Abstract
Auditors are often asked to opine on technical security and encryption technologies, as well as providing admissible evidence in legal cases. This chapter reviews the most encountered security and encryption technologies, with guides to how auditors should assess and manage them. Substantial new capabilities are now available through machine learning and large language models, which are reviewed in this chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nakamoto, Satoshi et al. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System.
Varian, Hal R. 1972. Benfords Law. American Statistician 26(3): 65.
Westland, J. Christopher. 2021. Trade Informativeness and Liquidity in Bitcoin Markets. Plos One 16(8): e0255515.
———. 2023. Determinants of Liquidity in Cryptocurrency Markets. Digital Finance 5: 1–33.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Christopher Westland, J. (2024). Blockchains, Large Language Models, Cybercrime, and Forensics. In: Audit Analytics. Use R!. Springer, Cham. https://doi.org/10.1007/978-3-031-47464-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-47464-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47463-7
Online ISBN: 978-3-031-47464-4
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)