Search results
1 – 10 of 34
Abstract
Details
Keywords
Balkiz Yapicioglu and Rebecca Leshinsky
This paper aims to set out an argument for the use of blockchain technology as a land registration tool, for Cyprus and other disputed land contexts, to assist with land disputes…
Abstract
Purpose
This paper aims to set out an argument for the use of blockchain technology as a land registration tool, for Cyprus and other disputed land contexts, to assist with land disputes, which may, in turn, promote peace and harmony.
Design/methodology/approach
The paper is exploratory in nature. It raises the historical and present land issues in Cyprus and highlights that blockchain technologies could work as a tool to record disputed property rights on the Island.
Findings
While there have been many pilots to date for blockchain land registration, there is still scope to develop blockchain as a tool to record land interests. Cyprus offers an exemplar opportunity to use such a tool to assist in developing peace on the Island.
Originality/value
While the paper is conceptual in its application of blockchain technologies, it is novel in that it strives to show how technologies such as blockchain can act as a tool to assist with land registration matters, which, in turn, can assist with new ways to approach the peace process. More research is necessary for this area of inquiry, especially as to how sidechains can act as a conduit for recording competing land interests and disputed land claims.
Details
Keywords
Sanjay Prasad, Ravi Shankar, Rachita Gupta and Sreejit Roy
Over last few years, a major innovation known as blockchain technology has emerged as potentially one of the most disruptive technology of recent times. The purpose of this paper…
Abstract
Purpose
Over last few years, a major innovation known as blockchain technology has emerged as potentially one of the most disruptive technology of recent times. The purpose of this paper is to identify and analyze various critical success factors (CSFs) that can facilitate success of blockchain-based cloud services. Further, this paper aims to analyze and understand mutual interactions among these CSFs.
Design/methodology/approach
In this paper, 19 CSFs have been identified through literature review and expert opinions. The hierarchical framework developed using total interpretive structural modeling has revealed the inter-dependencies among these CSFs. The methodology employed in this study provides a mechanism to conduct an exploratory study by identifying the factors and analyzing their interactions through the development of a hierarchical framework. This research further categorizes CSFs into multiple clusters based on their driving power and dependence power.
Findings
This paper has identified 19 CSFs, namely, user engagement, industry collaboration, rich ecosystem, blockchain technology standardization, regulatory clarity, cost efficiency, energy efficiency (wasted resources), handling blockchain bloat, miner incentives, business case alignment to blockchain capability, sidechains development, blockchain talent pool availability, leadership readiness for a decentralized consensus based technology, technology investment and maturity, trust on blockchain networks, integration with other cloud services, robust and mature smart contracts platform, blockchain security and user control on data (privacy). Further, driver and dependent variables have been identified.
Research limitations/implications
Future research can discover and detail the sub-factors behind the 19 CSFs identified in this paper. Additionally, more work can be done to extend the current structural model for blockchain-based services to a more functional form.
Practical implications
It provides a comprehensive list of CSFs that are relevant for development of blockchain-based cloud services. This will help industry leaders to strategically focus on the main drivers that will ensure that businesses get maximum benefit of this disruptive technology.
Originality/value
This study makes a significant contribution in the literature of blockchain-based cloud services, which captures the perspective of different stakeholders. This study is one of the first (if not the first) systematic research on adoption of blockchain-based services. It creates the foundation to carry out further research in this area.
Details
Keywords
Alevtina Dubovitskaya Ackerer and Damien Ackerer
This chapter reviews the underlying technologies of cryptoassets, including fundamental cryptographic primitives used in distributed ledger technologies and permissionless…
Abstract
This chapter reviews the underlying technologies of cryptoassets, including fundamental cryptographic primitives used in distributed ledger technologies and permissionless blockchain technologies and their consensus protocols such as proof-of-work and proof-of-stake. It discusses the pros and cons of existing approaches to improve blockchain scalability and considers the requirements for security and decentralization. The chapter also examines the following techniques: layer 1 tuning, layer 1 sharding, and layer 2 solutions. It concludes with an overview of technologies to swap cryptoassets off-chain, technical requirements for cross-chain transactions, and reviews cross-chain atomic swap implementation using hashed time lock contracts.
Details
Keywords
Mabrook Al-Rakhami and Majed Al-Mashari
This work focuses on the interoperability of the blockchain from the viewpoint of its technological evolution in the wider context of supply chain systems. Interoperability…
Abstract
Purpose
This work focuses on the interoperability of the blockchain from the viewpoint of its technological evolution in the wider context of supply chain systems. Interoperability concerns the most since it is among the most persevering problems in the process of blockchain adaptation. The study aims to trace and pinpoint all the different methods that affect the interoperability of blockchains, gather all the obtainable evidence and recognize gaps in between the applicable approaches mentioned across the contemporary academic literature.
Design/methodology/approach
An analysis is done of seven interoperability approaches based on their relevance, practical usefulness and adoption processes concerning the blockchain. Mainly, this work examines interoperability from several different perspectives. An interoperability modular decomposition via a layered model has been defined through the level of conceptual interoperability (LCIM) and level of information system interoperability (LISI), which represent the most popular metrics with regard to assessing the level of interoperability from a qualitative level.
Findings
Generally, the findings of this work are directed in two major aspects: Firstly, it expands the research around blockchain technology interoperability by providing crucial background information and pinpointing important connotations for both industrial and academic environments. It also defines and analyzes several different approaches toward the blockchain platform's interoperability. Secondly, it also identifies and proposes several scenarios that take advantage of multiple blockchain application approaches, highlights various issues and challenges to the evolution of interoperability standards and solutions and indicates the desired areas of further research.
Originality/value
An essential aspect of the originality of this paper is that, contrary to other work contributions, this work summarized the different interoperability approaches for blockchain in supply chain systems. Mainly, seven approaches were discussed for practitioners and researchers, and the open issues and future research direction were considered.
Details
Keywords
Nowadays, to operate securely and legally and to achieve business objectives, secure valuable assets and support uninterrupted business processes, all organizations need to match…
Abstract
Purpose
Nowadays, to operate securely and legally and to achieve business objectives, secure valuable assets and support uninterrupted business processes, all organizations need to match a lot of internal and external compliance regulations such as laws, standards, guidelines, policies, specifications and procedures. An integrated system able to manage information security (IS) for their intranets in the new cyberspace while processing tremendous amounts of IS-related data coming in various formats is required as never before. These data, after being collected and analyzed, should be evaluated in real-time from an IS incident viewpoint, to identify an incident’s source, consider its type, weigh its consequences, visualize its vector, associate all target systems, prioritize countermeasures and offer mitigation solutions with weighted impact relevance. Different security information and event management (SIEM) systems cope with this routine and usually complicated work by rapid detection of IS incidents and further appropriate response. Modern challenges dictate the need to build these systems using advanced technologies such as the blockchain (BC) technologies (BCTs). The purpose of this study is to design a new BC-based SIEM 3.0 system and propose a methodology for its evaluation.
Design/methodology/approach
Modern challenges dictate the need to build these systems using advanced technologies such as the BC technologies. Many internet resources argue that the BCT suits the intrusion detection objectives very well, but they do not mention how to implement it.
Findings
After a brief analysis of the BC concept and the evolution of SIEM systems, this paper presents the main ideas on designing the next-generation BC-based SIEM 3.0 systems, for the first time in open access publications, including a convolution method for solving the scalability issue for ever-growing BC size. This new approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future.
Research limitations/implications
The most important area of the future work is to bring this proposed system to life. The implementation, deployment and testing onto a real-world network would also allow people to see its viability or show that a more sophisticated model should be worked out. After developing the design basics, we are ready to determine the directions of the most promising studies. What are the main criteria and principles, according to which the organization will select events from PEL for creating one BC block? What is the optimal number of nodes in the organization’s BC, depending on its network assets, services provided and the number of events that occur in its network? How to build and host the SIEM 3.0 BC infrastructure? How to arrange streaming analytics of block’s content containing events taking place in the network? How to design the BC middleware as software that enables staff to interact with BC blocks to provide services like IS events correlation? How to visualize the results obtained to find insights and patterns in historical BC data for better IS management? How to predict the emergence of IS events in the future? This list of questions can be continued indefinitely for a full-fledged design of SIEM 3.0.
Practical implications
This paper shows the full applicability of the BC concept to the creation of the next-generation SIEM 3.0 systems that are designed to detect IS incidents in a modern, fully interconnected organization’s network environment. The authors’ attempt to begin with a detailed description of the basics for a BC-based SIEM 3.0 system design is presented, as well as the evaluation methodology for the resulting product.
Originality/value
The authors believe that their new revolutionary approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future. They hope that this paper will evoke a lively response in this segment of the security controls market from both theorists and direct developers of living systems that will implement the above approach.
Details