Search results

1 – 10 of 309

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Content available
Book part
Publication date: 2 July 2020

Kathleen M. Moriarty

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Book part
Publication date: 16 January 2023

Alevtina Dubovitskaya Ackerer and Damien Ackerer

This chapter reviews the underlying technologies of cryptoassets, including fundamental cryptographic primitives used in distributed ledger technologies and permissionless…

Abstract

This chapter reviews the underlying technologies of cryptoassets, including fundamental cryptographic primitives used in distributed ledger technologies and permissionless blockchain technologies and their consensus protocols such as proof-of-work and proof-of-stake. It discusses the pros and cons of existing approaches to improve blockchain scalability and considers the requirements for security and decentralization. The chapter also examines the following techniques: layer 1 tuning, layer 1 sharding, and layer 2 solutions. It concludes with an overview of technologies to swap cryptoassets off-chain, technical requirements for cross-chain transactions, and reviews cross-chain atomic swap implementation using hashed time lock contracts.

Details

The Emerald Handbook on Cryptoassets: Investment Opportunities and Challenges
Type: Book
ISBN: 978-1-80455-321-3

Keywords

Abstract

Details

Radical Transparency and Digital Democracy
Type: Book
ISBN: 978-1-80043-763-0

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Abstract

Details

The Definitive Guide to Blockchain for Accounting and Business: Understanding the Revolutionary Technology
Type: Book
ISBN: 978-1-78973-865-0

Open Access
Book part
Publication date: 9 December 2021

David J. Harper, Darren Ellis and Ian Tucker

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…

Abstract

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

This chapter explores the laws and unique challenges associated with the investigation and prosecution of cybercrime. Crimes that involve the misuse of computers (e.g., hacking…

Abstract

This chapter explores the laws and unique challenges associated with the investigation and prosecution of cybercrime. Crimes that involve the misuse of computers (e.g., hacking, denial of service, and ransomware attacks) and criminal activity that uses computers to commit the act are both covered (e.g., fraud, theft, and money laundering). This chapter also describes the roles of the various federal agencies involved in investigating cybercrime, common cybercrime terms and trends, the statutes frequently used to prosecute cybercrimes, and the challenges and complexity of investigating cybercrime.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

1 – 10 of 309