Search results

1 – 10 of 34

Abstract

Details

An Introduction to Algorithmic Finance, Algorithmic Trading and Blockchain
Type: Book
ISBN: 978-1-78973-894-0

Article
Publication date: 30 April 2020

Balkiz Yapicioglu and Rebecca Leshinsky

This paper aims to set out an argument for the use of blockchain technology as a land registration tool, for Cyprus and other disputed land contexts, to assist with land disputes…

Abstract

Purpose

This paper aims to set out an argument for the use of blockchain technology as a land registration tool, for Cyprus and other disputed land contexts, to assist with land disputes, which may, in turn, promote peace and harmony.

Design/methodology/approach

The paper is exploratory in nature. It raises the historical and present land issues in Cyprus and highlights that blockchain technologies could work as a tool to record disputed property rights on the Island.

Findings

While there have been many pilots to date for blockchain land registration, there is still scope to develop blockchain as a tool to record land interests. Cyprus offers an exemplar opportunity to use such a tool to assist in developing peace on the Island.

Originality/value

While the paper is conceptual in its application of blockchain technologies, it is novel in that it strives to show how technologies such as blockchain can act as a tool to assist with land registration matters, which, in turn, can assist with new ways to approach the peace process. More research is necessary for this area of inquiry, especially as to how sidechains can act as a conduit for recording competing land interests and disputed land claims.

Details

Journal of Property, Planning and Environmental Law, vol. 12 no. 2
Type: Research Article
ISSN: 2514-9407

Keywords

Article
Publication date: 6 September 2018

Sanjay Prasad, Ravi Shankar, Rachita Gupta and Sreejit Roy

Over last few years, a major innovation known as blockchain technology has emerged as potentially one of the most disruptive technology of recent times. The purpose of this paper…

1984

Abstract

Purpose

Over last few years, a major innovation known as blockchain technology has emerged as potentially one of the most disruptive technology of recent times. The purpose of this paper is to identify and analyze various critical success factors (CSFs) that can facilitate success of blockchain-based cloud services. Further, this paper aims to analyze and understand mutual interactions among these CSFs.

Design/methodology/approach

In this paper, 19 CSFs have been identified through literature review and expert opinions. The hierarchical framework developed using total interpretive structural modeling has revealed the inter-dependencies among these CSFs. The methodology employed in this study provides a mechanism to conduct an exploratory study by identifying the factors and analyzing their interactions through the development of a hierarchical framework. This research further categorizes CSFs into multiple clusters based on their driving power and dependence power.

Findings

This paper has identified 19 CSFs, namely, user engagement, industry collaboration, rich ecosystem, blockchain technology standardization, regulatory clarity, cost efficiency, energy efficiency (wasted resources), handling blockchain bloat, miner incentives, business case alignment to blockchain capability, sidechains development, blockchain talent pool availability, leadership readiness for a decentralized consensus based technology, technology investment and maturity, trust on blockchain networks, integration with other cloud services, robust and mature smart contracts platform, blockchain security and user control on data (privacy). Further, driver and dependent variables have been identified.

Research limitations/implications

Future research can discover and detail the sub-factors behind the 19 CSFs identified in this paper. Additionally, more work can be done to extend the current structural model for blockchain-based services to a more functional form.

Practical implications

It provides a comprehensive list of CSFs that are relevant for development of blockchain-based cloud services. This will help industry leaders to strategically focus on the main drivers that will ensure that businesses get maximum benefit of this disruptive technology.

Originality/value

This study makes a significant contribution in the literature of blockchain-based cloud services, which captures the perspective of different stakeholders. This study is one of the first (if not the first) systematic research on adoption of blockchain-based services. It creates the foundation to carry out further research in this area.

Book part
Publication date: 16 January 2023

Alevtina Dubovitskaya Ackerer and Damien Ackerer

This chapter reviews the underlying technologies of cryptoassets, including fundamental cryptographic primitives used in distributed ledger technologies and permissionless…

Abstract

This chapter reviews the underlying technologies of cryptoassets, including fundamental cryptographic primitives used in distributed ledger technologies and permissionless blockchain technologies and their consensus protocols such as proof-of-work and proof-of-stake. It discusses the pros and cons of existing approaches to improve blockchain scalability and considers the requirements for security and decentralization. The chapter also examines the following techniques: layer 1 tuning, layer 1 sharding, and layer 2 solutions. It concludes with an overview of technologies to swap cryptoassets off-chain, technical requirements for cross-chain transactions, and reviews cross-chain atomic swap implementation using hashed time lock contracts.

Details

The Emerald Handbook on Cryptoassets: Investment Opportunities and Challenges
Type: Book
ISBN: 978-1-80455-321-3

Keywords

Article
Publication date: 22 August 2022

Mabrook Al-Rakhami and Majed Al-Mashari

This work focuses on the interoperability of the blockchain from the viewpoint of its technological evolution in the wider context of supply chain systems. Interoperability…

Abstract

Purpose

This work focuses on the interoperability of the blockchain from the viewpoint of its technological evolution in the wider context of supply chain systems. Interoperability concerns the most since it is among the most persevering problems in the process of blockchain adaptation. The study aims to trace and pinpoint all the different methods that affect the interoperability of blockchains, gather all the obtainable evidence and recognize gaps in between the applicable approaches mentioned across the contemporary academic literature.

Design/methodology/approach

An analysis is done of seven interoperability approaches based on their relevance, practical usefulness and adoption processes concerning the blockchain. Mainly, this work examines interoperability from several different perspectives. An interoperability modular decomposition via a layered model has been defined through the level of conceptual interoperability (LCIM) and level of information system interoperability (LISI), which represent the most popular metrics with regard to assessing the level of interoperability from a qualitative level.

Findings

Generally, the findings of this work are directed in two major aspects: Firstly, it expands the research around blockchain technology interoperability by providing crucial background information and pinpointing important connotations for both industrial and academic environments. It also defines and analyzes several different approaches toward the blockchain platform's interoperability. Secondly, it also identifies and proposes several scenarios that take advantage of multiple blockchain application approaches, highlights various issues and challenges to the evolution of interoperability standards and solutions and indicates the desired areas of further research.

Originality/value

An essential aspect of the originality of this paper is that, contrary to other work contributions, this work summarized the different interoperability approaches for blockchain in supply chain systems. Mainly, seven approaches were discussed for practitioners and researchers, and the open issues and future research direction were considered.

Details

Business Process Management Journal, vol. 28 no. 5/6
Type: Research Article
ISSN: 1463-7154

Keywords

Content available
Book part
Publication date: 9 March 2021

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

Content available
Book part
Publication date: 9 March 2021

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

Article
Publication date: 8 October 2018

Natalia Miloslavskaya

Nowadays, to operate securely and legally and to achieve business objectives, secure valuable assets and support uninterrupted business processes, all organizations need to match…

Abstract

Purpose

Nowadays, to operate securely and legally and to achieve business objectives, secure valuable assets and support uninterrupted business processes, all organizations need to match a lot of internal and external compliance regulations such as laws, standards, guidelines, policies, specifications and procedures. An integrated system able to manage information security (IS) for their intranets in the new cyberspace while processing tremendous amounts of IS-related data coming in various formats is required as never before. These data, after being collected and analyzed, should be evaluated in real-time from an IS incident viewpoint, to identify an incident’s source, consider its type, weigh its consequences, visualize its vector, associate all target systems, prioritize countermeasures and offer mitigation solutions with weighted impact relevance. Different security information and event management (SIEM) systems cope with this routine and usually complicated work by rapid detection of IS incidents and further appropriate response. Modern challenges dictate the need to build these systems using advanced technologies such as the blockchain (BC) technologies (BCTs). The purpose of this study is to design a new BC-based SIEM 3.0 system and propose a methodology for its evaluation.

Design/methodology/approach

Modern challenges dictate the need to build these systems using advanced technologies such as the BC technologies. Many internet resources argue that the BCT suits the intrusion detection objectives very well, but they do not mention how to implement it.

Findings

After a brief analysis of the BC concept and the evolution of SIEM systems, this paper presents the main ideas on designing the next-generation BC-based SIEM 3.0 systems, for the first time in open access publications, including a convolution method for solving the scalability issue for ever-growing BC size. This new approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future.

Research limitations/implications

The most important area of the future work is to bring this proposed system to life. The implementation, deployment and testing onto a real-world network would also allow people to see its viability or show that a more sophisticated model should be worked out. After developing the design basics, we are ready to determine the directions of the most promising studies. What are the main criteria and principles, according to which the organization will select events from PEL for creating one BC block? What is the optimal number of nodes in the organization’s BC, depending on its network assets, services provided and the number of events that occur in its network? How to build and host the SIEM 3.0 BC infrastructure? How to arrange streaming analytics of block’s content containing events taking place in the network? How to design the BC middleware as software that enables staff to interact with BC blocks to provide services like IS events correlation? How to visualize the results obtained to find insights and patterns in historical BC data for better IS management? How to predict the emergence of IS events in the future? This list of questions can be continued indefinitely for a full-fledged design of SIEM 3.0.

Practical implications

This paper shows the full applicability of the BC concept to the creation of the next-generation SIEM 3.0 systems that are designed to detect IS incidents in a modern, fully interconnected organization’s network environment. The authors’ attempt to begin with a detailed description of the basics for a BC-based SIEM 3.0 system design is presented, as well as the evaluation methodology for the resulting product.

Originality/value

The authors believe that their new revolutionary approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future. They hope that this paper will evoke a lively response in this segment of the security controls market from both theorists and direct developers of living systems that will implement the above approach.

Content available
Book part
Publication date: 16 January 2023

Abstract

Details

The Emerald Handbook on Cryptoassets: Investment Opportunities and Challenges
Type: Book
ISBN: 978-1-80455-321-3

1 – 10 of 34