Academic literature on the topic 'Public ledger'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Public ledger.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Public ledger"

1

Dixon, Peter, and David Mannion. "Goldsmith and the Public Ledger." Language and Literature: International Journal of Stylistics 10, no. 4 (November 1, 2001): 307–23. http://dx.doi.org/10.1177/0973-9470-20010804-01.

Full text
Abstract:
Three essays, first published in 1760 in the Public Ledger, have been attributed to Goldsmith, though on somewhat scanty evidence. A stylometric study of these, based on samples from authentic Goldsmith material and from four control authors, suggests that one piece is very probably his, while the other two are almost certainly not. Inferences are based on the distances between samples from the three essays and the cluster of 20 samples from Goldsmith.
APA, Harvard, Vancouver, ISO, and other styles
2

Sahani, Amarpreet, Pawan Singh, and Anil Kumar. "Introduction to Blockchain." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 1, no. 1 (April 25, 2020): 1–9. http://dx.doi.org/10.54060/jieee/001.01.004.

Full text
Abstract:
The current monetary system has many issues associated with it like double spending, standard transaction fees, financial crisis, centralized power and private ledgers. Blockchain provides a remedy to all these ills by its basic structure, zero or minimal transaction fees and by providing a public ledger system which is visible to everyone who is the part of blockchain which makes it free from complications like double spending and financial crisis. Blockchain is basically a continuously growing list of records or public distributed ledger system called blocks linked and secured suing cryptography. Each block has multiple transaction details associated with it. It was introduced in the year 2009 by Satoshi Nakamoto, who is believed to be a Japanese man, born in 1974. Given the features and universal nature of the Blockchain, which include decentralized ledger system, proof of work and cryptography, one can appreciate that its implementation could result in far reaching changes in all domains.
APA, Harvard, Vancouver, ISO, and other styles
3

Charanya R. and Saravanaguru R. A. K. "Integrity of E-Health Record Ensured With Context-Based Merkle Tree Through Temporal Shadow in Blockchain." International Journal of Information Technology and Web Engineering 15, no. 4 (October 2020): 72–87. http://dx.doi.org/10.4018/ijitwe.2020100105.

Full text
Abstract:
The patient's health record is sensitive and confidential information. The sharing of health information is a first venture to make health services more productive and improve the quality of healthcare services. Decentralized online ledgers with blockchain-based platforms were already proposed and in use to address the interoperability and privacy issues. However, other challenges remain, in particular, scalability, usability, and accessibility as core technical challenges. The paper focuses on ensuring the integrity of the health record with context-based Merkle tree (CBMT) through temporal shadow. In this system, two ledgers were used to ensure the integrity of eHealth records like general public ledger (GPL) and personalized micro ledger (PML). The context-based Merkle tree (CBMT) is used to aggregates all the transactions at a particular time. The context means it depends on time, location, and identity. This is ensured without the help of a third party.
APA, Harvard, Vancouver, ISO, and other styles
4

Ajao, Lukman Adewale, James Agajo, Emmanuel Adewale Adedokun, and Loveth Karngong. "Crypto Hash Algorithm-Based Blockchain Technology for Managing Decentralized Ledger Database in Oil and Gas Industry." J 2, no. 3 (August 8, 2019): 300–325. http://dx.doi.org/10.3390/j2030021.

Full text
Abstract:
This research work proposes a method for the securing and monitoring of petroleum product distribution records in a decentralized ledger database using blockchain technology. The aim of using this technique is to secure the transaction of distributed ledgers in a database and to protect records from tampering, fraudulent activity, and corruption by the chain participants. The blockchain technology approach offers an efficient security measure and novel advantages, such as in the transaction existence and distribution ledger management between the depot, transporter, and retailing filling station. Others advantages are transparency, immunity to fraud, insusceptibility to tampering, and maintaining record order. The technique adopted for this secure distributed ledger database is crypto hash algorithm-1 (SHA-1)-based public permissioned blockchain and telematics, while this telematics approach is an embedded system integrated into an in-vehicle model for remote tracking of geolocation (using Global Positioning System (GPS)), monitoring, and far-off data acquisition in a real-time. The scope of the data in the secure distributed ledger database (using blockchain) developed are identification (ID) of the tanker operator, Depot name, Source station ID, Destination station ID, Petroleum product volume, Transporter ID, and Geographic automobiles location. This system proved to be efficient, secure, and easy to maintain as it does not permit any individual for records tampering, but supports agreement of ~75% of participants in the chain to make changes.
APA, Harvard, Vancouver, ISO, and other styles
5

Allen, Darcy W. E., Chris Berg, and Mikayla Novak. "Blockchain: an entangled political economy approach." Journal of Public Finance and Public Choice 33, no. 2 (October 31, 2018): 105–25. http://dx.doi.org/10.1332/251569118x15282111163993.

Full text
Abstract:
This paper incorporates blockchain activities into the broader remit of entangled political economy theory, emphasising economic and other social phenomena as the emergent by-product of human interactions. Blockchains are a digital technology combining peer-to-peer network computing and cryptography to create an immutable decentralised public ledger. The blockchain contrasts vintage ledger technologies, either paper-based or maintained by in-house databases, largely reliant upon hierarchical, third-party trust mechanisms for their maintenance and security. Recent contributions to the blockchain studies literature suggest that the blockchain itself poses as an institutional technology that could challenge existing forms of coordination and governance organised on the basis of vintage ledgers. This proposition has significant implications for the relevance of existing entangled relationships in the economic, social and political domains. Blockchain enables non-territorial 'crypto-secession', not only reducing the costs associated with maintaining ledgers, but radically revising and deconcentrating data-conditioned networks to fundamentally challenge the economic positions of legacy firms and governments. These insights are further illuminated with reference to finance, property and identity cases. Entangled political economy provides a compelling lens through which we can discern the impact of blockchain technology on some of our most important relationships.
APA, Harvard, Vancouver, ISO, and other styles
6

Konashevych, Oleksii. "Cross-blockchain protocol for public registries." International Journal of Web Information Systems 16, no. 5 (November 2, 2020): 571–610. http://dx.doi.org/10.1108/ijwis-07-2020-0045.

Full text
Abstract:
Purpose The purpose of this paper is to present a concept of the protocol for public registries based on blockchain. New database protocol aims to use the benefits of blockchain technologies and ensure their interoperability. Design/methodology/approach This paper is framed with design science research (DSR). The primary method is exaptation, i.e. adoption of solutions from other fields. The research is looking into existing technologies which are applied here as elements of the protocol: Name-Value Storage (NVS), Berkley DB, RAID protocol, among others. The choice of NVS as a reference technology for creating a database over blockchain is based on the analysis and comparison with two other similar technologies Bigchain and Amazon QLDB. Findings The proposed mechanism allows creating a standard database over a bundle of distributed ledgers. It ensures a blockchain agnostic approach and uses the benefits of various blockchain technologies in one ecosystem. In this scheme, blockchains play the role of journal storages (immutable log), whereas the overlaid database is the indexed storage. The distinctive feature of such a system is that in blockchain, users can perform peer-to-peer transactions directly in the ledger using blockchain native mechanism of user access management with public-key cryptography (blockchain does not require to administrate its database). Originality/value This paper presents a new method of creating a public peer-to-peer database across a bundle of distributed ledgers.
APA, Harvard, Vancouver, ISO, and other styles
7

Muftic, Sead. "BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger." Ledger 1 (December 21, 2016): 19–37. http://dx.doi.org/10.5195/ledger.2016.27.

Full text
Abstract:
With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI) as a distributed public ledger is also briefly described.
APA, Harvard, Vancouver, ISO, and other styles
8

Moreno, Jonathan D., and Ronald Bayer. "The Limits of the Ledger in Public Health Promotion." Hastings Center Report 15, no. 6 (December 1985): 37. http://dx.doi.org/10.2307/3563067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nin Sánchez, S. "The Implementation of Decentralised Ledger Technologies for Public Procurement." European Procurement & Public Private Partnership Law Review 14, no. 3 (2019): 180–96. http://dx.doi.org/10.21552/epppl/2019/3/7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Minesh Doshi, Akshat. "Decentralized Public / Private Ledger Technology and It‟s Applications." IJARCCE 7, no. 8 (August 30, 2018): 24–32. http://dx.doi.org/10.17148/ijarcce.2018.785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Public ledger"

1

Leung, Philip, and Daniel Svensson. "SecuRES: Secure Resource Sharing System : AN INVESTIGATION INTO USE OF PUBLIC LEDGER TECHNOLOGY TO CREATE DECENTRALIZED DIGITAL RESOURCE-SHARING SYSTEMS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187348.

Full text
Abstract:
The project aims at solving the problem of non-repudiation, integrity and confidentiality of data when digitally exchanging sensitive resources between parties that need to be able to trust each other without the need for a trusted third party. This is done in the framework of answering to what extent digital resources can be shared securely in a decentralized public ledger-based system compared to trust-based alternatives. A background of existing resource sharing solutions is explored which shows an abundance third party trust-based systems, but also an interest in public ledger solutions in the form of the Storj network which uses such technology, but focuses on storage rather than sharing. The proposed solution, called SecuRES, is a communication protocol based on public ledger technology which acts similar to Bitcoin. A prototype based on the protocol has been implemented which proves the ability to share encrypted files with one or several recipients through a decentralized public ledger-based network. It was concluded that the SecuRES solution could do away with the requirement of trust in third parties for all but some optional operations using external authentication services. This is done while still maintaining data integrity of a similar or greater degree to trust-based solutions and offers the additional benefits of non-repudiation, high confidentiality and high transparency from the ability to make source code and protocol documentation openly available without endangering the system. Further research is needed to investigate whether the system can scale up for widespread adoption while maintaining security and reasonable performance requirements.
Projektet ämnar lösa problemen med oförnekbarhet, integritet och konfidentialitet när man delar känsligt data mellan parter som behöver lita på varandra utan inblanding av betrodd tredje part. Detta diskuteras för att besvara till vilken omfattning digitala resurser kan delas säkert i ett decentraliserat system baserat på publika liggare jämfört med existerande tillitsbaserade alternativ. En undersökning av nuvarande resursdelningslösningar visar att det existerar många tillitsbaserade system men även en växande andel lösningar baserade på publika liggare. En intressant lösning som lyfts fram är Storj som använder sådan teknologi men fokuserar på resurslagring mer är delning. Projektets föreslagna lösning, kallad SecuRES, är ett kommunikationsprotokoll baserat på en publik liggare likt Bitcoin. En prototyp baserad på protokollet har tagits fram som visar att det är möjligt att dela krypterade filer med en eller flera mottagare genom ett decentraliserat nätverk baserat på publika liggare. Slutsatsen som dras är att SecuRES klarar sig utan betrodda tredje parter för att dela resurser medan vissa operationer kan göras mer användarvänliga genom externa autentiseringstjänster. Själva lösningen garanterar integritet av data och medför ytterligare fördelar såsom oförnekbarhet, konfidentialitet och hög transparens då man kan göra källkoden och protocoldokumentation fritt läsbar utan att utsätta systemet för fara. Vidare forskning behövs för att undersöka om systemet kan skalas upp för allmän användning och alltjämt bibehålla säkerhets- samt prestandakrav.
APA, Harvard, Vancouver, ISO, and other styles
2

Spendlove, George Bradley. "Security Analysis and Recommendations for CONIKS as a PKI Solution for Mobile Apps." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/8829.

Full text
Abstract:
Secure mobile apps, including end-to-end encrypted messaging apps such as Whats-App and Signal, are increasingly popular today. These apps require trust in a centralized key directory to automatically exchange the public keys used to secure user communication. This trust may be abused by malicious, subpoenaed, or compromised directories. A public key infrastructure (PKI) solution that requires less trust would increase the security of these commonly used apps.CONIKS is a recent PKI proposal that features transparent key directories which publish auditable digests of the public keys they present to queriers. By monitoring its key every time a new digest is published, a client can verify that its key is published correctly, reducing the need to trust the directory. CONIKS features improved security at the cost of unique auditing and monitoring requirements. In this thesis, we examine CONIKS' suitability as a PKI solution for secure mobile apps. We present a threat analysis of possible attacks on the CONIKS protocol and explore several important implications of CONIKS' system description, including recommendations for whistleblowing and key change policies. We also analyze mobile device usage data to estimate whether typical mobile device Internet connectivity is sufficient to fulfill CONIKS' monitoring requirement.
APA, Harvard, Vancouver, ISO, and other styles
3

JONSSON, JOHAN R. "Perceived Affordance and Socio-Technical Transition: Blockchain for the Swedish Public Sector." Thesis, KTH, Industriell ekonomi och organisation (Inst.), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-237533.

Full text
Abstract:
The Swedish public sector is under constant pressure to improve processes and services through further digitalization. Blockchain is a novelty technology which shows promise of enabling functionalities which are desired within the sector. However, as the technology is still in its infancy, the practical value it could offer the sector remains unproven. In this master thesis, the socio-technical transition of the public sector for adopting blockchain is analyzed using the multi-level perspective framework. The sector is operationalized as an incumbent socio-technical regime and blockchain as a collection of niche innovations. Affordance theory and the multi-level perspective are combined to analyze how the perception of blockchain affects the potential transition pathways. The primary empirical data is gathered through a series of interviews with key individuals from both the Swedish public sector and blockchain community, as well as from attending blockchain events. Secondary data is gathered through the review of various types of literature regarding the topic. The findings of the thesis show that the practical value and functionalities that blockchain offers and that match the needs of the sector are verification, authentication, traceability, automating simple logical functions, and digitizing unique value. The identified conceptual solutions deemed suitable today are: blockchain for identity management, blockchain for data verification, blockchains for property registers of, e.g., vehicles and real estate, and external industry blockchains for improved traceability of, e.g., supply chains and sales records. The thesis also derives recommendations for the public sector indicating that, e.g., active education, revision of regulation, and international cooperation would further a potential transition towards blockchain. It also finds that perceived affordances of a technology in its early stages affect the transition pathways; barriers of entry, number of potential adopting application sectors, the level of coordination, and the available resources for development are influenced by the perceptions.
Svensk offentlig sektor utsätts konstant för påtryckningar gällande fortsatt digitalisering av processer och tjänster. Blockkedjan är en ny teknologi som påvisar potential att kunna tillgodose funktioner önskvärda inom den offentliga sektorn. Dock är teknologin fortfarande i ett begynnande stadie och dess praktiska värde är ännu obevisat. I detta examensarbete analyseras offentliga sektorns potentiella socio-tekniska övergång till att ta blockkedjor i bruk med hjälp av multinivåperspektiv-ramverket. Sektorn operationaliseras som en befintlig socio-teknisk regim och blockkedjor som en samling av nischinnovationer. Görlighetsteori och multinivåperspektivet kombineras för att analysera hur uppfattningen av blockkedjor påverkar de potentiella övergångsvägarna. Primära empiriska data samlas in genom en serie av intervjuer med nyckelindivider från både svensk offentlig sektor och blockkedjegemenskapen, samt även från deltagande i blockkedjearrangemang. Sekundära data samlas in genom en studie av diverse typer av litteratur gällande ämnet. Examensarbetets resultat påvisar att det praktiska värdet och funktionaliteterna som blockkedjor tillgodoser och som passar med offentliga sektorns behov är verifikation, autentisering, spårbarhet, automatisering av simpla logiska funktioner, samt digitalisering av unika värden. De identifierade konceptuella lösningarna som bedöms lämpliga i dagsläget är: blockkedja för identitetshantering, blockkedja för dataverifikation, blockkedjor för egendomsregister, t.ex. för fordon och bostäder, samt externa industriblockkedjor för förbättrad spårning, t.ex. av försörjningskedjor och försäljning. Examensarbetet härleder även rekommendationer till offentliga sektorn, innefattande exempelvis aktiv utbildning, revision av reglementen, samt internationellt samarbete. Resultaten påvisar även att den uppfattade görligheten av en teknologi i ett tidigt stadie av innovation påverkar övergångsvägarna in i en regim. Detta genom att uppfattningarna influerar inträdesbarriärer, antalet potentiella applikationssektorer, koordinationsnivån, samt mängden tillgängliga resurser.
APA, Harvard, Vancouver, ISO, and other styles
4

Fleming, Theodor. "Decentralized Identity Management for a Maritime Digital Infrastructure : With focus on usability and data integrity." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-155115.

Full text
Abstract:
When the Internet was created it did not include any protocol for identifying the person behind the computer. Instead, the act of identification has primarily been established by trusting a third party. But, the rise of Distributed Ledger Technology has made it possible to authenticate a digital identity and build trust without the need of a third party. The Swedish Maritime Administration are currently validating a new maritime digital infrastructure for the maritime transportation industry. The goal is to reduce the number of accidents, fuel consumption and voyage costs. Involved actors has their identity stored in a central registry that relies on the trust of a third party. This thesis investigates how a conversion from the centralized identity registry to a decentralized identity registry affects the usability and the risk for compromised data integrity. This is done by implementing a Proof of Concept of a decentralized identity registry that replaces the current centralized registry, and comparing them. The decentralized Proof of Concept’s risk for compromised data integrity is 95.1% less compared with the centralized registry, but this comes with a loss of 53% in efficiency.
APA, Harvard, Vancouver, ISO, and other styles
5

Guler, Sevil. "Secure Bitcoin Wallet." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177587.

Full text
Abstract:
Virtual currencies and mobile banking are technology advancements that are receiving increased attention in the global community because of their accessibility, convenience and speed. However, this popularity comes with growing security concerns, like increasing frequency of identity theft, leading to bigger problems which put user anonymity at risk. One possible solution for these problems is using cryptography to enhance security of Bitcoin or other decentralised digital currency systems and to decrease frequency of attacks on either communication channels or system storage. This report outlines various methods and solutions targeting these issues and aims to understand their effectiveness. It also describes Secure Bitcoin Wallet, standard Bitcoin transactions client, enhanced with various security features and services.
APA, Harvard, Vancouver, ISO, and other styles
6

Lüdemann, Bente. "Å være faglig leder for anestesisykepleiere i norske helseforetak : balansekunst eller spagatøvelse?" Thesis, Nordic School of Public Health NHV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:norden:org:diva-3079.

Full text
Abstract:
Hensikt: Hensiktenmed studien var å undersøke forutsetningene for å være faglig leder for anestesisykepleiere i dagens norske helseforetak. Metode: Studien ble gjennomført med en kombinert metodikk: 1) Spørreundersøkelse med et skjema som forfatteren selv utviklet til alle førstelinjeledere for anestesisykepleiere i norske helseforetak,totalt77, med 80,5 % svarfrekvens. Datable analysert med kvantitative metoder.2) Halvstrukturerte individuelle intervju med syv ledere, strategisk utvalgt, både kvinner og menn, i alle landets fire regionale helseforetak, som det ble gjort en kvalitativ innholdsanalyse av. Resultat: I denne studien fant man at mange andre presserende oppgaver for lederne gjør at faglig ledelse ofte blir nedprioritertog delegert til andre, som fagutviklingssykepleierne. Lederne har et betydelig fokus på helsefremmende ledelse. Lederrollen er belastende, til tider slik at helsen påvirkes. Det er liten interesse for og nærmest ingen konkurranse om lederjobben. Av lederne er forholdsvis mange menn. Konklusjon: På grunn av de endrede rammebetingelsene,som følge av blant annet enhetlig ledelse og helseforetak,har lederrollen endret seg. Den har gått fra å stort sett være faglig leder til stadig mer personalledelse og administrative oppgaver. Lederne har i høy grad tilpasset seg de nye kravene, ogfungerer på mange måter som hybridlederemedettydelig fokus på helsefremmende ledelse.Anestesisykepleiefaget ivaretas gjerne av fagutviklingssykepleierne. Lederjobben oppleves som belastende og ikke særlig attraktiv for anestesisykepleiere
Aim: This study aimed to investigate the conditions being a professional leader of nurse anesthetists in Norwegian public hospitals today. Method: Thestudy used a combination of quantitative and qualitative methods, including a survey questionnaire constructed by the author and distributed to all first-line managers of nurse anesthetists in 77 Norwegian public hospitals, with a response rate of 80.5 %. The questionnaires were analyzed by quantitative methods. The author also conducted semi-structured individual interviews with seven strategically chosen leaders, both women and men, at hospitals in Norway’s four health regions. The interviews were analyzed using qualitative content analysis. Result: The results showed that leaders give less priority to professional leadership, largely due to many other urgent tasks, and frequently delegate this part of their leadership role to others (e.g., nurse anesthetists working with professional development). In leadership roles, nurse anesthetists focus on health promotion. They describe their managerial role as burdensome, at times even affecting their health. There is not much interest in and hardly any competition for managemen tpositions. Among the leaders, there is a relative dominance of men. Conclusion: Due to altered framework conditions, such as unitary management and health enterprises, the managerial role has changed, moving in responsibility from something more like a traditional foreman to becoming a first-line manager, who increasingly deals with personnel management and administration. Leaders have mostly adapted to the new demands.In many ways, they functionas hybrid leaders whofocus on health promoting leadership.Nurse anesthetistsperceive the management position as burdensome and not particularly attractive

ISBN 978-91-86739-38-6

APA, Harvard, Vancouver, ISO, and other styles
7

Pakola, Monsen Rebecca. "Vem leder organisationens narrativ? : En jämförelse mella Kvinnojouren Emblas och Rädda Barnens kommunikation på Facebook." Thesis, Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-28966.

Full text
Abstract:
Det är inget nytt att undersöka interaktioner på Facebook, dock är det oftast ur privatpersoners synvinkel Facebook undersöks och inte lika ofta ur en organisations synvinkel. Den här studien syftar till att fylla en del av gapet i medie- och kommunikationsforskningen om hur ideella organisationer beter sig på Facebook genom att undersöka den narrativa processen hos två ideella organisationer och hur delaktiga användare är i organisationernas berättelse beroende på organisationens storlek, Kvinnojouren Embla och Rädda Barnen. Därför är studiens frågeställning utformad som följande; på vilket sätt interagerar ideella organisationer med sina medlemmar via organisationens Facebook-sida? Hur utvecklas interaktiva berättelser på organisationernas Facebook-sida? Vilka skillnader kan identifieras mellan en stor och liten organisation? Studien utgår ifrån Earl och Kimport (2011) som menar att organisationer kan använda sig av två strategier i sin kommunikation på nätet; supersize strategier, som kortfattat innebär att organisationer tar sina befintliga offline-strategier och gör dem större, starkare och kraftfullare via internet, samt teori 2.0 strategier, som kortfattat innebär att organisationer använder nya, innovativa metoder för att förmedla sina budskap. Solis och Breakenridge (2010) skriver om hur interaktivitetsmöjligheter förändrar hur organisationer bör tänka när de skriver meddelanden på nätet och att organisationer bör sluta se sina intressenter som en stor publik, utan att de ska betraktas och behandlas som individer. De menar även att det är viktigt att alltid hålla sig uppkopplad för att det alltid händer något på nätet. Det kan resultera i utmaningar för ideella organisationer eftersom att Greenberg och MacAulay (2009) menar att de inte prioriterar att uppdatera sina sidor och därför kan ha det svårt att anpassa sig till nätverkets sociologiska dynamik. Fortsättningsvis undersöker studien Kvinnojouren Embla och Rädda Barnens respektive Facebook-sidor med hjälp av netnografi under en veckas tid. Netnografi är en observationsmetod för nätgemenskaper som liknar etnografi, men bör erkännas som en egen forskningsmetod separat från etnografin även om de båda utgår från samma pelare. Studien har funnit att Kvinnojouren Emblas Facebook-sida är betydligt mindre aktiv än Rädda Barnen både med publicering från organisationen men även användarna. Det är även en annan typ av diskurs på respektive sida. På Emblas sida strävar användarna mot en liten gemenskap, och på Rädda Barnens sida strävar användarna mot att förmedla sanning och rättvisa. Studien har även sett att det är användarna på Rädda Barnens Facebook-sida som till störst del driver interaktionerna mellan organisation och användare, vilket visar på att användarna använder teori 2.0 strategier och på så sätt blir individuella aktivister.
To study interaction on Facebook is nothing new; however, those studies are mostly made from an individual’s point of view and not as often from an organizations point of view. This study aims to fill a part of that hole in media and communication studies by studying the narrative process of two nonprofit organizations on Facebook, and how the users are part of the organizations storytelling according to size and resources, Kvinnojouren Embla and Save the Children. The studies main questions are therefore the following; in what way do nonprofit organizations interact with their members on the organizations Facebook page? How do interactive stories develop on the organizations Facebook page? What differences can be identified between a big and a small organization? The study is based on Earl and Kimport (2011) who says that organizations can use two strategies in their communication online; supersize strategies, that briefly means that organizations uses that same strategies from their offline communication and applies them to the internet to make it bigger better and stronger, and theory 2.0 strategies, that briefly means that organizations – or individuals – use new and innovative methods to mediate their message. Solis and Breakenridge (2010) writes about how the possibilities for interactivity changes how organizations should think while writing a message online and to stop seeing their stakeholders as a big audience, but to regard and treat them as individuals. They also claim that it is important to always be connected because something always happens online. This can result in difficulties for nonprofit organizations because, according to Greenberg & MacAulay (2009), they do not prioritize their pages, and therefore will have a hard time adapting to the sociological dynamics of Facebook. Further, the study examines Kvinnojouren Embla and Save the Children’s respective Facebook-pages with help from netnography during a week. Netnography is an observation method for examining online communities. The method is similar to ethnography, but should be known as a research method on its own, even though they both are based on the same pillars. The study has found that Kvinnojouren Embla’s Facebook-page is considerably less active than Save the Children’s, both regarding publications from the organization, but also the users. There is also another kind of discourse on the respective pages.  On Emblas page, the users strive towards a small community, and on Save the Children’s page the users strive towards mediating the truth and justice. The study has also found that it is the users on Save the Children’s Facebook-page that to the most part drives the interactivity between organization and user, which shows that the users uses theory 2.0 strategies and in that way becomes individual activists.
APA, Harvard, Vancouver, ISO, and other styles
8

Erdogan, Aysegül. "Leder intern policyförändring till extern policyförändring? : En studie av svensk migrationspolitik i EU." Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nessæther, Anne Lise. "Kvinnelige ledere av omsorgstjenestene. : En kvalitativ studie." Thesis, Nordic School of Public Health NHV, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:norden:org:diva-3207.

Full text
Abstract:
Det har skjedd store omstillinger og moderniseringer i norsk offentlig sektor. Mange norske kommuner har innført flat organisasjonsstruktur med to mydighetsnivåer. Desentralisering av ansvar til utførernivå, myndiggjøring og sterk ledelse er sentrale trekk. Den økte effektiviseringen av helse- og omsorgstjenestene, kombinert med økt krav til resultater og rasjonalisering, har hatt negativ innvirkning på arbeidsmiljøene. Tjenesteområdene er store kvinnearbeidsplasser og behovet for oppmerksomhet rundt kvinnenes innsats i norske velferdstjenester er stort. Hensikten med studien er å få kunnskap om hvordan kvinnelige ledere av omsorgstjenestene opplever og håndterer presset mellom økonomisk knapphet og det økende behovet for offentlige velferdsoppgaver, og om hvilken betydning kjønn, tjenestens innhold og struktur, samt ledernes profesjonelle fagbakgrunn, har for ledelse. Det er gjort kvalitative intervjuer med ti kvinnelige ledere av sykehjem og hjemmetjenester i en større bykommune i Norge. Konklusjon: Hovedfunn i studien er at ledelse i to-nivåmodell er kontekstuelt betinget, og styrere og soneledere utfører ledelse forskjellig. Desentralisering av ansvar gir tilsynelatende makt og myndighet over ressurser og budsjett. Styrerne opplever å ha alle muligheter til å lykkes og opplever mestring i jobben. Sonelederne utøver ”avmektig lederskap” og har et distansert forhold til systemet oppover. Familien er en viktig støtte og grensesetter for begge ledergruppene.
There have been great readjustments and modernizations within the Norwegian public sector. Many Norwegian local authorities have implemented a flat organizational structure with 2 levels of authority. Decentralization of responsibility to level of execution, empowerment, and a strong management are key features. The increased efficiency of health- and care services, combined with increased demands for results and rationalization, have had a negative effect on the work environment. The health and care services are large female workplaces, and the need for attention around the female contribution to the Norwegian welfare sector is great. The purpose of this study is to gain knowledge about how female leaders within the welfare sector perceive and handle the pressure that arises between the lack of funds and the increase in demand for public welfare services. Furthermore, it explores the significance gender, the services’ content and structure, and professional backgrounds of the leaders affect the management. There has been done qualitative interviews with ten female leaders of caring services and institutions for elderly in a larger city municipal in Norway. Conclusion: The main findings in this study is that management in the two-level model, is contextually conditioned, and the directors and zone leaders carry out their management in different ways. The decentralization of responsibility seemingly gives power and authority over resources and the budget. Directors feel they have the opportunity to succeed and experience mastering in their work. Zone leaders perform “powerless leadership” and have a distant relationship with the higher system. Family is an important support and also sets boundaries for both of the managerial groups

ISBN 978-91-85721-22-1

APA, Harvard, Vancouver, ISO, and other styles
10

Kjeldsø, Fastvold Kristin. "Ledelse i et krysspress : en kvalitativ studie av hvordan ledere opplever å arbeide helsefremmende i offentlig sektor." Thesis, Nordic School of Public Health NHV, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:norden:org:diva-3143.

Full text
Abstract:
Resultat: To tema fremkom i studien Ledelse i et krysspress og Ledelse i en omsorgsrolle. De to temaene ble belyst med fem hovedkategorier med til sammen 14 underkategorier, som viste at lederne opplever et visst krysspress med hensyn til krav fra overordnede gjeldende resultater, måloppnåelse, og forventninger fra ansatte om ivaretakelse av deres arbeidsmiljø. Endringer i offentlig sektor medfører et økt fokus på det helsefremmende aspekt og et større press på lederne for å innfri dette. De beskrivelser som fremkommer i studien viser at lederne er bevisste hvilken rolle de som ledere har i arbeidsmiljøet med hensyn til kommunikasjon, inkludering og tilrettelegging, samt samhandling og egen tilstedværelse i miljøet. Lederne har et flerdimensjonert og ulikt bilde av hva helsebegrepet innholder og omfatter. Lederne uttrykker et helhetlig syn på helse. Konklusjon: Helsefremmende arbeidsplasser representerer både noe nytt og noe kjent for lederne. Sentrale momenter i utøvelse av ledelse for å implementere konseptet er bevissthet og balansering av lederrollen, samhandling og tilstedeværelse og å ha en løsnings fokusert tilnærming til problemstillinger og en støttende lederstil.Endringene i offentlig sektor i Norge er basert på New Public Management prinsippene med fokus på resultatoppfølging og økonomi. Dette har medført at lederne opplever å ha et mindre handlingsrom for å fremme helsen til ansatte på arbeidsplassen.
Aim: This study is aimed to increase understanding of how leaders in the public sector experience and understand their role and responsiblity regarding health promotion in the workplace. Our results might prove useful in leadership training programs. Method: Data collection comprises a total of 10 semi-structured individual interviews with both male and female leaders from the public sector. Interview analysis was conducted using a phenomenographic approach. Result: Two main themes emerged: Leadership under pressure and Leadership in a caring role. Analysis also revealed 5 main categories, and 14 subcategories. The main results showed that the leaders must deal with the expectations of their superiors, who demand achievements and results, and their employees, who expect a healthy workplace environment. Changes in the public sector increasingly have focus on health promotion and on the demand that leaders fulfill this goal. The leaders understood their roles in communication, inclusion, and interaction, and also understood their own presence in the work environment. They all shared multidimensional and miscellaneous understanding of health promotion, and they expressed a holistic view of health in the workplace. Conclusion: Leaders in the public sector view healthy workplaces as both new and already familiar. Key leadership factors (ie. concept implementation, awareness and balancing of leadership roles, interaction, and presence) all require a focused approach to solutions and a supportive leadership style. Based on the new principals of public management in Norway, changes in the public sector currently focus on performance monitoring and economy. Consequently, leaders anticipate fewer possibilities for employees regarding health promotion in the workplace.

ISBN 978-91-86739-02-7

APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Public ledger"

1

Alcock, Vivien. The haunting of Cassie Palmer. New York: Dell, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

The haunting of Cassie Palmer. London: Mammoth, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thygesen, Niels. Tillid på bundlinjen: Offentlige ledere går nye veje. København: Gyldendal, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Johanson, Kjell E. Frǎn tanke till handling: Aktiva folkrörelser leder till bättre folkhälsa och ett tryggare samhälle. [Stockholm]: Sober förlag, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Press, Ehinold. Notary Log Book: Public Notary Ledger Book. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

The Public ledger commodity year book 1987/88. Watford: Turret-Wheatland Ltd, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pennsylvania, Genealogical Society of, ed. Public ledger newspaper index, January 1871-December 1875, death index. Philadelphia: [Genealogical Society of Pennsylvania], 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hill, Hamber. Notary Journal Book: Notary Gift- Notary Public Log Book- Notary Public Journal- Notary Ledger Book. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Public ledger newspaper, Philadelphia, Pennsylvania, January 1, 1866-December 31, 1870: Index to marriages. Philadelphia, Pa: The Society, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Public ledger newspaper: Philadelphia, Pennsylvania, January 1, 1852-December 31, 1865 : index, marriages only. [Philadelphia]: The Society, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Public ledger"

1

Shah, Jignasha R., and Deepak H. Sharma. "Public Distributed Ledger Technologies: Architecture and Consensus." In Lecture Notes in Networks and Systems, 545–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84760-9_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bui, Thanh, and Tuomas Aura. "Key Exchange with the Help of a Public Ledger." In Security Protocols XXV, 123–36. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reddick, Christopher G. "Analyzing the Case for Adopting Distributed Ledger Technology in the Bank of Canada." In Public Administration and Information Technology, 219–38. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55746-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bui, Thanh. "Key Exchange with the Help of a Public Ledger (Transcript of Discussion)." In Security Protocols XXV, 137–43. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bursuc, Sergiu, and Steve Kremer. "Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification." In Lecture Notes in Computer Science, 361–82. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29959-0_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bui, Thanh, and Tuomas Aura. "Application of Public Ledgers to Revocation in Distributed Access Control." In Information and Communications Security, 781–92. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01950-1_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Oliver Goldsmith, The Public Ledger, 16 February 1760." In Tobias Smollett, 166. Routledge, 2002. http://dx.doi.org/10.4324/9780203197516-60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kuppusamy, Palanivel. "Blockchain Architecture Stack to Smart Education." In Digital Transformation and Innovative Services for Business and Learning, 129–58. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-5175-2.ch008.

Full text
Abstract:
Blockchain is an emerging technology that serves as an immutable ledger and publicly available infrastructure for building decentralized applications. Blockchain-based applications ensure transparency and trust between all parties involved in the interaction. Nowadays, educational organizations focus on online education and propose to create a system based on educational smart contracts in a public ledger. This public ledger shall be shared between major online and offline educational institutes around the world. From a software architecture perspective, blockchain enables new forms of distributed software architectures across a large network of untrusted participants. The objective of this chapter is to propose a blockchain architecture stack to smart education. The proposed architecture exploits the benefits of the blockchain and global ecosystem simplification to create a globally trusted higher education credit system.
APA, Harvard, Vancouver, ISO, and other styles
9

Moussa, Rim, and Alfredo Cuzzocrea. "Extracting Insights From Bitcoin Transactions." In Advances in Information Security, Privacy, and Ethics, 45–65. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5839-3.ch003.

Full text
Abstract:
Bitcoin is the most well-known cryptocurrency. It was first released in 2009 by Satoshi Nakamoto. Bitcoin serves as a decentralized medium of digital exchange, with transactions verified and recorded in the blockchain. The latter is a public immutable distributed ledger that operates without the need of a trusted record keeping authority or a central intermediary. It provides OLTP capabilities with both atomic transactions and data durability guarantees for blockchain transactions. Blockchain ledgers were not designed to perform analytics questions. The availability of the entire bitcoin transaction history, stored in its public blockchain, offers interesting opportunities for analyzing the transactions to obtain insights on users/entities patterns and transactions patterns. For these purposes, the authors need to store and analyze cryptocurrency transactions in a data warehouse. In this chapter, they investigate public blockchain datasets, and they overview different data models for setting up a data warehouse appliance of cryptocurrencies.
APA, Harvard, Vancouver, ISO, and other styles
10

Sakiz, Burcu. "New Financial Technologies, Cryptocurrencies, Blockchain, and Challenges." In Handbook of Research on Creating Sustainable Value in the Global Economy, 85–102. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1196-1.ch006.

Full text
Abstract:
As technological innovation transforms our economies, companies and start-ups all over the world are performing developments on financial technologies called “FinTech/fintech” for a chance to thrive. It even sparked the invention of blockchain and the inception of cryptocurrencies (digital/virtual money) such as Bitcoin. The blockchain technology provides Bitcoin's public ledger, an ordered and timestamped record of transactions. Blockchain is one of a kind decentralized technology mainly used by fintechs and it is a distributed as well as decentralized ledger that presents a radical, new, modern, and disruptive way of conducting all manner of transactions over the internet. Blockchain-based applications provide many opportunities to create a more sustainable world. With this research agenda, this chapter contributes to the discussion on future avenues for sustainability and information systems research on fintechs, especially cryptocurrencies and blockchain-based platforms and services.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Public ledger"

1

Kobeissi, Nadim, and Natalia Kulatova. "Ledger design language: designing and deploying formally verified public ledgers." In 2018 3rd IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2018. http://dx.doi.org/10.1109/eurospw.2018.8429049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sidiq, Muhammad Fajar, Fahrudin Mukti Wibowo, Merlinda Wibowo, Akbari Indra Basuki, Iwan Setiawan, and Didi Rosiyadi. "Secret and Trustable Communication Channel over Blockchain Public Ledger." In 2021 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT). IEEE, 2021. http://dx.doi.org/10.1109/comnetsat53002.2021.9530771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Merlini, Marco, Neil Veira, Ryan Berryhill, and Andreas Veneris. "On Public Decentralized Ledger Oracles via a Paired-Question Protocol." In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2019. http://dx.doi.org/10.1109/bloc.2019.8751484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Zhou, Andrew B. Williams, and Debbie Perouli. "Dependable Public Ledger for Policy Compliance, a Blockchain Based Approach." In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2019. http://dx.doi.org/10.1109/icdcs.2019.00187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Lei, Lin Chen, Zhimin Gao, Yang Lu, and Weidong Shi. "CoC: Secure Supply Chain Management System Based on Public Ledger." In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 2017. http://dx.doi.org/10.1109/icccn.2017.8038514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hossain, Mahmud, Ragib Hasan, and Shams Zawoad. "Probe-IoT: A public digital ledger based forensic investigation framework for IoT." In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2018. http://dx.doi.org/10.1109/infcomw.2018.8406875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hossain, Mahmud, Yasser Karim, and Ragib Hasan. "FIF-IoT: A Forensic Investigation Framework for IoT Using a Public Digital Ledger." In 2018 IEEE International Congress on Internet of Things (ICIOT). IEEE, 2018. http://dx.doi.org/10.1109/iciot.2018.00012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Spence, Gary. "Blockchain based systems and Edge computing working together as a decentralized public ledger." In 2018 Fifth International Conference on Software Defined Systems (SDS). IEEE, 2018. http://dx.doi.org/10.1109/sds.2018.8370413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Concepcion Leon, Adrian, and Markus Endler. "Secure distributed ledgers to support IoT technologies data." In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7356.

Full text
Abstract:
Blockchain and Tangle are data structures used to create an immutable public record of data insured by a network of peer-to-peer participants who maintain a set of constantly growing data records known as ledgers. Blockchain and Tangle technologies are a decentralized solution that guarantees the exchange of large amounts of trusted messages, among billions of connected IoT devices, which are very valuable as they are valid and complete. This highly encrypted and secure peer-to-peer messaging mechanism is adopted in this project to manage the processing of IoT transactions and the coordination between the devices that interact with the process. To maintain private transactions, secure and trustless, the distributed consensus algorithms are responsible for validating and choosing transactions and recording them in the global ledger. The results showed that the speed of the consensus algorithms can affect the creation in real time of reliable stories that track the events of the IoT networks. After incorporating Complex Event Processing that allows selecting only those high level events, it is possible to get an improvement in many situations. The result is a Middleware system that provides a framework for the construction of large-scale computer applications that use Complex Events Processing and different decentralized ledgers such as the blockchain of Ethereum or IOTA Tangle, for secure data storage.
APA, Harvard, Vancouver, ISO, and other styles
10

Schwarzman, Oleg, Maksim Diuldin, Julia Zinkina, and Roman Davydov. "Prospects for Distributed Ledger Technology Use in Public Procurement System of the Russian Federation." In DTMIS '20: International Scientific Conference - Digital Transformation on Manufacturing, Infrastructure and Service. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3446434.3446534.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Public ledger"

1

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover's algorithm concedes a quadratic advantage for mining blocks in certain consensus protocols such as proof of work. Today, there are hundreds of billions of dollars denominated in cryptocurrencies that rely on blockchain ledgers as well as the thousands of blockchain-based applications storing value in blockchain networks. Cryptocurrencies and blockchain-based applications require solutions that guarantee quantum resistance in order to preserve the integrity of data and assets in their public and immutable ledgers. We have designed and developed a layer-two solution to secure the exchange of information between blockchain nodes over the internet and introduced a second signature in transactions using post-quantum keys. Our versatile solution can be applied to any blockchain network. In our implementation, quantum entropy was provided via the IronBridge Platform from CQC and we used LACChain Besu as the blockchain network.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography