Filters








49 Hits in 7.2 sec

Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets [article]

Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate
2022 IACR Cryptology ePrint Archive  
This work presents a data-driven investigation into the perceptions of cryptocurrency users towards multi-device wallets today, using a survey of 255 crypto-wallet users.  ...  Our qualitative analysis revealed a gap between the actual security guarantees and mental model for these participants-they were afraid that using multi-device wallets will result in losing control over  ...  ACKNOWLEDGEMENTS We thank Omer Shlomovits and Patrick McCorry for helpful comments and feedback on the multi-device wallets.  ... 
dblp:journals/iacr/MangipudiDMMK22 fatcat:huqmwoulbzdenp7mjarrxz4hru

Investigating e-Retailers' Intentions to Adopt Cryptocurrency Considering the Mediation of Technostress and Technology Involvement

Runhan Wu, Kamran Ishfaq, Siraj Hussain, Fahad Asmi, Ahmad Nabeel Siddiquei, Muhammad Azfar Anwar
2022 Sustainability  
Moreover, it was found that technostress among e-retailers profoundly impacts their intentions to adopt cryptocurrency in business settings.  ...  However, the adoption of cryptocurrency remains low among stakeholders, including e-retailers.  ...  Integrating virtual reality devices into the body: Effects of technological embodiment on customer engagement and behavioral intentions toward the destination. J. Travel Tour.  ... 
doi:10.3390/su14020641 fatcat:ezk66o2w4nautlnxcmylar6pgq

The Metaverse as the Digital Leviathan: A Case Study of Bit.Country

2022 Journal of Applied Business and Economics  
In this case study, the current state of nation-states was viewed through the lens of Hobbes' The Leviathan to assess whether decentralized metaverses will transition to a Digital Leviathan using Bit.Country  ...  The case study was conducted through interviews and uncovered that the quadruple bottom line implemented in conventional business could be transferrable to a digital world built on various blockchains,  ...  ACKNOWLEDGEMENTS The authors would like to thank Ray Lu and Shannon Christie, two of the co-founders of Bit.Country, for their agreement to collaborate on the creation of this case study.  ... 
doi:10.33423/jabe.v24i2.5099 fatcat:53bxumlumrdvbctqie7jorajci

The adoption of cryptocurrency as a disruptive force: Deep learning-based dual stage structural equation modelling and artificial neural network analysis

Ghazanfar Ali Abbasi, Lee Yin Tiew, Jinquan Tang, Yen-Nee Goh, Ramayah Thurasamy, Dejan Dragan
2021 PLoS ONE  
The model was further validated by introducing a new path model compared to the original UTAUT2 model and the moderating role of personal innovativeness between performance expectancy and price value,  ...  The Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model were extended with the inclusion of trust and personnel innovativeness.  ...  Notwithstanding that UTAUT2 model has already a satisfactory view towards adopting new technology, proposing a model which is efficient enough to interpret users' intention towards a sensitive technology  ... 
doi:10.1371/journal.pone.0247582 pmid:33684120 fatcat:oqlteixzuzfsjpncii2rzddf4i

D5.1 Key Technologies for IoT Data Management Benchmark

Gino Ciccone, Giuseppina Carpentieri, Cosimo Zotti, Alexandr Tardo, Marek Bednarczyk, Tadeusz Puźniakowski, Paweł Czapiewski, Stefan Köpsell, Kumar Sharad, José Luis Cárcel, Joan Meseguer, Ahmad Nimr (+9 others)
2021 Zenodo  
The deliverable describes the state of the current technologies and the planned innovations applied to internet-of-things (IoT) data management and applications.  ...  This document describes the approach of iNGENIOUS to develop an interoperable layer, aggregating data coming from different existing and forthcoming IoT technologies.  ...  This can make new opportunities for securing the wallets: • Multi-Signature multiple factor access, one owner has many devices and carriers which act like different wallets containing one of private keys  ... 
doi:10.5281/zenodo.5084813 fatcat:ssllddbo7rda7fadthu26ajrzu

Towards understanding and improving the crypto-asset user experience

Artemij Voskobojnikov
2021
They also owned fewer crypto-assets and used custodial wallets more often. We also identified factors influencing the adoption intention and behavior and found self-efficacy to be a major deterrent.  ...  The crypto-asset domain has grown substantially over the past years, both in terms of overall market capitalization, available crypto-assets, and the number of users.  ...  Interestingly, although expressing opposing views, both of these statements hint at PN3's and PN8's inadequate mental models about crypto-assets.  ... 
doi:10.14288/1.0401956 fatcat:bw2cgyduuffaphawr2mozsqnsm

A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues

Maria Stoyanova, Yannis Nikoloudakis, Spyridon Panagiotakis, Evangelos Pallis, Evangelos K. Markakis
2020 IEEE Communications Surveys and Tutorials  
Furthermore, this work provides an overview of the past and current theoretical models in the digital forensics science.  ...  infrastructure and the resulting multi-jurisdictional litigations.  ...  Instead of being confined to a single host or data centre, it is rather dispersed among different cloud recourses, personal networkattached storage units, crypto-currency wallets, online social networks  ... 
doi:10.1109/comst.2019.2962586 fatcat:crd72xiwnzekjkaf4xkrixvpsu

Advanced Cyber Security threats digest and analysis

Evangelos Markakis
2019 Zenodo  
Additionally, the document provides a thorough and comprehensive taxonomy of cyber-threats and the existing research concerning cybersecurity in the Healthcare domain.  ...  The purpose of this document is to research and elaborate upon the current existing and emerging standards on cybersecurity and the corresponding directives and regulations from the European Union.  ...  havoc on a global scale, followed by other tools such as crypto-miners, wallet-swiping trojans, and malicious code that exploited firmware and hardware vulnerabilities [11] .  ... 
doi:10.5281/zenodo.3521666 fatcat:koiwtjej3fgmnkgj643xuruak4

Integration of Adaptive Technologies with Healthcare for the Early Identification and Control of COVID-19 Pandemic Disease

Geetha Poornima K, Rajeshwari M, Vinayachandra, Krishna Prasad K
2020 Zenodo  
The impact of the COVID-19 pandemic has spread all over the world and it has affected voluminously everyday lives of billions.  ...  It also addresses new ubiquitous technologies such as AI, Machine Learning, and Big Data Analytics with new innovative methods to integrate the solutions, including wearable devices, RFID, GPS, mobile  ...  To decrease the risk of infection, telemedicine, remote patient care, etc. are extensively adopted. Healthcare service providers have created new COVID-19 management models.  ... 
doi:10.5281/zenodo.4063845 fatcat:sbosizxu45a6zkynxardkwp4xy

Exploring Research in Blockchain for Healthcare and a Roadmap for the Future

Mohamad Hassan Kassab, Joanna DeFranco, Tarek Malas, Phillip Laplante, giuseppe destefanis, Valdemar Vicente Graciano Neto
2019 IEEE Transactions on Emerging Topics in Computing  
While the focus of applications of blockchain in practice has been to build distributed ledgers involving virtual tokens, the impetus of this emerging technology has now extended to the medical domain.  ...  The contributions of this paper are the following: (i) report the results of a systematic literature review conducted to identify, extract, evaluate and synthesize the studies on the symbiosis of blockchain  ...  Through a variety of related technologies, we can associate a user's device (e.g., smartphone) to the uniquely-signed and crypto-secure digital wallet as discussed above.  ... 
doi:10.1109/tetc.2019.2936881 fatcat:il2v5gwvxbcdziy2nc3enbqdou

Blockchain and Cryptocurrencies [chapter]

Neha Mason, Malka N. Halgamuge, Kamalani Aiyar
2021 Exploring the Convergence of Big Data and the Internet of Things  
The authors present the result of an analysis of 30 recently published peer-reviewed scientific publications and suggest various mechanisms that can help in the detection and prevention of illegal activities  ...  that currently account for a substantial proportion of cryptocurrency trading.  ...  Conflicts of Interest: The author declares no conflict of interest. Funding: This research received no external funding. Conflicts of Interest: The author declares no conflict of interest.  ... 
doi:10.4018/978-1-7998-6650-3.ch007 fatcat:ubsh5ikff5hpzk52l65hai7lgy

Integration of Adaptive Technologies with Healthcare for the Early Identification and Control of COVID-19 Pandemic Disease

Geetha Poornima K., Rajeshwari M., Vinayachandra, Krishna Prasad K.
2020 International Journal of Health Sciences and Pharmacy  
The impact of the COVID-19 pandemic has spread all over the world and it has affected voluminously everyday lives of billions.  ...  It also addresses new ubiquitous technologies such as AI, Machine Learning, and Big Data Analytics with new innovative methods to integrate the solutions, including wearable devices, RFID, GPS, mobile  ...  To decrease the risk of infection, telemedicine, remote patient care, etc. are extensively adopted. Healthcare service providers have created new COVID-19 management models.  ... 
doi:10.47992/ijhsp.2581.6411.0066 fatcat:ny46olzd2nc3dmzwoyixhnffza

EXPLORING AVENUES IN BANKING, MANAGEMENT, IT, EDUCATION & SOCIAL SCIENCES

Dr. P.S. Aithal, Prof. Amith D. Menezes
2019 Zenodo  
The Proceedings Book of One Day National Conference  ...  ICCT has made a major impact due its associated new business models called e-business model and m-business models.  ...  The `model' solutions they adopt to deal with stress and conflict are often full of negativity.  ... 
doi:10.5281/zenodo.3369601 fatcat:36pzraub2zgx3hxb3gnowzrya4

Investigating And Prosecuting Cyber Crime: Forensic Dependencies And Barriers To Justice

Cameron S. D. Brown
2015 Zenodo  
The primary goal of this paper is to raise awareness regarding legal loopholes and enabling technologies, which facilitate acts of cyber crime.  ...  In this way, the author invites the reader to contemplate the reality of a cyber crime inquiry and the practical limits of the criminal justice process.  ...  This research is predominantly based on materials written in English that are orientated towards the common law model of justice.  ... 
doi:10.5281/zenodo.22387 fatcat:xjbjc5hs7zcnxnrnlukkkenxi4

A Work Life Balance of Employees and Its Effect on Emotional Intelligence

Dr. G. SUGANTHI
2019 Zenodo  
However, there is a important to investigate increasing cases of work life problems of school teachers.  ...  The percentage of analysis from the table was found majority of teaching staffs on the any WLB dimensions. Inter item Convergent validity was high.  ...  This study tries to examine the impact of infrastructural development on the Economic and Social development in rural areas.  ... 
doi:10.5281/zenodo.5476173 fatcat:5rro63pefzbpxigfgnilhazy5a
« Previous Showing results 1 — 15 out of 49 results