2,269 results on '"transactions"'
Search Results
2. Investment cooperation as a digital economy development method for the Republic of Kazakhstan and the EU
- Author
-
Otarbayeva, Aina B., Arupov, Akimzhan A., Abaidullayeva, Madina M., Dadabayeva, Dardana M., and Khajiyeva, Gulzhakhan U.
- Published
- 2024
- Full Text
- View/download PDF
3. Implementations Based Evaluation of No-Wait Approach for Resolving Conflicts in Databases
- Author
-
Wang, Yingming, Ezhilchelvan, Paul, Waudby, Jack, Webber, Jim, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Doncel, Josu, editor, Remke, Anne, editor, and Di Pompeo, Daniele, editor
- Published
- 2025
- Full Text
- View/download PDF
4. Credit Card Fraud Detection Using Random Forest and K-Nearest Neighbors (KNN) Algorithms
- Author
-
Alhabib, Abdulaziz Abdulrhman, Alasiri, Abdulaziz Fae, Alharbi, Mazen Bunayan, Ahmad, Sultan, Eljialy, A. E. M., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Gonçalves, Paulo J. Sequeira, editor, Singh, Pradeep Kumar, editor, Tanwar, Sudeep, editor, and Epiphaniou, Gregory, editor
- Published
- 2025
- Full Text
- View/download PDF
5. Trends in the Use of Electronic Channels for Banking and Financial Services in Ecuador
- Author
-
Arias, Carlos, Aizaga, Miguel, Ortega, William, Jaramillo, Carolina, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Carvalho, João Vidal, editor, Abreu, António, editor, Ferreira da Costa, Eusébio, editor, Vázquez-Justo, Enrique, editor, and Viguera Figueroa, Hernán, editor
- Published
- 2025
- Full Text
- View/download PDF
6. Implementing Cryptographic Algorithms for Securing Online Transactions
- Author
-
Bhuvana, J., Bhatt, Rahul, Metre, Prakash B., Mishra, Awakash, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Kumar, Amit, editor, Gunjan, Vinit Kumar, editor, Senatore, Sabrina, editor, and Hu, Yu-Chen, editor
- Published
- 2025
- Full Text
- View/download PDF
7. Somewhere I belong: the field of new climate activists and the Czech environmental movement.
- Author
-
Císař, Ondřej and Navrátil, Jiří
- Abstract
Although the environmental movement has been around for a long time, it is going through a visible transformation right now. This is mostly due to the mobilization of newly established political actors, such as Fridays for Future (FFF) and Extinction Rebellion (XR), which focus on the issue of climate change. Using a relational perspective to analyze the strategies of established and new actors we ask: given the importance and characteristics of new actors in the field, is environmental activism heading towards higher integration or fragmentation? Reflecting on the field of environmental and climate justice activism in Czechia, we demonstrate its development towards a centralized and hierarchical structure, although we also identify elements of fragmentation. Importantly, our data demonstrate that the two modes of activism do not necessarily form exclusive patterns but can exist in a mutual symbiosis, which enriches the extant understanding of how different forms of activism operate. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
8. Securing IoT Sensors Using Sharding-Based Blockchain Network Technology Integration: A Systematic Review.
- Author
-
Aslam, Ammad, Postolache, Octavian, Oliveira, Sancho, and Pereira, José Dias
- Abstract
Sharding is an emerging blockchain technology that is used extensively in several fields such as finance, reputation systems, the IoT, and others because of its ability to secure and increase the number of transactions every second. In sharding-based technology, the blockchain is divided into several sub-chains, also known as shards, that enhance the network throughput. This paper aims to examine the impact of integrating sharding-based blockchain network technology in securing IoT sensors, which is further used for environmental monitoring. In this paper, the idea of integrating sharding-based blockchain technology is proposed, along with its advantages and disadvantages, by conducting a systematic literature review of studies based on sharding-based blockchain technology in recent years. Based on the research findings, sharding-based technology is beneficial in securing IoT systems by improving security, access, and transaction rates. The findings also suggest several issues, such as cross-shard transactions, synchronization issues, and the concentration of stakes. With an increased focus on showcasing the important trade-offs, this paper also offers several recommendations for further research on the implementation of blockchain network technology for securing IoT sensors with applications in environment monitoring. These valuable insights are further effective in facilitating informed decisions while integrating sharding-based technology in developing more secure and efficient decentralized networks for internet data centers (IDCs), and monitoring the environment by picking out key points of the data. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
9. ENHANCING BLOCKCHAIN SECURITY WITH AN IMPROVISED CRYPTOGRAPHIC ALGORITHM FOR SECURE TRANSACTIONS.
- Author
-
Pandian, A. Sevuga and Agitha, W.
- Subjects
BLOCKCHAINS ,DATA warehousing ,DATA integrity ,QUANTUM computing ,ALGORITHMS - Abstract
Blockchain technology has emerged as a secure and decentralized mechanism for data storage and transactions. However, despite its promise, blockchain networks face ongoing challenges related to the security of transaction data, particularly concerning the integrity and confidentiality of the information. Traditional cryptographic algorithms, such as SHA-256, which are widely used in blockchain applications, are not immune to emerging threats like quantum computing and advanced brute-force attacks. This research proposes an enhanced version of the Secure Hash Algorithm (SHA) by introducing an improvisation to improve its resistance against these potential threats, ensuring better security for blockchain transactions. The proposed method involves modifying the core structure of SHA to incorporate a multi-layer encryption process, along with an adaptive hashing technique that adjusts key lengths and encryption protocols based on transaction types. By increasing the entropy and variability in the algorithm's encryption process, the method reduces the likelihood of collision attacks and enhances data integrity. The security improvements are assessed through a series of stress tests, comparing the performance of the improvised SHA algorithm with traditional SHA-256 and other common cryptographic methods. Results indicate that the enhanced SHA algorithm offers a 15% increase in transaction verification speed and a 25% improvement in resistance to brute-force and collision attacks. Additionally, computational analysis reveals a 20% reduction in processing time for large-scale blockchain networks while maintaining high security standards. This method provides a scalable and efficient solution for securing blockchain transactions, making it a valuable tool for industries reliant on blockchain technology. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. مطالعه حک شدگی اجتماعی معاملات در میان بازاریان شهر اردبیل.
- Author
-
کمال کوهی, فاطمه گلابی, حسین بنی فاطمه, and بهنام منصور یونج
- Subjects
MORAL norms ,ECONOMIC indicators ,SUPPLY & demand ,TRANSACTION costs ,SOCIAL networks - Abstract
Every economic action, including transactions, must be interpreted within the context of social relations Social life is inconceivable without exchange, despite the significant role that transactions play in the market. However, the fundamental concept of this article is that the social structure of the market influences the formation of transactions, which are not only subject to supply and demand and economic, technical and mathematical indicators, but also by the social relations between buyers and sellers. The objective of the present study was to construct a theoretical framework and comprehend the social embeddedness of marketers’ transactions using a qualitative and systematic grounded theory approach. The data was collected from the bazaars of Ardabil city using targeted and theoretical sampling with the maximum diversity method and a semi-structured interview technique with theoretical saturation of 20 people. Three methods of category identification and analysis were employed: open, axial, and selective coding. Around the core category of fragile embedded transactions, the primary categories of the research were identified: economic challenges, network of transactions, profiteering, ethical norms, multiple transaction styles, and transaction costs. Qualitative results showed that market transactions are not solely contingent upon economic indicators, personal interests, price, and profitability; rather, they are interwoven with the moral norms of the market, the social network of transactions, and tolerance. The quantity of social embeddedness of transactions is fragile, indicating that there is a potential for a deviation from the embeddedness of transactions toward fragile embeddedness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Co-Evolution of Law and Economics—Judicial Sovereignty.
- Author
-
Paschall, Stephen and Atkinson, Glen
- Subjects
ECONOMIES of scale ,INTANGIBLE property ,JUDICIAL review ,VALUATION of real property ,CAPITALISM ,MARKET power - Abstract
John R. Commons' Legal Foundations of Capitalism documented the co-evolution of law and economics. Commons reviewed legal cases that affected economic development. Courts had endorsed emerging business practices unleashing endogenous forces of change. Scarcity was the dominant feature of the pre-industrial economy, but Commons' Stages of Capitalism demonstrated that the economy had evolved to industrial production. As industrialism became more dominant, production was potentially abundant. However, abundance was a source of instability. Stabilized scarcity policies relieving instability were confirmed by the judiciary. Judicial review established judicial sovereignty that Commons called "dictatorship of the courts." Intangible property was legalized. Use value of property was replaced by exchange value. Edicts of the courts could supplant the work of the legislative and executive branches risking a movement toward the fascism of pre-war Italy. The economy continues to evolve. The cutting edge of the economy is knowledge-based production, which is not manufacturing commodities. It is about the design and use of technology for the application of ideas that are built on increasing returns and positive feedback (further sources of instability). Competition is different in these industries where market power is prominent. This will require policies to deal with market power. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Legal Protection for Sellers in E-Commerce with Cash on Delivery Payment Method at PT. Shopee International Indonesia
- Author
-
SADJIJONO, Murry DARMOKO, Dossy Iskandar PRASETYO, and MAFIRO
- Subjects
legal protection ,sellers ,cash on delivery (cod) ,online transactions ,shopee ,e-commerce ,transactions ,Criminal law and procedure ,K5000-5582 - Abstract
This study aims to analyze legal protection for sellers in online transactions using the Cash on Delivery (COD) payment method at PT. Shopee International Indonesia. COD is a popular payment method but presents risks for sellers, particularly related to the uncertainty of receiving payment and goods. The research employs a normative approach by examining relevant regulations, including the Customer Protection Law and Shopee’s policies. The findings indicate that legal protection for sellers in the COD scheme is still suboptimal. A major challenge is the unclear responsibility between the platform, courier, and buyer. There is also a risk of loss for sellers when buyers refuse to accept goods or return the goods without valid reasons. Although Shopee provides some protective measures, such as complaint services and guarantees, the implementation and oversight of these protections need to be reinforced to minimize seller losses. This study recommends the need for clearer regulatory enforcement and closer cooperation among e-commerce platforms, the government, and sellers to ensure adequate legal protection for sellers in COD transactions.
- Published
- 2024
13. Analysis of strategies for scalable transaction creation in blockchains.
- Author
-
Delzer, Ole, Hobeck, Richard, Weber, Ingo, Kaaser, Dominik, Sober, Michael, and Schulte, Stefan
- Subjects
- *
BLOCKCHAINS , *SCALABILITY , *POPULARITY - Abstract
The growing popularity of blockchains highlights the need to improve their scalability. While previous research has focused on scaling transaction processing, the scalability of transaction creation remains unexplored. This issue is particularly important for organizations needing to send large volumes of transactions quickly or continuously. Scaling transaction creation is challenging, especially for blockchain platforms like Ethereum, which require transactions to include a sequence number. This paper proposes four different methods to scale transaction creation. Our experimental evaluation assesses the scalability and latency of these methods, identifying two as feasible for scaling transaction creation. Additionally, we provide an in-depth theoretical analysis of these two methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Confidential Transaction Balance Verification by the Net Using Non-Interactive Zero-Knowledge Proofs.
- Author
-
Kilčiauskas, Aušrys, Bendoraitis, Antanas, and Sakalauskas, Eligijus
- Subjects
- *
PUBLIC key cryptography , *DATA privacy , *TAX collection , *CONFIDENTIAL communications , *PRIVACY - Abstract
One of the main trends for the monitoring and control of business processes is to implement these processes via private blockchain systems. These systems must ensure data privacy and verifiability for the entire network here denoted by 'Net'. In addition, every business activity should be declared to a trusted third party (TTP), such as an Audit Authority (AA), for tax declaration and collection purposes. We present a solution for a confidential and verifiable realization of transactions based on the Unspent Transaction Output (UTxO) paradigm. This means that the total sum of transaction inputs (incomes) I n must be equal to the total sum of transaction outputs (expenses) E x , satisfying the balance equation I n = E x. Privacy in a private blockchain must be achieved through the encryption of actual transaction values. However, it is crucial that all participants in the network be able to verify the validity of the transaction balance equation. This poses a challenge with probabilistically encrypted data. Moreover, the inputs and outputs are encrypted with different public keys. With the introduction of the AA, the number of different public keys for encryption can be reduced to two. Incomes are encrypted with the Receiver's public key and expenses with the AA's public key. The novelty of our realization lies in taking additively-multiplicative, homomorphic ElGamal encryption and integrating it with a proposed paradigm of modified Schnorr identification providing a non-interactive zero-knowledge proof (NIZKP) using a cryptographically secure h-function. Introducing the AA as a structural element in a blockchain system based on the UTxO enables effective verification of encrypted transaction data for the Net. This is possible because the proposed NIZKP is able to prove the equivalency of two ciphertexts encrypted with two different public keys and different actors. This integration allows all users on the Net to check the UTxO-based transaction balance equation on encrypted data. The security considerations of the proposed solution are presented. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. An intelligent approach to detect and predict online fraud transaction using XGBoost algorithm.
- Author
-
Kumar, Bala Santhosh, Yadav, Pasupula Praveen, and Reddy, Mogathala Raghavendra
- Subjects
CREDIT card fraud ,INTERNET fraud ,FRAUD ,CREDIT cards ,FRAUD investigation - Abstract
The most popular payment method in recent years is the credit card. Due to the E-commerce industry’s explosive growth, the usage of credit cards for online purchases have been greatly increased as a result frauds has increased. Banks have been facing challenges to detect the credit card system fraud in recent years. Credit card fraud happens when the card was stolen for any unauthorized purposes or if the fraudster utilizes the credit card information for his own use. In order to prevent credit card fraud, it is essential to build detection measures. While detecting credit card theft with machine learning (ML), the features of credit card frauds play an important and they must be carefully selected. A fraud detection algorithm must be created in order to correctly locate and stop fraudulent activity as technology advances along with the amount of fraud cases. ML methods are essential for identifying fraudulent transactions. The implementation of fraud detection models is particularly difficult because of the sensitive nature of the data, the unbalanced class distributions, and the lack of data. In this work, an intelligent approach to detect and predict online fraud transaction using extreme gradient boosting (XGBoost) algorithm is described. The XGBoost model predicts whether a transaction is fraud or not. This model will achieve better performance interarm of recall, precision, accuracy and F1-score for credit card fraud detection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Analysis Of Food Ordering Agreement Through Application Of Online Transportation System In Islamic Economic Overview.
- Author
-
Sitohang, Sahala Fajarillah, Marliyah, and Batubara, Maryam
- Subjects
PURCHASING contracts ,FOOD chemistry ,SERVICE contracts ,CONTRACTING out ,GROCERY shopping - Abstract
This research analyzes food ordering contracts via online transportation applications from an Islamic economic perspective. It was found that there are various electronic contracts that influence society, including the perception that booking contracts can be considered haram or contain gharar, affecting beliefs and the online transportation ecosystem. This research methodology is descriptive qualitative with primary data sources from interviews and secondary sources from books and papers. Data collection techniques include observation, interviews and documentation. The research results show that in Go-Food services by PT Go-Jek there are ijarah, wakalah, sale and purchase and musyarakah contracts. Ijarah contracts occur in service transactions, wakalah contracts when consumers represent purchases, sale and purchase contracts when drivers buy food, and musyarakah contracts in collaboration between PT Go-Jek and drivers. In addition, analysis of OVO top-up transactions shows that it is compatible with the Sarf contract, although a small number of users still consider it a Qardh contract due to the lack of socialization regarding the type of contract in OVO transactions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Formal Language for Objects' Transactions.
- Author
-
Adda, Mo
- Subjects
LEGAL settlement ,FORMAL languages ,BLOCKCHAINS ,BITCOIN ,SEMANTICS - Abstract
The gap between software design and implementation often results in a lack of clarity and precision. Formal languages, based on mathematical rules, logic, and symbols, are invaluable for specifying and verifying system designs. Various semi-formal and formal languages, such as JSON, XML, predicate logic, and regular expressions, along with formal models like Turing machines, serve specific domains. This paper introduces a new specification formal language, ObTFL (Object Transaction Formal Language), developed for general-purpose distributed systems, such as specifying the interactions between servers and IoT devices and their security protocols. The paper details the syntax and semantics of ObTFL and presents three real case studies—federated learning, blockchain for crypto and bitcoin networks, and the industrial PCB board with machine synchronization—to demonstrate its versatility and effectiveness in formally specifying the interactions and behaviors of distributed systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Exploring the Mesoscopic Structure of Bitcoin During its First Decade of Life
- Author
-
Nicolò Vallarano, Tiziano Squartini, and Claudio J. Tessone
- Subjects
networks ,bitcoin ,transactions ,complex systems ,Computer software ,QA76.75-76.765 ,Finance ,HG1-9999 - Abstract
The public availability of the entire history of Bitcoin transactions opens up the unprecedented possibility of studying this system at the desired level of detail. Our contribution is intended to analyse the mesoscopic properties of the Bitcoin User Network (BUN) during the first half of its history, i.e., across the years 2011-2018. What emerges from our analysis is that the BUN is a core-periphery structure with a certain degree of “bow-tieness”, i.e., admitting the presence of a Strongly-Connected Component (SCC), an IN-component (together with some tendrils attached to it) and an OUT-component. Interestingly, the evolution of the BUN structural organisation experiences fluctuations that seem to be correlated with the presence of “bubbles”, i.e., periods of price surge and decline observed throughout its entire history. Our results, thus, further confirm the interplay between structural quantities and price movements reported by previous analyses.
- Published
- 2025
- Full Text
- View/download PDF
19. Formal Language for Objects’ Transactions
- Author
-
Mo Adda
- Subjects
formal language ,activities ,interactions ,actors ,agents ,transactions ,Mathematics ,QA1-939 ,Applied mathematics. Quantitative methods ,T57-57.97 - Abstract
The gap between software design and implementation often results in a lack of clarity and precision. Formal languages, based on mathematical rules, logic, and symbols, are invaluable for specifying and verifying system designs. Various semi-formal and formal languages, such as JSON, XML, predicate logic, and regular expressions, along with formal models like Turing machines, serve specific domains. This paper introduces a new specification formal language, ObTFL (Object Transaction Formal Language), developed for general-purpose distributed systems, such as specifying the interactions between servers and IoT devices and their security protocols. The paper details the syntax and semantics of ObTFL and presents three real case studies—federated learning, blockchain for crypto and bitcoin networks, and the industrial PCB board with machine synchronization—to demonstrate its versatility and effectiveness in formally specifying the interactions and behaviors of distributed systems.
- Published
- 2024
- Full Text
- View/download PDF
20. Typical Online Agreements and Associated Legal Challenges Confronting Consumers: A South African Perspective
- Author
-
Olubunmi Olukemi Obioha and Paul S. Masumbe
- Subjects
contract law ,online contract ,legal principles ,consumers ,transactions ,consumer challenges ,technology ,e-commerce ,south africa ,Law in general. Comparative and uniform law. Jurisprudence ,K1-7720 - Abstract
The emergence of the internet coupled with the rapid development in digital technology has revolutionalised the way things are done, including the economic activities of businesses and consumers. The ease and convenience offered via the electronic commerce platform has become a major motivation for its increasing use rather than visits to physical stores or places of business. Amidst the comfort, wider array of products and time saving benefits available to consumers in the digital marketplace, consumers are confronted with complex problems and challenges that offline consumers who interact with sellers’ face to face do not experience. Although there is subsisting legislation that regulates online transactions and agreement in South Africa, this seems to be inadequate to address the adverse situations consumers are exposed to while contracting electronically. This paper discusses the common forms of online contracts and the concomitant legal challenges affecting consumers while concluding contracts online in the South African context. Questions such as ‘which country’s law will apply on online contracts in cross-border contracts’ are some of the pertinent issues without clear cut answers. Divided into four parts, the first part deals with the legal principles regulating online contracts, part two tackles the validity of online contracts, part three deals with the legal challenges consumers face in online contracts in South Africa and the last part is the conclusion. The authors hope that this contribution would help stimulate the debate about online contracts with hopes of bringing the much-needed contractual certainty in this area of the law.
- Published
- 2024
- Full Text
- View/download PDF
21. Legal Review on Consumer Protection in E-Commerce Transactions.
- Author
-
Rosanto, Tibar Cahyo, Sari, Surti Komala, Supriyadi, Yodi, Rahman, Alip, and Dikrurahman, Diky
- Subjects
- *
INFORMATION technology , *CONSUMER protection , *INTERNET stores , *CONSUMERS , *CONSUMERS' reviews - Abstract
The use of e-commerce in trade has had a big impact on Indonesian society, especially in terms of very important legal issues. Legal protection in e-commerce is crucial to protect consumers who make buying and selling transactions via the internet. This development is driven by high demand and acceptance from the public, as evidenced by the emergence of various online stores such as Kaskus, Tokopedia, Bukalapak, Shopee, and Lazada. Rapid advances in technology have changed the method of buying and selling from physical stores to online transactions via the internet. E-commerce, as an information technology innovation, allows consumers to make transactions with just the touch of a finger without having to leave the house. However, the variety of e-commerce platforms available increases the potential for legal issues in online transactions. This research aims to understand how to legally protect consumers and help them if losses occur in e-commerce transactions. The method used is a normative approach, by reviewing literature and secondary data related to consumer legal protection in e-commerce transactions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
22. Nova economia institucional: um estudo sobre possíveis contribuições das instituições no desenvolvimento económico.
- Author
-
da Silva Chadreque, Juvenal Laurinda
- Abstract
Copyright of GeSec: Revista de Gestao e Secretariado is the property of Sindicato das Secretarias e Secretarios do Estado de Sao Paulo (SINSESP) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
23. Transformation Of Cashless Transaction In India With Reference To Volume And Value Of Cashless Transactions In Pune.
- Author
-
Salunkhe, R. S. and Nagargoje, Bharat
- Subjects
REFERENCE values ,ELECTRONIC funds transfers ,CORPORATION reports ,SECONDARY analysis ,BARTER - Abstract
The medium of exchange for the transactions has been continuously evolved right from the stage of barter system to the current cashless economy. The cashless transactions, in real sense, the transaction between two entities without a medium of exchange. This paper intends to analyze the Cashless transactions in terms of value and volume. For this study the cashless transactions data is analyzed for 5 years. The secondary data is collected from RBI website. The RBI Annual Report 2019-20 and 2021-22 are used to analyze the total cashless transactions in the past 3 years. The statistical tools like Graph, Chart and percentage has been used to analyze the data. [ABSTRACT FROM AUTHOR]
- Published
- 2024
24. Relationality in transaction cost economics and stakeholder theory: A new conceptual framework.
- Author
-
Valentinov, Vladislav and Roth, Steffen
- Subjects
STAKEHOLDER theory ,TRANSACTION cost theory of the firm - Abstract
Stakeholder scholars have long explored how stakeholder relationships differ from economic transactions. We contribute to this ongoing inquiry by developing a conceptual framework of relationality in stakeholder theory that encompasses a stakeholder‐theoretic extension of Williamson's contracting schema and a new typology of stakeholder relationships. Premised on understanding relationality as the need for informal human relationships beyond formal governance, our framework locates the key difference between transaction cost economics and stakeholder theory in their treatment of informal relationships. While transaction cost economics perceives informal relationships to be shaped by formal governance structures and enforced by contractual safeguards, stakeholder theory is open to the possibility that some informal relationships between stakeholders may be genuinely moral and thus irreducible to formal governance and contractual safeguards. These stakeholder relationships may lead to unique economic effects described by instrumental stakeholder theory. The difference that we identified between the two literatures shows how stakeholder theory's embrace of relationality surpasses that of transaction cost economics. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. A Survey of Consortium Blockchain and Its Applications.
- Author
-
Chen, Xiaotong, He, Songlin, Sun, Linfu, Zheng, Yangxin, and Wu, Chase Q.
- Subjects
- *
CONSORTIA , *BLOCKCHAINS , *CRYPTOCURRENCIES , *ARCHITECTURAL design , *BITCOIN , *FASHION design - Abstract
Blockchain is a revolutionary technology that has reshaped the trust model among mutually distrustful peers in a distributed network. While blockchain is well-known for its initial usage in a public manner, such as the cryptocurrency of Bitcoin, consortium blockchain, which requires authentication of all involved participants, has also been widely adopted in various domains. Nevertheless, there is a lack of comprehensive study of consortium blockchain in terms of its architecture design, consensus mechanisms, comparative performance, etc. In this study, we aim to fill this gap by surveying the most popular consortium blockchain platforms and assessing their core designs in a layered fashion. Particularly, Byzantine fault tolerant (BFT) state machine replication (SMR) is introduced to act as a basic computational model of consortium blockchain. Then the consortium blockchain is split into the hardware layer, layer-0 (network layer), layer-I (data layer, consensus layer and contract layer), layer-II protocols, and application layer. Each layer is presented with closely related discussion and analysis. Furthermore, with the extraction of the core functionalities, i.e., robust storage and guaranteed execution, that a consortium blockchain can provide, several typical consortium blockchain-empowered decentralized application scenarios are introduced. With these thorough studies and analyses, this work aims to systematize the knowledge dispersed in the consortium blockchain, highlight the unsolved challenges, and also indicate the propitious avenues of future work. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. خصوصية الجزاء الجنائي في قمع جريمة الإستعمال التعسفي لأموال الشركات التجارية.
- Author
-
سكماكجي هبة فاطم
- Abstract
Copyright of Human Sciences Journal / Revue des Sciences Humaines is the property of Universite des Freres Mentouri Constantine and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
27. Relational Process Atomism: Epistemological and Methodological Considerations on the Metaphysics of Transactions
- Author
-
Schramm, Michael, Biggiero, Lucio, Series Editor, de Jongh, Derick, Series Editor, Priddat, Birger P., Series Editor, Wieland, Josef, Series Editor, Zicari, Adrian, Series Editor, Rendtorff, Jacob Dahl, editor, Belser, Lukas, editor, and Geraldo Schwengber, Jessica, editor
- Published
- 2024
- Full Text
- View/download PDF
28. Predicting Retail Store Transaction Patterns: A Comparison of ARIMA and Machine Learning Models
- Author
-
Vaz, Clara B., Sena, Inês, Braga, Ana Cristina, Novais, Paulo, Fernandes, Florbela P., Lima, José, Pereira, Ana I., Li, Gang, Series Editor, Filipe, Joaquim, Series Editor, Xu, Zhiwei, Series Editor, Pereira, Ana I., editor, Fernandes, Florbela P., editor, Coelho, João P., editor, Teixeira, João P., editor, Lima, José, editor, Pacheco, Maria F., editor, Lopes, Rui P., editor, and Álvarez, Santiago T., editor
- Published
- 2024
- Full Text
- View/download PDF
29. Design Website for Buying and Selling Property Transactions to Enhance Customer Experience
- Author
-
Kristin, Desi Maya, Alexandra, Jennifer, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Yang, Xin-She, editor, Sherratt, R. Simon, editor, Dey, Nilanjan, editor, and Joshi, Amit, editor
- Published
- 2024
- Full Text
- View/download PDF
30. Blockchain and Artificial Intelligence: Enhancing Security and Efficiency in Metaverse Payment Transactions
- Author
-
Rajawat, Anand Singh, Goyal, S. B., Shaari, Rosnizah Bt, Verma, Chaman, Singh, Pradeep Kumar, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Singh, Yashwant, editor, Gonçalves, Paulo J. Sequeira, editor, Singh, Pradeep Kumar, editor, and Kolekar, Maheshkumar H., editor
- Published
- 2024
- Full Text
- View/download PDF
31. Utility: Developing Efficient Language Interventions
- Author
-
Weideman, Albert, Hult, Francis M., Series Editor, Cavalcanti, Marilda C., Editorial Board Member, Cenoz, Jasone, Editorial Board Member, Creese, Angela, Editorial Board Member, Gogolin, Ingrid, Editorial Board Member, Hélot, Christine, Editorial Board Member, Janks, Hilary, Editorial Board Member, Kramsch, Claire, Editorial Board Member, Leung, Constant, Editorial Board Member, Lin, Angel, Editorial Board Member, Pennycook, Alastair, Editorial Board Member, and Weideman, Albert
- Published
- 2024
- Full Text
- View/download PDF
32. Checking Transaction Isolation Violations Using Graph Queries
- Author
-
Dumbrava, Stefania, Jin, Zhao, Ozkan, Burcu Kulahcioglu, Qiu, Jingxuan, Hartmanis, Juris, Founding Editor, van Leeuwen, Jan, Series Editor, Hutchison, David, Editorial Board Member, Kanade, Takeo, Editorial Board Member, Kittler, Josef, Editorial Board Member, Kleinberg, Jon M., Editorial Board Member, Kobsa, Alfred, Series Editor, Mattern, Friedemann, Editorial Board Member, Mitchell, John C., Editorial Board Member, Naor, Moni, Editorial Board Member, Nierstrasz, Oscar, Series Editor, Pandu Rangan, C., Editorial Board Member, Sudan, Madhu, Series Editor, Terzopoulos, Demetri, Editorial Board Member, Tygar, Doug, Editorial Board Member, Weikum, Gerhard, Series Editor, Vardi, Moshe Y, Series Editor, Goos, Gerhard, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Harmer, Russ, editor, and Kosiol, Jens, editor
- Published
- 2024
- Full Text
- View/download PDF
33. Re-ordering the EU and Europe: Old Boundaries and New Challenges
- Author
-
Smith, Michael, Wiesner, Claudia, editor, and Knodt, Michèle, editor
- Published
- 2024
- Full Text
- View/download PDF
34. Improved Purpose-Based Concurrency Control to Reduce the Electric Energy Consumption of a Server Cluster
- Author
-
Enokido, Tomoya, Duolikun, Dilawaer, Takizawa, Makoto, Xhafa, Fatos, Series Editor, and Barolli, Leonard, editor
- Published
- 2024
- Full Text
- View/download PDF
35. What Is Money?
- Author
-
Chowdhury, Mehdi and Chowdhury, Mehdi
- Published
- 2024
- Full Text
- View/download PDF
36. Security Challenges and Applications for Digital Transactions Using Blockchain Technology
- Author
-
Dang, Prateek, Gupta, Himanshu, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Jain, Shruti, editor, Marriwala, Nikhil, editor, Singh, Pushpendra, editor, Tripathi, C.C., editor, and Kumar, Dinesh, editor
- Published
- 2024
- Full Text
- View/download PDF
37. Fragmented Data Landscape and Data Asymmetries in the Real Estate Industry
- Author
-
Hazeem, Hamad, AlBurshaid, Ebrahim, Jreisat, Ammar, editor, and Mili, Mehdi, editor
- Published
- 2024
- Full Text
- View/download PDF
38. Bitcoin
- Author
-
Sharad Mangrulkar, Ramchandra, Vijay Chavan, Pallavi, Mangrulkar, Ramchandra Sharad, and Vijay Chavan, Pallavi
- Published
- 2024
- Full Text
- View/download PDF
39. Leveraging Artificial Intelligence to Combat Money Laundering and Related Crimes in the Banking Sector in South Africa
- Author
-
Howard Chitimira, Elfas Torerai, and Lisa Jana
- Subjects
artificial intelligence ,money laundering ,banking institutions ,combat ,transactions ,Law in general. Comparative and uniform law. Jurisprudence ,K1-7720 - Abstract
Abstract Money laundering and financial crimes pose a significant threat to the integrity and stability of South Africa’s financial system. This paper explores the application of artificial intelligence (AI) to detect and prevent money laundering in South African banking institutions. Through the implementation of big data technologies and data processing analytics, AI can enhance the detection and prevention of money laundering activities in South Africa’s banking sector. AI can be harnessed to improve the detection of suspicious activities, enhance accuracy of financial intelligence and adapt to evolving money laundering techniques. The paper also examines the benefits and challenges of implementing AI as an anti-money laundering (AML) measure in the South African banking sector. These include the need for quality data, integration with existing systems, regulatory compliance and ethical considerations. The paper further highlights the potential of AI in transaction monitoring, customer due diligence, outcomes-based risk assessment, and improved detection of suspicious transactions by analysing how AI can enhance the effectiveness and efficiency of AML measures. The importance of coordination between banking institutions, regulatory authorities and law enforcement bodies is also highlighted as an important component of leveraging AI to combat money laundering and related financial crimes in South Africa’s banking sector.
- Published
- 2024
- Full Text
- View/download PDF
40. Financial Literacy, Risk Tolerance, and Cryptocurrency Ownership in the United States.
- Author
-
Fumiko Hayashi and Routh, Aditi
- Subjects
FINANCIAL literacy ,CRYPTOCURRENCY exchanges ,TRANSACTION costs ,INVESTORS - Abstract
Cryptocurrency owners without sufficient financial literacy and risk tolerance may be financially vulnerable, as the cryptocurrency market is highly volatile and lacks consumer protections. Our study divides cryptocurrency owners into three groups based on their purpose for holding cryptocurrencies-for investment only (investors), for transactions only (transactors), and for a mix of investment and transactions (mix users)-and examines how each group correlates with financial literacy and risk tolerance compared to consumers who do not own cryptocurrencies (nonowners). Using the 2022 Survey of Household Economics and Decisionmaking, we find that investors and mix users are significantly or moderately more financially literate and risk tolerant than nonowners, but transactors are less financially literate and slightly more risk tolerant than nonowners. We also find that the three groups of cryptocurrency owners vary by demographic and financial characteristics. Our findings highlight that transactors could be particularly financially vulnerable in the absence of consumer protections in the cryptocurrency market. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. Securi-Chain: Enhancing Smart Contract Security in Blockchain Systems Through Optimized Access Control.
- Author
-
Swart, Keanu, Baror, Stacey Omeleze, and Venter, Hein
- Abstract
With the increase in usage of blockchain technology across domains, there is a high demand for the need of secure access control and a high level of security for smart contracts within blockchain to accommodate the domains that already implement blockchain and become accessible to other domains that require a high level of security in its transactions. This paper aims to evaluate the relationship between the best practices of access control and security of smart contracts in blockchain to optimise the usage of both technologies for blockchain usage across domains into a generalized blockchain model named the Securi-Chain Model. A literature review compares the relationship between access control and the security of smart contracts across three domains: Healthcare, IoT, and e-voting. Based on the findings of the literature review, Securi-Chain is proposed to implement the best practices displayed in these three domains and combine them in a way that ensures secure transactions across blockchain as a generalized approach that can be used throughout various domains. This model will also implement methods that enhance the security of transaction processes within the system. A Case Scenario is used to implement the Securi-Chain Model for the Healthcare and e-voting domains to display how this proposed model is used for domains that have been researched. The research that is conducted found that blockchain networks can support not only high-level access control across transactions in a network but also the security of smart contracts that comply to safeguard confidentiality, integrity, and data accessibility. Secrui-Chain, as well as the findings of the literature review, seem to benefit the domains that have been researched, as well as domains that require a high level of security regarding transactions across a network. These domains can benefit from using blockchain technology as well as the level of security that comes with the access control and security of smart contracts that have been implemented in Securi-Chain. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Application of the Al-Barā'ah Al-Dhimmah Method According to Fiqh Law and Its Implementation in Current Legislation in Malaysia
- Author
-
Nik Faisal Nik Ismail
- Subjects
principle ,application ,family matters ,transactions ,crimes ,legislation ,Islam ,BP1-253 ,Social sciences (General) ,H1-99 - Abstract
This article discusses the application of the principle of original freedom (al-asl barÉah al-zimmah) according to Islamic jurisprudence and its implementation in current legislation in Malaysia. The objective of this study is to demonstrate the important role of the stated principle in addressing various issues related to family matters, transactions, and crimes. This study is qualitative in nature and based on a framework of content analysis. Data collection involves referring to exegesis books, Sunnah, classical fiqh texts, principles of jurisprudence, al-Qawaid al-Fiqhiyyah, views of contemporary Islamic scholars, current laws, and content research. The collected data is analyzed and interpreted using deductive, descriptive, and comparative methods to obtain appropriate findings in line with the established research objectives. The results of the study indicate that this principle emphasizes the principle of al-baréah (freedom) possessed by every human being from being burdened with obligations, responsibilities, accusations, or punishments. Findings also show that this principle is based on the Quran and Sunnah and can be applied in various branches of Islamic law, playing a significant role in realizing justice for parties involved in disputes, especially in the aspects of family matters, transactions, and crimes. The implementation of the theories and principles found in this principle will ensure the preservation of the rights and dignity of every individual from both Islamic law and current legislative perspectives.
- Published
- 2024
43. The Concept of Reluctance and Reluctance transactions in terms of Iraqi Law and Islamic Jurisprudence
- Author
-
Abdolgabar Zargoosh Nasab
- Subjects
conceptualization ,reluctance ,transactions ,iraqi legal system ,jurisprudence ,Islamic law ,KBP1-4860 - Abstract
A reluctance contract is a contract in which the reluctant person does something reluctantly and with the reluctance's threat without consent. A reluctant person only lacks satisfaction and self-esteem, but has the intention of making a deal. From the point of view of jurists, reluctance occurs in two forms, right and wrongful reluctance. According to the famous jurists of Imamiyyah, Iraqi civil law and Iranian civil law, reluctance makes the transactions voidable, which becomes a valid and invalid contract with the subsequent consent of the reluctant. Sunni jurists believe that reluctance causes the transactions to be void, except Hanafi jurisprudence who consider reluctance to be different in cancellable and non-cancelable contracts. In the jurisprudence and civil law of Iraq and Iran, one of the conditions for the validity of a transaction is to have the option of the contracting parties, which means that they intend to enter into the content of the contract with full satisfaction (Tayib Nafs) and the effect of the contract and transaction (creating an obligation or transferring property) not with reluctance. As a result of reluctance, consent destroys the provisions of the contract. The necessity of the validity of this condition of absolute certainty is from the meaning of the honorable verse: "Only trade is based on agreement" and also the non-ordering of effects on a contract that was concluded out of reluctance is clearly used from the prophetic hadith known as the hadith of Rifa. This research through the method of descriptive and analytical way has investigated the concept of reluctance and reluctance transactions in terms of Iraqi law and Islamic jurisprudence.
- Published
- 2024
- Full Text
- View/download PDF
44. Development of Banking Card Market in Russia in Territorial View
- Author
-
E. V. Lapteva
- Subjects
sector ,payment system ,payment ,payment terminal ,issuer ,transactions ,payment card ,credit organization ,individuals ,legal entities ,cash payments ,clearing payments ,forecast ,Economics as a science ,HB71-74 - Abstract
The article highlights the growing frequency of using bank cards and analyzes the difference in their use subject to the region. According to statistics, in 2022 on Russian market 88% fell on payment cards. A steady growth in the number of bank cards was observed for 10 years both with individuals and legal entities. Individuals prevail among bank card users, their share in 2022 reached 98.2%. As technologies develop and new technical solutions turn up bank cards become more accessible for customers and today there are various types of payment cards meeting different needs and preferences of users. Regional distribution of bank cards in Russia was not equal. The leading position by payment card issuance is taken by the Central Federal Region, where 136.9m cards (34.5%) were issued in 2022. The second position is taken by the Volga Federal Region – 71.4m cards or 18.0%, the third position – by the Siberian Federal Region with 43.1m cards or 10.9%. The author showed that the number and the volume of transactions made by cards during the last decade demonstrate steady growing trend both in the country and in federal regions.
- Published
- 2024
- Full Text
- View/download PDF
45. reflection of digital financial transactions in russian accounting records
- Author
-
N. A. Lasareva
- Subjects
digital financial assets ,transactions ,smart contract ,cryptocurrency ,accounting ,reporting ,Accounting. Bookkeeping ,HF5601-5689 - Abstract
Digital transactions have become an integral part of modern business. With the growing popularity of digital technologies, electronic document management, and the development of Internet commerce, accountants are increasingly faced with the need to correctly record and account for these transactions. The current regulatory framework in the Russian Federation does not clearly define the positions of digital financial assets (DFAs), and there are no methodological guidelines for accounting for digital financial transactions and their reflection in reporting. The purpose of this study was to examine the fundamental transformations taking place in the system of accounting for new assets and transactions carried out with their use in the era of digitalization of the economy. The article discusses issues related to the development of the methodology of this type of accounting, the rationale for the need to separate it into a specialised area; a system of accounts for recording digital financial assets and transactions is presented. To systematize the reflection of digital transactions, it is proposed to identify stages that determine the procedure for accounting and generating information on transactions with digital roubles, digital financial assets, cryptocurrency, as well as digital transactions. The methodology of the conducted research is characterized by the use of specific scientific and general scientific methods — a historical approach, systematization of empirical and theoretical research, analysis and synthesis. The importance and relevance of the study are determined by the fact that the author identifies the main directions that establish the problems of accounting for digital types of property and the prospects for transactions with their participation. A system of accounting entries covering a wide range of business transactions involving DFA (digital financial assets) will be of interest to government agencies involved in the development of regulations governing the procedure for carrying out digital transactions, DFA market participants, practicing accountants, as well as top management for developing a strategy for the digitalization of accounting in the company and the generation of financial statements of a new format.
- Published
- 2024
- Full Text
- View/download PDF
46. The Assessment of the Romanian Market Regarding the Potential Adoption of Blockchain
- Author
-
Moraru, Maria
- Published
- 2023
- Full Text
- View/download PDF
47. Unsupervised clustering of bitcoin transactions
- Author
-
Vlahavas, George, Karasavvas, Kostas, and Vakali, Athena
- Published
- 2024
- Full Text
- View/download PDF
48. DIGITAL BANKING DALAM SUDUT PANDANG TEORI STRUKTURASI ANTHONY GIDDENS.
- Author
-
Fauzy, Shanty Dewi
- Abstract
This paper aims to analyze how digital banking is in the point of view of Anthony Giddens' Structuration Theory. Data collection is taken from various sources through literature studies. Structuration theory states that structure and agency are a unity that cannot be separated and influence each other. In digital banking, the system and rules in m-banking are seen as 'structure' while customers who use m-banking applications are seen as 'agencies' where between structures and agencies become a unit that needs each other and produces a social process called transactions. Transactions will not occur if there is no m-banking application system and user customers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. TRUST ME, I AM ACCOUNTABLE: FACTORS INFLUENCING THE PERCEPTION OF BENEFITS OF BLOCKCHAIN TECHNOLOGY.
- Author
-
Abdelhamid, Mohamed, Isaac, Ruchi, and Crusius, Katja
- Subjects
BLOCKCHAINS ,TRUST ,CRYPTOCURRENCIES ,MARKET capitalization ,BITCOIN - Abstract
Since its inception in 2007, blockchain has become a pivotal technology, with its market capitalization reaching $10 billion in 2016 for Bitcoin, a cryptocurrency that utilizes blockchain technology. Blockchain technology, which is used in various fields, is known for its audibility, security, trust, transparency, accountability, and traceability. However, it brings challenges such as scalability, privacy leakage, and selfish mining. Each transaction conducted on the blockchain is stored and registered, making it easy to check and confirm transactions during audits. Public key cryptography always ensures security, and each participant sees the same version of the distributed ledger, guaranteeing trust and transparency. Transactions cannot be tampered with, and each action a participant executes is traceable with no possibility of deleting transactions from the system. Despite these advancements, awareness of blockchain technology remains limited, hindering its widespread adoption. However, with ongoing research and development, blockchain technology holds great potential for a variety of industries, and its benefits will continue to be explored and leveraged. This paper provides insights from various studies that address the risks related to blockchain in cybersecurity, develops a seven-layer structure to combat those risks and proposes an invoice financing platform that establishes data confidentiality. The paper concludes that despite its potential, blockchain technology needs more exploration, awareness, and improvement to be adopted in more areas and companies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
50. وضعیت فقهی - حقوقی معاملات افراد مبتلا به اختلال شخصیت وابسته.
- Author
-
زهره بقیعی, علی اکبر ایزدی فر, and علی اکبر جهانی
- Abstract
The spread of mental disorders within the communities has caused many people to be vulnerable and harmed. Meanwhile, people with various disorders may experience more harm. Dependent personality disorder (DPD) is one of the most common personality disorders in which a person has an excessive and pervasive need to be taken care of by others .The person needs others to take responsibility for most of the major issues in their lives and since they fear losing others' support or approval and because of getting their support and love, they engage in any unpleasant action, including reluctant transactions, which directly affect the validity of their legal actions. The main question raised here is how is the status of transactions of people with DPD according to their characteristics? This article has been compiled in a library method and in a descriptive-analytical approach. In order to clarify the jurisprudential aspects of the subject, the opinions of the jurists have been obtained and analyzed through sending enquiries (istefta`). Also, to further investigate the legal aspects of the subject, the related juridical cases were studied and evaluated. The results of the study indicate that in personality disorders, in the assumption of DPD, people turn to reluctant transactions against their inner desire only because of the fear of losing support of others or the dependent partner. For the same reason, the satisfaction of transactions is impaired. And according to Article 199 of the Civil Law, which considers involuntary transactions as non-enforceable, the transactions of this group of people are also placed in the non-intrusion valley due to reluctance caused by mental disorder. In case of satisfaction, the transaction is correct and will be the source of effects [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.