A Report on Cryptocurrency: Emerging Technologies and Innovation
VerifiedAdded on 2023/06/05
|11
|2615
|268
Report
AI Summary
This report delves into the realm of emerging technologies and innovation within the cryptocurrency sector, highlighting how these advancements are reshaping organizational perspectives. It addresses critical research problems such as price manipulation, cybercriminal activities, price uniformity, and transaction delays. The report explores the application of blockchain technology, focusing on its role in securing data and transactions. It also discusses research issues like double spending and proposes solutions involving cryptographic functions and transaction confirmation by miners. Furthermore, the report offers recommendations for enhancing security through firewalls, user authentication, system monitoring, and robust control mechanisms. The analysis emphasizes the importance of cryptographic security and suggests that continued research and development in cryptocurrency technology will lead to its increased prominence in the future. Desklib provides access to this and other solved assignments for students.

Running head: EMERGING TECHNOLOGIES AND INNOVATION
EMERGING TECHNOLOGIES AND INNOVATION
Name of the Student
Name of the University
Author Note
EMERGING TECHNOLOGIES AND INNOVATION
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2EMERGING TECHNOLOGIES AND INNOVATION
Table of Contents
Introduction......................................................................................................................................3
Research problem overview............................................................................................................3
Application of technology...............................................................................................................3
About technology.............................................................................................................................4
Research issue and challenges.........................................................................................................4
Related work....................................................................................................................................4
Proposed solution to resolve the research issue...............................................................................5
Experimental analysis......................................................................................................................5
Conclusion.......................................................................................................................................5
Recommendation.............................................................................................................................5
References........................................................................................................................................7
Table of Contents
Introduction......................................................................................................................................3
Research problem overview............................................................................................................3
Application of technology...............................................................................................................3
About technology.............................................................................................................................4
Research issue and challenges.........................................................................................................4
Related work....................................................................................................................................4
Proposed solution to resolve the research issue...............................................................................5
Experimental analysis......................................................................................................................5
Conclusion.......................................................................................................................................5
Recommendation.............................................................................................................................5
References........................................................................................................................................7

3EMERGING TECHNOLOGIES AND INNOVATION
Introduction
In recent times there are many forms of technology which ae in the sector of the
innovation. These innovations implementation are directly altering the view point of each of the
organization (Sompolinsky, Lewenberg & Zohar, 2016). On the other hand, it can be stated that
there are different types of competitive advantage that an organization can directly gain from the
concept. The concept of the cryptocurrency is that it is directly connected with the aspect of the
electronic transaction which can be done between two users who interact with each other.
The main focus point of the report is to indulge into different aspects which is linked to
the concept of the cryptocurrency working of the technology can be directly be enhanced with
the working of the concept. The main risk factors which can be included into the working and the
mitigation plan which is related to the concept is directly stated in the report.
Research problem overview
The sector indulging into the research problem overview are stated below:
Price manipulation: the sectors which are important in the concept can be the extreme
volatility which is excessive. The price which is related to the cryptocurrencies on the
platform of exchange can be stated to rise and fall dramatically over a time span which is
very short (Narayanan et al., 2016). It can hamper the overall involvement of the
technology is related to the interaction of the users in the working of the technology.
Activity of the cybercriminals: The concept of the cryptocurrency can be stated to be
one of the sector in which is attackers indulge their direct interest (Cooper et al., 2017) It
can be stated that there are high number relating to the profile of the hackers of the
Introduction
In recent times there are many forms of technology which ae in the sector of the
innovation. These innovations implementation are directly altering the view point of each of the
organization (Sompolinsky, Lewenberg & Zohar, 2016). On the other hand, it can be stated that
there are different types of competitive advantage that an organization can directly gain from the
concept. The concept of the cryptocurrency is that it is directly connected with the aspect of the
electronic transaction which can be done between two users who interact with each other.
The main focus point of the report is to indulge into different aspects which is linked to
the concept of the cryptocurrency working of the technology can be directly be enhanced with
the working of the concept. The main risk factors which can be included into the working and the
mitigation plan which is related to the concept is directly stated in the report.
Research problem overview
The sector indulging into the research problem overview are stated below:
Price manipulation: the sectors which are important in the concept can be the extreme
volatility which is excessive. The price which is related to the cryptocurrencies on the
platform of exchange can be stated to rise and fall dramatically over a time span which is
very short (Narayanan et al., 2016). It can hamper the overall involvement of the
technology is related to the interaction of the users in the working of the technology.
Activity of the cybercriminals: The concept of the cryptocurrency can be stated to be
one of the sector in which is attackers indulge their direct interest (Cooper et al., 2017) It
can be stated that there are high number relating to the profile of the hackers of the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4EMERGING TECHNOLOGIES AND INNOVATION
cryptocurrency which directly heists in the sector of the resulted in the millions of dollars
being directly stolen.
Lack of uniformity in price: The concept which is related to the commodity and assets
can be stated to be an essential part. The main problem which is related to the concept
can be seen in the sector of the price of the cryptocurrency which can vary considerable
in the sector of the different platform which is related to the concept of the exchange.
Transaction delay: In the sector of the cryptocurrency market it can be stated that it is
directly plagued with a litany of delay across almost most of the transactions. It can be
stated here that from the aspect of the trading account there are different sequences which
should be followed (Park et al., 2015). These aspects can be considered to be very much
time consuming. The issue which is related to the aspect of the scalability is also
identified in the sector of the implementation of the technology.
Application of technology
The domain of the cryptocurrency block chain technology is playing a dominating role in
the technological implementation. In most of the cases it can be stated that the application of the
technology is a single version relating to the truth made very much possible by a secure time and
time stamped ledger which directly copes the factor which is related to multiple parties. The
application or the implementation of the technology secures the data and the transactions which
are linked to the previous on (Oh & Nguyen, 2018). This aspect is very much beneficial in the
sector of the changing the older records without having the concern which is relate to the
changing the ones which are subsequent.
cryptocurrency which directly heists in the sector of the resulted in the millions of dollars
being directly stolen.
Lack of uniformity in price: The concept which is related to the commodity and assets
can be stated to be an essential part. The main problem which is related to the concept
can be seen in the sector of the price of the cryptocurrency which can vary considerable
in the sector of the different platform which is related to the concept of the exchange.
Transaction delay: In the sector of the cryptocurrency market it can be stated that it is
directly plagued with a litany of delay across almost most of the transactions. It can be
stated here that from the aspect of the trading account there are different sequences which
should be followed (Park et al., 2015). These aspects can be considered to be very much
time consuming. The issue which is related to the aspect of the scalability is also
identified in the sector of the implementation of the technology.
Application of technology
The domain of the cryptocurrency block chain technology is playing a dominating role in
the technological implementation. In most of the cases it can be stated that the application of the
technology is a single version relating to the truth made very much possible by a secure time and
time stamped ledger which directly copes the factor which is related to multiple parties. The
application or the implementation of the technology secures the data and the transactions which
are linked to the previous on (Oh & Nguyen, 2018). This aspect is very much beneficial in the
sector of the changing the older records without having the concern which is relate to the
changing the ones which are subsequent.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5EMERGING TECHNOLOGIES AND INNOVATION
About technology
The technology which is related to the concept of the Cryptocurrency is based on the
concept of the block chain. The main application which is related to the technology may be
considered in the field of the two entity to send different types of money related aspect over the
network or platform which is very much secured without the aspect of revealing the identity of
the person engaged in the sector of communicating. In the concept it can be stated that there is no
need for the transaction to be verified from the end of the third party (Anderson, J. C. (2018). At
the end of the inception it can be stated that the main aim of the technology was the sanction,
enable and the concept of the cryptocurrency register transfer.
In main concern area which is related to the concept can be seen in the sector of the
security and safety of the technology. One of the implementation which can be stated here is that
both the parties who would be engaged in the concept of the fund transfer hold two keys to the
vault which is related to the private and the public key (Kim et al., 2016). The vault can directly
open if both of the parties agree on the use of the key after they see that they are authenticated
users who can access the data.
Research issue and challenges
In the domain of the working of the cryptocurrency there are different issue and
challenges which are majorly faced within the working of the concept. The important sector
which should be focused is the spending which is related to double spending. It can be stated as a
technique which is related to the fraudulent activity which can be related to the concept of the
spending the same mount twice.
About technology
The technology which is related to the concept of the Cryptocurrency is based on the
concept of the block chain. The main application which is related to the technology may be
considered in the field of the two entity to send different types of money related aspect over the
network or platform which is very much secured without the aspect of revealing the identity of
the person engaged in the sector of communicating. In the concept it can be stated that there is no
need for the transaction to be verified from the end of the third party (Anderson, J. C. (2018). At
the end of the inception it can be stated that the main aim of the technology was the sanction,
enable and the concept of the cryptocurrency register transfer.
In main concern area which is related to the concept can be seen in the sector of the
security and safety of the technology. One of the implementation which can be stated here is that
both the parties who would be engaged in the concept of the fund transfer hold two keys to the
vault which is related to the private and the public key (Kim et al., 2016). The vault can directly
open if both of the parties agree on the use of the key after they see that they are authenticated
users who can access the data.
Research issue and challenges
In the domain of the working of the cryptocurrency there are different issue and
challenges which are majorly faced within the working of the concept. The important sector
which should be focused is the spending which is related to double spending. It can be stated as a
technique which is related to the fraudulent activity which can be related to the concept of the
spending the same mount twice.

6EMERGING TECHNOLOGIES AND INNOVATION
The network which is related to the concept of the cryptocurrency is based on the concept
of the absolute consensus relating to all the participants relating to the legitimacy of the
transaction and the balances. If the different nodes which are present in the network does not
agree on the single balance the system would be directly resulting in the concept of the
breakdown. On the other hand, it can be stated that there are many rules which are predefined
and directly programmer into the network that directly prevent this concept from happening.
Related work
One of the aspect which can be related to the work mainly focus on the aspect of
generation of a security mechanism which would be securing the data which would be saved in
the concept. It can be stated here that since there is more than one node which is related to the
running of the network one would have to gain direct access control mechanism relating to more
than half of them.
Proposed solution to resolve the research issue
In the context of every transaction it ca be stated that there is always a file which consist
of the recipient and senders public key which is known as the public key and the amount of coin
which is transferred. It can be stated here that each of the transaction which is done in the context
should be signed off by each of the senders with is with their public key (Fry & Cheah, 2016).
This concept can be related to the concept of the basic cryptographic function. After the process
is conducted the transaction is put over to the concept of the network but it needs to be confirmed
before the actual implementation of the process.
In the network which is related to the cryptocurrency, only the miners can directly
confirm the transaction by means of solving the cryptographic puzzle. They directly engage into
The network which is related to the concept of the cryptocurrency is based on the concept
of the absolute consensus relating to all the participants relating to the legitimacy of the
transaction and the balances. If the different nodes which are present in the network does not
agree on the single balance the system would be directly resulting in the concept of the
breakdown. On the other hand, it can be stated that there are many rules which are predefined
and directly programmer into the network that directly prevent this concept from happening.
Related work
One of the aspect which can be related to the work mainly focus on the aspect of
generation of a security mechanism which would be securing the data which would be saved in
the concept. It can be stated here that since there is more than one node which is related to the
running of the network one would have to gain direct access control mechanism relating to more
than half of them.
Proposed solution to resolve the research issue
In the context of every transaction it ca be stated that there is always a file which consist
of the recipient and senders public key which is known as the public key and the amount of coin
which is transferred. It can be stated here that each of the transaction which is done in the context
should be signed off by each of the senders with is with their public key (Fry & Cheah, 2016).
This concept can be related to the concept of the basic cryptographic function. After the process
is conducted the transaction is put over to the concept of the network but it needs to be confirmed
before the actual implementation of the process.
In the network which is related to the cryptocurrency, only the miners can directly
confirm the transaction by means of solving the cryptographic puzzle. They directly engage into
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7EMERGING TECHNOLOGIES AND INNOVATION
the concept and make them very much legitimate and make them spread across the different
network. after this sequence every node which is related to the network adds itself to the
database (Li & Wang, 2017). It can be stated that once the transaction is directly confirmed it
directly becomes irreversible and unforgeable and a miner reward plus the fees which is related
to the transaction.
Experimental analysis
The main judgment relating to experimental analysis can be stated to be one of the factor
which is related to the proper working of the concept (Wustrow & VanderSloot, 2016). The
overall transaction in the process would be initiated and how it would be helping in the sector of
the removing all the problem which is related to the concept. The main sector of implementation
in the sector is the cryptography and the securing of the data which would be involved into the
operation.
Conclusion
The report can be concluded on a note that there is different section of technologic
implementation which can be done in the concept of the Cryptocurrency. As majorly discussed
in the report it can be seen that it is one of the most important sector which should be given top
most priority and majorly include division of security mechanism into the concept of the
working. The sector of the Cryptocurrency can be considered as a technology which is at the
section of research and it can be stated that in the future the technology would be playing a more
dominating role.
the concept and make them very much legitimate and make them spread across the different
network. after this sequence every node which is related to the network adds itself to the
database (Li & Wang, 2017). It can be stated that once the transaction is directly confirmed it
directly becomes irreversible and unforgeable and a miner reward plus the fees which is related
to the transaction.
Experimental analysis
The main judgment relating to experimental analysis can be stated to be one of the factor
which is related to the proper working of the concept (Wustrow & VanderSloot, 2016). The
overall transaction in the process would be initiated and how it would be helping in the sector of
the removing all the problem which is related to the concept. The main sector of implementation
in the sector is the cryptography and the securing of the data which would be involved into the
operation.
Conclusion
The report can be concluded on a note that there is different section of technologic
implementation which can be done in the concept of the Cryptocurrency. As majorly discussed
in the report it can be seen that it is one of the most important sector which should be given top
most priority and majorly include division of security mechanism into the concept of the
working. The sector of the Cryptocurrency can be considered as a technology which is at the
section of research and it can be stated that in the future the technology would be playing a more
dominating role.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8EMERGING TECHNOLOGIES AND INNOVATION
Recommendation
Recommendation 1: In the system the security of the data which would be prevailing in the
system should be secured so that the system should be secured from different activity relating to
the intruders. There should be installation of firewall in the network access area so that there are
no problem relating to data breaches which are seen within the working of the concept.
Recommendation 2: The users who would be interacting in the system or linked in the sector of
the exchange of the fund should be legitimate users. The section of the authentication can be
considered to be very much important in the sector of the working of the concept. Authentication
can directly help in the sector of the security of the data which would be included into the system
Recommendation 3: The monitoring of the system should be done in a proper manner so that
any problem seen in the sector can be mitigated which would be maintaining the integrity of the
system. The schedule which is related to the monitoring can be stated to be very much important
in the sector of working of the technology.
Recommendation 4: Controlling of the system can be stated as one of the major reated to the
implementation of the technology in the different domain it can be directly be related to the
concept. Every use case which is related to the concept should be taken into consideration so that
there is no security issue involved into the working of the technology. Controlling can be done in
various types of implementation details so that it directly does not impact the overall working of
the organization.
Recommendation
Recommendation 1: In the system the security of the data which would be prevailing in the
system should be secured so that the system should be secured from different activity relating to
the intruders. There should be installation of firewall in the network access area so that there are
no problem relating to data breaches which are seen within the working of the concept.
Recommendation 2: The users who would be interacting in the system or linked in the sector of
the exchange of the fund should be legitimate users. The section of the authentication can be
considered to be very much important in the sector of the working of the concept. Authentication
can directly help in the sector of the security of the data which would be included into the system
Recommendation 3: The monitoring of the system should be done in a proper manner so that
any problem seen in the sector can be mitigated which would be maintaining the integrity of the
system. The schedule which is related to the monitoring can be stated to be very much important
in the sector of working of the technology.
Recommendation 4: Controlling of the system can be stated as one of the major reated to the
implementation of the technology in the different domain it can be directly be related to the
concept. Every use case which is related to the concept should be taken into consideration so that
there is no security issue involved into the working of the technology. Controlling can be done in
various types of implementation details so that it directly does not impact the overall working of
the organization.

9EMERGING TECHNOLOGIES AND INNOVATION
References
Abraham, I., Malkhi, D., Nayak, K., Ren, L., & Spiegelman, A. (2016). Solidus: An incentive-
compatible cryptocurrency based on permissionless byzantine consensus. CoRR,
abs/1612.02916.
Anderson, J. C. (2018). Cryptocurrency: Advanced Strategies and Techniques to Learn and
Understand the World of Cryptocurrency.
Cocco, L., Concas, G., & Marchesi, M. (2017). Using an artificial financial market for studying a
cryptocurrency market. Journal of Economic Interaction and Coordination, 12(2), 345-
365.
Cooper, J., Morris, C., Marks, S., Daniel, R., Kiyoko, H., & Emerson, M. (2017). Blockchain
and Cryptocurrency Mega Bundle-6 Manuscripts in 1 Book: This Box Set includes books
on Blockchain, Investing in Bitcoin, Ethereum and other Cryptocurrencies, and much
more!.
Delmolino, K., Arnett, M., Kosba, A., Miller, A., & Shi, E. (2016, February). Step by step
towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab.
In International Conference on Financial Cryptography and Data Security (pp. 79-94).
Springer, Berlin, Heidelberg.
Fry, J., & Cheah, E. T. (2016). Negative bubbles and shocks in cryptocurrency
markets. International Review of Financial Analysis, 47, 343-352.
Gandal, N., & Halaburda, H. (2014). Competition in the cryptocurrency market.
References
Abraham, I., Malkhi, D., Nayak, K., Ren, L., & Spiegelman, A. (2016). Solidus: An incentive-
compatible cryptocurrency based on permissionless byzantine consensus. CoRR,
abs/1612.02916.
Anderson, J. C. (2018). Cryptocurrency: Advanced Strategies and Techniques to Learn and
Understand the World of Cryptocurrency.
Cocco, L., Concas, G., & Marchesi, M. (2017). Using an artificial financial market for studying a
cryptocurrency market. Journal of Economic Interaction and Coordination, 12(2), 345-
365.
Cooper, J., Morris, C., Marks, S., Daniel, R., Kiyoko, H., & Emerson, M. (2017). Blockchain
and Cryptocurrency Mega Bundle-6 Manuscripts in 1 Book: This Box Set includes books
on Blockchain, Investing in Bitcoin, Ethereum and other Cryptocurrencies, and much
more!.
Delmolino, K., Arnett, M., Kosba, A., Miller, A., & Shi, E. (2016, February). Step by step
towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab.
In International Conference on Financial Cryptography and Data Security (pp. 79-94).
Springer, Berlin, Heidelberg.
Fry, J., & Cheah, E. T. (2016). Negative bubbles and shocks in cryptocurrency
markets. International Review of Financial Analysis, 47, 343-352.
Gandal, N., & Halaburda, H. (2014). Competition in the cryptocurrency market.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

10EMERGING TECHNOLOGIES AND INNOVATION
Gandal, N., & Halaburda, H. (2016). Can we predict the winner in a market with network
effects? Competition in cryptocurrency market. Games, 7(3), 16.
Kim, Y. B., Kim, J. G., Kim, W., Im, J. H., Kim, T. H., Kang, S. J., & Kim, C. H. (2016).
Predicting fluctuations in cryptocurrency transactions based on user comments and
replies. PloS one, 11(8), e0161197.
Li, X., & Wang, C. A. (2017). The technology and economic determinants of cryptocurrency
exchange rates: The case of Bitcoin. Decision Support Systems, 95, 49-60.
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and
cryptocurrency technologies: a comprehensive introduction. Princeton University Press.
Oh, J. H., & Nguyen, K. (2018). The Growing Role of Cryptocurrency: What Does It Mean for
Central Banks and Governments?. 정정정정정정정정, 25(1), 33-55.
Park, S., Pietrzak, K., Alwen, J., Fuchsbauer, G., & Gazi, P. (2015). Spacecoin: A
cryptocurrency based on proofs of space(Vol. 528). IACR Cryptology ePrint Archive
2015.
Partanen, C. (2018). The viability of cryptocurrency in relation to the response of financial
institutions and governments.
Sompolinsky, Y., Lewenberg, Y., & Zohar, A. (2016). SPECTRE: A Fast and Scalable
Cryptocurrency Protocol. IACR Cryptology ePrint Archive, 2016, 1159.
Thelwall, M. (2017). Can social news websites pay for content and curation? The SteemIt
cryptocurrency model. Journal of Information Science, 0165551517748290.
Gandal, N., & Halaburda, H. (2016). Can we predict the winner in a market with network
effects? Competition in cryptocurrency market. Games, 7(3), 16.
Kim, Y. B., Kim, J. G., Kim, W., Im, J. H., Kim, T. H., Kang, S. J., & Kim, C. H. (2016).
Predicting fluctuations in cryptocurrency transactions based on user comments and
replies. PloS one, 11(8), e0161197.
Li, X., & Wang, C. A. (2017). The technology and economic determinants of cryptocurrency
exchange rates: The case of Bitcoin. Decision Support Systems, 95, 49-60.
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and
cryptocurrency technologies: a comprehensive introduction. Princeton University Press.
Oh, J. H., & Nguyen, K. (2018). The Growing Role of Cryptocurrency: What Does It Mean for
Central Banks and Governments?. 정정정정정정정정, 25(1), 33-55.
Park, S., Pietrzak, K., Alwen, J., Fuchsbauer, G., & Gazi, P. (2015). Spacecoin: A
cryptocurrency based on proofs of space(Vol. 528). IACR Cryptology ePrint Archive
2015.
Partanen, C. (2018). The viability of cryptocurrency in relation to the response of financial
institutions and governments.
Sompolinsky, Y., Lewenberg, Y., & Zohar, A. (2016). SPECTRE: A Fast and Scalable
Cryptocurrency Protocol. IACR Cryptology ePrint Archive, 2016, 1159.
Thelwall, M. (2017). Can social news websites pay for content and curation? The SteemIt
cryptocurrency model. Journal of Information Science, 0165551517748290.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

11EMERGING TECHNOLOGIES AND INNOVATION
Wustrow, E., & VanderSloot, B. (2016, August). DDoSCoin: Cryptocurrency with a Malicious
Proof-of-Work. In WOOT.
Wustrow, E., & VanderSloot, B. (2016, August). DDoSCoin: Cryptocurrency with a Malicious
Proof-of-Work. In WOOT.
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



