Michael L. Spafford, Daren F. Stanaway and Sabin Chung
To analyze the CFTC’s approach to regulating cryptocurrencies and blockchain technologies in light of their cross-border nature, limitations on the CFTC’s extraterritorial…
Abstract
Purpose
To analyze the CFTC’s approach to regulating cryptocurrencies and blockchain technologies in light of their cross-border nature, limitations on the CFTC’s extraterritorial authority, and the CFTC’s prerogative to work cooperatively with foreign regulators.
Design/methodology/approach
Discusses the principles set forth in CFTC Chairman Christopher Giancarlo’s White Paper regarding cross-border swap regulation; analyzes the similar nature of cross-border issues arising from regulation of cryptocurrencies and blockchain technologies; examines regulations and guidance implemented by foreign authorities in the blockchain and cryptocurrency space; and assesses the limitations of the CFTC’s extraterritorial authority.
Findings
The principles set forth in Chairman Giancarlo’s White Paper regarding cross-border swap regulation apply equally to blockchain technologies and cryptocurrencies, and as such, the CFTC may wish to pursue an analogous approach to regulating cryptocurrencies and blockchain technologies.
Practical implications
The CFTC should exercise deference to and cooperate with foreign counterparts to regulate cryptocurrencies and blockchain technologies that traverse international borders, thereby avoiding overlapping and potentially conflicting regulation while fostering an innovative growth environment for emerging technologies.
Originality/value
In-depth analysis and insight from experienced professionals in the CFTC and cross-border investigations and enforcement space.
Details
Keywords
Identifies key activities that network users can perform in orderto use the network effectively. Offers recommended reading, frombeginner to expert user status. Explains some…
Abstract
Identifies key activities that network users can perform in order to use the network effectively. Offers recommended reading, from beginner to expert user status. Explains some commonly used terms (e.g. Turbo Gopher with Veronica!). Lists useful Internet resources.
Michael F. Schwartz and John S. Quarterman
Explains the necessity for measurement of Internet growth so thatcapacity, commercial potential, etc. may be planned and assessed. Arguesthat this cannot be measured merely by…
Abstract
Explains the necessity for measurement of Internet growth so that capacity, commercial potential, etc. may be planned and assessed. Argues that this cannot be measured merely by packet counts and user registrations. Presents detailed analysis of over 13,000 sites, worldwide. Develops a mathematical model which can be used to predict growth, by individual countries and globally. Offers further topics for future research.
Details
Keywords
IT is too early to examine what the change of Government may portend for libraries sustained attract malign attention from any party. We are aware enough, however, that a time of…
Abstract
IT is too early to examine what the change of Government may portend for libraries sustained attract malign attention from any party. We are aware enough, however, that a time of financial stringency lies ahead for every public activity. In book production, the restrictions on imports may worsen a position which is bad enough as it is. There may not be a sinister intention in the gesture of cutting the salaries of Cabinet Ministers by a sum which for several of them represents about £25 or about a half crown a week on such salaries as librarians earn. We hope there is not. Although all good Britons will make necessary sacrifices; but they want to be sure that they are necessary and not, as usually is the case, merely attacks on public servants. We are told that there will be no Geddes axe this time, but experience shows that the politician can always find a way of reversing a statement in what he imagines to be the public interest. Fortunately those likely to be affected are better organized than they were in the early twenties.
What is hacking? Is it an art form to explore computers, a means to accumulate information as proof of an electronic passage through security systems and around passwords? Or is…
Abstract
What is hacking? Is it an art form to explore computers, a means to accumulate information as proof of an electronic passage through security systems and around passwords? Or is it an illegal venture whose sole purpose is mischief, digital anarchy, a form of revolution against the government, corporations, and other powers that own mainframes and their associated data files? The issue of hacking has erupted with even more vigor this year with the conviction of Robert T. Morris, the author of the Internet worm, along with the recent support of hackers by Mitch Kapor, founder of the Lotus Development Corp. A new aggressive stance by the U.S. Justice Department to track down specialists stealing passwords and credit card numbers has created sensational headlines along with a number of new virulent viruses on personal computers.
Danielle Mihram, G. Arthur Mihram and Caroline Gilson
To report on the Annual Meeting of the American Association for the Advancement of Science held in St Louis, Missouri in February 2006.
Abstract
Purpose
To report on the Annual Meeting of the American Association for the Advancement of Science held in St Louis, Missouri in February 2006.
Design/methodology/approach
An overview of the seminars, symposia, workshops and presentations at the conference.
Findings
The theme of the meeting was Grand Challenges, Great Opportunities. The meeting was attended by 4,000 registrants, 105 exhibitors; and 900 members of the press. The meeting highlighted the academic role and infrastructure of technology in different science applications, including publishing, and national policy.
Originality/value
A report of interest to library and information management professionals.
Details
Keywords
In this article the historical development of computer crime is traced and analysed. Some major examples of the phenomenon are examined with particular reference to financial and…
Abstract
In this article the historical development of computer crime is traced and analysed. Some major examples of the phenomenon are examined with particular reference to financial and commercial information systems and institutions. The varied motivations of computer criminals are also considered. Finally, some lessons for today's financial and commercial IT communities are offered.
Sheshadri Chatterjee, Arpan Kumar Kar, Yogesh K. Dwivedi and Hatice Kizgin
The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.
Abstract
Purpose
The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.
Design/methodology/approach
A conceptual model has been developed for identifying factors preventing cybercrimes. The conceptual model was validated empirically with a sample size of 315 participants from India. Data were analyzed using structural equation modeling with SPSS and AMOS softwares.
Findings
The study reveals that the “awareness of cybercrimes” significantly influences the actual usage of technology to prevent cybercrimes in Smart Cities of India. The study reveals that government initiative (GI) and legal awareness are less influential in spreading of the awareness of cybercrimes (AOC) to the citizens of the proposed smart cities.
Research limitations/implications
The conceptual model utilizes two constructs from the technology adoption model, namely, perceived usefulness and ease of use. The study employs other factors such as social media, word of mouth, GIs, legal awareness and organizations constituting entities spreading awareness from different related literature works. Thereby, a comprehensive theoretical conceptual model has been proposed which helps to identify the factors that may help in preventing cybercrimes.
Practical implications
This study provides an insight to the policy maker to understand several factors influencing the AOC of the citizens of the proposed Smart Cities of India for the prevention of cybercrimes.
Originality/value
There are few existing studies analyzing the effect of AOC to mitigate cybercrimes. Thus, this study offers a novel contribution.