logo

Cryptocurrency- An Annotated Bibliography

   

Added on  2023-06-10

5 Pages1123 Words121 Views
Running head: CRYPTOCURRENCY 1
Cryptocurrency- An Annotated Bibliography
Name of the Student:
Name of the Institution:
Cryptocurrency- An Annotated Bibliography_1
CRYPTOCURRENCY 2
An Annotated Bibliography on Cryptocurrency
The concepts about money, developing from tangible objects that served as a medium, measure,
store and a standard to intangible ‘objects’ has caused a lot of discussions in the recent past. The
acceptability of such currencies as medium of exchange continue to receive more and more attention,
despite the fact that there has been difficulties in defining what really entails crypto currencies such as
digital currencies, in-game and virtual currencies among others (Vora, 2015). The debate concerning
security of the Cryptocurrency systems was triggered and accelerated by the birth of bitcoin, an online
system through which individuals make and receive bitcoins. With the number of crypto currency
systems increasing, this paper present an annotated bibliography through which current trends, forms
and types, Blockchain systems and Cryptocurrency security issues are discussed.
Sward, A., Vecna, I., & Stonedahl, F. (2018). Data Insertion in Bitcoin's Blockchain. Ledger, 3.
The introduction of bitcoin in 2008 has seen enormous adoption of blockchain systems.
Blockchain systems enable Cryptocurrency users and miners carry out several application such as
robustness, smart contracts and distribution of consensus by providing a persistent, distributed and
append –only ledger system. With the recent studies revealing that such system are continually
becoming prone to and a major target by cyber-attacks, and going by the fact that such systems as the
Bitcoin’s blockchain system has been used to store arbitrary content, and that there has been instances of
illegal entries, there has been questions regarding possible misuse of blockchain systems and their
security measures. This study digs deeper into the matter and investigates special-purpose content
detectors as mitigation mechanisms for the threat (Sward, Vecna, & Forrest, 2018). The study establishes
that there is a ‘wide spectrum’ of countermeasures, and that which could be combined as a way of
increasing efficiency. Their further analysis of content-agnostic countermeasures leads to the discovery
Cryptocurrency- An Annotated Bibliography_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Journal of Alternative Investments
|10
|2526
|20

Blockchain FINTECH and BTC Name: Aakash K V
|29
|2822
|16

Cryptocurrency Giants-Ethereum and Bitcoin
|8
|2255
|376

Crypto Currency: Pros, Cons, Regulation and Impact on International Business
|8
|1446
|265

Trends in Cybercrime | Report
|4
|3538
|16

Key Ideas and Technology Behind Crypto Currencies
|14
|3741
|23