Results 71 to 80 of about 4,817 (211)

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Between Cryptocurrencies' Risk and Crypto Environmental Attention: The Crypto Environment Attention Index and Volatility in the Cryptocurrencies Market Nexus

open access: yesBusiness Ethics, the Environment &Responsibility, EarlyView.
ABSTRACT This study investigates the impact of environmental attention on cryptocurrency market volatility by introducing the Crypto Environmental Attention Index (CEAI), a new metric inspired by Wang et al. (2022) and constructed using daily web search data.
Ines Ghazouani   +2 more
wiley   +1 more source

Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies

open access: yesInternational Economic Review, EarlyView.
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi   +2 more
wiley   +1 more source

Digital Identity Wallets: A Guide to the EU’s New Identity Model

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra   +5 more
wiley   +1 more source

On Cryptographic Information Security in Cloud Infrastructures: PKI and IBE Methods

open access: yesБезопасность информационных технологий, 2014
The application of cryptographic security methods in cloud infrastructure information security is analyzed. The cryptographic problems in cloudy infrastructures are chosen; the appropriate protocols are investigated; the appropriate mathematical problems
Konstantin Grigorevich Kogos   +2 more
doaj  

Coalition Formation for Sustainable Blockchain Governance: Insights From the Hedera Case

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Sustainable governance is essential for blockchain networks to achieve widespread adoption and deliver long‐term business value. Prior blockchain initiatives indicate that inadequate governance structures often lead to limited adoption or eventual project failure, underscoring the importance of decentralised governance for building resilient ...
Christophe Viguerie, Horst Treiblmaier
wiley   +1 more source

Make Social Media Social Again: How Platform Interoperability Can Fix Social Media and Future‐Proof Democracy

open access: yesJournal of Management Studies, EarlyView.
Abstract This essay argues that social media document (rather than fuel) the decline of political democracy while helping revive organizational democracy, including through ‘decentralized autonomous organizations’ (DAOs). Yet, despite giving everyone a voice and the ability to organize across borders, social media could over‐concentrate power if, in ...
J.P. Vergne
wiley   +1 more source

Regulating critical technologies: National security and intellectual property

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley   +1 more source

Cryptographic Protocols in Wireless Sensor Networks: A Critical Review

open access: yesProceedings, 2017
Wireless sensor networks (WSNs) play a fundamental role in new paradigms such as the Internet of Everything or the Industry 4.0. [...]
Angel Martin del Rey   +1 more
doaj   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy