Critical Review: Current Research Issues on Crypto-currency and its Application in Financial Sectors

2020 ◽  
Vol 15 (3) ◽  
pp. 139
Author(s):  
Lim Hong Hin

This research article is based on the current research issues on crypto-currency and its application in financial sectors. The researcher stated that crypto- currency attracted a significant attention and has been adopted in numerous applications, such as smart grid and Internet of Things (IoT) have a high scalability barrier for block-chain which limits its ability to support services with frequent transactions. In this research paper the researcher emphasized that some of the significant research issues on decentralized, peer to peer financial networks face risks such as fraud and suspicious trading, volatile price fluctuations, regularity uncertainty, and instability in financial sectors. This research study shows the huge growth of online users, virtual word concept which are created a new business phenomenon to facilitate financial activities such as buying, selling and trading. This research article analyzed the user’s expectation of future of crypto-currency in financial sectors at different significant level. In addition to this the researcher also discussed a statistical report which is adopted from the Statistic to provide a future direction of money regulatory in financial sector.

2020 ◽  
Vol 15 (3) ◽  
pp. 145
Author(s):  
Lim Hong Hin

This research article is based on the current research issues on crypto-currency and its application in financial sectors. The researcher stated that crypto- currency attracted a significant attention and has been adopted in numerous applications, such as smart grid and Internet of Things (IoT) have a high scalability barrier for block-chain which limits its ability to support services with frequent transactions. In this research paper the researcher emphasized that some of the significant research issues on decentralized, peer to peer financial networks face risks such as fraud and suspicious trading, volatile price fluctuations, regularity uncertainty, and instability in financial sectors. This research study shows the huge growth of online users, virtual word concept which are created a new business phenomenon to facilitate financial activities such as buying, selling and trading. This research article analyzed the user’s expectation of future of crypto-currency in financial sectors at different significant level. In addition to this the researcher also discussed a statistical report which is adopted from the Statistic to provide a future direction of money regulatory in financial sector.


Author(s):  
Anil Kumar G. ◽  
Shantala C. P.

Owing to the highly distributed nature of the cloud storage system, it is one of the challenging tasks to incorporate a higher degree of security towards the vulnerable data. Apart from various security concerns, data privacy is still one of the unsolved problems in this regards. The prime reason is that existing approaches of data privacy doesn't offer data integrity and secure data deduplication process at the same time, which is highly essential to ensure a higher degree of resistance against all form of dynamic threats over cloud and internet systems. Therefore, data integrity, as well as data deduplication is such associated phenomena which influence data privacy. Therefore, this manuscript discusses the explicit research contribution toward data integrity, data privacy, and data deduplication. The manuscript also contributes towards highlighting the potential open research issues followed by a discussion of the possible future direction of work towards addressing the existing problems.


Author(s):  
Hilary Perraton

Research is seen as something grounded in theory that can lead to improved practice. Without a theoretical basis it is unlikely to go beyond data gathering. The theoretical insights leading to good research are more likely to come from educational and social theories generally than from an attempt to develop a theory of open and distance learning. An examination of existing research shows that it is often atheoretical and predominantly descriptive. Research on the context of open and distance learning, considering its purposes, outcomes, and relevance to major educational problems, has been relatively neglected as contrasted with research on its application. Significant research issues today include: problems posed by globalisation, including issues of governance and consumer protection; ways of maximising public benefit from new communication technologies; the development of strategies for AIDS education; and the continuing need for educational expansion.


2020 ◽  
Vol 12 (05-SPECIAL ISSUE) ◽  
pp. 1426-1431
Author(s):  
Monika R ◽  
Mukka Priyanka ◽  
Aishwarya R
Keyword(s):  

Recently, there has been a continuous occurrence of a security incident on a crypto currency exchange. This background is not related to the current social situation. This is because the social interest in crypto currency provides an attacker with a chance to attack. In this paper, we have started to investigate the relationship between crypto currency and security incidents of block chain. This paper focuses on analysis of crypto currency event of block chain. In this paper, we analyzed the amount of Google data retrieval around specific keywords during a specific period. And we analysis the relevance of this keyword to specific keywords related to security. For example, we analyzed the decrypted bitch coin or etherium, the nice money exchange, nicehash, coincheck, BTCglobal, BITGRAIL, Blackwallet. We are focused on the relationship between the time of the security incident and the public awareness of the related crypto currency exchange. According to the results of the study, it can be assumed that a security incident occurred at a certain point in each exchange. Through this study, we were able to confirm public interest in crypto currency miners. I was able to confirm the degree of interest by time. Cryptographic digger was mainly focused on BitMiner, CGMiner, MultiMiner, and BFGMiner. Most of the public interest in these mining equipment is peaking in December 2017. We also looked at public interest in cryptic bit coin and etherium, mainly in December 2017. The results of this paper can be used to analyze the point of time of the attack on the crypto currency exchange. Crypto currency exchange attacks will continue to occur in the future. If so, when is this attack going to take place? At that point, we need to know at what point the exchange will have public interest. At that point, we should also look at the exchange for vulnerabilities.


Author(s):  
Prof. Sushma Laxman Wakchaure ◽  
Shinde Bipin Balu ◽  
Bhabad Vasant M. ◽  
Dnyandev S. Musale ◽  
Supriya S. Burhade

Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. You have probably heard of Blockchain in the past few years, mostly in the context of crypto currency. However, Blockchain has grown to have several different applications. The significant part about Blockchain is that it is never under the complete control of a single entity due to being entirely consensus-driven. It can never change the data you store in the Blockchain used widely in sharing medical data in the healthcare industry. Due to the security that Blockchain provides, this data can be shared among parties seamlessly. Another application of Blockchain is in maintaining the integrity of payment systems. Blockchain-based payment systems are immune to external attacks and theft. Blockchain can also be used in tracking the status of products in a supply chain in real-time.


Voting is the principal incident in any democratic country. Generally voting is done using ballots system, but this technique is ancient and can be easily sabotaged. There is a necessity to bring in new technologies to ensure effective implementation of digital voting systems. The security of digital voting is a significant aspect for implementation and must meet the requirements to be appropriate for trust worthiness. Block chain technology provides reliable electronic voting system that can be secured by adding more decision so that the possible attacks can be avoided. Block chain technology based on crypto currency implements diffused database architecture with transaction records secured by transactions.


2021 ◽  
Vol 4 (2) ◽  
pp. 15
Author(s):  
Sarwat Liaqut ◽  
Ammar Siddiqui

Cryptocurrency used an online ledger with highly strong cryptography to secure online transactions. There are multiple cryptocurrencies traded publically that imparts an important role on the behavioral intention of users. The disruption in the economy of the world has provided some opportunities for the development of virtual money or cryptocurrencies so that financial crises of individuals can be removed. The study adapted Theory of Acceptance Model (TAM) that explains the factor that effect behavioral intention of the users of cryptocurrency. The data was collected through survey questionnaire from 177 participants to measure the impact of cryptocurrency on the behavioral intention of users. The findings of this study revealed that multiple factors such as social influence, facilitating conditions, financial literacy, and perceived risk of cryptocurrency imparts an important role on the behavioral intention of individuals to use cryptocurrencies. Moreover the findings will propose numerous methods to function with a greater chance of success in the block chain-related services and cryptocurrencies markets.


2020 ◽  
Vol 12 (7) ◽  
pp. 121 ◽  
Author(s):  
Chaminda Hewage ◽  
Erhan Ekmekcioglu

Quality of Experience (QoE) is becoming an important factor of User-Centred Design (UCD). The deployment of pure technical measures such as Quality of Service (QoS) parameters to assess the quality of multimedia applications is phasing out due to the failure of those methods to quantify true user satisfaction. Though significant research results and several deployments have occurred and been realized over the last few years, focusing on QoE-based multimedia technologies, several issues both of theoretical and practical importance remain open. Accordingly, the papers of this Special Issue are significant contribution samples within the general ecosystem highlighted above, ranging from QoE in the capture, processing and consumption of next-generation multimedia applications. In particular, a total of five excellent articles have been accepted, following a rigorous review process, which address many of the aforementioned challenges and beyond.


Sign in / Sign up

Export Citation Format

Share Document