National Security Implications of Virtual Currency Examining the Potential for Non-state Actor Deployment
This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. This report should be of interest to policymakers interested in techno...
Saved in:
Main Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
RAND Corporation
2015
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_115584 | ||
005 | 20231005 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231005s2015 xx |||||o ||| 0|eng d | ||
020 | |a j.ctt19rmd78 | ||
020 | |a 9780833093691 | ||
020 | |a 9780833091833 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7249/j.ctt19rmd78 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UB |2 bicssc | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UBW |2 bicssc | |
072 | 7 | |a JPWL |2 bicssc | |
072 | 7 | |a TJK |2 bicssc | |
100 | 1 | |a Baron, Joshua |4 auth | |
700 | 1 | |a O'Mahony, Angela |4 auth | |
700 | 1 | |a Manheim, David |4 auth | |
700 | 1 | |a Dion-Schwarz, Cynthia |4 auth | |
245 | 1 | 0 | |a National Security Implications of Virtual Currency |b Examining the Potential for Non-state Actor Deployment |
260 | |b RAND Corporation |c 2015 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. This report should be of interest to policymakers interested in technology, counterterrorism, and intelligence and law enforcement issues, as well as for VC and cybersecurity researchers. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
650 | 7 | |a Information technology: general issues |2 bicssc | |
650 | 7 | |a Computer security |2 bicssc | |
650 | 7 | |a Internet: general works |2 bicssc | |
650 | 7 | |a Terrorism, armed struggle |2 bicssc | |
650 | 7 | |a Communications engineering / telecommunications |2 bicssc | |
653 | |a Technology | ||
653 | |a Political Science | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.jstor.org/stable/10.7249/j.ctt19rmd78 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/115584 |7 0 |z DOAB: description of the publication |