Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Artificial intelligence (1)
- Blockchain (1)
- Blockchains (1)
- Case study (1)
- Cryptocurrencies (1)
-
- Cyber threats (1)
- Data auditing (1)
- Data deduplication (1)
- Data privacy (1)
- Dynamic pricing (1)
- Fair arbitration (1)
- FireEye (1)
- Machine learning (1)
- Nature of work (1)
- Network effects (1)
- New technologies (1)
- Sequential innovation (1)
- Software maintenance (1)
- Strategic consumers (1)
- Two-sided platforms (1)
Articles 1 - 4 of 4
Full-Text Articles in Business
Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo
Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo
Research Collection School Of Computing and Information Systems
Data auditing enables data owners to verify the integrity of their sensitive data stored at an untrusted cloud without retrieving them. This feature has been widely adopted by commercial cloud storage. However, the existing approaches still have some drawbacks. On the one hand, the existing schemes have a defect of fair arbitration, i.e., existing auditing schemes lack an effective method to punish the malicious cloud service provider (CSP) and compensate users whose data integrity is destroyed. On the other hand, a CSP may store redundant and repetitive data. These redundant data inevitably increase management overhead and computational cost during the …
Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun
Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun
Research Collection School Of Computing and Information Systems
Cryptocurrencies have become very popular in recent years. Thousands of new cryptocurrencies have emerged, proposing new and novel techniques that improve on Bitcoin's core innovation of the blockchain data structure and consensus mechanism. However, cryptocurrencies are a major target for cyber-attacks, as they can be sold on exchanges anonymously and most cryptocurrencies have their codebases publicly available. One particular issue is the prevalence of code clones in cryptocurrencies, which may amplify security threats. If a vulnerability is found in one cryptocurrency, it might be propagated into other cloned cryptocurrencies. In this work, we propose a systematic remedy to this problem, …
Platform Pricing With Strategic Buyers: The Impact Of Future Production Cost, Mei Lin, Xiajun Amy Pan, Quan Zheng
Platform Pricing With Strategic Buyers: The Impact Of Future Production Cost, Mei Lin, Xiajun Amy Pan, Quan Zheng
Research Collection School Of Computing and Information Systems
Two-sided platforms are often coupled with exclusive hardware products that connect two sides of users, the consumers of the hardware product (i.e., buyers) and the application developers (i.e., sellers). The hardware product in the platform business model introduces three important issues that are not yet well understood in the literature of platform pricing: potentially downward-trending production cost, product quality improvements, and consumers' strategic behaviors. Using analytical modeling, our study explicitly factors in these issues in analyzing a monopoly platform owner's two-sided pricing problem. The platform sequentially introduces and prices quality-improving hardware products, for which the costliness of quality may decrease. …
The Future Of Work Now: Cyber Threat Attribution At Fireeye, Thomas H. Davenport, Steven M. Miller
The Future Of Work Now: Cyber Threat Attribution At Fireeye, Thomas H. Davenport, Steven M. Miller
Research Collection School Of Computing and Information Systems
One of the most frequently-used phrases at business events these days is “the future of work.” It’s increasingly clear that artificial intelligence and other new technologies will bring substantial changes in work tasks and business processes. But while these changes are predicted for the future, they’re already present in many organizations for many different jobs. The job and incumbent described below is an example of this phenomenon. It’s a clear example of an existing job that’s been transformed by AI and related tools.