Digital Currencies and Cryptocurrencies Transforming Financial Transactions and Investment Strategies
Abstract
As mentioned by Amsyar (2020), in the world of finance, digital currencies and tokens are taking the place of stock exchanges. Cryptocurrencies have been used to conduct transactions in and out of the world since 2009, but only in this new form of financial transaction that has captured attention. Cryptocurrencies are becoming widespread use globally, taking advantage of emerging technology, which may be reflected in several measures to improve the global economy. It is an easy choice when trying to purchase shares in Bitcoin companies, currently the most significant Bitcoin holders in the world. As a result of these significant crypto bullshitting stocks, hundreds of cryptocurrencies are currently trending in the stock market. By purchasing and holding cryptocurrency as its own, the investor can keep a stake in the cryptocurrency by investing in the underlying assets or the cryptocurrency trading network. One of the most popular ways to use cryptocurrencies to invest is by purchasing them in large amounts. In many cases, these investments are called buy and hold investments, in which the investor holds the cryptocurrencies while purchasing underlying assets (Amsyar et al., 2020).
References
R. R. Pansara, S. A. Vaddadi, R. Vallabhaneni, N. Alam, B. Y. Khosla and P. Whig, "Fortifying Data Integrity using Holistic Approach to Master Data Management and Cybersecurity Safeguarding," 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2024, pp. 1424-1428, doi: 10.23919/INDIACom61295.2024.10498671.
R. Vallabhaneni, N. H. S, H. P and S. S, "Protecting the Cybersecurity Network Using Lotus Effect Optimization Algorithm Based SDL Model," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-7, doi: 10.1109/ICDCOT61034.2024.10515812.
R. Vallabhaneni, N. H S, H. P and S. S, "Feature Selection Using COA with Modified Feedforward Neural Network for Prediction of Attacks in Cyber-Security," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10516044.
S. E. V. S. Pillai, R. Vallabhaneni, P. K. Pareek and S. Dontu, "Strengthening Cybersecurity using a Hybrid Classification Model with SCO Optimization for Enhanced Network Intrusion Detection System," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-9, doi: 10.1109/ICDCOT61034.2024.10516247.
R. Vallabhaneni, N. H. S, H. P and S. S, "Team Work Optimizer Based Bidirectional LSTM Model for Designing a Secure Cybersecurity Model," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10515495.
S. E. V. S. Pillai, R. Vallabhaneni, P. K. Pareek and S. Dontu, "The People Moods Analysing Using Tweets Data on Primary Things with the Help of Advanced Techniques," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10516073.
S. E. V. Somanathan Pillai, R. Vallabhaneni, P. K. Pareek and S. Dontu, "Financial Fraudulent Detection using Vortex Search Algorithm based Efficient 1DCNN Classification," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10515330.
Vallabhaneni, Rohith et al. Secured web application based on CapsuleNet and OWASP in the cloud. Indonesian Journal of Electrical Engineering and Computer Science, [S.l.], v. 35, n. 3, p. 1924-1932, sep. 2024. ISSN 2502-4760. doi:http://doi.org/10.11591/ijeecs.v35.i3.pp1924-1932.
Vallabhaneni Rohith et al. Detection of cyberattacks using bidirectional generative adversarial network. Indonesian Journal of Electrical Engineering and Computer Science, [S.l.], v. 35, n. 3, p. 1653-1660, sep. 2024. ISSN 2502-4760. doi:http://doi.org/10.11591/ijeecs.v35.i3.pp1653-1660.
Vallabhaneni Rohith et al. MobileNet based secured compliance through open web application security projects in cloud system. Indonesian Journal of Electrical Engineering and Computer Science, [S.l.], v. 35, n. 3, p. 1661-1669, sep. 2024. ISSN 2502-4760. doi:http://doi.org/10.11591/ijeecs.v35.i3.pp1661-1669.
Refbacks
- There are currently no refbacks.