Blockchain technology is predicted to have a major impact on the intellectual property (IP) ecosystem. More and more projects are being launched, both in the public and private sector. The World Intellectual Property Organization (WIPO) has built up a Blockchain Task Force and is preparing a new WIPO Standard to encompass all types of IP rights and the entire IP lifecycle; the German Government published a strategy paper on blockchain with a chapter on applications in the creative arts sector; a European Blockchain Service Infrastructure is being built up; the European Union Intellectual Property Office (EUIPO) established an Anti-Counterfeiting Forum as part of the broader EU strategy to create a blockchain ecosystem and now has its own blockchain for trademarks and designs in the EU. Furthermore, LVMH, with brands such as Louis Vuitton, developed its own blockchain to track luxury goods; Kodak started a blockchain initiative for image rights management; music and film streaming are offered on blockchain platforms; sports clubs discuss micro-licensing of their IP rights; digital fashion is created for distribution using blockchain. Moreover, news abounds of blockchain-based non-fungible tokens (NFTs) representing basically everything imaginable – both digital and physical – in the IP ecosystem, to track the origin of art and all manner of products. However, interestingly enough, as early as 2012 a whitepaper was published linking the idea of smart property by Nick Szabo and digital collectibles to blockchain and at the same time introducing the first kind of NFTs, coloured coins. The developments in the blockchain space, including in the area of IP, are progressing at a rapid pace, both from a technological and a value perspective. For example, the value of crypto art traded on blockchain from 2018 to 2020 was estimated at about 15 million US Dollar (with about 8.2 million US Dollar worth of crypto artwork in December 2020 ). In March 2021, the most expensive piece of artwork linked to an NFT in history was sold by Mike Winkelmann (Beeple) for 42,329.453 Ether, at the time worth 69,346,250 million US Dollar. The NFT marketplace OpenSea has set and then beat daily records several times, reaching a new peak of 322,982,301 million US Dollar of trading volume on 29 August 2021. Nevertheless, many applications for IP matters are still in their infancy. The reason for this might lay, aside from the rather complex technological details, in uncertainties about their regulation and legal standing in court, such as the recognition of a legal binding smart contract. Therefore, the article introduces the very basic features of blockchain technology and blockchain-based IP applications. The article then dives into concrete IP use cases that are currently offered and developed on the market. It also gives a general overview of opportunities and existing challenges for the IP ecosystem. The legal perspective is mainly a German and European one.
{"title":"Blockchain Technology and Intellectual Property – A Basic Introduction","authors":"Julia Hugendubel","doi":"10.2139/ssrn.3917801","DOIUrl":"https://doi.org/10.2139/ssrn.3917801","url":null,"abstract":"Blockchain technology is predicted to have a major impact on the intellectual property (IP) ecosystem. More and more projects are being launched, both in the public and private sector. The World Intellectual Property Organization (WIPO) has built up a Blockchain Task Force and is preparing a new WIPO Standard to encompass all types of IP rights and the entire IP lifecycle; the German Government published a strategy paper on blockchain with a chapter on applications in the creative arts sector; a European Blockchain Service Infrastructure is being built up; the European Union Intellectual Property Office (EUIPO) established an Anti-Counterfeiting Forum as part of the broader EU strategy to create a blockchain ecosystem and now has its own blockchain for trademarks and designs in the EU. Furthermore, LVMH, with brands such as Louis Vuitton, developed its own blockchain to track luxury goods; Kodak started a blockchain initiative for image rights management; music and film streaming are offered on blockchain platforms; sports clubs discuss micro-licensing of their IP rights; digital fashion is created for distribution using blockchain. Moreover, news abounds of blockchain-based non-fungible tokens (NFTs) representing basically everything imaginable – both digital and physical – in the IP ecosystem, to track the origin of art and all manner of products. However, interestingly enough, as early as 2012 a whitepaper was published linking the idea of smart property by Nick Szabo and digital collectibles to blockchain and at the same time introducing the first kind of NFTs, coloured coins. The developments in the blockchain space, including in the area of IP, are progressing at a rapid pace, both from a technological and a value perspective. For example, the value of crypto art traded on blockchain from 2018 to 2020 was estimated at about 15 million US Dollar (with about 8.2 million US Dollar worth of crypto artwork in December 2020 ). In March 2021, the most expensive piece of artwork linked to an NFT in history was sold by Mike Winkelmann (Beeple) for 42,329.453 Ether, at the time worth 69,346,250 million US Dollar. The NFT marketplace OpenSea has set and then beat daily records several times, reaching a new peak of 322,982,301 million US Dollar of trading volume on 29 August 2021. Nevertheless, many applications for IP matters are still in their infancy. The reason for this might lay, aside from the rather complex technological details, in uncertainties about their regulation and legal standing in court, such as the recognition of a legal binding smart contract. Therefore, the article introduces the very basic features of blockchain technology and blockchain-based IP applications. The article then dives into concrete IP use cases that are currently offered and developed on the market. It also gives a general overview of opportunities and existing challenges for the IP ecosystem. The legal perspective is mainly a German and European one.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114148692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Increasingly dominant online platforms are collecting and sharing user data across multiple markets, raising red flags as regards privacy, as well as potential anti-competitive abuses. We analyse competition among two platforms that compete in prices and advertising quantities, with one platform collecting data in a related market where it is dominant. We find that data collection is socially excessive whenever market competition is at an intermediate level, whereas weak competition leads to too little data collection. We then use this framework to examine a possible regulatory approach to privacy protection, i.e. empowering users to control the amount of data that can be collected from them. Surprisingly, we find that in markets where advertising is effectively targetted, but competition is weak, user control of data can increase data collection, thus degrading privacy. In all other markets however privacy improves. We also analyse the welfare implications of such a policy.
{"title":"Endogenous Data Collection in Platform Markets: Privacy and Welfare","authors":"Gaurav Jakhu, Prabal Roy Chowdhury","doi":"10.2139/ssrn.3867746","DOIUrl":"https://doi.org/10.2139/ssrn.3867746","url":null,"abstract":"Increasingly dominant online platforms are collecting and sharing user data across multiple markets, raising red flags as regards privacy, as well as potential anti-competitive abuses. We analyse competition among two platforms that compete in prices and advertising quantities, with one platform collecting data in a related market where it is dominant. We find that data collection is socially excessive whenever market competition is at an intermediate level, whereas weak competition leads to too little data collection. We then use this framework to examine a possible regulatory approach to privacy protection, i.e. empowering users to control the amount of data that can be collected from them. Surprisingly, we find that in markets where advertising is effectively targetted, but competition is weak, user control of data can increase data collection, thus degrading privacy. In all other markets however privacy improves. We also analyse the welfare implications of such a policy.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121900133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this chapter we discuss smart contracts and functionalities they afford, especially in combination with blockchain. 6.1. The rise of Ethereum. 6.1.1. History. 6.1.2. Ethereum is “different”. 6.2. Smart contracts. 6.2.1. Smart contracts on Ethereum. 6.2.2. What do smart contracts need a blockchain for? 6.3. Tokens. 6.3.1. What are tokens? 6.3.2. Use of tokens. 6.4. Initial coin offering. 6.5 Non-fungible tokens. 6.5.1 NFTs and Smart contracts do not solve digital art ownership problems. 6.5.2. New markets enabled by NFTs. 6.6. DAPPS. 6.7 Blockchain governance, DAPPS and smart contracts. For Chapter 1 (Introduction), see https://ssrn.com/abstract=3135021. For Chapter 2 (Means of Exchange: Ever-present Competition), see https://ssrn.com/abstract=3135028. For Chapter 3 (Platform-based Currencies), see https://ssrn.com/abstract=3135030. For Chapter 4 (Bitcoin and Emergence of Cryptocurrencies), see https://ssrn.com/abstract=3135043. For Chapter 5 (The Rich Land of Crypto), see https://ssrn.com/abstract=3135057. For Chapter 6 (Smart Contracts and Blockchain), see https://ssrn.com/abstract=3894110. For Chapter 7 (Enterprise Blockchains), see https://ssrn.com/abstract=3894117. For Chapter 8 (Conclusions: Future Full of Possibilities), see https://ssrn.com/abstract=3894118.
{"title":"Beyond Bitcoin: The Economics of Cryptocurrencies and Blockchain Technologies (Chapter 6: Smart Contracts and Blockchain)","authors":"Hanna Halaburda, M. Sarvary, Guillaume Haeringer","doi":"10.2139/ssrn.3894110","DOIUrl":"https://doi.org/10.2139/ssrn.3894110","url":null,"abstract":"In this chapter we discuss smart contracts and functionalities they afford, especially in combination with blockchain. 6.1. The rise of Ethereum. 6.1.1. History. 6.1.2. Ethereum is “different”. 6.2. Smart contracts. 6.2.1. Smart contracts on Ethereum. 6.2.2. What do smart contracts need a blockchain for? 6.3. Tokens. 6.3.1. What are tokens? 6.3.2. Use of tokens. 6.4. Initial coin offering. 6.5 Non-fungible tokens. 6.5.1 NFTs and Smart contracts do not solve digital art ownership problems. 6.5.2. New markets enabled by NFTs. 6.6. DAPPS. 6.7 Blockchain governance, DAPPS and smart contracts. For Chapter 1 (Introduction), see https://ssrn.com/abstract=3135021. For Chapter 2 (Means of Exchange: Ever-present Competition), see https://ssrn.com/abstract=3135028. For Chapter 3 (Platform-based Currencies), see https://ssrn.com/abstract=3135030. For Chapter 4 (Bitcoin and Emergence of Cryptocurrencies), see https://ssrn.com/abstract=3135043. For Chapter 5 (The Rich Land of Crypto), see https://ssrn.com/abstract=3135057. For Chapter 6 (Smart Contracts and Blockchain), see https://ssrn.com/abstract=3894110. For Chapter 7 (Enterprise Blockchains), see https://ssrn.com/abstract=3894117. For Chapter 8 (Conclusions: Future Full of Possibilities), see https://ssrn.com/abstract=3894118.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115297066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the most recent updates of its mobile operating systems, in April 2021 Apple implemented a new global App Tracking Transparency policy. The policy obliges app developers to display an additional (Apple-designed) prompt to request permission from end users for the developer to “track” the user, even when the user has already consented to the sharing of its data through the developer’s own consent tool. Apple presents the new policy as a step to enhance privacy. Others, including the authors of this article, see it as a “bombshell for third-party mobile ad tech” that, together with Google’s disabling of third-party cookies, only entrenches the data supremacy of Apple and Google, and forecloses data-based competition and consumer choice across the entire Apple ecosystem. These concerns in fact have already triggered an investigation by the French Autorité de la concurrence and a complaint of eight media and tech associations before the German Bundeskartellamt. From the standpoint of EU law, this article describes the relevant conduct and technicalities, its impact on end users’ data privacy and on competition, and how both interests may be weighed considering the existing legislation.
随着其移动操作系统的最新更新,苹果于2021年4月实施了新的全球应用程序跟踪透明度政策。该政策要求应用开发者显示一个额外的(苹果设计的)提示,以请求最终用户允许开发者“跟踪”用户,即使用户已经通过开发者自己的同意工具同意分享其数据。苹果公司表示,这项新政策是为了加强隐私保护。其他人,包括本文的作者,认为这是“第三方移动广告技术的重磅炸弹”,加上谷歌禁用第三方cookie,只会巩固苹果和谷歌的数据霸权,并在整个苹果生态系统中排除基于数据的竞争和消费者选择。事实上,这些担忧已经引发了法国新闻管理局(autorit de la conce)的调查,以及8家媒体和科技协会向德国联邦反垄断委员会(Bundeskartellamt)提出申诉。从欧盟法律的角度出发,本文描述了相关的行为和技术细节,其对最终用户数据隐私和竞争的影响,以及如何考虑现有立法来权衡这两种利益。
{"title":"Privacy by Default, Abuse by Design: EU Competition Concerns About Apple's New App Tracking Policy","authors":"Thomas Hoppner, Philipp Westerhoff","doi":"10.2139/ssrn.3853981","DOIUrl":"https://doi.org/10.2139/ssrn.3853981","url":null,"abstract":"With the most recent updates of its mobile operating systems, in April 2021 Apple implemented a new global App Tracking Transparency policy. The policy obliges app developers to display an additional (Apple-designed) prompt to request permission from end users for the developer to “track” the user, even when the user has already consented to the sharing of its data through the developer’s own consent tool. Apple presents the new policy as a step to enhance privacy. Others, including the authors of this article, see it as a “bombshell for third-party mobile ad tech” that, together with Google’s disabling of third-party cookies, only entrenches the data supremacy of Apple and Google, and forecloses data-based competition and consumer choice across the entire Apple ecosystem. These concerns in fact have already triggered an investigation by the French Autorité de la concurrence and a complaint of eight media and tech associations before the German Bundeskartellamt. From the standpoint of EU law, this article describes the relevant conduct and technicalities, its impact on end users’ data privacy and on competition, and how both interests may be weighed considering the existing legislation.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134328757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cryptocurrencies have gone a long way since their inception. While the conventional financial sector initially dismissed digital currencies as tools for crooks and speculators, the sector has made considerable progress in establishing itself as a genuine and (possibly) world-changing arena. There are still concerns about the long-term effects of widespread cryptocurrency usage. Many skeptics and environmentalists, in particular, have expressed worry about the energy consumption of cryptocurrency mining, which may result in increasing carbon emissions and climate change. The mainstreaming of cryptocurrency, as it has been dubbed, is clearly a significant event in the world of finance. It's also a significant event in the world of, well, the globe. Whether you like cryptocurrencies or oppose them, there's no denying that bitcoin and other proof-of-work blockchains use massive amounts of energy.
{"title":"Cryptocurrency & Its Impact on Environment","authors":"Kamshad Mohsin","doi":"10.2139/ssrn.3846774","DOIUrl":"https://doi.org/10.2139/ssrn.3846774","url":null,"abstract":"Cryptocurrencies have gone a long way since their inception. While the conventional financial sector initially dismissed digital currencies as tools for crooks and speculators, the sector has made considerable progress in establishing itself as a genuine and (possibly) world-changing arena. There are still concerns about the long-term effects of widespread cryptocurrency usage. Many skeptics and environmentalists, in particular, have expressed worry about the energy consumption of cryptocurrency mining, which may result in increasing carbon emissions and climate change. The mainstreaming of cryptocurrency, as it has been dubbed, is clearly a significant event in the world of finance. It's also a significant event in the world of, well, the globe. Whether you like cryptocurrencies or oppose them, there's no denying that bitcoin and other proof-of-work blockchains use massive amounts of energy.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124039937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The article presents the main trends in the application of blockchain technology and the basic principles of homeostatics in the formation of monetary policy: theoretical approaches and a methodological basis for conducting the study are investigated. The tools used for the research include literature and statistics. In the conclusion, examples and possible scenarios of predictive implementation for the use of homeostatics and blockchain technology in monetary policy are presented.
Analyzed data allowed us to conclude that distributed ledgers leveraged by the means of blockchain represent a model ruled by the principles of homeostatics. They are characterized by a similar structure (four layers) and can increase the transparency of the financial market. Being supported by the laws of homeostatics, blockchain simplifies processes compared to centralized solutions and enables flexible settlement models. In the analytical part, we assumed that the implementation of blockchain-based digital currencies may have a serious short- and long-term impact on monetary systems and put the role of Central Banks under question.
{"title":"The Use of Blockchain Technology and Homeostatic Principles in the Monetary Policies of States","authors":"Anton Dziatkovskii, Uladzimir Hryneuski","doi":"10.2139/ssrn.3849156","DOIUrl":"https://doi.org/10.2139/ssrn.3849156","url":null,"abstract":"The article presents the main trends in the application of blockchain technology and the basic principles of homeostatics in the formation of monetary policy: theoretical approaches and a methodological basis for conducting the study are investigated. The tools used for the research include literature and statistics. In the conclusion, examples and possible scenarios of predictive implementation for the use of homeostatics and blockchain technology in monetary policy are presented.<br><br>Analyzed data allowed us to conclude that distributed ledgers leveraged by the means of blockchain represent a model ruled by the principles of homeostatics. They are characterized by a similar structure (four layers) and can increase the transparency of the financial market. Being supported by the laws of homeostatics, blockchain simplifies processes compared to centralized solutions and enables flexible settlement models. In the analytical part, we assumed that the implementation of blockchain-based digital currencies may have a serious short- and long-term impact on monetary systems and put the role of Central Banks under question.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121855933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Spanish abstract: El mercado de la inversion de criptoactivos necesita todavia tiempo por madurar como demuestra la importante volatilidad de precios que sufren estos, haciendo dificil todavia que criptomonedas como bitcoin se conviertan el verdaderos y generalizados medios de intercambio, capaces de competir en este aspecto con las monedas fiat (yen, euro, dolar, libra, etc.). Logicamente sin cumplirse plenamente esta funcionalidad del dinero indicada de la propiedad de unidad de cuenta (significa que es la unidad de medida que se utiliza en una economia para fijar los precios, ya que el dinero es un sistema de registro contable) ni hablamos, quizas todo llegue a su tiempo. El creciente interes inversor institucional, ademas del consolidado individual, hace necesario el contar con instrumentos y metodologias de valoracion que permitan evaluar el cambio de valor temporal que sufren los criptomonedas en los criptomercados Cada vez son mas las voces reputadas que creen que el bitcoin y otros criptoactivos como StableCoins van a forzar un nuevo patron monetario, como vemos en las recientes reacciones de los bancos centrales al proyectar la emision, mas pronto ya que tarde, de sus CBDCs o monedas digitales emitidos por bancos centrales de curso legal. El problema que encontramos en los tradicionales metodos de valoracion a traves del descuento de los flujos de caja no son correctamente aplicables en este caso y debemos recurrir a un nuevo enfoque alternativo en los metodos de valoracion de criptoactivos. En este trabajo de investigacion realizamos un analisis de las variables fundamentales para determinar el valor de los criptoactivos. English abstract: The crypto-asset investment market still needs time to mature, as shown by the significant price volatility suffered by these, making it difficult for cryptocurrencies such as bitcoin to become the true and widespread means of exchange, capable of competing in this regard with fiat currencies. (yen, euro, dollar, pound, etc.). Logically, this functionality of the indicated money of the unit of account property is not fully fulfilled (it means that it is the unit of measurement that is used in an economy to set prices, since money is an accounting record system) nor do we speak, perhaps everything arrives in its time. The growing institutional investor interest, in addition to the individual consolidated, makes it necessary to have instruments and valuation methodologies that allow evaluating the change in time value suffered by cryptocurrencies in crypto markets. More and more reputable voices believe that bitcoin and other crypto assets such as StableCoins are going to force a new monetary standard, as we see in the recent reactions of central banks when projecting the issuance, sooner rather than later, of their CBDCs or digital currencies issued by legal tender central banks. The problem that we find in traditional valuation methods through discounting of cash flows are not correctly applicable
[abstract: criptoactivos inversion市场还需要时间成长为重要的价格波动,证明这些,困难还是criptomonedas像bitcoin变成真正和广泛交流手段,能够在这方面竞争与菲亚特货币(欧元、日元、美元、英镑等)。Logicamente完全未执行此功能的匹配的单位账户的所有权(意为计量单位中使用的是价格经济,因为钱是一个记账记录系统)或谈,也许所有到达的时间。兴趣不断增加个人综合机构,此外,使得投资者拥有必要的工具和metodologias valoracion所遭受的时间值,以评估变化中的criptomonedas criptomercados越来越多信誉好的声音认为bitcoin等criptoactivos StableCoins会挑一个新的货币,正如我们在最近的反应模式的各国央行emision设计,他们的cbdc或法定货币中央银行发行的数字货币。我们在通过现金流贴现的传统估值方法中发现的问题不适用于这种情况,我们必须在加密资产估值方法中采用一种新的替代方法。在这项研究工作中,我们对确定加密资产价值的基本变量进行了分析。摘要:加密资产投资市场仍然需要时间来成熟,这可以从这些货币遭受的巨大价格波动中看出,这使得比特币等加密货币很难成为真正和广泛的交易媒介,能够在这方面与法币竞争。(日元、欧元、美元、英镑等)。Logically, this account functionality of the indicated money of the unit of property is not完全满足(it means that it is the unit of measurement that is in an economy to set的油价,nor do we money is an会计记录system)说,条约everything arrives in its time。机构投资者的兴趣日益增长,加上个人的综合,使得有必要有工具和估值方法来评估加密货币在加密市场中所遭受的时间价值变化。More and More reputable之声认为bitcoin加密和其他资产如StableCoins are going to force新货币standard, as we see in the近期reactions of central banks当projecting issuance, sooner than后面的数字,其CBDCs or currencies下发通过法律设了中央银行。我们在通过现金流贴现的传统估值方法中发现的问题在这种情况下不正确适用,我们必须在加密资产估值方法中寻找一种新的替代方法。在本研究中,我们对决定加密资产价值的基本变量进行了分析。
{"title":"LOS NUEVOS MÉTODOS DE VALORACIÓN DE CRIPTOACTIVOS (The New Methods of Valuation of Cryptoassets)","authors":"Ismael Santiago","doi":"10.2139/SSRN.3817055","DOIUrl":"https://doi.org/10.2139/SSRN.3817055","url":null,"abstract":"Spanish abstract: El mercado de la inversion de criptoactivos necesita todavia tiempo por madurar como demuestra la importante volatilidad de precios que sufren estos, haciendo dificil todavia que criptomonedas como bitcoin se conviertan el verdaderos y generalizados medios de intercambio, capaces de competir en este aspecto con las monedas fiat (yen, euro, dolar, libra, etc.). Logicamente sin cumplirse plenamente esta funcionalidad del dinero indicada de la propiedad de unidad de cuenta (significa que es la unidad de medida que se utiliza en una economia para fijar los precios, ya que el dinero es un sistema de registro contable) ni hablamos, quizas todo llegue a su tiempo. El creciente interes inversor institucional, ademas del consolidado individual, hace necesario el contar con instrumentos y metodologias de valoracion que permitan evaluar el cambio de valor temporal que sufren los criptomonedas en los criptomercados \u0000Cada vez son mas las voces reputadas que creen que el bitcoin y otros criptoactivos como StableCoins van a forzar un nuevo patron monetario, como vemos en las recientes reacciones de los bancos centrales al proyectar la emision, mas pronto ya que tarde, de sus CBDCs o monedas digitales emitidos por bancos centrales de curso legal. El problema que encontramos en los tradicionales metodos de valoracion a traves del descuento de los flujos de caja no son correctamente aplicables en este caso y debemos recurrir a un nuevo enfoque alternativo en los metodos de valoracion de criptoactivos. En este trabajo de investigacion realizamos un analisis de las variables fundamentales para determinar el valor de los criptoactivos. \u0000 \u0000English abstract: The crypto-asset investment market still needs time to mature, as shown by the significant price volatility suffered by these, making it difficult for cryptocurrencies such as bitcoin to become the true and widespread means of exchange, capable of competing in this regard with fiat currencies. (yen, euro, dollar, pound, etc.). Logically, this functionality of the indicated money of the unit of account property is not fully fulfilled (it means that it is the unit of measurement that is used in an economy to set prices, since money is an accounting record system) nor do we speak, perhaps everything arrives in its time. The growing institutional investor interest, in addition to the individual consolidated, makes it necessary to have instruments and valuation methodologies that allow evaluating the change in time value suffered by cryptocurrencies in crypto markets. More and more reputable voices believe that bitcoin and other crypto assets such as StableCoins are going to force a new monetary standard, as we see in the recent reactions of central banks when projecting the issuance, sooner rather than later, of their CBDCs or digital currencies issued by legal tender central banks. The problem that we find in traditional valuation methods through discounting of cash flows are not correctly applicable","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126003641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-26DOI: 10.15587/1729-4061.2021.225371
Israa Mohammed Khudher
Steganography is the science of hiding secret data inside another data type as image and text. This data is known as carrier data; it lets people interconnect secretly. This suggested paper aims to design a Steganography Biometric Imaging System (SBIS). The system is constructed in a hybridization manner between image processing, steganography, and artificial intelligence techniques. During image processing techniques the system receives RGB foot-tip images and preprocesses the images to get foot-template images. Then a chain code is illustrated for personal information within the foot-template image by Least Significant Bit (LSB). Accurate recognition operation is performed by artificial bee colony optimization (ABC). The automated system was tested on a live-took about ninety RGB foot-tip images known as the cover image and clustered to nine clusters that authorized visual database. The Least Significant Bit method transforms the foot template to a stego image and is stored on a stego visual database for further use. Features database was constructed for each stego footprint template. This step converts the image to quantities data and stored in an Excel feature database file. The quantities data was used at the recognition stage to produce either a notification of rejection or acceptance. At the acceptance choice, the corresponding stego foot-tip template occurrence was retrieved, it is corresponding individual data were extracted and cluster position on the stego template visual database. Indeed, the foot-tip template is displayed. The suggested work consequence is affected by the optimum feature selection via the artificial bee colony optimization usage and clustering, which declined the complication and subsequently raised the recognition rate to 93.65 %. This rate competes out the technique over others’ techniques in the field of biometric recognition.
{"title":"LSB Steganography Strengthen Footprint Biometric Template","authors":"Israa Mohammed Khudher","doi":"10.15587/1729-4061.2021.225371","DOIUrl":"https://doi.org/10.15587/1729-4061.2021.225371","url":null,"abstract":"Steganography is the science of hiding secret data inside another data type as image and text. This data is known as carrier data; it lets people interconnect secretly. This suggested paper aims to design a Steganography Biometric Imaging System (SBIS). The system is constructed in a hybridization manner between image processing, steganography, and artificial intelligence techniques. During image processing techniques the system receives RGB foot-tip images and preprocesses the images to get foot-template images. Then a chain code is illustrated for personal information within the foot-template image by Least Significant Bit (LSB). Accurate recognition operation is performed by artificial bee colony optimization (ABC). The automated system was tested on a live-took about ninety RGB foot-tip images known as the cover image and clustered to nine clusters that authorized visual database. The Least Significant Bit method transforms the foot template to a stego image and is stored on a stego visual database for further use. Features database was constructed for each stego footprint template. This step converts the image to quantities data and stored in an Excel feature database file. The quantities data was used at the recognition stage to produce either a notification of rejection or acceptance. At the acceptance choice, the corresponding stego foot-tip template occurrence was retrieved, it is corresponding individual data were extracted and cluster position on the stego template visual database. Indeed, the foot-tip template is displayed. The suggested work consequence is affected by the optimum feature selection via the artificial bee colony optimization usage and clustering, which declined the complication and subsequently raised the recognition rate to 93.65 %. This rate competes out the technique over others’ techniques in the field of biometric recognition.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122526313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Startups and large technology companies are working with companies in healthcare to research, create, and deploy machine learning healthcare solutions. The growth of machine learning healthcare solutions is increasing the risk of re-identification of health data, raising concerns for individual privacy. Differential privacy is one of the latest and most popular anonymization techniques used on machine learning data to guarantee data privacy but is presenting challenges when applied to health data. The Health Insurance Portability and Accountability Act (HIPAA) has loopholes and does not address the use of machine learning on health data. This paper will explain why HIPAA needs to be amended to reduce the risk of re-identification due to the growth of machine learning in healthcare and the challenges presented in applying differential privacy. The paper will also discuss three possible proposals to amend HIPAA to reduce the risk of re-identification.
{"title":"Re-identification of Health Data through Machine Learning","authors":"Jayanth Kancherla","doi":"10.2139/ssrn.3794927","DOIUrl":"https://doi.org/10.2139/ssrn.3794927","url":null,"abstract":"Startups and large technology companies are working with companies in healthcare to research, create, and deploy machine learning healthcare solutions. The growth of machine learning healthcare solutions is increasing the risk of re-identification of health data, raising concerns for individual privacy. Differential privacy is one of the latest and most popular anonymization techniques used on machine learning data to guarantee data privacy but is presenting challenges when applied to health data. The Health Insurance Portability and Accountability Act (HIPAA) has loopholes and does not address the use of machine learning on health data. This paper will explain why HIPAA needs to be amended to reduce the risk of re-identification due to the growth of machine learning in healthcare and the challenges presented in applying differential privacy. The paper will also discuss three possible proposals to amend HIPAA to reduce the risk of re-identification.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132972367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Hirsch, Tim Bartley, Aravind Chandrasekaran, Davon Norris, Srinivasan Parthasarathy, Piers Norris Turner
Advanced analytics and artificial intelligence are powerful technologies that, along with their benefits, create new threats to privacy, equality, fairness and transparency. Existing law does not yet protect sufficiently against these threats. This has led some organizations to pursue what they call “data ethics” or “AI ethics” in an attempt to bring advanced analytics and AI more into line with societal values and so legitimate their growing use of these technologies.
To date, much of the scholarship on data ethics has sought either to define the ethical principles to which organization should aspire, or to map out the laws and regulations needed to push organizations towards these ethical goals. While these two lines of inquiry are important, the literature is missing a critical third dimension: empirical work on how organizations are actually governing the threats that their use of advanced analytics and AI can generate. Good regulatory design requires such knowledge. Yet, while there have been important studies of how organizations manage privacy “on the ground” (Bamberger and Mulligan 2015), there has been little such work on the governance of advanced analytics and AI.
This report begins to fill this gap. Focusing on private sector organizations, the authors interviewed corporate privacy managers deemed by their peers to be leaders in the governance of advanced analytics and AI, as well as the lawyers, consultants and thought leaders who advise them on this topic. They also surveyed a wider range of privacy mangers. The study sought to answer three, fundamental questions about business data ethics management: (1) How do leading companies conceptualize the threats that their use of advanced analytics and AI pose for individuals, groups and the broader society? (2) If it is true that the law does not yet require companies to reduce these risks, then why are they pursuing data ethics? and (3) How are companies pursuing data ethics? What substantive benchmarks, management processes and technological solutions do they use towards this end?
The authors previously shared on SSRN their preliminary findings. This final report provides a much fuller picture. The report should provide legislators and policymakers with an empirical foundation for their efforts to regulate advanced analytics and AI, at the same time as it gives interested organizations ideas on how to improve their data ethics management.
{"title":"Business Data Ethics: Emerging Trends in the Governance of Advanced Analytics and AI","authors":"D. Hirsch, Tim Bartley, Aravind Chandrasekaran, Davon Norris, Srinivasan Parthasarathy, Piers Norris Turner","doi":"10.2139/ssrn.3828239","DOIUrl":"https://doi.org/10.2139/ssrn.3828239","url":null,"abstract":"Advanced analytics and artificial intelligence are powerful technologies that, along with their benefits, create new threats to privacy, equality, fairness and transparency. Existing law does not yet protect sufficiently against these threats. This has led some organizations to pursue what they call “data ethics” or “AI ethics” in an attempt to bring advanced analytics and AI more into line with societal values and so legitimate their growing use of these technologies.<br><br>To date, much of the scholarship on data ethics has sought either to define the ethical principles to which organization should aspire, or to map out the laws and regulations needed to push organizations towards these ethical goals. While these two lines of inquiry are important, the literature is missing a critical third dimension: empirical work on how organizations are actually governing the threats that their use of advanced analytics and AI can generate. Good regulatory design requires such knowledge. Yet, while there have been important studies of how organizations manage privacy “on the ground” (Bamberger and Mulligan 2015), there has been little such work on the governance of advanced analytics and AI.<br><br>This report begins to fill this gap. Focusing on private sector organizations, the authors interviewed corporate privacy managers deemed by their peers to be leaders in the governance of advanced analytics and AI, as well as the lawyers, consultants and thought leaders who advise them on this topic. They also surveyed a wider range of privacy mangers. The study sought to answer three, fundamental questions about business data ethics management: (1) How do leading companies conceptualize the threats that their use of advanced analytics and AI pose for individuals, groups and the broader society? (2) If it is true that the law does not yet require companies to reduce these risks, then why are they pursuing data ethics? and (3) How are companies pursuing data ethics? What substantive benchmarks, management processes and technological solutions do they use towards this end?<br><br>The authors previously shared on SSRN their preliminary findings. This final report provides a much fuller picture. The report should provide legislators and policymakers with an empirical foundation for their efforts to regulate advanced analytics and AI, at the same time as it gives interested organizations ideas on how to improve their data ethics management.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}