Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
98
result(s) for
"Electronic data interchange Security measures."
Sort by:
Blockchain Technology and Applications
by
Banafa, Ahmed
in
Blockchains (Databases)
,
Computer programming, programs, data
,
Computing & IT Security
2022,2020
Blockchain is an emerging technology that can radically improve transactions security at banking, supply chain, and other transaction networks. It's estimated that Blockchain will generate $3.1 trillion in new business value by 2030. Essentially, it provides the basis for a dynamic distributed ledger that can be applied to save time when recording transactions between parties, remove costs associated with intermediaries, and reduce risks of fraud and tampering. This book explores the fundamentals and applications of Blockchain technology. Readers will learn about the decentralized peer-to-peer network, distributed ledger, and the trust model that defines Blockchain technology. They will also be introduced to the basic components of Blockchain (transaction, block, block header, and the chain), its operations (hashing, verification, validation, and consensus model), underlying algorithms, and essentials of trust (hard fork and soft fork). Private and public Blockchain networks similar to Bitcoin and Ethereum will be introduced, as will concepts of Smart Contracts, Proof of Work and Proof of Stack, and cryptocurrency including Facebook's Libra will be elucidated. Also, the book will address the relationship between Blockchain technology, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity, Digital Transformation and Quantum Computing. Readers will understand the inner workings and applications of this disruptive technology and its potential impact on all aspects of the business world and society. A look at the future trends of Blockchain Technology will be presented in the book.
Understanding bitcoin : cryptography, engineering and economics
2015,2014
Discover Bitcoin, the cryptocurrency that has the finance world buzzing
Bitcoin is arguably one of the biggest developments in finance since the advent of fiat currency. With Understanding Bitcoin, expert author Pedro Franco provides finance professionals with a complete technical guide and resource to the cryptography, engineering and economic development of Bitcoin and other cryptocurrencies. This comprehensive, yet accessible work fully explores the supporting economic realities and technological advances of Bitcoin, and presents positive and negative arguments from various economic schools regarding its continued viability.
This authoritative text provides a step-by-step description of how Bitcoin works, starting with public key cryptography and moving on to explain transaction processing, the blockchain and mining technologies. This vital resource reviews Bitcoin from the broader perspective of digital currencies and explores historical attempts at cryptographic currencies. Bitcoin is, after all, not just a digital currency; it's a modern approach to the secure transfer of value using cryptography. This book is a detailed guide to what it is, how it works, and how it just may jumpstart a change in the way digital value changes hands.
* Understand how Bitcoin works, and the technology behind it
* Delve into the economics of Bitcoin, and its impact on the financial industry
* Discover alt-coins and other available cryptocurrencies
* Explore the ideas behind Bitcoin 2.0 technologies
* Learn transaction protocols, micropayment channels, atomic cross-chain trading, and more
Bitcoin challenges the basic assumption under which the current financial system rests: that currencies are issued by central governments, and their supply is managed by central banks. To fully understand this revolutionary technology, Understanding Bitcoin is a uniquely complete, reader-friendly guide.
Scaling Up Security and Efficiency in Financial Transactions and Blockchain Systems
2023
Blockchain, the underlying technology powering the Bitcoin cryptocurrency, is a distributed ledger that creates a distributed consensus on a history of transactions. Cryptocurrency transaction verification takes substantially longer than it does for conventional digital payment systems. Despite blockchain’s appealing benefits, one of its main drawbacks is scalability. Designing a solution that delivers a quicker proof of work is one method for increasing scalability or the rate at which transactions are processed. In this paper, we suggest a solution based on parallel mining rather than solo mining to prevent more than two miners from contributing an equal amount of effort to solving a single block. Moreover, we propose the idea of automatically selecting the optimal manager over all miners by using the particle swarm optimization (PSO) algorithm. This process solves many problems of blockchain scalability and makes the system more scalable by decreasing the waiting time if the manager fails to respond. Additionally, the proposed model includes the process of a reward system and the distribution of work. In this work, we propose the particle swarm optimization proof of work (PSO-POW) model. Three scenarios have been tested including solo mining, parallel mining without using the PSO process, and parallel mining using the PSO process (PSO-POW model) to ensure the power and robustness of the proposed model. This model has been tested using a range of case situations by adjusting the difficulty level and the number of peers. It has been implemented in a test environment that has all the qualities required to perform proof of work for Bitcoin. A comparison between three different scenarios has been constructed against difficulty levels and the number of peers. Local experimental assessments were carried out, and the findings show that the suggested strategy is workable, solves the scalability problems, and enhances the overall performance of the blockchain network.
Journal Article
Examination of cybercrime and its effects on corporate stock value
by
Smith, Lawrence Murphy
,
Jones, Amie
,
Johnson, Leigh
in
Averages
,
Business
,
Business operations
2019
Purpose
Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology management. Cybercrime often not only results in stolen assets and lost business but also damages a company’s reputation, which in turn may affect the company’s stock market value. This is a serious concern to company managers, financial analysts, investors and creditors. This paper aims to examine the impact of cybercrime on stock prices of a sample of publicly traded companies.
Design/methodology/approach
Financial data were gathered on companies that were reported in news stories as victims of cybercrime. The market price of the company’s stock was recorded for several days before the news report and several days after. The percentage change in the stock price was compared to the change in the Dow Jones Industrial average to determine whether the stock price increased or decreased along with the rest of the market.
Findings
Stock prices were negatively affected in all time periods examined, significantly so in one period.
Practical implications
This paper describes cases concerning cybercrime, thereby bringing attention to the value of cybersecurity in protecting computers, identity and transactions. Cyber security is necessary to avoid becoming a victim of cybercrime. Specific security improvements and preventive measures are provided within the paper. Preventive measures are generally less costly than repairs after a cybercrime.
Originality/value
This is an original manuscript that adds to the literature regarding cybercrime and preventive measures.
Journal Article
Security for Service Oriented Architectures
This book examines application and security architectures, and illustrates the relationship between the two. Supplying guidance through the design of distributed and resilient applications, it gives an overview of the standards that service oriented and distributed applications leverage to provide the understanding to make decisions on design.
Traceability in food supply chains: SME focused traceability framework for chain-wide quality and safety-Part 2
2021
It is relevant for traceability systems to have a common structure for information exchange. Without it, these systems lose much of their utility as they will only be usable internally and will have reduced capacity to add value to products and manage recalls. Based on extensive literature review, a non-proprietary framework for traceability was developed. This framework encompasses whole food supply chains and aims to maintain records of quality and safety while not necessitating mature IT capabilities, uncommon characteristic of SME's. As such the volume of information is divided between all stakeholders according to their necessities and funding capacities. Most of the information is stored by regulators as they have access to more funding. This improves the ease and flexibility of implementation of traceability systems by the companies. Tools were developed and simulated, and all results are presented, clearly demonstrating the capability for quality information sharing through food supply chains which in turn can increase transparency between consumers and producers as well as adjusting the quality to the desired end use.
Journal Article
Virtual private networking
2005,2004
This book provides network managers, LAN administrators and small business operators with all they need to know to \"interconnect\" multiple locations or travelling employees that need to access a single location.
Secure Semantic Service-Oriented Systems
by
Thuraisingham, Bhavani
in
Computer networks
,
Security measures
,
Service-oriented architecture (Computer science)
2010,2011
Focusing on confidentiality, privacy, trust, and integrity management for Web services, Secure Semantic Service-Oriented Systems considers applications of these technologies across multiple domains. The author lays the groundwork with discussions of concepts in trustworthy information systems and security for service-oriented architecture. Next, she covers secure Web services and applications discussing their use in secure interoperability, defense, and medical applications. The book describes the various aspects of secure service oriented information systems; including confidentiality, trust management, integrity, and data quality.