѕѕ оf IЅ ѕeсurity iѕѕueѕ аmоng Ѕаudi companies tо асhieve better рrоteсtiоn tо their IЅ
Warez
When most people think of piracy, they think of Bittorrent and The Pirate Bay. These public manifestations of piracy, though, conceal an elite worldwide, underground, organized network of pirate groups who specialize in obtaining media – music, videos, games, and software – before their official sale date and then racing against one another to release the material for free.
Warez: The Infrastructure and Aesthetics of Piracy is the first scholarly research book about this underground subculture, which began life in the pre-internet era Bulletin Board Systems and moved to internet File Transfer Protocol servers (“topsites”) in the mid- to late-1990s. The “Scene,” as it is known, is highly illegal in almost every aspect of its operations. The term “Warez” itself refers to pirated media, a derivative of “software.” Taking a deep dive in the documentary evidence produced by the Scene itself, Warez describes the operations and infrastructures an underground culture with its own norms and rules of participation, its own forms of sociality, and its own artistic forms. Even though forms of digital piracy are often framed within ideological terms of equal access to knowledge and culture, Eve uncovers in the Warez Scene a culture of competitive ranking and one-upmanship that is at odds with the often communalist interpretations of piracy.
Broad in scope and novel in its approach, Warez is indispensible reading for anyone interested in recent developments in digital culture, access to knowledge and culture, and the infrastructures that support our digital age
- …