Zayyad, 2022 - Google Patents
Economic Risk, Cyber Threats and Privacy Issues of Blockchain Technology in NigeriaZayyad, 2022
View PDF- Document ID
- 18187145972741263727
- Author
- Zayyad M
- Publication year
- Publication venue
- International Journal of Research and Innovation in Social Science
External Links
Snippet
Blockchain technology and cryptocurrency are continuously becoming more popular all over the world, especially with the rapid popularity of access to the internet. It appears to be one of the most significant trends of the modern era. It is difficult nowadays to spend a whole day …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Efanov et al. | The all-pervasiveness of the blockchain technology | |
Brown | Cryptocurrency and criminality: The Bitcoin opportunity | |
Xu | Are blockchains immune to all malicious attacks? | |
Badawi et al. | Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review | |
CN113015989A (en) | Block chain supervision | |
Baliker et al. | On the applications of blockchain in FinTech: advancements and opportunities | |
Garg | Distributed ecosystem for identity management | |
Sabry et al. | Anonymity and privacy in bitcoin escrow trades | |
Soni et al. | Security issues & seclusion in bitcoin system | |
Kamboj et al. | An exploratory analysis of blockchain: applications, security, and related issues | |
Ghonge et al. | A comprehensive review of the security and privacy issues in blockchain technologies | |
Singh et al. | Checking the Effectiveness of Blockchain Application in Fraud Detection with A Systematic Literature Review Approach | |
Lal et al. | Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain | |
Xia | In search of the perfect coin: China’s approach towards cryptocurrency and its own central bank digital currency | |
Horch et al. | Adversary tactics and techniques specific to cryptocurrency scams | |
Zayyad | Economic Risk, Cyber Threats and Privacy Issues of Blockchain Technology in Nigeria | |
Ramageri et al. | Applications of blockchain technology in various sectors: A review | |
Nandy et al. | The Evaluation of Cryptocurrency: Overview, Opportunities, and Future Directions | |
Rampone | Data protection in the Blockchain environment: GDPR is not a hurdle to permissionless DLT solutions | |
Loporchio et al. | Is Bitcoin gathering dust? An analysis of low-amount Bitcoin transactions | |
Samanta et al. | A framework to build user profile on cryptocurrency data for detection of money laundering activities | |
Al-Hashedi et al. | A conceptual model to identify illegal activities on the bitcoin system | |
Tewari | Abuses of cryptocurrency in dark web and ways to regulate them | |
Kerimov et al. | Blockchain technology in bank's anti-money laundering | |
Thomas et al. | A comparison of conventional and online fraud |