• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 46
  • 12
  • 8
  • 6
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 85
  • 19
  • 14
  • 14
  • 13
  • 11
  • 11
  • 10
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Komparace právních podmínek užití kryptoměn ve Švýcarsku, Spojených státech amerických a Japonsku / Comparison of the legal regulation of crypto-currency in Switzerland, the United States of America and Japan

Yakimenka, Aliaksandr January 2017 (has links)
Resume In my graduation thesis I concentrated on the comparative characteristics of the legal regulation of crypto-currency in three countries: Switzerland, the United States of America and Japan. Because it is a very crucial and challenging topic today and many governments are trying to find the solution for it. These countries and their legal regulations are considered to be the best in the world in many aspects, that other countries are trying to be equal to and they took leading position in the creation of the legal base for crypto-currency. The goal of my graduation thesis is to provide comparative analysis of the legal regulation of crypto-currency in the countries that I selected. This problem was solved by wide spread usage of laws and regulations of these countries, internet resources that are studying this question as well as the knowledge obtained during my studies at the faculty. Comparative, descriptive and synthetic-analytical methods were used to resolve the given problem of my thesis. My graduation work is divided into parts for easier comprehension of such complicated and specific topic. The thesis includes introduction, the first part which gives general knowledge about the crypto-currency, the second part which is dedicated to the principals of crypto-currency functioning, Bitcoin is...
32

“Now You See It. Now You Don't”- How Cryptocurrencies Enable Money Laundering

Gonçalves, Maria January 2019 (has links)
Money laundering is a non-violent crime, however when successfully executed it has a negative impact on society, as it tends to support other illicit activities, including terrorism. As was the case for other financial crimes, the internet opened the door for new tools that enable criminals to launder their illicit profits. One of these tools is cryptocurrency.This paper takes the form of a literature review, in order to find the most relevant and important work within the research topic, and to identify central issues associated with laundering money through cryptocurrencies. It aims to explain the crypto-laundering process, methods and features that make cryptocurrencies tempting to criminals when searching tools to launder their illicit profits.The findings of this literature review demonstrate that cryptocurrencies have more characteristics that appeal to launderers than deters them. The results also show the existence of different methods that are employed in crypto-laundering and how it mirrors traditional money laundering stages, making evident that crypto-laundering is a real threat. Due to these results, it is essential that the criminological community delve into financial crimes perpetrated in the online environment.
33

Platforma pro sběr kryptoměnových adres / Platform for Cryptocurrency Address Collection

Bambuch, Vladislav January 2020 (has links)
Cílem této práce je vytvořit platformu pro sběr a zobrazování metadat o kryptoměnových adresách z veřejného i temného webu. K dosažení tohoto cíle jsem použil technologie zpracování webu napsané v PHP. Komplikace doprovázející automatické zpracování webových stránek byly vyřešeny techonologí Apache Kafka a jejími schopnosti škálování procesů. Modularita platformy byla dosažena pomocí architektury microservices a Docker containerization. Práce umožňuje jedinečný způsob, jak hledat potenciální kriminální aktivity, které se odehrály mimo rámec blockchain, pomocí webové aplikace pro správu platformy a vyhledávání v extrahovaných datech. Vytvořená platforma zjednodušuje přidávání nových, na sobě nezávislých modulů, kde Apache Kafka zprostředkovává komunikaci mezi nimi. Výsledek této práce může být použit pro detekci a prevenci kybernetické kriminality. Uživatelé tohoto systému mohou být orgány činné v trestním řízení nebo ostatní činitelé a uživatelé, zajímající se o reputaci a kreditibilitu kryptoměnových adres.
34

Systém Excalibur - implementace SSO / Excalibur System - SSO Implementation

Chripko, Juraj January 2021 (has links)
Cieľom systému Excalibur je presunúť autentifikáciu od hesiel používaných v súčastnosti ku bezheslovej budúcnosti. Zámerom tejto práce je integrácia systému Excalibur s webovými bezheslovými protokolmi SAML a FIDO2.    Štandard SAML bol integrovaný do systému Excalibur a úspešne otestovaný s niekoľkými známymi aplikáciami. Excalibur má na starosti samotnú autentifikáciu a manažment používateľov a SAML je použitý na predanie týchto informácii aplikáciam tretích strán.   FIDO2 je, na druhú stranu, kompletný autentifikačný štandard, ktorý môže byť do systému Excalibur integrovaný viacerými spôsobmi. Ako najsľubnejší spôsob sa javí výmena autentifikačného mechanizmu systému Excalibur za FIDO2, ale slabá podpora štandardu a chýbajúce funkcie to zatiaľ nedovoľujú.
35

Analýza šifrovacích metod pro klonování disků / Analysis of Encipherement Methods for Disk Cloning

Chromečka, Jiří January 2016 (has links)
The presented text deals with designing of a multilingual application and its following implementation in the C++ language. The application encrypts disk volumes with Microsoft Windows system using symmetric cryptography and password authentication, where the password security strength is verified. Securing the sensitive data is one of the important security goals in area of information technology. The symmetric cryptography uses the same key for both the encryption and the decryption and due to its speed it is suitable for the data storage encryption. For the higher security it is possible to encrypt a whole disk volume with sensitive data.
36

An analysis of the Zimbabwean money laundering and proceeds of crime amendment act of 2018

Nyarugwe, Raymond Tendai January 2020 (has links)
Magister Legum - LLM / Financial crimes are transnational in nature, and no country is immune from them. They are an international problem that can best be solved through international cooperation on a global scale. It is therefore necessary to have rules and norms that apply worldwide in order to deal with these crimes comprehensively.1 Of particular prominence is the crime of money laundering (ML), which may be defined as the processing of criminal proceeds to disguise their illegal origin.2 This term is relatively new and is broadly defined, with the definitions varying from jurisdiction to jurisdiction. In Zimbabwe, money laundering acts are listed in the Money Laundering and Proceeds of Crime Act 34 of 2013 (the Principal Act).3 The Financial Action Task Force (FATF) is the main international inter-governmental body formed specifically to set AML standards and to promote their implementation globally.
37

How to combat the rise of Ransomware

Martell, Angelica January 2022 (has links)
In today’s fast-evolving market, cybercriminals and threat actors are also developing. During and after the Covid-19 pandemic, ransomwares have become more frequent, and each year they are getting more advanced and harder to detect.Today, according to sources, there is barely anything stopping ransomware. On the other hand, security products are also improving and progressing with behavioral algorithms, machine learning, and AI. So, the struggle continues…From beginning to end, this thesis will demonstrate many aspects of ransomware. From a brief history, ransomware types and how they function. What the primary entry points are, infection vectors, and main threats.The focus of this study is to help businesses and organizations to protect themselves against ransomware. It will show how to be better equipped and prepared by building a defense strategy that includes the four steps, prevent, detect, defend, and recover.An experiment, market research, and a literature study will be performed. The result will show how some well-known security solutions perform when faced with ransomware.
38

Investigating Security Aspects of Cryptocurrency Wallets - a Systematic Study / Undersökning av säkerhetsaspekter på plånböcker för kryptovalutor - en systematisk studie

Schmid, Philipp, Houy, Sabine January 2021 (has links)
Cryptocurrencies are gaining prominence among individuals and companies alike, resulting in the growing adoption of so-called cryptocurrency wallet applications, as these simplify carrying out transactions. These wallets are available in a myriad of different forms and specifications. For example, there are hardware and software wallets. The latter can be divided into mobile, web, and desktop wallets. All of them offer attackers various ways to exploit vulnerabilities and steal money from victims. It is hard to keep track of this multitude of options and thus choose the right cryptocurrency wallet. For this reason, in this thesis, we collect the findings from previous literature to provide an overview of the various attack surfaces, possible countermeasures, and further research. Our systematic study has shown that there is still a considerable variety of attack vectors, which we have divided into six subcategories, (i) Memory and Storage, (ii) Operating Systems, (iii) Software Layer, (iv) Network Layer, (v) Blockchain Protocol, and (vi) Others. Some of the identified vulnerabilities have currently no solutions at all or hardly applicable countermeasures. However, some are easy to fix and simple to implement. One of the essential measures is to raise awareness of the identified weaknesses and the associated mitigations, if any, among the involved stakeholders, including users, developers, and exchanges.
39

Blockkedjeteknikens påverkan på utlandsbetalningar

Hallberg, Christoffer, Jansson, Daniel January 2018 (has links)
Den snabba framfarten av blockkedjetekniken samt teknikens disruptiva möjligheter inom den finansiella sektorn har lett fram till vad denna studien undersöker; blockkedjeteknikens påverkan på utlandsbetalningar och huruvida marknaden för utlandsbetalningar påverkas av den ökade utforskningen och användningen av tekniken. Faktorerna kostnad tid och säkerhet kopplat till utlandsbetalningar analyseras för att ta reda på hur dessa skulle kunna påverkas. För att lättare få en förståelse för kostnader, tid och säkerhet kopplat till utlandsbetalningar inom bankindustrin utreds även hur en traditionell utlandsbetalning går till. När en ny disruptiv teknik växer fram och börjar användas i allt större omfång kan det frambringa konsekvenser som påverkar hela branschen. Därav tar denna studie även upp hur den finansiella marknaden kan komma att förändras till följd av blockkedjetekniken och vad det kan innebära för organisationer. Fintech-bolag har på senare år tagit allt större plats på den finansiella marknaden och fortsätter att styrka deras marknadsposition. Samtidigt som banker måste anpassa sig till teknikens utveckling måste de även förhålla sig till fintech-bolagens starka framväxt. Många storbanker investerar i fintech-bolag för att på så sätt kunna följa med den snabba digitala utvecklingen. Allianser mellan banker och fintech-bolag benämns fintech 2.0. Tack vare teknikens snabba utveckling i samband med digitaliseringen är det svårt att förutspå vad som kommer att definiera den finansiella sektorn i framtiden. Fortsatt forskning inom området är nödvändigt för att förstå hur processer, organisationer och marknader kommer att förändras till följd av utvecklingen. / The rapid progress of blockchain technology and the disruptive possibilities of technology in the financial sector has led to what this study examines; the impact of blockchain technology on cross-border payments and whether the market for foreign payments is affected by the increased exploration and use of the technology. Factors such as cost, time and security linked to cross-border payments are analyzed to find out how these could be affected. In order to get an understanding of costs, time and security linked to cross-border payments in the banking industry, we also investigate how a traditional cross-border payment is being executed. When a new disruptive technique emerges and begins to be used in a wider range, it can cause consequences that affect the entire industry. Hence, this study also examines how the financial market may change as a result of blockchain technology and what it might mean to organizations. In recent years, fintech companies have taken more place in the financial market and continued to strengthen their market position. While banks must adapt to the technology development, they must also relate to the strong growth of the fintech companies. Many major banks invest in fintech companies in order to be able to follow the fast digital development. Alliances between banks and fintech companies are called fintech 2.0. Thanks to the rapid development of technology in connection with digitization, it is difficult to predict what will define the financial sector in the future. Continuing research in the field is necessary to understand how processes, organizations and markets will change as a result of the development.
40

Cryptocurrencies, Remittances and Exchange Rates : A quantitative study on the rapid growth of crypto adoption in developing countries

Fahlander, Felix January 2022 (has links)
In this study, a total of nine regression models were performed with three different dependent variables, nine independent variables, in three different country groups, to find out the relationship between crypto adoption and remittances, monetary uncertainty and financial inclusion. The results show a statistically significant relationship between increased crypto adoption and historical exchange rate volatility in both high- and low-income countries. Peer-to-peer exchange trade volume in low-income countries also seems to be affected by the proportion of the population that sends remittances. Based on these findings, it seems like cryptocurrencies are not only seen as asset substitution, i.e., something to risk diversify the investment portfolio with, it also seems to be used as a currency substitution.

Page generated in 0.0218 seconds