Results 51 to 60 of about 7,182 (203)
ABSTRACT This research explores the adaptive strategies employed by Conversas (Christian women of Jewish origin) and Moriscas (Christian women of Muslim origin) in navigating adversity, particularly in their interactions with inquisitorial authorities in the early modern Crown of Aragon. This study analyses these women's efforts to uphold religious and
Ivana Arsić
wiley +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Modelling Crypto Asset Price Dynamics, Optimal Crypto Portfolio, and Crypto Option Valuation
Despite being described as a medium of exchange, cryptocurrencies do not have the typical attributes of a medium of exchange. Consequently, cryptocurrencies are more appropriately described as crypto assets. A common investment attribute shared by the more than 2,500 crypto assets is that they are highly volatile.
Hu, Yuan +2 more
openaire +2 more sources
De‐Dollarization Is a Plausible Outcome of the New Washington Consensus
ABSTRACT A trend towards de‐dollarization of the global economy in which the US dollar ceases to be used as the world's reserve currency for international transactions confronts some of the existing structures of international economic law, built upon the rules set out by US‐led organizations like the WTO, the IMF, and the World Bank. This article will
David Collins
wiley +1 more source
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source
How Tether Depegging Affects Cryptocurrency Returns
ABSTRACT This paper examines the relationship between Tether depegging events and the returns of ten major cryptocurrencies from November 2017 to November 2024. We distinguish between upward and downward deviations from the Tether peg, identifying these events as threshold exceedances based on historical prices, using both constant parameter and ...
Sean Foley +2 more
wiley +1 more source
Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks
Fault injection attacks are a serious concern for cryptographic hardware. Adversaries may extract sensitive information from the faulty output that is produced by a cryptographic circuit after actively disturbing its computation.
Thorben Moos +2 more
doaj +1 more source
Abstract This study develops an explainable machine learning model to predict cryptocurrency delistings using Binance data. It combines quantitative indicators (price, volume) with qualitative data from real‐time news and Reddit. Latent Dirichlet Allocation (LDA) is used to extract topic trends and community reactions, which are transformed into time ...
Sungju Yang, Hunyeong Kwon
wiley +1 more source
Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study
Implementation-level countermeasures like masking can be applied to any cryptographic algorithm in order to mitigate Differential Power Analysis (DPA).
Charles Momin +2 more
doaj +1 more source

