Results 51 to 60 of about 7,182 (203)

In Defence of Food: A Comparative Study of Conversas' and Moriscas' Dietary Laws as a Form of Cultural Resistance in the Early Modern Crown of Aragon

open access: yesGender &History, EarlyView.
ABSTRACT This research explores the adaptive strategies employed by Conversas (Christian women of Jewish origin) and Moriscas (Christian women of Muslim origin) in navigating adversity, particularly in their interactions with inquisitorial authorities in the early modern Crown of Aragon. This study analyses these women's efforts to uphold religious and
Ivana Arsić
wiley   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Modelling Crypto Asset Price Dynamics, Optimal Crypto Portfolio, and Crypto Option Valuation

open access: yes, 2019
Despite being described as a medium of exchange, cryptocurrencies do not have the typical attributes of a medium of exchange. Consequently, cryptocurrencies are more appropriately described as crypto assets. A common investment attribute shared by the more than 2,500 crypto assets is that they are highly volatile.
Hu, Yuan   +2 more
openaire   +2 more sources

De‐Dollarization Is a Plausible Outcome of the New Washington Consensus

open access: yesGlobal Policy, EarlyView.
ABSTRACT A trend towards de‐dollarization of the global economy in which the US dollar ceases to be used as the world's reserve currency for international transactions confronts some of the existing structures of international economic law, built upon the rules set out by US‐led organizations like the WTO, the IMF, and the World Bank. This article will
David Collins
wiley   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

How Tether Depegging Affects Cryptocurrency Returns

open access: yesAccounting &Finance, EarlyView.
ABSTRACT This paper examines the relationship between Tether depegging events and the returns of ten major cryptocurrencies from November 2017 to November 2024. We distinguish between upward and downward deviations from the Tether peg, identifying these events as threshold exceedances based on historical prices, using both constant parameter and ...
Sean Foley   +2 more
wiley   +1 more source

Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fault injection attacks are a serious concern for cryptographic hardware. Adversaries may extract sensitive information from the faulty output that is produced by a cryptographic circuit after actively disturbing its computation.
Thorben Moos   +2 more
doaj   +1 more source

Developing Predictive and Explainable Models for Cryptocurrency Delistings: A Case Study of Binance Exchange

open access: yesAsia-Pacific Journal of Financial Studies, EarlyView.
Abstract This study develops an explainable machine learning model to predict cryptocurrency delistings using Binance data. It combines quantitative indicators (price, volume) with qualitative data from real‐time news and Reddit. Latent Dirichlet Allocation (LDA) is used to extract topic trends and community reactions, which are transformed into time ...
Sungju Yang, Hunyeong Kwon
wiley   +1 more source

Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Implementation-level countermeasures like masking can be applied to any cryptographic algorithm in order to mitigate Differential Power Analysis (DPA).
Charles Momin   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy