Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
552 result(s) for "Money Computer programs."
Sort by:
When Bitcoin encounters information in an online forum: Using text mining to analyse user opinions and predict value fluctuation
Bitcoin is an online currency that is used worldwide to make online payments. It has consequently become an investment vehicle in itself and is traded in a way similar to other open currencies. The ability to predict the price fluctuation of Bitcoin would therefore facilitate future investment and payment decisions. In order to predict the price fluctuation of Bitcoin, we analyse the comments posted in the Bitcoin online forum. Unlike most research on Bitcoin-related online forums, which is limited to simple sentiment analysis and does not pay sufficient attention to note-worthy user comments, our approach involved extracting keywords from Bitcoin-related user comments posted on the online forum with the aim of analytically predicting the price and extent of transaction fluctuation of the currency. The effectiveness of the proposed method is validated based on Bitcoin online forum data ranging over a period of 2.8 years from December 2013 to September 2016.
Mastering bitcoin : programming the open blockchain
\"Join the technological revolution that's taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the knowledge you need to participate in the internet of money. Whether you're building the next killer app, investing in a startup, or simply curious about the technology, this revised and expanded second edition provides essential detail to get you started.\"--Provided by Amazon.com.
Blockchain Technology and Applications
Blockchain is an emerging technology that can radically improve transactions security at banking, supply chain, and other transaction networks. It's estimated that Blockchain will generate $3.1 trillion in new business value by 2030. Essentially, it provides the basis for a dynamic distributed ledger that can be applied to save time when recording transactions between parties, remove costs associated with intermediaries, and reduce risks of fraud and tampering. This book explores the fundamentals and applications of Blockchain technology. Readers will learn about the decentralized peer-to-peer network, distributed ledger, and the trust model that defines Blockchain technology. They will also be introduced to the basic components of Blockchain (transaction, block, block header, and the chain), its operations (hashing, verification, validation, and consensus model), underlying algorithms, and essentials of trust (hard fork and soft fork). Private and public Blockchain networks similar to Bitcoin and Ethereum will be introduced, as will concepts of Smart Contracts, Proof of Work and Proof of Stack, and cryptocurrency including Facebook's Libra will be elucidated. Also, the book will address the relationship between Blockchain technology, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity, Digital Transformation and Quantum Computing. Readers will understand the inner workings and applications of this disruptive technology and its potential impact on all aspects of the business world and society. A look at the future trends of Blockchain Technology will be presented in the book.
Smart home cybersecurity awareness and behavioral incentives
Purpose Smart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studies focus on smart-home users. This paper aims to fill this gap by investigating the potential interests of adult smart-home users in cybersecurity awareness training and nonfinancial rewards that may encourage them to adopt sound cybersecurity practices. Design/methodology/approach A total of 423 smart-home users between the ages of 25 and 64 completed a survey questionnaire for this study, with 224 participants from Japan and 199 from the UK. Findings Cultural factors considerably influence adult smart-home users’ attitudes toward cybersecurity. Specifically, cultural differences impact their willingness to participate in cybersecurity awareness training, their views on the importance of cybersecurity training for children and senior citizens and their preference for nonfinancial rewards as an incentive for good cybersecurity behavior. These results highlight the need to consider cultural differences and their potential impact when developing and implementing cybersecurity programs that target smart-home users. Practical implications This research has two main implications. First, it provides insights for information security professionals on the importance of designing cost-effective and time-efficient cybersecurity awareness training programs for smart-home users. Second, the findings may assist governments in establishing nonfinancial incentives to encourage greater uptake of cybersecurity practices among smart-home users. Originality/value The paper investigates whether adult smart-home users are willing to spend time and money to engage in cybersecurity awareness training and to encourage their children and elderly parents to participate in training, as well. In addition, the paper examines incentives, especially nonfinancial rewards, that may motivate adult smart-home users to adopt cybersecurity behaviors at home. Furthermore, the paper analyses demographic differences among smart-home users in Japan and the UK.
Examining the role of narratives in civic crowdfunding: linguistic style and message substance
Purpose The purpose of this paper is to explore how linguistic style and message substance influence persuasion in civic crowdfunding marketplaces in which written narrative pitch become a vital communication to attract private contributions to public goods and services. Drawing on the elaboration likelihood model (ELM), the authors operationalize the linguistic style of the narrative pitch as language power and message substance as issue-relevant argument quality. In this paper, the authors examine how characteristics of both style and message are related to the outcome of civic crowdfunded projects. Design/methodology/approach The data on civic crowdfunding projects were retrieved from Spacehive, the platform that dedicated mainly to civic projects ranging from community programs, social-oriented enterprises, to infrastructure or facility development. Each of the narrative samples is analyzed using a computerized text analysis package called the Linguistic Inquiry and Word Count to extract the features of the linguistic style and message substance in the narratives. The logistic regression models are estimated to assess the impact of both linguistic style and message substance on crowdfunding decisions. Findings The results show that funding outcomes can be improved with psychological language dimensions (i.e. positive affective and perceptual language). However, extensive use of social language does not help project creators to increase their chance of funding performance; but instead, such language reduces the likelihood of project success. Additionally, message substance or issue-relevant information such as money and risk language influences funding outcome. Originality/value Very few empirical studies investigated the differential effects of language style and message substance on funding performance of crowdfunding campaigns. The authors draw upon the dual process of persuasion as a theoretical base to identify a comprehensive set of linguistic style and message substance and to examine the role of such features in an emerging civic crowdfunding market. This study advances the application of the dual process in ELM by identifying and examining distinct persuasive cues originating from linguistics styles and message contents.
Adolescent gaming and gambling: risks and implications for prevention and health promotion
Background Gaming and gambling in adolescence raise growing concerns. Gaming is increasingly resembling gambling due to factors such as the role of chance in video games, the opportunities for direct betting, and the possibility of ‘investing’ money. As literature shows, video games could facilitate the ‘transition’ both to gambling and gambling addiction. Therefore, research efforts should further investigate the relationship between problem gaming and problem gambling in adolescents, in order to explore implications for prevention and health promotion. Methods Data from the Health Behaviour in School-aged Children (HBSC) 2022 surveillance in the Lombardy Region (Italy) were employed to evaluate the association between gaming and gambling among students aged 15-17. Specifically, a logistic regression was conducted with problem gambling as the dependent variable (independent variables: problem gaming, age, gender, nationality, socio-economic status, and problematic use of social media). Results The odds of individuals with problematic video game use of being problem gamblers were approximately two times higher (OR = 2.092; 95% CI: 1.503-2.911) compared to those without problematic video game use. Similarly, social media usage was a risk factor, with the odds of being a problem gambler approximately two times higher (OR = 2.011; 95% CI: 1.322-3.058) for individuals with problematic social media use. Furthermore, the likelihood of being a problem gambler were six times higher for males (OR = 6.398; 95% CI: 4.388-9.328); odds also increased with age (OR = 2.049; 95% CI: 1.556-2.698). Conclusions Results from the HBSC Lombardy surveillance confirmed the association between problem gaming and problem gambling in adolescents. This evidence is acknowledged within the Problem Gambling Plan of the Lombardy Region, which outlines communication actions, as well as health promotion and prevention programs to be accomplished, particularly in school settings. Key messages • Rasing awareness on the risks of both gaming and gambling among adolescents and adults. • Highlighting the need to regulate advertising and limit the use of gambling-related elements in video games.
Data Marketplaces: Trends and Monetisation of Data Goods
Despite the large number of academic contributions, there is no uniform definition of data marketplaces.However, different data marketplaces may vary from eachother in terms of their underlying business model, type ofdata offered, functionality, market mechanisms, etc.
Determining psycholinguistic features of deception in phishing messages
Purpose Distinguishing phishing emails from legitimate emails continues to be a difficult task for most individuals. This study aims to investigate the psycholinguistic factors associated with deception in phishing email text and their effect on end-user ability to discriminate phishing emails from legitimate emails. Design/methodology/approach Email messages and end-user decisions collected from a laboratory phishing study were validated and analyzed using natural language processing methods (Linguistic Inquiry Word Count) and penalized regression models (LASSO and Elastic Net) to determine the linguistic dimensions that attackers may use in phishing emails to deceive end-users and measure the impact of such choices on end-user susceptibility to phishing. Findings We found that most participants, who played the role of a phisher in the study, chose to deceive their end-user targets by pretending to be a familiar individual and presenting time pressure or deadlines. Results show that use of words conveying certainty (e.g. always, never) and work-related features in the phishing messages predicted higher end-user vulnerability. On the contrary, use of words that convey achievement (e.g. earn, win) or reward (cash, money) in the phishing messages predicted lower end-user vulnerability because such features are usually observed in scam-like messages. Practical implications Insights from this research show that analyzing emails for psycholinguistic features associated with computer-mediated deception could be used to fine-tune and improve spam and phishing detection technologies. This research also informs the kinds of phishing attacks that must be prioritized in antiphishing training programs. Originality/value Applying natural language processing and statistical modeling methods to analyze results from a laboratory phishing experiment to understand deception from both attacker and end-user is novel. Furthermore, results from this work advance our understanding of the linguistic factors associated with deception in phishing email text and its impact on end-user susceptibility.
Connecting the poor: the internet, mobile phones and financial inclusion in Africa
PurposeThe increased adoption of internet-enabled phones in Africa has caused much speculation and optimism concerning its effects on financial inclusion. Policymakers, the media and various studies have all flaunted the potentials of internet and mobile phones for financial inclusion. An important question therefore is “Can the internet and mobile phones spur the inclusion of the financially excluded poor? This study therefore aims to examine the relationship and causality between internet, mobile phones and financial inclusion in Africa for the 2000-2016 period.Design/methodology/approachThe empirical analysis followed these three steps: examination of the stationarity of the variables; testing for the cointegration; and evaluation of the effects of the internet and mobile phones on financial inclusion in Africa for the 2000-2016 period using three outcomes of panel FMOLS approach and Granger causality tests.FindingsThe empirical evidence shows that internet and mobile phones have significant positive relationship with financial inclusion, meaning that rising levels of internet and mobile phones are associated with increased financial inclusion. There is also uni-directional causality from internet and mobile phones to financial inclusion, implying that internet and mobile phones cause financial inclusion. The study also shows that macroeconomic factors such as capital formation, primary enrollment, bank credit, broad money, population growth, remittances, agriculture and interest rate, as well as institutional factors such as regulatory quality are important underlying factors for financial inclusion in Africa.Originality/valueIn the literature, there is a dearth of research on the internet, mobile phones and financial inclusion, especially in Africa. Most of the related studies are conceptual and micro-based, with little empirical attention to the relationship and causality between internet, mobile phones and financial inclusion. In fact, this dearth of rigorous empirical studies has been attributed as the main cause of inadequate policy guidance in enhancing information communication technologies (Roycroft and Anantho, 2003), despite saturation levels in developed economies. This study fills the gap by evaluating the effects of the Internet and mobile phones on financial inclusion for 44 African countries for the 2000-2016 period.