Search results

1 – 10 of 11
Article
Publication date: 21 August 2019

Michael L. Spafford, Daren F. Stanaway and Sabin Chung

To analyze the CFTC’s approach to regulating cryptocurrencies and blockchain technologies in light of their cross-border nature, limitations on the CFTC’s extraterritorial…

Abstract

Purpose

To analyze the CFTC’s approach to regulating cryptocurrencies and blockchain technologies in light of their cross-border nature, limitations on the CFTC’s extraterritorial authority, and the CFTC’s prerogative to work cooperatively with foreign regulators.

Design/methodology/approach

Discusses the principles set forth in CFTC Chairman Christopher Giancarlo’s White Paper regarding cross-border swap regulation; analyzes the similar nature of cross-border issues arising from regulation of cryptocurrencies and blockchain technologies; examines regulations and guidance implemented by foreign authorities in the blockchain and cryptocurrency space; and assesses the limitations of the CFTC’s extraterritorial authority.

Findings

The principles set forth in Chairman Giancarlo’s White Paper regarding cross-border swap regulation apply equally to blockchain technologies and cryptocurrencies, and as such, the CFTC may wish to pursue an analogous approach to regulating cryptocurrencies and blockchain technologies.

Practical implications

The CFTC should exercise deference to and cooperate with foreign counterparts to regulate cryptocurrencies and blockchain technologies that traverse international borders, thereby avoiding overlapping and potentially conflicting regulation while fostering an innovative growth environment for emerging technologies.

Originality/value

In-depth analysis and insight from experienced professionals in the CFTC and cross-border investigations and enforcement space.

Details

Journal of Investment Compliance, vol. 20 no. 3
Type: Research Article
ISSN: 1528-5812

Keywords

Article
Publication date: 1 February 1993

Joe Ryan

Identifies key activities that network users can perform in orderto use the network effectively. Offers recommended reading, frombeginner to expert user status. Explains some…

Abstract

Identifies key activities that network users can perform in order to use the network effectively. Offers recommended reading, from beginner to expert user status. Explains some commonly used terms (e.g. Turbo Gopher with Veronica!). Lists useful Internet resources.

Details

Internet Research, vol. 3 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 March 1993

Michael F. Schwartz and John S. Quarterman

Explains the necessity for measurement of Internet growth so thatcapacity, commercial potential, etc. may be planned and assessed. Arguesthat this cannot be measured merely by…

Abstract

Explains the necessity for measurement of Internet growth so that capacity, commercial potential, etc. may be planned and assessed. Argues that this cannot be measured merely by packet counts and user registrations. Presents detailed analysis of over 13,000 sites, worldwide. Develops a mathematical model which can be used to predict growth, by individual countries and globally. Offers further topics for future research.

Details

Internet Research, vol. 3 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 January 1951

IT is too early to examine what the change of Government may portend for libraries sustained attract malign attention from any party. We are aware enough, however, that a time of…

Abstract

IT is too early to examine what the change of Government may portend for libraries sustained attract malign attention from any party. We are aware enough, however, that a time of financial stringency lies ahead for every public activity. In book production, the restrictions on imports may worsen a position which is bad enough as it is. There may not be a sinister intention in the gesture of cutting the salaries of Cabinet Ministers by a sum which for several of them represents about £25 or about a half crown a week on such salaries as librarians earn. We hope there is not. Although all good Britons will make necessary sacrifices; but they want to be sure that they are necessary and not, as usually is the case, merely attacks on public servants. We are told that there will be no Geddes axe this time, but experience shows that the politician can always find a way of reversing a statement in what he imagines to be the public interest. Fortunately those likely to be affected are better organized than they were in the early twenties.

Details

New Library World, vol. 53 no. 16
Type: Research Article
ISSN: 0307-4803

Article
Publication date: 1 June 1990

Edward Valauskas

What is hacking? Is it an art form to explore computers, a means to accumulate information as proof of an electronic passage through security systems and around passwords? Or is…

Abstract

What is hacking? Is it an art form to explore computers, a means to accumulate information as proof of an electronic passage through security systems and around passwords? Or is it an illegal venture whose sole purpose is mischief, digital anarchy, a form of revolution against the government, corporations, and other powers that own mainframes and their associated data files? The issue of hacking has erupted with even more vigor this year with the conviction of Robert T. Morris, the author of the Internet worm, along with the recent support of hackers by Mitch Kapor, founder of the Lotus Development Corp. A new aggressive stance by the U.S. Justice Department to track down specialists stealing passwords and credit card numbers has created sensational headlines along with a number of new virulent viruses on personal computers.

Details

Library Workstation Report, vol. 7 no. 6
Type: Research Article
ISSN: 1041-7923

Article
Publication date: 1 June 2006

Danielle Mihram, G. Arthur Mihram and Caroline Gilson

To report on the Annual Meeting of the American Association for the Advancement of Science held in St Louis, Missouri in February 2006.

501

Abstract

Purpose

To report on the Annual Meeting of the American Association for the Advancement of Science held in St Louis, Missouri in February 2006.

Design/methodology/approach

An overview of the seminars, symposia, workshops and presentations at the conference.

Findings

The theme of the meeting was Grand Challenges, Great Opportunities. The meeting was attended by 4,000 registrants, 105 exhibitors; and 900 members of the press. The meeting highlighted the academic role and infrastructure of technology in different science applications, including publishing, and national policy.

Originality/value

A report of interest to library and information management professionals.

Details

Library Hi Tech News, vol. 23 no. 5
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 1 April 1998

Richard E. Overill

In this article the historical development of computer crime is traced and analysed. Some major examples of the phenomenon are examined with particular reference to financial and…

Abstract

In this article the historical development of computer crime is traced and analysed. Some major examples of the phenomenon are examined with particular reference to financial and commercial information systems and institutions. The varied motivations of computer criminals are also considered. Finally, some lessons for today's financial and commercial IT communities are offered.

Details

Journal of Financial Crime, vol. 6 no. 2
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 17 December 2018

Sheshadri Chatterjee, Arpan Kumar Kar, Yogesh K. Dwivedi and Hatice Kizgin

The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.

1523

Abstract

Purpose

The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.

Design/methodology/approach

A conceptual model has been developed for identifying factors preventing cybercrimes. The conceptual model was validated empirically with a sample size of 315 participants from India. Data were analyzed using structural equation modeling with SPSS and AMOS softwares.

Findings

The study reveals that the “awareness of cybercrimes” significantly influences the actual usage of technology to prevent cybercrimes in Smart Cities of India. The study reveals that government initiative (GI) and legal awareness are less influential in spreading of the awareness of cybercrimes (AOC) to the citizens of the proposed smart cities.

Research limitations/implications

The conceptual model utilizes two constructs from the technology adoption model, namely, perceived usefulness and ease of use. The study employs other factors such as social media, word of mouth, GIs, legal awareness and organizations constituting entities spreading awareness from different related literature works. Thereby, a comprehensive theoretical conceptual model has been proposed which helps to identify the factors that may help in preventing cybercrimes.

Practical implications

This study provides an insight to the policy maker to understand several factors influencing the AOC of the citizens of the proposed Smart Cities of India for the prevention of cybercrimes.

Originality/value

There are few existing studies analyzing the effect of AOC to mitigate cybercrimes. Thus, this study offers a novel contribution.

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 25 January 2011

Zahir A. Quraeshi and Mushtaq Luqmani

The purpose of this paper is to provide a systematic framework for guidance to developing countries in promoting competitive capabilities in targeted sectors.

4306

Abstract

Purpose

The purpose of this paper is to provide a systematic framework for guidance to developing countries in promoting competitive capabilities in targeted sectors.

Design/methodology/approach

This is a conceptual paper that incorporates experiences culled from the literature on national sectoral development (call centers).

Findings

Many businesses today are dissecting their value chains and outsourcing functional activities offshore. Beginning in the 1990s, developing countries tried to attract manufacturing (sub) activities such as assembly. More recently, in a deeply interconnected business world, developing nations are fostering sectoral development through a process of attracting offshore activities other than manufacturing to their shores.

Practical implications

Many developing countries are searching for ways to emulate the success of countries such as India to spur economic development. A framework for developing national sectoral competitiveness can benefit policymakers in the public and private sectors by outlining a path toward further economic development.

Originality/value

The paper makes an original contribution by presenting a synthetic framework delineating the steps towards building competitive sectoral capabilities and discussing all aspects of the framework.

Details

Competitiveness Review: An International Business Journal, vol. 21 no. 1
Type: Research Article
ISSN: 1059-5422

Keywords

Article
Publication date: 30 October 2009

Haider H. Madani

The purpose of this paper is to develop a theoretical framework that will help to examine the role of internal auditors (IAs) in enterprise resource planning (ERP) based…

3245

Abstract

Purpose

The purpose of this paper is to develop a theoretical framework that will help to examine the role of internal auditors (IAs) in enterprise resource planning (ERP) based organizations. An ERP integrates all organizational functions in one powerful system that drives the organization strategically and also presents new challenges to the internal audit function.

Design/methodology/approach

A literature review is undertaken to highlight the role of IAs in an ERP environment.

Findings

The framework depicts the new relationships which the ERP system requires between the IAs and five associated groups: software vendors, information systems, information technology managers, ERP users, and consultants. ERP also gives interanl auditors an enabling technology to advise management on the implications of ERP for risk‐intelligence.

Research limitations/implications

This is a conceptual paper that has implications for internal auditing practice. Academic researchers will find this framework to be useful for testing it in the field. Practitioners will also benefit from this model when assessing the role of IAs in an ERP environment.

Originality/value

Prior research in the auditing field has overlooked this issue. This paper will attempt to fill such an apparent gap in prior research and will help motivate further research in this field.

Details

Journal of Accounting & Organizational Change, vol. 5 no. 4
Type: Research Article
ISSN: 1832-5912

Keywords

Access

Year

Content type

Article (11)
1 – 10 of 11