SECTION: Features
Is cryptocurrency necessarily energy-consuming? Can we use blockchain to facilitate sustainable development? This interview presents insights into an investment project rooted in sustainability, bridging finance and ecology.
By Jiayi Li, Yingfei Wang, June 2021
PDF | HTML | In the Digital Library
International exposure impacts your views on technology, design, consumption, and adoption, and sometimes technology is not even the direct solution. Building a digital ecosystem entails the right policy mix to support the expansion of mobile broadband coupled with complementary policies to boost affordability and digital skills for underserved groups.
By Jimena Luna, March 2021
PDF | HTML | In the Digital Library
Cybersecurity involves protection of computer systems from theft, damage, or manipulation to the hardware, software, or the data contained on them. A limitless cyberspace, little to no boundaries, and eroding national borders is making Africa vulnerable to cyber threats and potential harms. Cybersecurity represents serious economic and national security challenges, which need to be properly defined and contextualized.
By Hood Mukiibi, November 2019
PDF | HTML | In the Digital Library
COLUMN: Careers
Consider what it takes to stand out as more than just a "good" candidate.
By Christopher Hazlett, April 2017
PDF | HTML | In the Digital Library
SECTION: Features
How the technology of the Occupy movement became a mobile app for policing.
By Joan Donovan, April 2017
PDF | HTML | In the Digital Library
The results of the 2016 Brexit referendum in the U.K. and presidential election in the U.S. surprised pollsters and traditional media alike, and social media is now being blamed in part for creating echo chambers that encouraged the spread of fake news that influenced voters.
By Dominic DiFranzo, Kristine Gloria-Garcia, April 2017
PDF | HTML | In the Digital Library
Crisis Text Line CTO Jason Bennett shares his insight on the technology behind this helpline using text to reach people in need of counseling during times of crisis.
By Rahul R. Divekar, Nidhi Rastogi, April 2017
PDF | HTML | In the Digital Library
Strengths and weaknesses of the leader in a new generation of emerging cryptocurrencies.
By Dominic Hobson, September 2013
PDF | HTML | In the Digital Library
SECTION: Features
By observing how covert financial networks operate in online games like World of Warcraft, we can learn about how they might function offline.
By Brian Keegan, Muhammad Aurangzeb Ahmad, Dmitri Williams, Jaideep Srivastava, Noshir Contractor, March 2011
PDF | HTML | In the Digital Library
Suspicious network patterns may be the key to detecting criminals and fraudsters on e-commerce sites.
By Polo Chau, March 2011
PDF | HTML | In the Digital Library
Everything, everywhere, tagged and tracked. How can this data be harnessed to deliver better products and services?
By Mark Harrison, March 2011
PDF | HTML | In the Digital Library
A more accurate measuring instrument may be found in stable money baskets built by computers and mathematics.
By Nikolai V. Hovanov, James W. Kolari, Mikhail V. Sokolov, March 2011
PDF | HTML | In the Digital Library
The CIO of USAA, a full-service, branchless financial services operation, sees much more to banking than e-transactions.
By James Stanier, March 2011
PDF | HTML | In the Digital Library
At the turn of the 20th century, companies stopped generating their own power and plugged into the electricity grid. In his now famous book The Big Switch, Nick Carr analogizes those events of a hundred years ago to the tectonic shift taking place in the technology industry today.
By Guy Rosen, March 2010
PDF | HTML | In the Digital Library
This article describes a technique to visualize query results, representing purchase orders placed on Amazon.com, along a traditional 2-D scatter plot and a space-filling spiral. We integrate 3-D objects that vary their spatial placement, color, and texture properties into a visualization algorithm. This algorithm represents important aspects of a purchase order based on experimental results from human vision, computer graphics, and psychology. The resulting visual abstractions are used by viewers to rapidly and effectively explore and analyze the underlying purchase orders data.
By Amit Prakash Sawant, Christopher G. Healey, Dongfeng Chen, Rada Chirkova, March 2009
PDF | HTML | In the Digital Library
Electronic commerce faces the problem of signing electronic contracts. Three approaches for handling electronic contracts include 1) no trusted third party protocols, 2) strongly-trusted third party protocols and 3) weakly-trusted third party protocols. A secondary problem facing electronic commerce is self-enforcing contract design.
By David Molnar, September 2000
PDF | HTML | In the Digital Library