Digital economics
A Goldfarb, C Tucker - Journal of economic literature, 2019 - aeaweb.org
Digital technology is the representation of information in bits. This technology has reduced
the cost of storage, computation, and transmission of data. Research on digital economics …
the cost of storage, computation, and transmission of data. Research on digital economics …
A survey on data pricing: from economics to data science
J Pei - IEEE Transactions on knowledge and Data …, 2020 - ieeexplore.ieee.org
Data are invaluable. How can we assess the value of data objectively, systematically and
quantitatively? Pricing data, or information goods in general, has been studied and practiced …
quantitatively? Pricing data, or information goods in general, has been studied and practiced …
The economics of privacy
This article summarizes and draws connections among diverse streams of theoretical and
empirical research on the economics of privacy. We focus on the economic value and …
empirical research on the economics of privacy. We focus on the economic value and …
Protecting society from AI misuse: when are restrictions on capabilities warranted?
M Anderljung, J Hazell - arXiv preprint arXiv:2303.09377, 2023 - arxiv.org
Artificial intelligence (AI) systems will increasingly be used to cause harm as they grow more
capable. In fact, AI systems are already starting to be used to automate fraudulent activities …
capable. In fact, AI systems are already starting to be used to automate fraudulent activities …
[PDF][PDF] Economics, fairness and algorithmic bias
We develop an economic perspective on algorithmic fairness. Algorithmic bias and fairness
issues are appearing in an increasing variety of economic research literatures. Our …
issues are appearing in an increasing variety of economic research literatures. Our …
Spams meet cryptocurrencies: Sextortion in the bitcoin ecosystem
M Paquet-Clouston, M Romiti, B Haslhofer… - Proceedings of the 1st …, 2019 - dl.acm.org
In the past year, a new spamming scheme has emerged: sexual extortion messages
requiring payments in the cryptocurrency Bitcoin, also known as sextortion. This scheme …
requiring payments in the cryptocurrency Bitcoin, also known as sextortion. This scheme …
Guest editorial: Research framework for AIS grand vision of the bright ICT initiative
JK Lee - MIS quarterly, 2015 - dl.acm.org
The Internet has become a minefield of crime, fakes, and terror perpetuated by anonymous
users on a global scale. The security burden of protecting organizations is becoming …
users on a global scale. The security burden of protecting organizations is becoming …
Encrypted and covert DNS queries for botnets: Challenges and countermeasures
There is a continuous increase in the sophistication that modern malware exercise in order
to bypass the deployed security mechanisms. A typical approach to evade the identification …
to bypass the deployed security mechanisms. A typical approach to evade the identification …
Ghost in the Network
DE Bambauer - U. Pa. L. Rev., 2013 - HeinOnline
Begin with a tale of two specters. The first invaded the computer systems of the Dalai Lama
in Dharamsala, India, sometime in 2008.1 As the leader of Tibet's government in exile, the …
in Dharamsala, India, sometime in 2008.1 As the leader of Tibet's government in exile, the …
Newscats: A news categorization and trading system
MA Mittermayer, GF Knolmayer - Sixth international conference …, 2006 - ieeexplore.ieee.org
NewsCATS is an automated text categorization (ATC) prototype using a hand-made
thesaurus to forecast intraday stock price trends from information contained in press …
thesaurus to forecast intraday stock price trends from information contained in press …