216 research outputs found

    Assesment of Blockchain-Based P2P (Pear to Pear) Transactions in International Trade with Swot Analysis

    Get PDF
    Blockchain is known as a digitalized, decentralized online computer network on which a public ledger of all cryptocurrency transactions stored and it attempts to create and share all transactions that are verified by using a peer-to-peer (P2P) connected computer network. From the point of production to the truncating the international trade finance process or recording the customs procedures control, many companies are taking the advantages of blockchain technology day by day. The development of peer-to-peer payment systems make the crypto-currencies capable of dealing with not only the individual money transfers but also with the international trade activities. Expected result of this development is an increase the international trade volume in the short run. There are both threats and opportunities in terms of blockchain-based peer-to-peer commercial transactions. And also, some strengths and weaknesses due to the internal structure of the blockchain system. In this study, we are analyzing online peer-to-peer commercial activities via SWOT analysis from the perspective of institutions. It is expected that this study will enable to analyze the major factors of the peer-to-peer transactions in international trade facilities by applying "SWOT analysis". Even though there are a lot of research about blockchain in the local literature, institutional dimension in terms of the state-of-the-art cases of the adoption of blockchain in transport and logistics are studied scarcely in Turkey and hopefully will guide the academicians who want to work in this field

    Assesment of Blockchain-Based P2P (Pear to Pear) Transactions in International Trade with Swot Analysis

    Get PDF
    Blockchain is known as a digitalized, decentralized online computer network on which a public ledger of all cryptocurrency transactions stored and it attempts to create and share all transactions that are verified by using a peer-to-peer (P2P) connected computer network. From the point of production to the truncating the international trade finance process or recording the customs procedures control, many companies are taking the advantages of blockchain technology day by day. The development of peer-to-peer payment systems make the crypto-currencies capable of dealing with not only the individual money transfers but also with the international trade activities. Expected result of this development is an increase the international trade volume in the short run. There are both threats and opportunities in terms of blockchain-based peer-to-peer commercial transactions. And also, some strengths and weaknesses due to the internal structure of the blockchain system. In this study, we are analyzing online peer-to-peer commercial activities via SWOT analysis from the perspective of institutions. It is expected that this study will enable to analyze the major factors of the peer-to-peer transactions in international trade facilities by applying "SWOT analysis". Even though there are a lot of research about blockchain in the local literature, institutional dimension in terms of the state-of-the-art cases of the adoption of blockchain in transport and logistics are studied scarcely in Turkey and hopefully will guide the academicians who want to work in this field

    Visual Cryptography-Based Secure QR Payment System Design and Implementation

    Get PDF
    It is important to validate the Merchant and the Client to increase confidence in online transactions. At present, only the Client is checked against the merchant server. The research in this paper will show you how to create and launch a QR code-based payment system that is both secure and convenient for users. As a result of their capacity to facilitate instantaneous transactions and offer unparalleled ease of use, QR codes have seen explosive growth in the past few years. QR-based online payment systems are easy to use but susceptible to various assaults. So, for the level of security given by transaction processing to hold, the secrecy and integrity of each payment procedure must be guaranteed. In addition, the online payment system must verify each transaction from both the sender's and the recipient's perspectives. The study's QR-based method is kept safe through visual cryptography. The suggested approach takes advantage of visual cryptography via a web-based application

    Autonomy and Efficiency Trade-offs on an Ethereum-Based Real Estate Application

    Get PDF
    Siiani on jagamismajanduse vahendusplatvorme arendatud tsentraliseeritud andmebaaside abil. Plokiahela esiletõus on aga ilmutanud uusi võimalusi, et muuta valdkonda võltsimiskindlaks ning vähendada vajadust vahendajate järele. Käesolevas töös uuritakse plokiahela kasutusvõimalusi kinnisvara rentimise protsessi näitel. Täpsemalt, töös disainitakse lahendus Ethereumi abil ning teostatakse kolm järjestikust prototüüpi, et analüüsida andmete ning arvutuste tõstmist plokiahelasse. Tulemused näitavad, et detsentraliseerimisel tuleb teha kompromisse teostatavuse ning tõhususe vahel.Marketplaces in sharing economy have traditionally been organized as web applications running on top of centralized databases. The advent of blockchain technology brings new opportunities, with the promise of transforming the landscape with tamper-resilient storage and the potential of reduction in intermediaries. In this context, in this thesis we look at exploring the use of blockchain technologies in the domain of real estate rental process. More specifically, we designed a solution on top of Ethereum and implemented three consecutive prototypes to analyze the impact of moving data and processing to the blockchain. The results show a trade-off between efficacy versus efficiency when moving toward decentralization

    Enhancing data privacy and security in Internet of Things through decentralized models and services

    Get PDF
    exploits a Byzantine Fault Tolerant (BFT) blockchain, in order to perform collaborative and dynamic botnet detection by collecting and auditing IoT devices\u2019 network traffic flows as blockchain transactions. Secondly, we take the challenge to decentralize IoT, and design a hybrid blockchain architecture for IoT, by proposing Hybrid-IoT. In Hybrid-IoT, subgroups of IoT devices form PoW blockchains, referred to as PoW sub-blockchains. Connection among the PoW sub-blockchains employs a BFT inter-connector framework. We focus on the PoW sub-blockchains formation, guided by a set of guidelines based on a set of dimensions, metrics and bounds

    Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey

    Get PDF
    This is an accepted manuscript of an article published by IEEE in IEEE Transactions on Engineering Management, available online at: https://ieeexplore.ieee.org/document/9366288 The accepted version of the publication may differ from the final published versionSupply-chains (SC) present performance bottlenecks that contribute to a high level of costs, infltration of product quality, and impact productivity. Examples of such inhibitors include the bullwhip effect, new product lines, high inventory, and restrictive data fows. These bottlenecks can force manufacturers to source more raw materials and increase production signifcantly. Also, restrictive data fow in a complex global SC network generally slows down the movement of goods and services. The use of Distributed LedgerTechnologies (DLT) in supply chain management (SCM) demonstrates the potentials to to reduce these bottlenecks through transparency, decentralization, and optimizations in data management. These technologies promise to enhance the trustworthiness of entities within the supply chain, ensure the accuracy of data-driven operations, and enable existing SCM processes to migrate from a linear to a fully circular economy. This paper presents a comprehensive review of 111 articles published in the public domain in the use and effcacyofDLTin SC.It acts asaroadmapfor current and futureresearchers whofocus onSC Security Management to better understand the integration of digital technologies such as DLT. We clustered these articles using standard descriptors linked to trustworthiness, namely, immutability, transparency, traceability, and integrity

    Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey

    Get PDF
    Supply chains (SC) present performance bottlenecks that contribute to a high level of costs, infiltration of product quality, and impact productivity. Examples of such inhibitors include the bullwhip effect, new product lines, high inventory, and restrictive data flows. These bottlenecks can force manufacturers to source more raw materials and increase production significantly. Also, restrictive data flow in a complex global SC network generally slows down the movement of goods and services. The use of distributed ledger technologies (DLT) in SC management (SCM) demonstrates the potentials to reduce these bottlenecks through transparency, decentralization, and optimizations in data management. These technologies promise to enhance the trustworthiness of entities within the SC, ensure the accuracy of data-driven operations, and enable existing SCM processes to migrate from a linear to a fully circular economy. This article presents a comprehensive review of 111 articles published in the public domain in the use and efficacy of DLT in SC. It acts as a roadmap for current and future researchers who focus on SC security management to better understand the integration of digital technologies such as DLT. We clustered these articles using standard descriptors linked to trustworthiness, namely, immutability, transparency, traceability, and integrity
    corecore