Future applications of blockchain in business and management: A Delphi study
Tóm tắt
Từ khóa
Tài liệu tham khảo
Agarwal S., 2015, Internet of Things: A vision for a better future, Advances in Computer Science and Information Technology, 2, 584
Ahn I., 2014, Public certification and optimal level of quality standard, Journal of Economic Development, 39, 49, 10.35866/caujed.2014.39.4.003
Anish Dev J.(2014). Bitcoin mining acceleration and performance quantification.Proceedings of IEEE 27th Canadian Conference on Electrical and Computer Engineering pp.1–6.
Barkatullah J., 2015, Goldstrike 1: CoinTerra’s first‐generation cryptocurrency mining processor for Bitcoin, IEEE, 35, 68
Beikverdi A. &JooSeok S.(2015). Trend of centralization in Bitcoin’s distributed network.Proceedings of 16th IEEE/ACIS International Conference on Software Engineering Artificial Intelligence Networking and Parallel/Distributed Computing pp.1–6.
Bitcoin Theft., 2013, Massive Bitcoin thefts and seizures leave many users nervous and poorer, Computer Fraud & Security, 12, 3
Boulkedid R. Abdoul H. Loustau M. Sibony O. &Alberti C.(2011). Using and reporting the Delphi method for selecting healthcare quality indicators: A systematic review.PLos One. Retrieved fromhttp://www.ncbi.nlm.nih.gov/pmc/articles/PMC3111406/
Catinean I., 2013, Characteristics of the cloud computing model as a disruptive innovation, Review of International Comparative Management, 14, 783
Christensen C. M., 1997, The innovator’s dilemma: When new technologies cause great firms to fail
Christensen C. M.(2014). Disruptive innovation. In M. Soegaard & R. F. Dam (Eds.) The encyclopedia of human–computer interaction(2nd edn). Retrieved fromhttps://www.interaction-design.org/encyclopedia/disruptive_innovation.html
Christensen C., 2004, Seeing what’s next
Cortez N., 2014, Regulating disruptive innovation, Berkeley Technology Law Journal, 29, 175
Decker C. &Wattenhofer R.(2013). Information propagation in the Bitcoin network.Proceedings of IEEE 13th International Conference on Peer‐to‐Peer Computing.
Denscombe M., 2010, The good research guide: For small‐scale social research projects (4th edn)
De Vos A. S., 1998, Research at grass root
DiBattista G. DiDonato V. Patrignani M. Pizzonia M. &Roselli V.(2015). Bitcoinview: Visualization of flows in the Bitcoin transaction graph.Proceedings of IEEE Symposium on Visualization for Cyber Security pp. 1–8.
Dyson B.(2014). Bitcoin’s 3 fatal design flaws.PositiveMoney. Retrieved fromhttp://positivemoney.org/2014/04/bitcoins-fatal-design-flaws/
Farrington T., 2012, Research foresights. Research, Technology Management, 55, 26
Fox N., 2009, Using interview in a research project
Gilbert C.(2003). The disruption opportunity.MIT Sloan Management Review 27–32.
Grime R. &Guo B.(2009). Conducting anticorruption due diligence in M&A deals.China Business Review Jul/Aug 22–25.
Higgins S.(2015). Ben Bernanke: Bitcoin has ‘serious problems.’Coindesk. Retrieved fromhttp://www.coindesk.com/ben-bernanke-bitcoin-serious-problems/
Kell M. Tiwana A. &Bush A.(2002). Reconciling user and project manager perceptions of IT project risk: A Delphi study.Information Systems Journal 103–119.
Kishigami J. Fukimura S. Watanabe H. Nakadaira A. &Akutsu A.(2015). The blockchain‐based digital content distribution system.Proceedings of IEEE 5th International Conference on Big Data and Cloud Computing pp.187–190.
Kosow H., 2008, Methods of future and scenario analysis overview, assessment, and selection criteria. Studies 39
Lewandowsky S., 2016, Future global change and cognition, Topics, 8, 7
Linstone H. A., 1975, The Delphi method: Techniques and applications, 3
Luu L. Teutsch J. Kulkarni R. &Saxena P.(2015). Demystifying incentives in the consensus computer.CCS ‘15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security pp.706–719.
Maxwell D. Speed C. &Campbell D.(2015). ‘Effing’ the ineffable: Opening up understandings of the blockchain.British HCI ‘15: Proceedings of the 2015 British HCI Conference pp.208–209.
Mihaiu D., 2014, Measuring performance in the public sector: Between necessity and difficulty, Studies in Business and Economics, 9, 40
Moser M. Bohme R. &Breuker D.(2013). An inquiry into money laundering tools in the Bitcoin ecosystem.eCrime Researchers Summit pp.1–14.
Naughton J.(2016). Is blockchain the most important IT invention of our age?The Guardian. Retrieved fromhttp://www.theguardian.com/commentisfree/2016/jan/24/blockchain-bitcoin-technology-most-important-tech-invention-of-our-age-sir-mark-walport?CMP=share_btn_fb
Porter M. E.(2001). Strategy and the Internet.Harvard Business Review March 1–20.
Schumpeter J., 1942, Capitalism, socialism and democracy
Simonite T.(2015). The looming problem that could kill Bitcoin.Technology Review. retrieved fromhttp://www.technologyreview.com/news/540921/the-looming-problem-that-could-kill-bitcoin/
Spoonauer M.(2013). 10 Worst tech predictions of all time.Blog.laptopmag. Retrieved fromhttp://blog.laptopmag.com/10-worst-tech-predictions-of-all-time
Thierer A., 2013, Permissionless innovation
Tsukerman M., 2015, The block is hot: A survey of the state of bitcoin regulation and suggestions for the future, Berkeley Technology Law Journal, 30, 1127
vanden Hooff J. Kaashoek M. F. &Zeldovich N.(2014). VerSum: Verificable computations over large public logs.CCS ‘14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security p.1304–1316.
Wentholt M. T. A., 2010, Coordination of European Research on Emerging and Major Infectious Diseases of Livestock
Yin R. K., 2003, Case Study Research: Design and Methods
Yong Y. W., 1989, A Delphi forecast for the Singapore tourism industry: Future scenario and marketing implications, International Marketing Review, 6, 35
Zhang Y. &Wen J.(2015). An IoT electric business model based on the protocol of Bitcoin.Proceedings of 18th International Conference on Intelligence in Next Generation Networks pp.184–191.
Ziegeldorf J. H. Grossman F. Henze M. Inden N. &Wehrle K.(2015). CoinParty: Secure multi‐party mixing of Bitcoins.CODASPY ‘15: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy pp.75–86.