This report discusses the implementation of cryptocurrency and blockchain technology, its challenges, and proposed solutions. It also covers the application of technology, related work, and experimental analysis. Recommendations for securing the system and controlling it are also provided.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: EMERGING TECHNOLOGIES AND INNOVATION EMERGING TECHNOLOGIES AND INNOVATION Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2EMERGING TECHNOLOGIES AND INNOVATION Table of Contents Introduction......................................................................................................................................3 Research problem overview............................................................................................................3 Application of technology...............................................................................................................3 About technology.............................................................................................................................4 Research issue and challenges.........................................................................................................4 Related work....................................................................................................................................4 Proposed solution to resolve the research issue...............................................................................5 Experimental analysis......................................................................................................................5 Conclusion.......................................................................................................................................5 Recommendation.............................................................................................................................5 References........................................................................................................................................7
3EMERGING TECHNOLOGIES AND INNOVATION Introduction In recent times there are many forms of technology which ae in the sector of the innovation. These innovations implementation are directly altering the view point of each of the organization (Sompolinsky, Lewenberg & Zohar, 2016). On the other hand, it can be stated that there are different types of competitive advantage that an organization can directly gain from the concept. The concept of the cryptocurrency is that it is directly connected with the aspect of the electronic transaction which can be done between two users who interact with each other. The main focus point of the report is to indulge into different aspects which is linked to the concept of the cryptocurrency working of the technology can be directly be enhanced with the working of the concept. The main risk factors which can be included into the working and the mitigation plan which is related to the concept is directly stated in the report. Research problem overview The sector indulging into the research problem overview are stated below: Price manipulation:the sectors which are important in the concept can be the extreme volatility which is excessive. The price which is related to the cryptocurrencies on the platform of exchange can be stated to rise and fall dramatically over a time span which is very short (Narayanan et al., 2016). It can hamper the overall involvement of the technology is related to the interaction of the users in the working of the technology. Activity of the cybercriminals:The concept of the cryptocurrency can be stated to be one of the sector in which is attackers indulge their direct interest (Cooper et al., 2017) It can be stated that there are high number relating to the profile of the hackers of the
4EMERGING TECHNOLOGIES AND INNOVATION cryptocurrency which directly heists in the sector of the resulted in the millions of dollars being directly stolen. Lack of uniformity in price:The concept which is related to the commodity and assets can be stated to be an essential part. The main problem which is related to the concept can be seen in the sector of the price of the cryptocurrency which can vary considerable in the sector of the different platform which is related to the concept of the exchange. Transaction delay:In the sector of the cryptocurrency market it can be stated that it is directly plagued with a litany of delay across almost most of the transactions. It can be stated here that from the aspect of the trading account there are different sequences which should be followed (Park et al., 2015). These aspects can be considered to be very much time consuming. The issue which is related to the aspect of the scalability is also identified in the sector of the implementation of the technology. Application of technology The domain of the cryptocurrency block chain technology is playing a dominating role in the technological implementation. In most of the cases it can be stated that the application of the technology is a single version relating to the truth made very much possible by a secure time and time stamped ledger which directly copes the factor which is related to multiple parties. The application or the implementation of the technology secures the data and the transactions which are linked to the previous on (Oh & Nguyen, 2018). This aspect is very much beneficial in the sector of the changing the older records without having the concern which is relate to the changing the ones which are subsequent.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5EMERGING TECHNOLOGIES AND INNOVATION About technology The technology which is related to the concept of the Cryptocurrency is based on the concept of the block chain. The main application which is related to the technology may be considered in the field of the two entity to send different types of money related aspect over the network or platform which is very much secured without the aspect of revealing the identity of the person engaged in the sector of communicating. In the concept it can be stated that there is no need for the transaction to be verified from the end of the third party (Anderson, J. C. (2018). At the end of the inception it can be stated that the main aim of the technology was the sanction, enable and the concept of the cryptocurrency register transfer. In main concern area which is related to the concept can be seen in the sector of the security and safety of the technology. One of the implementation which can be stated here is that both the parties who would be engaged in the concept of the fund transfer hold two keys to the vault which is related to the private and the public key (Kim et al., 2016). The vault can directly open if both of the parties agree on the use of the key after they see that they are authenticated users who can access the data. Research issue and challenges In the domain of the working of the cryptocurrency there are different issue and challenges which are majorly faced within the working of the concept. The important sector which should be focused is the spending which is related to double spending. It can be stated as a technique which is related to the fraudulent activity which can be related to the concept of the spending the same mount twice.
6EMERGING TECHNOLOGIES AND INNOVATION The network which is related to the concept of the cryptocurrency is based on the concept of the absolute consensus relating to all the participants relating to the legitimacy of the transaction and the balances. If the different nodes which are present in the network does not agree on the single balance the system would be directly resulting in the concept of the breakdown. On the other hand, it can be stated that there are many rules which are predefined and directly programmer into the network that directly prevent this concept from happening. Related work One of the aspect which can be related to the work mainly focus on the aspect of generation of a security mechanism which would be securing the data which would be saved in the concept. It can be stated here that since there is more than one node which is related to the running of the network one would have to gain direct access control mechanism relating to more than half of them. Proposed solution to resolve the research issue In the context of every transaction it ca be stated that there is always a file which consist of the recipient and senders public key which is known as the public key and the amount of coin which is transferred. It can be stated here that each of the transaction which is done in the context should be signed off by each of the senders with is with their public key (Fry & Cheah, 2016). This concept can be related to the concept of the basic cryptographic function. After the process is conducted the transaction is put over to the concept of the network but it needs to be confirmed before the actual implementation of the process. In the network which is related to the cryptocurrency, only the miners can directly confirm the transaction by means of solving the cryptographic puzzle. They directly engage into
7EMERGING TECHNOLOGIES AND INNOVATION the concept and make them very much legitimate and make them spread across the different network. after this sequence every node which is related to the network adds itself to the database (Li & Wang, 2017). It can be stated that once the transaction is directly confirmed it directly becomes irreversible and unforgeable and a miner reward plus the fees which is related to the transaction. Experimental analysis The main judgment relating to experimental analysis can be stated to be one of the factor which is related to the proper working of the concept (Wustrow & VanderSloot, 2016). The overall transaction in the process would be initiated and how it would be helping in the sector of the removing all the problem which is related to the concept. The main sector of implementation in the sector is the cryptography and the securing of the data which would be involved into the operation. Conclusion The report can be concluded on a note that there is different section of technologic implementation which can be done in the concept of the Cryptocurrency. As majorly discussed in the report it can be seen that it is one of the most important sector which should be given top most priority and majorly include division of security mechanism into the concept of the working. The sector of the Cryptocurrency can be considered as a technology which is at the section of research and it can be stated that in the future the technology would be playing a more dominating role.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8EMERGING TECHNOLOGIES AND INNOVATION Recommendation Recommendation 1:In the system the security of the data which would be prevailing in the system should be secured so that the system should be secured from different activity relating to the intruders. There should be installation of firewall in the network access area so that there are no problem relating to data breaches which are seen within the working of the concept. Recommendation 2:The users who would be interacting in the system or linked in the sector of the exchange of the fund should be legitimate users. The section of the authentication can be considered to be very much important in the sector of the working of the concept. Authentication can directly help in the sector of the security of the data which would be includedinto the system Recommendation 3:The monitoring of the system should be done in a proper manner so that any problem seen in the sector can be mitigated which would be maintaining the integrity of the system. The schedule which is related to the monitoring can be stated to be very much important in the sector of working of the technology. Recommendation 4:Controlling of the system can be stated as one of the major reated to the implementation of the technology in the different domain it can be directly be related to the concept. Every use case which is related to the concept should be taken into consideration so that there is no security issue involved into the working of the technology. Controlling can be done in various types of implementation details so that it directly does not impact the overall working of the organization.
9EMERGING TECHNOLOGIES AND INNOVATION References Abraham, I., Malkhi, D., Nayak, K., Ren, L., & Spiegelman, A. (2016). Solidus: An incentive- compatiblecryptocurrencybasedonpermissionlessbyzantineconsensus.CoRR, abs/1612.02916. Anderson, J. C. (2018). Cryptocurrency: Advanced Strategies and Techniques to Learn and Understand the World of Cryptocurrency. Cocco, L., Concas, G., & Marchesi, M. (2017). Using an artificial financial market for studying a cryptocurrency market.Journal of Economic Interaction and Coordination,12(2), 345- 365. Cooper, J., Morris, C., Marks, S., Daniel, R., Kiyoko, H., & Emerson, M. (2017). Blockchain and Cryptocurrency Mega Bundle-6 Manuscripts in 1 Book: This Box Set includes books on Blockchain, Investing in Bitcoin, Ethereum and other Cryptocurrencies, and much more!. Delmolino, K., Arnett, M., Kosba, A., Miller, A., & Shi, E. (2016, February). Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. InInternational Conference on Financial Cryptography and Data Security(pp. 79-94). Springer, Berlin, Heidelberg. Fry,J.,&Cheah,E.T.(2016).Negativebubblesandshocksincryptocurrency markets.International Review of Financial Analysis,47, 343-352. Gandal, N., & Halaburda, H. (2014). Competition in the cryptocurrency market.
10EMERGING TECHNOLOGIES AND INNOVATION Gandal, N., & Halaburda, H. (2016). Can we predict the winner in a market with network effects? Competition in cryptocurrency market.Games,7(3), 16. Kim, Y. B., Kim, J. G., Kim, W., Im, J. H., Kim, T. H., Kang, S. J., & Kim, C. H. (2016). Predicting fluctuations in cryptocurrency transactions based on user comments and replies.PloS one,11(8), e0161197. Li, X., & Wang, C. A. (2017). The technology and economic determinants of cryptocurrency exchange rates: The case of Bitcoin.Decision Support Systems,95, 49-60. Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016).Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press. Oh, J. H., & Nguyen, K. (2018). The Growing Role of Cryptocurrency: What Does It Mean for Central Banks and Governments?.정정정정정정정정,25(1), 33-55. Park,S.,Pietrzak,K.,Alwen,J.,Fuchsbauer,G.,&Gazi,P.(2015).Spacecoin:A cryptocurrency based on proofs of space(Vol. 528). IACR Cryptology ePrint Archive 2015. Partanen, C. (2018). The viability of cryptocurrency in relation to the response of financial institutions and governments. Sompolinsky, Y., Lewenberg,Y., &Zohar, A. (2016). SPECTRE:A Fast andScalable Cryptocurrency Protocol.IACR Cryptology ePrint Archive,2016, 1159. Thelwall, M. (2017). Can social news websites pay for content and curation? The SteemIt cryptocurrency model.Journal of Information Science, 0165551517748290.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser