31 research outputs found

    I Rest My Case! The Possibilities and Limitations of Blockchain-Based IP Protection

    Get PDF
    We have identified, mapped and discussed existing research on Blockchain-based solutions for intellectual property (IP) protection, an investigation that emerged from a case in antibody production for scientific and medical applications. To that end, we have performed a systematic literature review and created an instrument that classifies the contributions according to the materiality of the object they protect (from immaterial to physical), the type of protection (authorship notarization or prevention of illegal use) and the type of research (conceptual or empirical). Our results can be used to understand which avenues to pursue in the effort to create a new generation of more effective technology-assisted IP protection systems, a priority for 152 signatory countries of the patent cooperation treaty

    Sovereignty, privacy, and ethics in blockchain-based identity management systems

    No full text
    Self-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the concept of individual control over identity relevant private data, capacity to choose where such data is stored, and the ability to provide it to those who need to validate it. It is also argued that while it might be appealing to operationalise the concept of ‘self-sovereignty’ in a narrow technical sense, depreciation of moral semantics obscures key challenges and long-term repercussions. Closer attention to the normative substance of the ‘sovereignty’ concept helps to highlight a range of ethical issues pertaining to the changing nature of human identity in the context of ubiquitous private data collection.</p

    Blockchain Technology as an Institution of Property

    No full text
    This paper argues that the practical implementation of blockchain technology can be considered an institution of property similar to legal institutions. Invoking Penner's theory of property and Hegel's system of property rights, and using the example of bitcoin, it is possible to demonstrate that blockchain effectively implements all necessary and sufficient criteria for property without reliance on legal means. Blockchains eliminate the need for a third-party authority to enforce exclusion rights, and provide a system of universal access to knowledge and discoverability about the property rights of all participants and how the system functions. The implications of these findings are that traditional property relations in society could be replaced by or supplemented with blockchain models, and implemented in new domains.</p

    Sovereignty, privacy, and ethics in blockchain-based identity management systems

    No full text
    Self-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the concept of individual control over identity relevant private data, capacity to choose where such data is stored, and the ability to provide it to those who need to validate it. It is also argued that while it might be appealing to operationalise the concept of ‘self-sovereignty’ in a narrow technical sense, depreciation of moral semantics obscures key challenges and long-term repercussions. Closer attention to the normative substance of the ‘sovereignty’ concept helps to highlight a range of ethical issues pertaining to the changing nature of human identity in the context of ubiquitous private data collection.Distributed SystemsSafety and Security Scienc

    Open Sourcing Normative Assumptions on Privacy and Other Moral Values in Blockchain Applications

    No full text
    The moral significance of blockchain technologies is a highly debated and polarised topic, ranging from accusations that cryptocurrencies are tools serving only nefarious purposes such as cybercrime and money laundering, to the assessment of blockchain technology as an enabler for revolutionary positive social transformations of all kinds. Such technological determinism, however, hardly provides insights of sufficient depth on the moral significance of blockchain technology. This thesis argues rather, that very much like the cryptographic tools before them, blockchains develop in a constant feedback loop. Blockchain applications are driven by values, normative assumptions, and personal commitments of researchers, which shape moral effects of technology. At the same time these very assumption are often embedded in preexisting moral conception and ethical theories, implicitly or explicitly accepted by blockchain developers. And just as the introduction of one flawed element in the cryptographic application can have mass scale effects, the introduction of flawed normative assumptions can have far reaching consequences in blockchain applications.Ethics & Philosophy of Technolog

    The Ethical Limits of Blockchain-Enabled Markets for Private IoT Data

    No full text
    This paper looks at the development of blockchain technologies that promise to bring new tools for the management of private data, providing enhanced security and privacy to individuals. Particular interest presents solutions aimed at reorganizing data flows in the Internet of Things (IoT) architectures, enabling the secure and decentralized exchange of data between network participants. However, as this paper argues, the promised benefits are counterbalanced by a significant shift towards the propertization of private data, underlying these proposals. Considering the unique capacity of blockchain technology applications to imitate and even replace traditional institutions, this aspect may present certain challenges, both of technical and ethical character. In order to highlight these challenges and associated concerns, this paper identifies the underlying techno-economic factors and normative assumptions defining the development of these solutions amounting to technologically enabled propertization. It is argued that without careful consideration of a wider impact, such blockchain applications could have effects opposite to the intended ones, thus contributing to the erosion of privacy for IoT users.Ethics & Philosophy of Technolog

    Fictions and frictions: Promises, transaction costs and the innovation of network technologies

    No full text
    New network technologies are framed as eliminating ‘transaction costs’, a notion first developed in economic theory that now drives the design of market systems. However, the actual promise of the elimination of transaction costs seems unfeasible, because of a cyclical pattern in which network technologies that make that promise create processes of institutionalization that create new forms transaction costs. Nonetheless, the promises legitimize the exemption of innovations of network technologies from critical scrutiny.Ethics & Philosophy of Technolog

    MATCH: A Decentralized Middleware for Fair Matchmaking In Peer-to-Peer Markets

    No full text
    Matchmaking is a core enabling element in peer-to-peer markets. To date, matchmaking is predominantly performed by proprietary algorithms, fully controlled by market operators. This raises fairness concerns as market operators effectively can hide, prioritize, or delay the orders of specific users. Blockchain technology has been proposed as an alternative for fair matchmaking without a trusted operator but is still vulnerable to specific fairness attacks.We present MATCH, a decentralized middleware for fair matchmaking in peer-to-peer markets. By decoupling the dissemination of potential matches from the negotiation of trade agreements, MATCH empowers end-users to make their own educated decisions and to engage in direct negotiations with trade partners. This approach makes MATCH highly resilient against malicious matchmakers that deviate from a specific matching policy We implement MATCH and evaluate our middleware using real-world ride-hailing and asset trading workloads. It is demonstrated that MATCH maintains high matching quality, even when 75% of all matchmakers is malicious. We also show that the bandwidth usage and order fulfil latency of MATCH is orders of magnitude lower compared to matchmaking on an Ethereum blockchain

    MeritRank: Sybil Tolerant Reputation for Merit-based Tokenomics

    No full text
    Decentralized reputation schemes present a promising area of experimentation in blockchain applications. These solutions aim to overcome the shortcomings of simple monetary incentive mechanisms of naive tokenomics. However, there is a significant research gap regarding the limitations and benefits of such solutions. We formulate these trade-offs as a conjecture on the irreconcilability of three desirable properties of the reputation system in this context. Such a system can not be simultaneously generalizable, trustless, and Sybil resistant. To handle the limitations of this trilemma, we propose MeritRank: Sybil tolerant feedback aggregation mechanism for reputation. Instead of preventing Sybil attacks, our approach successfully bounds the benefits of these attacks. Using a dataset of participants’ interactions in MakerDAO, we run experiments to demonstrate Sybil tolerance of MeritRank. Decay parameters of reputation in MeritRank: transitivity decay and connectivity decay, allow for a fine-tuning of desirable levels of reputation utility and Sybil tolerance in different use contexts.Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.Distributed System

    Safe by design regulation for academic experimentation and value conflicts: An exploration of solution directions

    No full text
    In this paper, we explore solution directions for the implementation of Safe by Design (SbD) in safety regimes for academic experimentation. SbD is a dynamic and anticipatory strategy for safety regulation in academic research. In this strategy, safety is taken in a broader sense including not only issues of technical precaution of avoiding risks of experimentation but also the societal responsibility of researchers and research institutes of identifying possible future risks. In our research, we have interviewed academic researchers from different disciplines and university support personnel about the factors that enable and limit the possibilities of researchers to implement SbD in safety regimes for experimentation. We articulate our findings in terms of a core set of research values and in terms of conflicts between safety and these research values. And we argue that tools for resolving value conflicts as originating in design for values research can provide directions to solve the value conflicts, and thus help academic researchers to adopt SbD in their experimentation.</p
    corecore