Future applications of blockchain in business and management: A Delphi study

Strategic Change - Tập 26 Số 5 - Trang 439-451 - 2017
Gareth White1
1University of South Wales, United Kingdom

Tóm tắt

AbstractBlockchain has the potential to become a significant source of disruptive innovations in business and management. There is a scarcity of knowledge and understanding of blockchain techniques that hinders its academic research and practical application. Business managers need to understand the potential impact and threat of blockchain applications in order to gain and maintain competitive advantage. Blockchain applications appear to offer considerable performance improvement and commercialization opportunities.

Từ khóa


Tài liệu tham khảo

10.1002/smj.246

Agarwal S., 2015, Internet of Things: A vision for a better future, Advances in Computer Science and Information Technology, 2, 584

Ahn I., 2014, Public certification and optimal level of quality standard, Journal of Economic Development, 39, 49, 10.35866/caujed.2014.39.4.003

Anish Dev J.(2014). Bitcoin mining acceleration and performance quantification.Proceedings of IEEE 27th Canadian Conference on Electrical and Computer Engineering pp.1–6.

10.1108/14601060610663587

Barkatullah J., 2015, Goldstrike 1: CoinTerra’s first‐generation cryptocurrency mining processor for Bitcoin, IEEE, 35, 68

10.1093/itnow/bww017

Beikverdi A. &JooSeok S.(2015). Trend of centralization in Bitcoin’s distributed network.Proceedings of 16th IEEE/ACIS International Conference on Software Engineering Artificial Intelligence Networking and Parallel/Distributed Computing pp.1–6.

Bitcoin Theft., 2013, Massive Bitcoin thefts and seizures leave many users nervous and poorer, Computer Fraud & Security, 12, 3

Boulkedid R. Abdoul H. Loustau M. Sibony O. &Alberti C.(2011). Using and reporting the Delphi method for selecting healthcare quality indicators: A systematic review.PLos One. Retrieved fromhttp://www.ncbi.nlm.nih.gov/pmc/articles/PMC3111406/

10.1016/S1361-3723(13)70101-5

10.1016/S1353-4858(14)70102-3

Bradbury D.(2015). In blocks we trust.Engineering & Technology 68–71.

10.1108/02634500310490229

10.1007/s11423-006-8251-y

10.1111/j.1540-6520.2009.00297.x

10.1016/j.futures.2015.07.015

10.1111/isj.12039

10.1108/FS-10-2012-0076

Catinean I., 2013, Characteristics of the cloud computing model as a disruptive innovation, Review of International Comparative Management, 14, 783

10.1016/j.respol.2012.04.004

10.1080/00207543.2012.701776

Christensen C. M., 1997, The innovator’s dilemma: When new technologies cause great firms to fail

Christensen C. M.(2014). Disruptive innovation. In M. Soegaard & R. F. Dam (Eds.) The encyclopedia of human–computer interaction(2nd edn). Retrieved fromhttps://www.interaction-design.org/encyclopedia/disruptive_innovation.html

Christensen C., 2004, Seeing what’s next

Chuen D. L. K.(2016). Interview.Solving Modern Crime in Financial Markets 559–573.

10.1017/iop.2015.10

10.1145/2874239.2874264

Cortez N., 2014, Regulating disruptive innovation, Berkeley Technology Law Journal, 29, 175

10.1287/mnsc.9.3.458

10.1142/S1363919609002297

10.1111/j.0737-6782.2004.00076.x

Decker C. &Wattenhofer R.(2013). Information propagation in the Bitcoin network.Proceedings of IEEE 13th International Conference on Peer‐to‐Peer Computing.

Denscombe M., 2010, The good research guide: For small‐scale social research projects (4th edn)

De Vos A. S., 1998, Research at grass root

10.1108/JOIC-08-2015-0047

DiBattista G. DiDonato V. Patrignani M. Pizzonia M. &Roselli V.(2015). Bitcoinview: Visualization of flows in the Bitcoin transaction graph.Proceedings of IEEE Symposium on Visualization for Cyber Security pp. 1–8.

10.1257/jel.48.4.935

10.1080/07421222.1995.11518080

Dyson B.(2014). Bitcoin’s 3 fatal design flaws.PositiveMoney. Retrieved fromhttp://positivemoney.org/2014/04/bitcoins-fatal-design-flaws/

10.1049/et.2015.0220

10.1177/0007650314523096

Farrington T., 2012, Research foresights. Research, Technology Management, 55, 26

10.1016/j.procs.2014.05.542

10.1111/1468-2451.00358

Fox N., 2009, Using interview in a research project

10.1016/j.futures.2015.03.005

Gilbert C.(2003). The disruption opportunity.MIT Sloan Management Review 27–32.

10.1108/JOIC-01-2015-0009

Grime R. &Guo B.(2009). Conducting anticorruption due diligence in M&A deals.China Business Review Jul/Aug 22–25.

10.1016/j.respol.2011.07.001

10.1016/S0732-0671(02)20011-5

Higgins S.(2015). Ben Bernanke: Bitcoin has ‘serious problems.’Coindesk. Retrieved fromhttp://www.coindesk.com/ben-bernanke-bitcoin-serious-problems/

10.1080/08874417.2015.11645784

10.1080/14783363.2011.637785

10.2307/2392366

10.1093/occmed/49.8.556

Kell M. Tiwana A. &Bush A.(2002). Reconciling user and project manager perceptions of IT project risk: A Delphi study.Information Systems Journal 103–119.

10.1016/S1361-3723(15)30038-5

Kishigami J. Fukimura S. Watanabe H. Nakadaira A. &Akutsu A.(2015). The blockchain‐based digital content distribution system.Proceedings of IEEE 5th International Conference on Big Data and Cloud Computing pp.187–190.

10.1353/jsh/1.2.119

10.1016/S1745-3542(04)01002-1

10.1108/eb044885

Kosow H., 2008, Methods of future and scenario analysis overview, assessment, and selection criteria. Studies 39

10.2307/3151189

Lewandowsky S., 2016, Future global change and cognition, Topics, 8, 7

10.1002/smj.771

Linstone H. A., 1975, The Delphi method: Techniques and applications, 3

10.1108/IJQRM-10-2013-0169

10.1111/j.1365-2575.2009.00333.x

10.1080/00207540500056102

Luu L. Teutsch J. Kulkarni R. &Saxena P.(2015). Demystifying incentives in the consensus computer.CCS ‘15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security pp.706–719.

10.2307/30036549

10.3846/20294913.2011.649912

10.1016/j.respol.2012.09.008

10.1111/j.1540-5885.2005.00177.x

10.15728/bbr.2015.12.3.2

Maxwell D. Speed C. &Campbell D.(2015). ‘Effing’ the ineffable: Opening up understandings of the blockchain.British HCI ‘15: Proceedings of the 2015 British HCI Conference pp.208–209.

10.1287/mnsc.44.8.1115

10.1080/00207540802014700

10.1057/palgrave.jt.5740189

Mihaiu D., 2014, Measuring performance in the public sector: Between necessity and difficulty, Studies in Business and Economics, 9, 40

Milliken F. J., Academy of Management Perspectives, 29, 405, 10.5465/amp.2013.0121

10.1016/S0026-0657(13)70129-2

10.1108/02634509210012069

Moser M. Bohme R. &Breuker D.(2013). An inquiry into money laundering tools in the Bitcoin ecosystem.eCrime Researchers Summit pp.1–14.

10.1108/eb058251

Naughton J.(2016). Is blockchain the most important IT invention of our age?The Guardian. Retrieved fromhttp://www.theguardian.com/commentisfree/2016/jan/24/blockchain-bitcoin-technology-most-important-tech-invention-of-our-age-sir-mark-walport?CMP=share_btn_fb

Network Security (2013). In Brief. Network Security 11 3.

10.1016/j.im.2003.11.002

10.1108/eb001309

10.1111/j.1365-2788.2006.00882.x

Porter M. E.(2001). Strategy and the Internet.Harvard Business Review March 1–20.

10.1108/EUM0000000005556

10.1108/01443579010005245

10.1002/joe.21530

10.1080/09585192.2013.763843

10.1016/j.procs.2015.03.066

10.1016/S0169-2070(99)00018-7

Rutkin A., 2016, People‐powered grid, New Scientist, 22, 10.1016/S0262-4079(16)30410-9

10.1111/caim.12092

10.1111/j.1540-5885.2008.00306.x

10.1080/07421222.2001.11045662

10.1108/13673270410529082

Schumpeter J., 1942, Capitalism, socialism and democracy

10.25300/MISQ/2014/38.3.11

Simonite T.(2015). The looming problem that could kill Bitcoin.Technology Review. retrieved fromhttp://www.technologyreview.com/news/540921/the-looming-problem-that-could-kill-bitcoin/

10.28945/199

Spoonauer M.(2013). 10 Worst tech predictions of all time.Blog.laptopmag. Retrieved fromhttp://blog.laptopmag.com/10-worst-tech-predictions-of-all-time

10.2753/MIS0742-1222280204

10.1109/MTS.2015.2494358

10.1111/j.1540-5885.2005.00179.x

Thierer A., 2013, Permissionless innovation

Tsukerman M., 2015, The block is hot: A survey of the state of bitcoin regulation and suggestions for the future, Berkeley Technology Law Journal, 30, 1127

vanden Hooff J. Kaashoek M. F. &Zeldovich N.(2014). VerSum: Verificable computations over large public logs.CCS ‘14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security p.1304–1316.

10.5465/amj.2014.0205

10.1016/j.respol.2015.05.004

10.1108/13632540810881938

Wentholt M. T. A., 2010, Coordination of European Research on Emerging and Major Infectious Diseases of Livestock

10.1177/0276146715620236

10.1108/eb055397

Yin R. K., 2003, Case Study Research: Design and Methods

Yong Y. W., 1989, A Delphi forecast for the Singapore tourism industry: Future scenario and marketing implications, International Marketing Review, 6, 35

10.1111/j.1468-2370.2009.00272.x

Zhang Y. &Wen J.(2015). An IoT electric business model based on the protocol of Bitcoin.Proceedings of 18th International Conference on Intelligence in Next Generation Networks pp.184–191.

10.1007/s10551-012-1474-4

Ziegeldorf J. H. Grossman F. Henze M. Inden N. &Wehrle K.(2015). CoinParty: Secure multi‐party mixing of Bitcoins.CODASPY ‘15: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy pp.75–86.

Zyskind G. Nathan O. Pentland A.(2015). Decentralizing privacy: Using blockchain to protect personal data.IEEE CS Security Workshops pp.180–184.