scholarly journals Risks to the National Security Generated By the Widespread Use of Cryptocurrency

2021 ◽  
Vol 26 (2) ◽  
pp. 87-97
Author(s):  
George-Daniel Bobric

Abstract The pronounced multi-domain technologicalization specific to the last decades has had a significant impact on all areas of activity, including the financial one. The use of cyberspace to facilitate the actions undertaken in the monetary activity has generated the development of this field to the point where virtual currencies have been created and new technologies have been developed to support their use. Like any emerging domain, the cryptocurrency field and the related technology are in a relatively early stage and exclusively imply operating in cyberspace, thus generating security risks in the event of the involvement of malicious entities in illicit activities. In this context, it is worth analyzing how the improper use of the crypto domain can lead to various risks to national security.

2008 ◽  
Vol 39 (4) ◽  
pp. 379-394 ◽  
Author(s):  
Kenneth Ruthven

This article examines three important facets of the incorporation of new technologies into educational practice, focusing on emergent usages of the mathematical tools of computer algebra and dynamic geometry. First, it illustrates the interpretative flexibility of these tools, highlighting important differences in ways of conceptualizing and employing them that reflect their appropriation to contrasting practices of mathematics teaching. Second, it examines the cultural process of instrumental evolution in which mathematical frameworks and teaching practices are adapted in response to new possibilities created by these tools, showing that such evolution remains at a relatively early stage. Third, it points to crucial prerequisites, at both classroom and systemic levels, for effective institutional adoption of such tools: explicit recognition of the interplay between the development of instrumental and mathematical knowledge, including the establishment of a recognized repertoire of tool-mediated mathematical techniques supported by appropriate discourses of explanation and justification.


2008 ◽  
Vol 5 (2) ◽  
Author(s):  
Michal-Ruth Schweiger ◽  
Hans Lehrach

According to the centre for disease control (CDC) malignant neoplasms are the second most common cause of death in the US in 2004 (1). One of the major problems is that most of the cancers are diagnosed in an advanced stage, which prohibits curative treatment. In order to circumvent these problems, we need to develop strategies that allow identification of risk patients and tumors at an early stage. In addition, it is necessary to identify prognostic and predictive biomarkers that guide patient treatment at different stages of the disease.


2021 ◽  
Vol 22 (1) ◽  
pp. 29-40
Author(s):  
Julie Lenzer ◽  
Piotr Kulczakowicz

The new technologies born from academic research can be very promising, yet they are often very early stage. University spin-off companies are uniquely positioned to tackle the risks associated with new technologies emerging from academia by developing proofs of concept, functioning prototypes, and new products. While these enterprises start from a solid research and development foundation, they face their own unique set of challenges—they are strongly anchored in the scientific and technological expertise that is typically backed by intellectual property but often lack the business experience needed to develop and market products demanded by customers. University spin-offs have access to substantial non-dilutive funding that can be utilized for advancing product development. While the relentless pursuit of these funds builds a company's credibility and improves its position for negotiating future private investment, university spin-offs would greatly benefit from an early focus on complementing their technology teams with their business teams. These new enterprises should consider pursuing private investment in parallel to utilizing sources of non-dilutive funding. Timing of private investment is extremely important to maximize the value of the opportunity, and, therefore, building relationships with investors early on and getting ready for executing an investment round can greatly increase odds for success. While there is no single path to formulate, pursue, and adapt successful financing strategies, lessons can be learned from real-life cases of university spin-offs that continue their journeys towards ultimate success.


2020 ◽  
Vol 13 (4) ◽  
pp. 80-90
Author(s):  
Shaimaa K. Ahmed ◽  
Zobeda H. Naji ◽  
Yousif N. Hatif ◽  
Meaad Hussam

Automation in the drug inventory distribution process is helpful to pharmacist. Pharmacy management has kept paper record in filing cabinets. Managing a very large pharmacy with records on papers will be tedious and difficult to keep track ofinventories with regards to the drugs in the store, expiry date, quantity of drugs available based on the categories and their functions. A Drug Inventory Management Information System(DIMIS) is basically a computer system that can manage all the information to allow pharmacists to do their jobs faster and more effective in real time. These jobs include: dispensing of drugs, drug regulation, and the sale of these drugs. The developed methodology adopted in the implementation of the software is iterative model of system development life cycle. This method produces an early stage of model. The development of the system is based on using new technologies like AJAX, ASP.NET MVC 5, Bootstrap, HTML and CSS which make the user interface more interactive. C#.NET language was used as server language whereas as a database server Microsoft SQL server 2012 was utilized. DIMIS is able to search and check a huge number and expiration date of drug in the purchase as well as delivery records. These attributes and functions are powerful, efficient and subsequently useful in patient's safety and cost containment


2021 ◽  
Author(s):  
Vallet Laurent ◽  
Gutarov Pavel ◽  
Chevallier Bertrand ◽  
Converset Julien ◽  
Paterson Graeme ◽  
...  

Abstract In the current economic environment, delivering wells on time and on budget is paramount. Well construction is a significant cost of any field development and it is more important than ever to minimize these costs and to avoid unnecessary lost time and non-productive time. Invisible lost time and non-productive time can represent as much as 40% of the cost of well construction and can lead to more severe issues such as delaying first oil, losing the well or environmental impact. There has been much work developing systems to optimize well construction, but the industry still fails to routinely detect and avoid problematic events such as stuck pipe, kicks, losses and washouts. Standardizing drilling practice can help also to improve the efficiency, this practice has shown a 30% cost reduction through repetitive and systematic practices, automation becomes the key process to realize it and Machine Learning introduced by new technologies is the key to achieve it. Drilling data analysis is key to understanding reasons for bad performances and detecting at an early stage potential downhole events. It can be done efficiently to provide to the user tools to look at the well construction process in its whole instead of looking at the last few hours as it is done at the rig site. In order to analyze the drilling data, it is necessary to have access to reliable data in Real-Time to compare with a data model considering the context (BHA, fluids, well geometry). Well planning, including multi-well offset analysis of risks, drilling processes and geology enables a user to look at the full well construction process and define levels of automation. This paper applies machine learning to a post multi-well analysis of a deepwater field development known for its drilling challenges. Minimizing the human input through automation allowed us to compare offset wells and to define the root cause for non-productive time. In our case study an increase of the pressure while drilling should have led to immediate mitigation measures to avoid a wiper trip. This paper presents techniques used to systematize surface data analysis and a workflow to identify at an early stage a near pack off which was spotted in an automatic way. The application of this process during operations could have achieved a 10%-time reduction of the section 12 ¼’’.


2011 ◽  
Vol 1 (1) ◽  
pp. 35-40 ◽  
Author(s):  
Matthew Warren ◽  
Shona Leitch

Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Nicholas E. Matthews ◽  
Carrie A. Cizauskas ◽  
Donovan S. Layton ◽  
Laurence Stamford ◽  
Philip Shapira

AbstractTackling the pressing sustainability needs of society will require the development and application of new technologies. Biotechnology, emboldened by recent advances in synthetic biology, offers to generate sustainable biologically-based routes to chemicals and materials as alternatives to fossil-derived incumbents. Yet, the sustainability potential of biotechnology is not without trade-offs. Here, we probe this capacity for sustainability for the case of bio-based nylon using both deliberative and analytical approaches within a framework of Constructive Sustainability Assessment. We highlight the potential for life cycle CO2 and N2O savings with bio-based processes, but report mixed results in other environmental and social impact categories. Importantly, we demonstrate how this knowledge can be generated collaboratively and constructively within companies at an early stage to anticipate consequences and to inform the modification of designs and applications. Application of the approach demonstrated here provides an avenue for technological actors to better understand and become responsive to the sustainability implications of their products, systems and actions.


2019 ◽  
Vol 185 (3-4) ◽  
pp. 330-333 ◽  
Author(s):  
Sean D Mclaughlin ◽  
Ramey L Wilson

Abstract Developing, cultivating, and sustaining medical interoperability strengthens the support we provide to the warfighter by presenting our Commanders options and efficiencies to the way we can enable their operations. As our national security and defense strategies change the way our forces are employed to address our security risks throughout the world, some military commands will find they cannot provide adequate medical care without working in concert with willing and available partners.This article proposes a tiered framework that allows medical personnel to further describe and organize their engagement activities around the concept and practicalities of medical interoperability. As resources become diverted to other theaters or missions expand beyond assigned capabilities, medical interoperability provides Commanders with options to medically enable their missions through their partnerships with others. This framework links and connects activities and engagements to build partner capacity with long-term or regional interoperability among our partners and challenges engagement planners to consider ways to build interoperability at all four tiers when planning or executing health engagements and global health development. Using this framework when planning or evaluating an engagement or training event will illuminate opportunities to develop interoperability that might have otherwise been unappreciated or missed.


2020 ◽  
Vol 10 (7) ◽  
pp. 2574 ◽  
Author(s):  
Donatas Mažeika ◽  
Rimantas Butleris

This paper presents how Model-Based System Engineering (MBSE) could be leveraged in order to mitigate security risks at an early stage of system development. Primarily, MBSE was used to manage complex engineering projects in terms of system requirements, design, analysis, verification, and validation activities, leaving security aspects aside. However, previous research showed that security requirements and risks could be tackled in the MBSE model, and powerful MBSE tools such as simulation, change impact analysis, automated document generation, validation, and verification could be successfully reused in the multidisciplinary field. This article analyzes various security-related techniques and then clarifies how these techniques can be represented in the Systems Modeling Language (SysML) model and then further exploited with MBSE tools. The paper introduces the MBSEsec method, which gives guidelines for the security analysis process, the SysML/UML-based security profile, and recommendations on what security technique is needed at each security process phase. The MBSEsec method was verified by creating an application case study that reflects real-world problems and running an experiment where systems and security engineers evaluated the feasibility of our approach.


Sign in / Sign up

Export Citation Format

Share Document