Preview

Case Study About E-Money

Better Essays
Open Document
Open Document
8478 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study About E-Money
E-Money (That's What I Want)

The killer application for electronic networks isn't video-on-demand. It's going to hit you where it really matters - in your wallet. It's, not only going to revolutionize the Net, it will change the global economy.
By Steven Levy

Clouds gather over Amsterdam as I ride into the city center after a day at the headquarters of DigiCash, a company whose mission is to change the world through the introduction of anonymous digital money technology. I have been inundated with talk of smart cards and automated toll takers and tamper-proof observer chips and virtual coinage for anonymous network ftps. I have made photocopies using a digital wallet and would have bought a soda from a DigiCash vending machine, but it was out of order.
My fellow passenger and tour guide is David Chaum, the bearded and ponytailed founder of DigiCash, and the inventor of cryptographic protocols that could catapult our currency system into the 21st century. They may, in the process, shatter the Orwellian predictions of a Big Brother dystopia, replacing them with a world in which the ease of electronic transactions is combined with the elegant anonymity of paying in cash.
He points out the plaza where the Nazis rounded up the Jews for deportation to concentration camps.
This is not idle conversation, but a topic rooted in the Chaum Weltanschauung - state repression extended to the maximum. David Chaum has devoted his life, or at least his life's work, to creating cryptographic technology that liberates individuals from the spooky shadows of those who gather digital profiles. In the process, he has become the central figure in the evolution of electronic money, advocating a form of it that fits neatly into a privacy paradigm, whereby the details of people's lives are shielded from the prying eyes of the state, the corporation, and various unsavory elements.
Fifteen years ago, David Chaum seemed a Don Quixote in Birkenstocks, a stray computer scientist

You May Also Find These Documents Helpful

  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    The actual business goals for this project is to offer new and better services and support, open the network to key constituents, build relationships and information accessibility to a new level, as a basis for the network organizational model, avoid business disruption caused by network security problems, avoid business disruption caused by natural and unnatural disaster, modernize outdated technologies and reduce telecommunications and network costs, including overhead associated with separate networks for voice, data and video.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Randy Vanderhoof Summary

    • 1496 Words
    • 6 Pages

    In 2012, citizens in the United States incurred 47.3% of global fraud. Imagine being one of the 47% who nearly lost everything (Vanderhoof, 213). One has the option to stand up to fraud or sit back and become a victim. Randy Vanderhoof explains the importance of technology in the fight against fraud at length in his article, “Can Technology Protect Americans from International Cybercriminals?” In his testimony, Vanderhoof expresses the importance of EMV (Europay, Mastercard, and Visa) chip technology in the fight against bankcard fraud (Vanderhoof, 212). Vanderhoof cites the high amount of security that EMV chips have beyond traditional magnetic stripe cards. In addition, Vanderhoof cites recent hacking events to illustrate the need for EMV…

    • 1496 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    The author makes a good point in his article by explaining that the violation of privacy due to technology is not something new. He backs that point up by evidence of two Boston lawyers at the Harvard Law Review who argued that privacy was under attack by inventions and also business methods in 1890.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    We will install a state of the art network allowing access to the Internet from every workstation, as well as provide an infrastructure that can be used as an example for those learning how to develop superior network design. We will also be able to provide a faculty for video conferencing not only for internal use but also for our customers.…

    • 4435 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    FIN301 Mod 5 SLP

    • 1544 Words
    • 6 Pages

    Rogowsky, M. (2014). Apple Pay is here and it’s going to be great: Why the skeptics have it…

    • 1544 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Anderson, the author has created a vision of our future. A future where the internet is connected…

    • 2143 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Business LLaw

    • 926 Words
    • 4 Pages

    Criminals often use stolen or fake identity documents in order to carry out financial crimes. We are leading an international, cross-sector partnership to improve the level of security of official documents.…

    • 926 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Hollocaust

    • 663 Words
    • 3 Pages

    After Hitler convinced the Germans that the Jews were the center of all problems, he started to make camps to place all the Jews. These camps weren’t nice places to be. They were all used to kill millions of Jews. Auschwitz was the most feared of all. Over 2 million Jews were killed there in ways that aren’t humane, such as shooting them, or gassing them in a chamber, or even burning them alive. This camp even bought little farms and houses for places to kill. They had the ever so famous Little Red house and the Little White house. These were places that they took Jews to kill them.…

    • 663 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the book Technology and Society: Opposing Viewpoints, Joseph D’agnese discusses our loss of privacy on the internet: “. . .almost every move you make is catalogued in service to the gods of commerce. They know what you’re buying. What you listen to. Where you chat” (D’Agnese, 180). This has become very scary for our generation as our personal information can easily get out. Not enough privacy lowers our happiness level. We feel as if we are being controlled and watched.…

    • 1049 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Rtyn

    • 5264 Words
    • 22 Pages

    _______ (1997). "Towards a Theory of Privacy in the Information Age," Computers and Society, Vol. 27, No. 3, September, 27–32.…

    • 5264 Words
    • 22 Pages
    Better Essays
  • Good Essays

    People are mistaken who believe internet video streaming is a fringe market. Watching television programming through subscription services like cable and dish is becoming increasingly expensive while online video streaming is free or becoming cheaper with more content being added daily. Streaming is “the process of providing a steady flow of audio or video data so that an Internet user is able to access it as it is transmitted.”(Daintith, 2004) In time internet video streaming will replace cable, dish, and over the air broadcasts as the main source of televised programming.…

    • 792 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Pointing to “backward U.S. technology,” Ziobro and Sidel reveal a long-standing issue between the financial industry and retailers that has slowed progression on chip cards. Because these cards are widely used in Europe and Canada, the U.S. has become the preferred target for criminal hackers, according to the authors. As a result, “the breaches keep coming,” and a computer-based attack experienced by Neiman Marcus over the holidays as well is used as further evidence of the widespread problem at hand.…

    • 439 Words
    • 2 Pages
    Good Essays

Related Topics