Globalization aided by the internet has now come to stay, which has brought in cryptocurrency to support local and international financial transactions. This qualitative study used content analysis research techniques to assess the impact of cryptocurrency on traditional banking and fiat currency. The findings of this study were, firstly cryptocurrency has similar features and function of banks and fiat currency, as it operates through the internet. Secondly, cryptocurrency functions as a unit of account, medium of exchange, store of value and an intermediary on fund accumulation and distribution. Thirdly, cryptocurrency which is dollarization 2.0 has come to restore the confidence and convenience of financial globalization in that it eliminates the third party from interfering with the transactional process. Lastly, its influence on central banks and governments is the elimination of seigniorage. What cryptocurrency requires now is the legal tender status through regulations.
Due to the sensitivity and amount of information stored on mobile devices, the need to protect these devices from unauthorized access has become imperative. Among the various mechanisms to manage access on mobile devices, this chapter focused on identifying research trends on biometric authentication schemes. The systematic literature review approach was adopted to guide future researches in the subject area. Consequently, seventeen selected articles from journals in three databases (IEEE, ACM digital library, and SpringerLink) were reviewed. Findings from the reviewed articles indicated that touch gestures are the predominant authentication technique used in mobile devices, particularly in android devices. Furthermore, mimic attacks were identified as the commonest attacks on biometric authentic schemes. While, robust authentication techniques such as dental occlusion, ECG (electrocardiogram), palmprints and knuckles were identified as newly implemented authentication techniques in mobile devices.
International students are an important and desirable constituent in most computer science programs. These students help to enrich the programs, bring new perspectives into the classroom, diversify the student population, globalize the curriculum, broaden the perspective of domestic students, and generate revenue for the host institution. Each of these characteristics is desirable and increasingly important in today's highly connected world and job market. Most institutions invest resources in attracting international students and provide orientation sessions for them on arrival to help acclimate them to the new environment and to introduce them to other students. There are often clubs to provide support groups and social functions to help them meet and make friends with domestic students. However, challenges for international students, and for the faculty teaching them, persist at many institutions despite these efforts to help international students deal with culture shock, differing academic expectations and teaching methods, and different attitudes toward issues such as plagiarism.
Security is one of the major concerns of every industry in the world today. One of the best ways of hacking into a computer system is brute forcing. And with the increase in computing, brute forcing has become faster and easy to do. Text-based passwords are still the most popular and most commonly used form of authentication even though the requirements for a good password are still increasing. Research has shown that the best text-based passwords are the random ones that have no sequence or pattern to them. But this also makes it difficult to remember. Well- documented research has shown that it is easier to remember an image than words, hence the adage "A picture is worth a thousand words." Even though there are good policies for text-based passwords, the unpredictability of users' attitudes and behavior has most of the time rendered these policies inefficient. The common trade-off for the complexity of text-based passwords is recallability. Most users would prefer to use a password they can easily remember than a complex one that they can easily forget. One of the proposed alternatives to text-based passwords is graphical passwords. There are several schemes that have been proposed but are still unpopular. This thesis investigated one of these schemes that are used on mobile devices to determine whether it can be used as an alternative to text-based passwords. Also this research proposes ways to improve this scheme and options of bringing it at par with the current minimum requirements of a good text-based password.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.