Governance in Decentralized Networks
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Secure and Privacy-Preserving Proxy Voting System
Secure and Privacy-Preserving Proxy Voting System Bernd Zwattendorfer, Christoph Hillebold, and Peter Teufl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria {bernd.zwattendorfer, peter.teufl}@iaik.tugraz.at, [email protected] Abstract— Voting is a frequent and popular decision making Proxy: A proxy is a voter that wants to get delegations process in many diverse areas, targeting the fields of e- from other voters. Delegations are kept secretly and are not Government, e-Participation, e-Business, etc. In e-Business, public. Like a user, also a proxy could either vote directly or voting processes may be carried out e.g. in order management, delegate her voting power to another proxy. A proxy can be inventory management, or production management. In this compared with a politician whose opinion must be public. field, voting processes are typically based on direct voting. Therefore a proxy cannot vote secretly and has to publish her While direct voting enables each eligible voter to express her vote. opinion about a given subject, representative voting shifts this Proxy voting allows voters either to vote directly or to power to elected representatives. Declarative or proxy voting delegate their voting power to a proxy. Delegations could be (based on liquid democracy) is a voting process situated in solved in two ways: between these two approaches and allows a voter to delegate her voting power to a so called proxy, who actually casts the 1. Either the voter copies the published vote of the votes for all the represented voters. The most interesting aspect chosen proxy (client-based) or of this approach is that voters have the opportunity to skip the 2. -
Proxy Voting Guidelines Benchmark Policy Recommendations TITLE
UNITED STATES Proxy Voting Guidelines Benchmark Policy Recommendations TITLE Effective for Meetings on or after February 1, 2021 Published November 19, 2020 ISS GOVERNANCE .COM © 2020 | Institutional Shareholder Services and/or its affiliates UNITED STATES PROXY VOTING GUIDELINES TABLE OF CONTENTS Coverage ................................................................................................................................................................ 7 1. Board of Directors ......................................................................................................................................... 8 Voting on Director Nominees in Uncontested Elections ........................................................................................... 8 Independence ....................................................................................................................................................... 8 ISS Classification of Directors – U.S. ................................................................................................................. 9 Composition ........................................................................................................................................................ 11 Responsiveness ................................................................................................................................................... 12 Accountability .................................................................................................................................................... -
A Liquid Democracy System for Human-Computer Societies
A Liquid Democracy System for Human-Computer Societies Anton Kolonin, Ben Goertzel, Cassio Pennachin, Deborah Duong, Marco Argentieri, Matt Iklé, Nejc Znidar SingularityNET Foundation, Amsterdam, Netherlands {anton, ben, cassio}@singularitynet.io Abstract replicated in latest developments of distributed computing system based on Proof-of-Stake (PoS) in blockchain. In the Problem of reliable democratic governance is blockchain systems, including some that are now used to critical for survival of any community, and it will design ecosystems for Artificial Intelligence (AI) be critical for communities powered with Artificial applications, the mostly suggested solution called Delegated Intelligence (AI) systems upon developments of Proof-of-Stake (DPoS), which effectively means that rule on the latter. Apparently, it will be getting more and basis of financial capabilities while it is implemented more critical because of increasing speeds and indirectly, by means of manually controlled voting process scales of electronic communications and to select delegates to conduct the governance of the system. decreasing latencies in system responses. In order The latter be only limited improvement and can nor be to address this need, we present design and implemented in AI communities operating at high speeds implementation of a reputation system supporting not controllable by means of limited human capabilities. “liquid democracy” principle. The system is based on “weighted liquid rank” algorithm employing The described situation leads to the danger that consensus in different sorts of explicit and implicit ratings being any emergent AI community may be quickly took over by exchanged by members of the society as well as AI system hostile to either majority of community of AI implicit assessments of of the members based on systems or humans that are supposed to be served by given measures of their activity in the society. -
Proxy Voting Policy and Procedures
Proxy Voting Policy and Procedures SEPTEMBER 2020 I. POLICY STATEMENT • For other pooled investment vehicles (e.g., UCITS), each MSIM Affiliate will vote proxies under this Policy pursuant Morgan Stanley Investment Management’s (“MSIM”) policy and to authority granted under its applicable investment advisory procedures for voting proxies, the Equity Proxy Voting Policy and agreement or, in the absence of such authority, as authorized by Procedures (the “Policy”) with respect to securities held in the the relevant governing board. accounts of clients applies to those MSIM entities that provide discretionary investment management services and for which • For separately managed accounts (including ERISA and an MSIM entity has authority to vote proxies. For purposes of ERISA-equivalent clients), each MSIM Affiliate will vote this Policy, clients shall include: Morgan Stanley U.S. registered proxies under this Policy pursuant to authority granted investment companies, other Morgan Stanley pooled investment under the applicable investment advisory agreement or vehicles, and MSIM separately managed accounts (including investment management agreement. Where a MSIM Affiliate accounts for Employee Retirement Income Security (“ERISA”) has the authority to vote proxies on behalf of ERISA and clients and ERISA-equivalent clients). This Policy is reviewed and ERISA-equivalent clients, the MSIM Affiliate must do so in updated as necessary to address new and evolving proxy voting accordance with its fiduciary duties under ERISA (and the issues and standards. Internal Revenue Code). The MSIM entities covered by this Policy currently include • In certain situations, a client or its fiduciary may reserve the the following: Morgan Stanley AIP GP LP, Morgan Stanley authority to vote proxies for itself or an outside party or may Investment Management Inc., Morgan Stanley Investment provide a MSIM Affiliate with a statement of proxy voting Management Limited, Morgan Stanley Investment policy. -
GJR-GARCH Volatility Modeling Under NIG and ANN for Predicting Top Cryptocurrencies
Journal of Risk and Financial Management Article GJR-GARCH Volatility Modeling under NIG and ANN for Predicting Top Cryptocurrencies Fahad Mostafa 1,* , Pritam Saha 2, Mohammad Rafiqul Islam 3 and Nguyet Nguyen 4,* 1 Department of Mathematics and Statistics, Texas Tech University, Lubbock, TX 79409, USA 2 Rawls College of Business, Texas Tech University, Lubbock, TX 79409, USA; [email protected] 3 Department of Mathematics, Florida State University, Tallahassee, FL 32306, USA; [email protected] 4 Department of Mathematics and Statistics, Youngstown State University, Youngstown, OH 44555, USA * Correspondence: [email protected] (F.M.); [email protected] (N.N.) Abstract: Cryptocurrencies are currently traded worldwide, with hundreds of different currencies in existence and even more on the way. This study implements some statistical and machine learning approaches for cryptocurrency investments. First, we implement GJR-GARCH over the GARCH model to estimate the volatility of ten popular cryptocurrencies based on market capitalization: Bitcoin, Bitcoin Cash, Bitcoin SV, Chainlink, EOS, Ethereum, Litecoin, TETHER, Tezos, and XRP. Then, we use Monte Carlo simulations to generate the conditional variance of the cryptocurrencies using the GJR-GARCH model, and calculate the value at risk (VaR) of the simulations. We also estimate the tail-risk using VaR backtesting. Finally, we use an artificial neural network (ANN) for predicting the prices of the ten cryptocurrencies. The graphical analysis and mean square errors (MSEs) from the ANN models confirmed that the predicted prices are close to the market prices. For some cryptocurrencies, the ANN models perform better than traditional ARIMA models. Citation: Mostafa, Fahad, Pritam Saha, Mohammad Rafiqul Islam, and Keywords: artificial neural network; cryptocurrency; GJR-GARCH; NIG; Monte Carlo simulation; Nguyet Nguyen. -
Interactive Democracy Blue Sky Ideas Track
Session 29: Blue Sky AAMAS 2018, July 10-15, 2018, Stockholm, Sweden Interactive Democracy Blue Sky Ideas Track Markus Brill TU Berlin Berlin, Germany [email protected] ABSTRACT approached this question by developing an app, DemocracyOS [48], Interactive Democracy is an umbrella term that encompasses a va- that allows users to propose, debate, and vote on issues. Democ- riety of approaches to make collective decision making processes racyOS is only one example of a quickly growing number of ap- more engaging and responsive. A common goal of these approaches proaches that aim to reconcile established democratic processes is to utilize modern information technology—in particular, the with the desire of citizens to participate in political decision mak- 1 Internet—in order to enable more interactive decision making pro- ing. Another example is the software LiquidFeedback [6], which is 2 cesses. An integral part of many interactive democracy proposals developed by the Association for Interactive Democracy. Currently, are online decision platforms that provide much more flexibility these tools are mainly used for decision making within progressive and interaction possibilities than traditional democratic systems. political parties [9, p. 162] or in the context of community engage- This is achieved by embracing the novel paradigm of delegative ment platforms such as WeGovNow [10]. A common goal of these voting, often referred to as liquid democracy, which aims to recon- approaches, often summarized under the umbrella term Interac- 3 cile the idealistic appeal of direct democracy with the practicality tive Democracy (henceforth ID), is to utilize modern information of representative democracy. The successful design of interactive technology—in particular, the Internet—in order to enable more democracy systems presents a multidisciplinary research challenge; interactive decision making processes. -
What Is Dynamic Governance?
What is Dynamic Governance? By Becky Bowen J.D. I attended a workshop on Dynamic Governance recently. While the concepts were not entirely unfamiliar to me, it wasn’t until I used them at a recent group facilitation that I noticed how big a difference they made in both the energy level and the satisfaction of the individual group members. What is Dynamic Governance? To answer that question, we need to take a look at what governance is. More than just the process of decision-making, governance is also the system by which decision-makers are determined and decisions are implemented. Back in high school we learned about our nation’s Constitution and the Bill of Rights that amended it. With all the political bickering that occurs over what is and is not a “constitutional right,” we sometimes forget that the Constitution is also the document by which our government was formed. It provides the structure for the three branches of government and the checks and balances system that has made for a pretty good system of law-making, law-enforcement, and law-interpretation. It also describes the system by which our Senators, Congressmen, President, Vice-President, and Supreme Court Justices take office. It isn’t so specific as to describe congressional rule-making procedure, but most of us are familiar enough with the voting process to know that in most cases, majority rules, and in some cases, a super-majority vote is required. How we run our town councils, non-profit boards, and other governance structures pretty much mirrors the government system just described. -
Free Speech Yearbook: 1972. INSTITUTION Speech Communication Association,New York, N.Y
DOCUMENT RESUME ED 071 122 CS 500 097 ADTHOR Tedford, Thomas L., Ed. TITLE Free Speech Yearbook: 1972. INSTITUTION Speech Communication Association,New York, N.Y. PUB DATE 73 NOTE 142p. AVAILABLE FROMSpeech Communication Association,Statler Hilton Hotel, New York, N.Y. 10001 ($2.50) ERRS PRICE MF-$0.65 HC-$6.58 DESCRIPTORS Bibliographies; Censorship; *CivilLiberties; Court Doctrine; *Freedom of Speech; GreekCivilization; *Social Attitudes; Student Opinion;Supreme Court Litigation ABSTRACT This book is a collection ofessays on free speech. issues and attitudes, compiled bythe Commission on Freedom of Speech of the Speech CommunicationAssociation. Four articles focuson freedom of speech in classroomsituations as follows:a philosophic view of teaching free speech, effectsof a course on free speechon student attitudes, historicalessentials of teaching free speech,and two opposing views on teacher attitudeson free speech in the communications classroom. Subjects ofother essays are: the judicial process in relation to freedom of speech;freedom of speech in ancient Athens; a case in which theAmerican Civil Liberties Union sought limitations on freedom ofspeech; the opposing philosophiesof Thomas Hobbes and John Stuart Mill;the rhetoric of intimidationin Indiana during.World War I; andSupreme Court decisions relating to the First Amendment during its1971-1972 term. The book ends withan extensive bibliography of articles,books, and court decisions relating to freedom of speechand published between July 1971and June 1972. (RN) rJ;freeperil ljearbook:1972 ,c.! a publication of The Commissionon Freedom of Speech of the Speech CommunicationAssociation U S. DEPARTMENT OF HEALTH. EDUCATION & WELFARE OFFICE OF EDUCATION THIS DOCUMENT HAS BEEN REPRO. DUCED EXACTLY AS RECEIVED FROM THE PERSON OR ORGANIZATION ORIG. -
Democracy on the Precipice Council of Europe Democracy 2011-12 Council of Europe Publishing Debates
Democracy on the Precipice Democracy Democracy is well-established and soundly practiced in most European countries. But despite unprecedented progress, there is growing dissatisfaction with the state of democracy and deepening mistrust of democratic institutions; a situation exacer- Democracy on the Precipice bated by the economic crisis. Are Europe’s democracies really under threat? Has the traditional model of European democracy exhausted its potential? A broad consensus is forming as to the urgent need to examine the origins of the crisis and to explore Council of Europe visions and strategies which could contribute to rebuilding confidence in democracy. Democracy Debates 2011-12 As Europe’s guardian of democracy, human rights and the rule of law, the Council of Europe is committed to exploring the state and practice of European democracy, as Debates of Europe Publishing 2011-12 Council Council of Europe Democracy well as identifying new challenges and anticipating future trends. In order to facilitate Preface by Thorbjørn Jagland this reflection, the Council of Europe held a series of Democracy Debates with the participation of renowned specialists working in a variety of backgrounds and disciplines. This publication presents the eight Democracy Debate lectures. Each presentation Zygmunt Bauman analyses a specific aspect of democracy today, placing the issues not only in their political context but also addressing the historical, technological and communication Ulrich Beck dimensions. The authors make proposals on ways to improve democratic governance Ayşe Kadıoğlu and offer their predictions on how democracy in Europe may evolve. Together, the presentations contribute to improving our understanding of democracy today and to John Keane recognising the ways it could be protected and strengthened. -
OCC Interpretive Letter 1174: DLT and Stable Coins
OCC interpretive letter 1174: DLT and stable coins Author: Ousmène Jacques Mandeng, Senior Advisor, Blockchain and Multiparty Systems, Accenture Table of Contents OCC interpretive letter 1174: DLT and stable coins .................................................. 2 OCC’s position on DLT and stable coins ................................................................. 2 DLT-platforms .......................................................................................................... 3 Tokens ..................................................................................................................... 4 Stable coins ............................................................................................................. 4 Token payments ...................................................................................................... 5 Token networks ....................................................................................................... 5 Bank balance sheet tokenization ............................................................................ 6 Next steps ................................................................................................................. 7 Copyright © 2021 Accenture. All rights reserved. 1 United States OCC interpretive letter 1174: DLT and stable coins The United States Office of the Comptroller of the Currency (OCC), a federal supervisor of national banks and cooperative banks, issued new general guidance about stable coins and distributed ledger technology (DLT) -
Defending Against Malicious Reorgs in Tezos Proof-Of-Stake
Defending Against Malicious Reorgs in Tezos Proof-of-Stake Michael Neuder Daniel J. Moroz Harvard University Harvard University [email protected] [email protected] Rithvik Rao David C. Parkes Harvard University Harvard University [email protected] [email protected] ABSTRACT Conference on Advances in Financial Technologies (AFT ’20), October 21– Blockchains are intended to be immutable, so an attacker who is 23, 2020, New York, NY, USA. ACM, New York, NY, USA , 13 pages. https: //doi.org/10.1145/3419614.3423265 able to delete transactions through a chain reorganization (a ma- licious reorg) can perform a profitable double-spend attack. We study the rate at which an attacker can execute reorgs in the Tezos 1 INTRODUCTION Proof-of-Stake protocol. As an example, an attacker with 40% of the Blockchains are designed to be immutable in order to protect against staking power is able to execute a 20-block malicious reorg at an attackers who seek to delete transactions through chain reorga- average rate of once per day, and the attack probability increases nizations (malicious reorgs). Any attacker who causes a reorg of super-linearly as the staking power grows beyond 40%. Moreover, the chain could double-spend transactions, meaning they commit an attacker of the Tezos protocol knows in advance when an at- a transaction to the chain, receive some goods in exchange, and tack opportunity will arise, and can use this knowledge to arrange then delete the transaction, effectively robbing their counterparty. transactions to double-spend. We show that in particular cases, the Nakamoto [15] demonstrated that, in a Proof-of-Work (PoW) setting, Tezos protocol can be adjusted to protect against deep reorgs. -
W5: Manipulability & Weighted Voting Systems
MATH 181 D2: A MATHEMATICAL WORLD W5: Manipulability & Weighted Voting Systems Objectives: SWBAT Manipulate a given election to produce the desired winner under any manipulable voting system. r Recognize which voting systems are manipulable. r Describe a weighted voting system using the quota and the voting weights r Determine which players are dictators or dummy voters r Recall Arrow's Impossibility Theorem: With three or more candidates and any number of voters, there does not exist{and there never will exist{a voting system that always produces a winner, satisfies the Pareto condition and IIA, and is not a dictatorship. So how badly do the suggested voting systems do? We are going to start by looking more closely at the manipulability of the system. Group Activity: Worksheet W5.1 Def: A voting system is said to be manipulable if there exist two sequences of preference list ballot and a voter (call the voter Jane) such that 1. Neither election results in a tie. 2. The only ballot change is by Jane. 3. Jane prefers{assuming that her ballot in the first election represents her true preferences{the outcome of the second election to that of the first election. We see this illustrated in the example from the worksheet. Note: Neither majority rule, in the case of two candidates, nor Condorcet's method, in the case of three or more candidates are manipulable. What about the Borda Count? We saw earlier that with four candidates and 2 voters it was manipulable, what about with 3 candidates? Group Activity: Worksheet W5.2 1 Example: Suppose the candidates are A; B, and C, and that you prefer A to B, but B is the election winner using the Borda count.