SlideShare a Scribd company logo
1 of 11
Download to read offline
Contents lists available at ScienceDirect
Telematics and Informatics
journal homepage: www.elsevier.com/locate/tele
Blockchain: The emerging technology of digital trust
Don D.H. Shin
⁎
College of Communication and Media Sciences, Zayed University, Abu Dhabi, UAE
A R T I C L E I N F O
Keywords:
Blockchain
Blockchain service
Perceived security
Perceived privacy
Digital trust
A B S T R A C T
Trust in individual relationships with blockchain has become an increasingly prominent issue.
This study introduces a key heuristic used to assess trust in blockchain by analyzing how
privacy and security concerns about blockchains have an impact on the user’s attitude and be-
havior. It proposes a blockchain user model by integrating security and privacy as primary in-
fluencing factors of trust and behavioral intent. The results from a user experience model of
blockchain users confirm that the model explains user experience and predicts behavioral intent
of blockchain. The results establish users’ cognitive role in embedding privacy and security in
blockchain. The research contributes to the ongoing research by clarifying the role and dimen-
sion of trust in relation to security and privacy in blockchains and provides heuristic implications
for academia and industry.
1. Introduction
Blockchains have experienced exponential growth over the last few years (Kshetri, 2018). Blockchain technology, in particular the
cryptocurrency mania of 2017, has created a great deal of disruptive buzz in the industry. As blockchain rises beyond being just
another buzz-word, the variety of blockchain applications ranges from healthcare, financial, transportation, risk management and
media to public and social services (Grover et al., 2019). While blockchains afford a new window of opportunities for interaction and
decentralized transactions, a wide variety of security and privacy have risen as thorny issues in the blockchain environment (Joshi
et al., 2018). Security considerations specifically override all other considerations in blockchain. Blockchain provides decentralized,
peer-to-peer security for all transactions, yet many blockchain security vulnerabilities remain (Kshetri, 2017). The key to continued
growth is addressing the security issues facing blockchains (Vidan and Lehdonvirta, 2018). How to ensure privacy and security in
blockchains has been a critical issue in the success of blockchains (Du et al., 2019).
Despite the growing issue over vulnerability, there is a lack of research on the concern of privacy and security in blockchains,
leading to a limited understanding on how security concerns and trust influence the experience of blockchains. As blockchains
mature, the degree to which users trust the services, interactions, and organizations behind them becomes increasingly critical
(Bancroft and Reid, 2017). When users interact within blockchains, they expect that they will receive the products they paid for and
that their data will not be abused (Casino et al., 2019). While it is obvious that trust matters in digital contexts (Tian et al., 2019),
there has been a lack of clarity about what trust is, how it works/can be formed, and what truly constitutes digital trust (Park et al.,
2018).
This study makes a heuristic contribution to filling the existing gap in the literature and creating the essential linkages between
the level of privacy and security and the effects of the extent on trust. Aiming to conceptualize digital trust through blockchains, this
study examines blockchain users’ cognitive process of security and privacy and its impact on intention by highlighting how trust is
https://doi.org/10.1016/j.tele.2019.101278
Received 4 June 2019; Received in revised form 2 August 2019; Accepted 12 September 2019
⁎
Address: P.O. Box 144534, Abu Dhabi, UAE. Tel.: +97125993488.
E-mail address: dshin1030@gmail.com.
Telematics and Informatics 45 (2019) 101278
Available online 17 September 2019
0736-5853/ © 2019 Elsevier Ltd. All rights reserved.
T
generated and how it leads to user behavioral intention in blockchains.
Although numerous studies have investigated user privacy concerns and firm security practices in a diverse technological en-
vironment (e.g., (Kshetri, 2013, 2014, 2017; Shin, 2010), it has remained unknown how privacy/security aspects in the emerging
blockchain context affect an individual’s cognitive process of acceptance (Seigel and Sarma, 2019). This study discusses a user
cognitive model of blockchains in generating a security/trust and trust model of blockchain adoption. With this model in place, the
current study proposes means to configure and evaluate users’ perceived security and privacy of their blockchain experiences. With
the following research questions in focus, the study conceptualizes digital trust in the new context of the blockchain era.
RQ1: What is the relationship between users’ trust in blockchain platforms, their security and privacy concerns, and their
blockchain adoption and use?
RQ2: How user trust is developed and how it influences user behavior in the blockchain environment? What role does trust/
distrust play in the acceptance of blockchains? How can digital trust be measured and operationalized in the digital era?
With the inquires in place, it securitizes the effects of privacy and security in blockchain experience and behaviors. The findings
open windows of opportunity for user-centered evaluation and an analytical method for assessing user experience for future
blockchain environments. Ongoing research has shown that improved privacy measures increase perceived security, which leads to
increased intention to adopt technology services (Carmen and Lopez, 2018; Shin, 2011; Tian et al., 2019). This study advances
current understanding by further showing how trust is related and generated, and, in turn, affects perceived privacy and security.
This relation implies a positive feedback loop of trust shedding light on the new roles of trust in emerging digital contexts. The loop in
the blockchain context should interest both researchers and industries. From a scholarly standpoint, the findings provide an insightful
framework of a blockchain experience model by recognizing antecedents of user intention to adopt a blockchain relative to privacy
and security. The value of our approach is examining the cognitive aspects of security and embedding it privacy and security in a
user-focused way. Despite extensive research on the factors that affect users to experience and use technologies in general (Kim et al.,
2019; Kim and Yun, 2007), blockchain user research in terms of user-centered privacy and security has been rare. This research
addresses this aspect by uncovering users’ cognitive process of security/privacy in blockchains. This academic work also offers
practical guidelines for practitioners. The findings should guide firms developing blockchain in fostering user trust by ensuring
anonymity, protecting users from security threats, and assisting them to track a misuse of their data. As cryptocurrency industries
such as bitcoin face the difficulties of establishing a sustainable and trusting environment (Lemieux, 2016), blockchain industries
should see this study’s results helpful for future development.
2. Literature review
2.1. Blockchain, security, and the future of digital trust
The societal implications of blockchain technology are immense. Blockchain has provided financial services to a great number of
customers without access to banking via online, debit cards and ATMs. It has additionally allowed micropayments and microloans to
people in disadvantaged socio-economic circumstances, unravelling a complete new form of advantage for the world economy (Shin,
2019). Another example of a social implication is within a section of social enterprise where lack of trust is a specific issue (Park,
2018). Blockchain technology produces a meaningful means of finding a way around the challenges of corruption. The decentralized
characteristics of the blockchain and smart-contracts mean that an agreement built on its platform does not need a separate party. As
smart-contracts are basically computer code, contractual conditions could be translated into logical functions which trigger subse-
quently when set conditions are met. It is feasible to add clauses in smart agreements which specify that obligations are met if certain
results are accomplished. Smart agreements may even be used to govern the circulation of currency.
Blockchain continues to gain momentum in a myriad of use cases across a wide variety of industries. Firms are increasing their
investments in blockchain to transform how they deliver products and services, gain new insights to obtain a competitive edge, and
improve their financial and operational performance (Marsal-Llacuna, 2018). The fact that blockchain ledger records are secure,
sequential, and immutable is improving the security of customer information as well as business and transaction records (Macrinici
et al., 2018). Ironically, such a trust-based mechanism is blockchain’s most vulnerable point (Kshetri, 2017). Information and services
of blockchains are vulnerable to manipulation by hackers or foreign powers, and personal data are not necessarily private. As
blockchain develops in different sectors of various domains, security-related issues become prime factors in determining the success
of the blockchain economy (Pink et al., 2018). Blockchain will continue to change the future of digital transactions in the new data
economy and transform the nature of digital trust (Filippi and Hassan, 2016; Shin and Park, 2019). Digital trust in blockchain can be
defined as enabling user heuristics made between security and privacy that reflect their level of confidence.
Digital trust is a kind of user heuristics in blockchain. Blockchain users are likely cope with the perceived risk, security, and
privacy, and overload by using heuristics that minimize their cognitive effort and time, through the use of cognitive heuristics. Digital
trust as cognitive heuristics constitute information processing methods to make decisions more quickly and with less effort than more
complex methods, and thus they reduce cognitive load during security assessment.
2.2. Concerns over privacy in blockchain
Security and privacy are critical to the blockchain technology since it can exist without an authorized third party. Blockchain
security issues are closely related to concerns over privacy in blockchains (Kshetri, 2018). Although distributed ledger technology is
encrypted, it is not held in a single place. Firms do not have complete control over the data. Due to this decentralized structure, user
D.D.H. Shin Telematics and Informatics 45 (2019) 101278
2
data might be diverted through many different servers when being processed in blockchains. Data in a blockchain are vulnerable and
can be accessed by other people in the chain. When data are encrypted intentionally or mistakenly before transmitting to a chain,
nobody can access the data unless they are decoded. Despite privacy-enhancing technologies, blockchain transactions are vulnerable
to hacking throughout chain nodes. These produce metadata and statistical analysis that can produce information even from en-
crypted data, allowing for pattern recognition (Leon et al., 2017). Against the privacy issues, the EU as well as the US impose very
strict rules and regulations in regard to data privacy. The EU establishes the General Data Protection Regulation, which imposes clear
conditions for consent and data retention, requires firms to protect the individual data and privacy of people for transactions in the
EU. It also prohibits personal data from leaving the EU, giving users eventual and sheer control over all their data. GDPR might
hamper industry innovation in blockchain technologies, while on the other, opens windows of opportunities in the use of blockchain
technologies as a venue for enforcing GDPR. When blockchain entails the processing of personal data, it raises legal compliance
questions. The regulations inform data protection laws and corporate trust-building strategies.
3. Research model and hypothesis development
As blockchain-based services provides various innovative features, it is critical to recognize what users’ expectations are and how
they are formed and how users’ recognized confirmation affects satisfaction, which then influences intentions. Theory of Reasoned
Action (TRA) can be a good frame for this task as the theory explains the relationship between attitudes and behaviors within human
action (Shin, 2013). The theory explains how behavioral intent is created or caused by human attitudes and subjective norms.
TRA is used in this study as a lens to examine the UX of blockchain security and privacy. TRA is right for this analysis since it is
structured to describe user behaviors as a function of belief, evaluation, and performance of beliefs based on cognitive processes. As
blockchain systems afford users unique experiences, TRA can be extended by incorporating blockchain-specific factors (such as
privacy and security) as antecedents of trust and utility/convenience as a performance value.
3.1. Attitude toward blockchain
Per the theory of reasoned action (TRA), peoples’ action of a certain behavior is influenced by their behavioral intention to
perform the behavior, and behavioral intention is affected by a person’s attitudes (Shin, 2013). As the direct antecedent of behavior,
behavioral intent is the cognitive expression of individual preparation to carry out a given behavior (Shin, 2010). Per TRA, attitude
toward a behavior is stated as a person’s belief of performing the target behavior. An individual’s attitude toward a behavior is
decided by his/her belief and valuations. As the TRA has been widely applied to diverse technological contexts particularly emerging
technologies, the key premises of the TRA also apply in a blockchain context (Fig. 1).
H1. Attitude toward blockchain has a positive influence on the intention to adopt blockchain.
3.2. Perceived security
Given the rising concerns over security in blockchain (Joshi et al., 2018), this research addresses the influence of users’ recognized
security on intention to adopt blockchains. Shin (2010) defines perceived security as the extent to which a user considers that doing
things in certain contexts is secure and safe. Subjective security can be considered as the reflecting image of risk affinity. Kim and Yun
(2007) show that a perceived security is fundamentally determined by a user’s feelings of control in an online system. Security in a
mediated online platform may not depend on technical aspects of security alone (Shin, 2010). A low subjective security can be the
most serious reason for a refusal to adopt technological services (Mou et al., 2017). Numerous studies have confirmed that negative
subjective security thwarts users from accepting online services (Shin, 2013). There has been continuous research in conceptualizing
and theorizing a set of factors that elucidates the role of subjective security.
In accordance with ongoing research, this study examines security from a user-centric view that addresses not only technical
Fig. 1. Blockchain trust model.
D.D.H. Shin Telematics and Informatics 45 (2019) 101278
3
features, such as authentication and confidentiality but also the people’s cognitive feeling of security and emotional comfortability. In
terms of blockchains, users’ assessment of security can differ from physical security levels (Vidan and Lehdonvirta, 2018). While a
technical evaluation of security is grounded on scientific solutions, it is the individuals’ assessments of security that affect intention
and behavior (Mou et al., 2017; Shin, 2010). Although numerous studies have examined the function of perceived security in various
contexts, only a few have applied it to a blockchain context. It is useful to examine user dimension of security and its link to trust in
the blockchain context.
H2. Perceived security positively influences users’ trust in blockchain.
H3. Perceived security positively influences users’ attitudes toward blockchain.
3.3. Perceived privacy
Similar to perceived security, perceived privacy is critical in blockchains. In this study, perceived privacy is seen as the extent to
which a user considers that his or her information is protected and will not be misused (Casalo et al., 2007). Privacy is often
interchangeably used with the issue of security, as a subset thereof, computer security (Park et al., 2018). Information privacy is one
of the most critical issues in various technological environments (Miyazaki, 2001; Shin, 2011). The concept of privacy has been
conceived as a user’s capacity to manage and maneuver the conditions by which his/her personal information is collected and
processed (Carmen and Lopez, 2018). The degree to which blockchain users believe that a blockchain service ensures their privacy
may also have an influence on their trust of the service. Blockchain services influence perceptions of a service’s privacy assurance
through distributed ledger functions. Research confirms that positive perceptions of service privacy protection via features increase
regard for and trust in the firm (Kim et al., 2015; Shin, 2011). For example, Diakopoulos and Koliska (2016) found that sharing
information acquisition procedures enhances users’ feelings of security and trust. Similarly, (Klinger and Svensson, 2018) argue that
having a clear privacy procedure, which clarifies how the firm would use user data and information, leads to trust in a service. People
are likely to give personal information to service providers if the latter displays privacy seals or privacy statements (Kim and Yun,
2007). Based on the ongoing literature, it can be hypothesized that the degree to which blockchain users think a blockchain service
ensures their privacy favorably affect their overall attitude and trust in the providers and the service itself.
H4. Perceived privacy positively influences users’ trust in blockchain.
H5. Perceived privacy positively influences users’ attitudes toward blockchain.
3.4. Trust
Trust is a key component in blockchain technology (Shin, 2019). People do not require an established trust relationship if
transactions are carried out on a distributed ledger. If each participant in the transaction trusts the blockchain itself, they do not need
to directly trust each other. Whether and how users trust blockchain plays a critical role in blockchain success. In this regard, trust is
proposed as a key factor. Trust is seen as assured reliance on the character or capability that the willingness of a user to be vulnerable
to the actions of another user based on the belief that the other will conduct a certain action (Shin, 2011). Given this definition, trust
can be seen as a consequent factor of privacy and security and as an antecedent factor to attitudes toward blockchain.
In online contexts, trust has been consistently found to be a key factor in exchanges involving risk. Research in e-commerce and
digital technologies has consistently found trust to be strongly related to user acceptance (Mou and Shin, 2018; Shin, 2011). Research
by Shin, Lee, and Hwang (Shin et al., 2017) found a significant impact of trust on behavioral outcomes. The higher the users’ trust in
the online service, the less effort users will need to validate details of those services to evaluate their reality and legitimacy. With a
trusted service, users would experience convenience and ease of using as they have less need of checking or examining authenticity
and legitimacy (Bianchi and Brockner, 2012).
As trust has recently been considered key issue in digital media and technologies (Shin and Biocca, 2018), it is opportune to
examine if trust in a blockchain service influences or is influenced by what factors. As trust is key to the process of digital transaction,
it is critical to test what promotes trust in a blockchain service.
H6. Trust positively influences users’ attitudes toward blockchain.
4. Methodology
4.1. Survey procedure
To understand overarching views on users’ perspectives, presurvey interviews were performed 1) to confirm factors validated
from the other research; 2) to draw blockchain-specific features; and 3) to generate the survey measurements. In-depth interview
subjects were recruited from graduate students registered in classes in a university. A total of 20 people were presurveyed. The
sample comprises 8 male and 12 female subjects. As most blockchain users fit the demographics of young user groups, a student
sample can be justified in this study. Participants expressed their opinions on security, privacy, risk, and feelings about blockchains
on memos and then post the memos under the types prepared by the researchers.
The reliability and the validity of the measurements were assessed through a pretest. A total of 43 subjects participated in the
pretest. Respondents were asked about their general view on the questionnaire and expressed any trouble they may have encountered
in the measurements. Opinion and comments from the pretest were incorporated into a survey questionnaire. Lastly, the wording of
measurements was finally edited.
D.D.H. Shin Telematics and Informatics 45 (2019) 101278
4
Following the pretest, a contracted survey firm performed a four-week web survey (see Appendix for the survey). A total of 391
responses were gathered (21% response rate; 52.2% were female and 47.8% were male). After dropping error responses through data
filtering, 363 quality responses were finalized as the usable sample. The final sample shows general trends of blockchain users in
general. Young people indeed are the dominant users of blockchains (Casino et al., 2019). The chosen sample is well matched
matched to a general population of blockchains (Table 1).
4.2. Scales and measurements
The final measurements comprised 15 items, with three items per factor. All of the items were derived from the TRA literature and
user study frameworks (see the Appendix for the item questionnaire). A pretest was performed: 20 people with previous and/or
current users of blockchain services participated in the pretest over a ten-day interval. For the reliability of the measurements,
Cronbach’s alpha was used. Correlation coefficients were utilized to evaluate the concurrent validity of the instrument. The scores for
this measurement ranged from 0.823 to 0.965, indicating highly suitable construct reliability (Table 2). The analysis of confirmatory
factor analysis showed that the items had acceptable factor loadings. To assess validity, a simple linear correlation was used to assess
the significance of the relationship. The appropriate level of intercorrelations among the variables showed no critical multi-
collinearity problems. Furthermore, discriminant validity (factors are distinct and uncorrelated) is verified as the square root of the
average variance extracted (AVE) is higher than the largest correlation of that factor with any other factor. All of the goodness-of-fit
indices were within acceptable ranges and indicate that the model of the research has good fitness.
5. Results
The hypothesized causal paths were tested, and all the hypotheses were confirmed (Table 3). The results confirm the model and
highlight heuristic functions of trust in the formation of user behaviors. The results reveal the underlying antecedent roles of users’
privacy and security in shaping users’ behavioral intent of blockchain. Security is found to be a higher effect on trust than perceived
privacy (β = 0.23, CR = 2.688; β = 0.18; CR = 2.704). The model also showed a significant positive effect of trust on attitude (H6),
implying the mediating effect of trust on the relation between security/privacy and attitude.
The explanatory powers of constructs were verified (Fig. 2). Perceived security and privacy together account for 23% of the
Table 1
Demographics of Survey Respondents.
Age (years) Percent
Under 20 94
21–35 170
36–45 29
Blockchain experience
1–5 104
6–9 97
10–12 99
> 1 year 63
Gender
Female 182
Male 180
No response 1
Table 2
Reliability and Validity.
Variables Mean SD Cronbach’s alpha AVE Composite reliability
Perceived privacy 5.18 1.404 0.866 0.751 0.710
4.85 1.642
4.66 1.740
Perceived security 5.60 1.203 0.868 0.743 0.896
5.37 1.275
5.10 1.011
Trust 3.90 1.151 0.920 0.757 0.903
3.96 1.089
4.19 1.418
5.09 1.413
Attitude 5.13 1.414 0.970 0.850 0.944
5.05 1.416
Intention 4.98 1.380 0.940 0.663 0.855
4.63 1.485
4.61 1.461
D.D.H. Shin Telematics and Informatics 45 (2019) 101278
5
variance in trust. Trust, along with privacy and security, charged 27% of the variance in attitude toward behavior, which in turn
described 72% of the variance of intent. Potential underlying effects can be inferred in the model from the high R2
of 72%.
5.1. Mediating roles of trust
As trust was found to play a significant role between security/privacy and attitude, it is worthwhile to extend the model by
examining the mediating roles of trust. This task will be significant, as research literature has consistently shown that trust plays a
significant role (Shin, 2010; Chang et al., 2016). The relationship between privacy and security is an indirect effect of the influence of
the trust mediator. The consistent findings regarding trust warrant the significant role of trust in the blockchain context.
The effect of trust on other variables was analyzed with mediating regression. This research tested the mediating effect using the
multiple-step method of Hayes (2013). Per the proposed steps, the significant links were verified between the independent variable
and the mediating variable and between the dependent variable (intention) and the mediating variable. Subsequently, mediation is
verified if the effect of the independent variable on the dependent variable is decreased by the mediating variable. The mediating
effect test is complete when the direct effect becomes insignificant.
The first step is to show that the causal variable trust is correlated with security. Perceived security was used as the criterion
variable in a regression equation and perceived privacy was analyzed as a predictor. The influence of privacy largely accounted for
the variance in the hypothesized mediator trust (t = 3.82, F = 14.31, p < .001). It showed that there is an effect that may be
mediated. Then, perceived privacy was correlated with trust. Trust was used as the criterion variable in the regression equation and
perceived privacy was used as a predictor. This step established that trust significantly explains the variance in the dependent
variable security (t = 4.24, F = 18.31, p < .001). Third, a regression test was done to show whether trust affects perceived security.
Trust and privacy were used as predictors, and security was analyzed with the criterion variable in a regression equation. The result
was significant (t = 2.91, F = 8.41, p < .001).
Lastly, a regression model was used to test whether trust completely mediates the privacy-security relationship. It was regressed
with security as the dependent variable and privacy and trust as the independent variables. The effects were insignificant (t = 1.12,
p = .28) when the significant effect of the hypothesized mediator trust (t = 3.79, p < .001) was partitioned out. Hence, trust was
found as a partial mediator (but close to full mediator) between privacy and security (Fig. 3 & Table 4). This illustrates that users
should completely trust the blockchains to ensure that the information provided by users in the transaction would not be misused and
is warranted for the protection of personal privacy. It then generates a positive attitude and triggers use intention. This showed users’
concern with issues of personal information protection for blockchains. Users pay attention to the issue of trust in the protection of
personal data by blockchains in terms of transaction security. Cognitive trust has a positive mediating effect on the relationship
Table 3
Results of Hypothesis Testing.
Path Standardized Coefficients S.E. t-value
H1: Attitude → Intent 0.85 0.038 2.684**
H2: Security → Attitude 0.11 0.079 1.782*
H3: Security → Trust 0.18 0.090 2.704**
H4: Privacy → Trust 0.23 0.098 2.688**
H5: Privacy → Attitude 0.17 0.088 2.228**
H6: Trust → Attitude 0.38 0.052 7.082**
* p < .05.
** p < .001.
Fig. 2. A user trust model of blockchain.
D.D.H. Shin Telematics and Informatics 45 (2019) 101278
6
between privacy concern and security.
The mediating effects are in line with the role of the trust mechanism in blockchain and related services overall. The heuristic role
of trust is critical to the development of critical determinants in blockchain. In ongoing literature, trust has been found just one of the
factors facilitating adoption (Buchanan et al., 2007; Shin, 2010). In the blockchain context, trust represents more than one of the
factors for user decisions; it may be understood by users as a facilitator or a catalytic cue that plays a key role in triggering and
forming the user experience of blockchains. In this light, the domain of trust in blockchain can be broadened to include diverse roles
at different dimensions. The model shows that trust plays a crucial part in the stimulation and generation of user motivation,
attitudes, and behaviors. This finding has valuable and heuristic implications for both academia and industry. While the findings
confirm previous research on trust, they further clarify the applicability of trust in emerging technology areas. Previous research on
trust have consistently confirmed that user trust plays a role in establishing a person’s cognitive decision and behavior (Alexander
et al., 2018; Carmen and Lopez, 2018; Shin, 2010). The role of trust in blockchains, however, has not been extensively examined
despite the increasing popularity of blockchain-based services. Trust plays a key role in blockchain where credibility, transparency,
and accuracy have been considered key criteria, carrying out users’ wishes while interacting with blockchain. In other words, trust
can be a heuristic providing users with mental shortcuts to form judgments and make decisions: How blockchains are formed, how
data are collected and analyzed, and how transparent and accurate transactions are provided are highly dependent upon trust.
6. Discussion
Blockchain technology is exceedingly recognized and rapidly diffused due to its decentralized infrastructure and peer-to-peer
nature. These characteristics have the potential to support a plethora of requirements in diverse areas and applications, but at the
same time they engender inherent concerns over privacy and security issues. Given these concerns, this study develops an under-
pinning model of trust-based blockchain to explore the user cognitive processes leading to the formation of motivational attitude and
behavioral intent to experience blockchain.
Despite an exponential growth in blockchains, there is limited research on their potential effect on trust, security, and purchase
intentions. This study makes a relevant contribution to fill the existing gap in the knowledge by creating the fundamental linkages
between level of security/privacy and the effects of the extent on trust. The importance of the user model lies in identifying the role
played by security and privacy in generating trust. This study empirically examines the relationship among security and privacy and
trust created through blockchains. In line with previous studies that has examined the influence of security and trust (e.g., (Shin,
2010; Lemieux, 2016; Mou et al., 2017), findings from this research provide heuristic support for the user trust model in this study.
The results show that in the face of complexity and choice, blockchain users predominantly resorted to the heuristic of trust to make
judgements on privacy and security assessment. The results enhance our understanding of users’ attitudes and the behavior of
blockchain with regard to privacy dimension and offer implications for sustainable blockchain services. The results of the structural
and measurement model test lend support to the proposed arguments. The proposed model produced a satisfactory fit to the observed
data, and all the paths in the model were statistically significant and conceptually meaningful, in line with previous findings and trust
research (e.g., Shin, 2010). The results show that the model establishes decent predictive powers and justifies behavioral experiences
in blockchains.
The study develops the measurements of perceived security and privacy as the key antecedents of trust in blockchain experience.
Trust
SecurityPrivacy
Security= b + 2*Privacy+ 3*trust
2 = (not sig.); (p<.001)
Security= c + 4*Privacy
(p<.001)
Trust=a + 1*Privacy
(p<.001)
Blockchain
Transaction
Fig. 3. The results of the mediation analysis.
Table 4
The Mediating Effects of Trust.
Model p-value
Trust = β0 + β1*Privacy 0.001
Security = β0 + β1*trust 0.001
Security = β0 + β1*Privacy 0.001
Security = β0 + β1*Privacy + β2*trust 0.001
D.D.H. Shin Telematics and Informatics 45 (2019) 101278
7
Two key factors nicely reflect current blockchain development: 1) people have concerns about privacy breaches and the vulnerability
of security matters, and 2) perceived privacy and security directly influence trust in blockchain adoption. A lot of aspects of trust is
explained by user-based security/privacy, as seen in the R square (67%). Given the high level of its variance, it can be inferred that
user trust is formed through the users’ cognitive processing of security and privacy. Obviously, while technological security and
objective privacy measures may be essential, so is how users perceive and process such external stimuli, and complete transactions
are as critical as technological features. Users described that being assured and positive was vital and emphasized the affordance of
being able to explore new experiences in digital virtual spaces (Chang et al., 2016; Shin, 2010). Enhanced assurance of security and
ensured privacy would lead to improved perception of trust. While previous studies have found that trust plays a key dimension in
establishing a user’s behavioral intention and behavior (e.g., Buchanan et al., 2007; Roca et al., 2009), it has remained unclear how
trust is influenced by what variables and how users’ trust is formed. Our model advances previous literature by elucidating the
relationships among trust, risk, privacy, and in an emerging technology context. The results confirm that trust is somehow and
someway associated with to the assessments of security and privacy. This effect, together with the path of perceived security to trust,
suggests a mediating effect of privacy on trust through security. This effect is consistent with findings by Shin (Shin, 2010) and
Palmer, Bailey and Faraj (Palmer et al., 2000) on the mediating role of trust in online services.
From the model, it can be inferred that trust is formed from the users’ cognitive domain rather than given as a package from the
outside. Trust is heavily influenced by users’ perceived notions about how secure and private blockchain services are. Hence, user-
generated trust is influenced by users’ intrinsic traits, such as an existing tendency toward new technologies, credible characteristics,
and demographic factors. Previous studies have found that trust is influenced by users’ existing intrinsic factors (e.g., Shin et al.,
2017). Thus, it is worthwhile to test the effects of the moderating role of demographic factors on trust.
6.1. Findings from moderation effect
We used Chow tests (F-test) to check the significance of the statistical difference between the strength of relationship among the
variables from the two groups. The moderation effects were obvious in the all paths in the model.
Other studies on the antecedents of user’s judgments of security and privacy has researched primarily on technical or objective
factors. Based on the study, it can be argued that dispositional tendencies, in particular user’s general propensity to trust things and
others, also influence security and privacy. Users who were more trusting had more positive views of security and privacy. Users who
are more trusting show more favorable attitudes and intention. People with trust are more likely to believe their data are treated
fairly and security is secure.
6.2. Implications: how is trust generated?
As trust becomes a central factor in blockchains as well as emerging technologies, many people wonder about the role of trust in
user heuristics and how trust is generated and sustained throughout the continued usage. These issues are related to theoretical
matters as well as practical strategies. The results produce meaningful implications for user-study scholars as well as the blockchain
industry. From a theoretical standpoint, the study improves our knowledge about the roles of and relations among security, trust, and
privacy. As the importance of trust has increased, numerous researchers call for rigorous research to validate the heuristic link
between the function of trust and its antecedents in technologies (Shin, 2010; Mou et al., 2017). To examine that link, this study
approaches trust in relation to perceived security and privacy. It was found that security and privacy as determinants of trust,
subsequently influencing attitude and behavioral decision. This finding further suggests that the trust plays a heuristic role in the kind
and type of information that a user willingly shares with blockchain communities. While extensive studies have noted the effects of
privacy and security on trust in diverse technological contexts, few have extensively examined the topic (particularly the link among
factors that trigger user action) in the emerging blockchain context, leaving this question unclarified: With what cognitive processing
is trust generated and to what extent are users sensitive regarding security/privacy and in what ways? While further studies should
continue to research the questions, the theoretical contributions of this research lie in the examination of blockchain services in
relation to a user cognitive process of trust. There has been a tendency to consider trust as an external stimulus underplaying users’
internal cognitive process formulating their own trust. As shown in the findings, trust is influenced by users’ own perceived security
and privacy, which are also influenced by users’ intrinsic traits. The notion of trust may not be an issue of reflecting what users
actually can trust, but what users would like to believe and achieve eventually. The findings indirectly imply that perceptions of trust
are not purely objective responses to blockchain transactions. Rather, the findings in this study lends robust support to the argument
that similar to perceptions of information in general, perceived security and privacy in blockchain services are like beauty: they are in
the eye of the beholder. Security and privacy can be more subjective perceptions held by users rather than objective criteria (Dennis
et al., 2012). There are various dimensions by which we can measure how “secure and private” a service is. Security and privacy
depend on users’ perceptions and experiences. While security and privacy have been popular topics in digital technologies, such
heuristics are socially created and cognitively reconstructed within users’ cognitive schemas. Rather than such issues being uniformly
or collectively provided to users, users actively and conscientiously forge their own versions of security and privacy based on their
intrinsic dimensions of trust and/or their own schematic experiences (Shin and Park, 2019). That is, security and privacy are cog-
nitively constructed realities of their own making (constructivism) as they depend upon users’ perceptions.
Regarding blockchain cognitive model, industry can gain useful insights from our results in terms of user strategies and novel
business models for blockchains. From the notable role of security/privacy in relation to trust, firms may expend greater efforts to
comprehend users’ experiences of security-related issues and how these experiences are generated and impact motivational attitude.
D.D.H. Shin Telematics and Informatics 45 (2019) 101278
8
Attitude toward individual blockchains can be variously affected by the varying levels of risk/privacy/security. Industry can
develop a sustainable security-risk protocol that operates different security policies in blockchain depending on various individuals
with differing levels of appropriate privacy practices.
As for trust, industries must develop a trust-based channel with users by establishing comprehensive standards and participating
privacy-seal programs adhere to those standards. The trust heuristics show the need for industry and public policymakers to be aware
that users can and will depend on simplified heuristics as a basis for security/privacy judgement, particularly within an environment
where substantial complexity and choice exist. Firms should establish user trust in blockchain security by ensuring that their services
are performed in accordance with customers’ expectations that they provide trustworthy services and that they keep their com-
mitments. Blockchain firms should inform users that risk-taking and privacy concerns are potentially significant and critical concerns
before customers sign up and adopt blockchain services. The service providers should establish transparent guidelines and data
protection policies to deliver the same level of social privacy found offline (Park, 2018). It is necessary to put in place a range of
security and privacy-enhancing measures. The trusting bondages between participants and users would lead to the success of the
sustainable development of blockchains.
6.3. Conceptualizing and measuring digital trust
Considering the fast-developing technology of the digital environment, this research proposes insights into the conceptualization
of security behaviors associated with blockchains and into strategic implications for developing trust-based services. As people adopt
blockchains as a new means to interact and become informed, obtain information, acquire contents, and communicate with others,
blockchains evolve into a stable, innovative services. Yet, to continue their sustainability, blockchains face critical hurdles to
overcome, and user trust is perhaps the most critical hurdle. Blockchain providers need to enhance the understanding of user ex-
periences concerning the dimension of trust and the effect of security on intention to adopt. Our findings offer a solid foundation for
the firms to develop a user trust evaluation framework to develop user-based new services in the blockchain era. The proposed trust
model provides an effective venue to comprehend market potential through a lens of user experiences and prototyping market
profiles. Based on the results, we can suggest a conceptual framework of digital trust designed to help figure out what constitutes
digital trust and establish why it matters (Fig. 4). The components of the framework comprise three drivers: environment, experience,
and technologies.
The framework considers the factors that determine the quality of interactions between two parties using a blockchain medium:
users, who are on the giving side of trust, and the firms that manage the platforms. Contextual factors include laws and regulations
like GDPR or third-trusted parties that make the experience convenient and seamless.
The results hint the modes of cognitive heuristics that information blockchain users utilize when assessing what sources and
information to trust blockchain services. The study concludes with an agenda for future research on digital trust that should be better
conceptualized the role and influence of digital heuristics in privacy/security evaluation in blockchain contexts.
6.4. Limitations and future studies
While the findings of this research are legitimate, the results must be taken with caution for the following causes. First, the
subjects of this study might not represent the overall population as the majority of blockchain users remain junior population. The
respondents of the research were collected as representatives of young students. It may not offer an inclusive persona of entire
blockchain populations; rather, it only shows a snapshot of a subset of user profiles. Future studies may examine personas from
diverse clusters of users in longitudinal tests.
Second, the user model in this study may not be an overarching model, since it left out possibly critical effects. One possible path
is that of from privacy to security and/or vice versa. Users’ perceived security of blockchains certainly influences their perceived
privacy. One’s belief that blockchains would keep up with privacy rules depends on how secure the blockchain actually is. This
relationship can be mutual, but it can be influenced more by the effect of security on privacy and less by the reverse direction. As the
model excluded potentially critical paths for parsimony reason, future studies should further investigate. Future studies should also
develop a more sophisticated instrument based on a thorough conceptual works.
Third, for parsimony reason, the study excluded possible external factors (different platform, service conditions, and service
quality), as blockchains are in still in an early stage of development. Wide dissimilarities in services across different blockchains may
exist, and user perception and behavior should vary accordingly. Given the notable increase variance of usage in user experience
research, future research should heavily consider various factors as covariates.
Fig. 4. Digital Trust.
D.D.H. Shin Telematics and Informatics 45 (2019) 101278
9
Despite the limitations, this study opens a window of opportunity for better understanding of digital trust in future emerging
ecology. Numerous issues remain unanswered and a series of issues remain unanswered as blockchains continue to evolve. This study
took an exploratory step in that direction.
Declaration of Competing Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to
influence the work reported in this paper.
Appendix:. Measurement instruments
Constructs Measure items Sources
Perceived priv-
acy
PP1: I am confident that I know all the parties who collect the information I provide during the use
of blockchains.
PP2: I am aware of the exact nature of information that will be collected during the use of
blockchains.
PP3: I am not concerned that the information I submitted on the blockchains could be misused.
Carmen and Lopez (2018); Kim et al.
(2019); Shin (2010)
Perceived se-
curity
PS1: I believe the information I provide with blockchains will be handled by appropriate processes.
PS2: I am confident that the private information I provide with SNS will be secured.
PS3: I believe only legitimate parties may view the information I provide with the blockchains.
Shin (2010)
Trust TR1: Blockchain is a trustworthy service
TR2: I can count on blockchains to protect my privacy.
TR3: Blockchain can be relied on to keep its promises.
Dennis et al. (2012); Shin (2010)
Attitude A1: I would have positive feelings towards blockchains in general.
A2: The thought of using blockchains is appealing to me.
A3: It would be a good idea to use blockchains.
Shin (2017)
Intention to use I1: I intend to use blockchains in the future.
I2: I intend to visit blockchains sites as much as possible.
I3: I intend to continue using blockchains in the future.
Shin (2017)
References
Alexander, V., Collin, B., Zak, P., 2018. Why trust an algorithm? Performance, cognition, and neurophysiology. Comput. Hum. Behav. 89, 279–288. https://doi.org/
10.1016/j.chb.2018.07.026.
Bancroft, A., Reid, P., 2017. Challenging the techno-politics of anonymity: the case of cryptomarket users. Inf., Commun. Soc. 20 (4), 497–512. https://doi.org/10.
1080/1369118X.2016.1187643.
Bianchi, E.C., Brockner, J., 2012. In the eyes of the beholder? Organ. Behav. Hum. Decis. Process. 118 (1), 46–59. https://doi.org/10.1016/j.obhdp.2011.12.005.
Buchanan, T., Paine, C., Joinson, A.N., Reips, U.-D., 2007. Development of measures of online privacy concern and protection for use on the internet. J. Am. Soc.
Inform. Sci. Technol. 58 (2), 157–165.
Carmen, R., Lopez, F., 2018. Modelling privacy-aware trust negotiations. Comput. Secur. 77, 773–789. https://doi.org/10.1016/j.cose.2017.09.015.
Casalo, L., Flavian, C., Guinaliiu, M., 2007. The role of security, privacy, usability and reputation in the development of online banking. Online Inf. Rev. 31 (5),
583–603. https://doi.org/10.1108/14684520710832315.
Casino, F., Dasalis, T., Patskis, C., 2019. A systematic literature review of blockchain-based applications. Telematics Inf. https://doi.org/10.1016/j.tele.2018.11.006.
Chang, S., Chih, W., Liou, D., Yang, Y., 2016. The mediation of cognitive attitude for online shopping. Inf. Technol. People 29 (3), 618–646. https://doi.org/10.1108/
ITP-08-2014-0172.
Dennis, A., Roberts, L., Cutis, A., Kowalczyk, S., Hasty, B., 2012. Trust Is in the Eye of the Beholder. Inf. Syst. Res. 23 (2), 546–558. https://doi.org/10.1287/isre.1110.
0364.
Diakopoulos, N., Koliska, M., 2016. Algorithmic Transparency in the News Media. Digital Journalism. https://doi.org/10.1080/21670811.2016.1208053.
Du, W., Pan, S., Leidner, D., Ying, W., 2019. Affordances, experimentation and actualization of FinTech: a blockchain implementation study. J. Strategic Inf. Syst.
https://doi.org/10.1016/j.jsis.2018.10.002.
Filippi, P., Hassan, S., 2016. Blockchain technology as a regulatory technology: From code is law to law is code. First Monday 21 (12). https://doi.org/10.5210/fm.
v21i12.7113.
Grover, P., Kumar, K., Janssen, M., Vigneswara, P., 2019. Perceived usefulness, ease of use and user acceptance of blockchain technology for digital transactions.
Enterprise Information Systems. In-press. https://doi.org/10.1080/17517575.2019.1599446.
Hayes, A.F., 2013. Introduction to mediation, moderation, and conditional process analysis. Guilford Press, New York, NY. US.
Leon, D., Stalick, A., Jilepali, A., Haney, M., Sheldon, F., 2017. Blockchain: properties and misconceptions. Asia Pacific J. Innovation Entrepreneurship 11 (3),
286–300. https://doi.org/10.1108/APJIE-12-2017-034.
Joshi, A., Han, M., Wang, Y., 2018. A survey on security and privacy issues of blockchain technology. Math. Found. Comput. 1 (2), 121–147. https://doi.org/10.3934/
mfc.2018007.
Kim, G., Chung, K., & Shin, D., 2015. Do people purchase a robot because of its coolness?. In: Human Robot Interaction’15, March 2–5, Portland, Oregon, USA.
Kim, D., Park, K., Park, Y., Ahn, J., 2019. Willingness to provide personal information: Perspective of privacy calculus in IoT services. Comput. Hum. Behav. 92,
273–281. https://doi.org/10.1016/j.chb.2018.11.022.
Kim, K.-H., Yun, H., 2007. Cying for me, Cying for us: Relational dialectics in a Korean social network site. J. Comput.-Mediated Commun. 13 (1) article 15.
Klinger, U., Svensson, J., 2018. The end of media logics? On algorithms and agency. New Media Soc. https://doi.org/10.1177/1461444818779750.
Kshetri, N., 2018. Blockchain’s roles in meeting key supply chain management objectives. Int. J. Inf. Manage. 39 (1), 80–89. https://doi.org/10.1016/j.ijinfomgt.2017.
12.005.
Kshetri, N., 2017. Blockchain's roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41 (10), 1027–1038. https://doi.org/10.1016/j.telpol.
2017.09.003.
Kshetri, N., 2013. Privacy and security issues in cloud computing: the role of institutions and institutional evolution. Telecommun. Policy 37 (4), 372–386.
D.D.H. Shin Telematics and Informatics 45 (2019) 101278
10
Kshetri, N., 2014. Big data‫׳‬s impact on privacy, security and consumer welfare. Telecommun. Policy 38 (11), 1134–1145.
Lemieux, V., 2016. Trusting records: is Blockchain technology the answer? Rec. Manage. J. 26 (2), 10–139. https://doi.org/10.1108/RMJ-12-2015-0042.
Macrinici, D., Cartofeanu, C., Gao, S., 2018. Smart contract applications within blockchain technology: a systematic mapping study. Telematics Inform. 35 (8),
2337–2354. https://doi.org/10.1016/j.tele.2018.10.004.
Marsal-Llacuna, M., 2018. Future living framework: is blockchain the next enabling network? Technol. Forecast. Soc. Chang. 128, 226–234. https://doi.org/10.1016/j.
techfore.2017.12.005.
Miyazaki, A.D., 2001. Consumer Perceptions of Privacy and Security Risks for Online Shopping. J. Cons. Affairs 35 (1), 27–32.
Mou, J., Shin, D., 2018. Effects of social popularity and time scarcity on online consumer behavior regarding smart healthcare products: An eye-tracking approach.
Comput. Hum. Behav. 78, 74–89. https://doi.org/10.1016/j.chb.2017.08.049.
Mou, J., Shin, D., Cohen, J., 2017. Trust and risk in consumer acceptance of e-services. Electron. Commerce Res. 17 (2), 255–288. https://doi.org/10.1007/s10660-
015-9205-4.
Palmer, J.W., Bailey, J.P., Faraj, S., 2000. The role of intermediaries in the development of trust on the WWW. J. Comput.-Mediated Commun. 5 (3). http://jcmc.
indiana.edu/vol5/issue3/palmer.html.
Park, Y., 2018. Social antecedents and consequences of political privacy. New Media Soc. 20 (7), 2352–2369. https://doi.org/10.1177/1461444817716677.
Park, Y., Chung, J., Shin, D., 2018. The structuration of digital ecosystem, privacy, and big data intelligence. Am. Behav. Sci. 62 (1), 1319–1337. https://doi.org/10.
1177/0002764218787863.
Pink, S., Lanzeni, D., Horst, H., 2018. Data anxieties: finding trust in everyday digital mess. Big Data Soc. 5 (1), 1–10. https://doi.org/10.1177/2053951718756685.
Roca, J.C., García, J.J., de la Vega, J.J., 2009. The importance of perceived trust, security and privacy in online trading systems. Inf. Manage. Comput. Secur. 17 (2),
96–113. https://doi.org/10.1108/09685220910963983.
Seigel, J., Sarma, S., 2019. A cognitive protection system for the Internet of Things. IEEE Secur. Priv. 17, 40–48. https://doi.org/10.1109/MSEC.2018.2884860.
Shin, D., 2010. The effects of trust, security and privacy in social networking: a security-based approach to understand the pattern of adoption. Interact. Comput. 22
(5), 428–438. https://doi.org/10.1016/j.intcom.2010.05.001.
Shin, D., 2011. Understanding e-book users: Uses and gratification expectancy model. New Media Soc. 13 (2), 260–278. https://doi.org/10.1177/1461444810372163.
Shin, D., 2013. User experience in social commerce: in friends we trust. Behav. Inf. Technol. 32 (1), 52–67. https://doi.org/10.1080/0144929X.2012.692167.
Shin, D., 2017. Conceptualizing and measuring quality of experience of the Internet of things: Exploring how quality is perceived by users. Inf. Manage. 54 (8),
998–1011. https://doi.org/10.1016/j.im.2017.02.006.
Shin, D., 2019. A living lab as socio-technical ecosystem: evaluating the Korean living lab of Internet of things. Government Inf. Q. 36, 264–275. https://doi.org/10.
1016/j.giq.2018.08.001.
Shin, D., Park, Y., 2019. Role of fairness, accountability, and transparency in algorithmic affordance. Comput. Hum. Behav. 98, 277–284. https://doi.org/10.1016/j.
chb.2019.04.019.
Shin, D., Biocca, F., 2018. Exploring immersive experience in journalism what makes people empathize with and embody immersive journalism? New Media Soc. 20
(8), 2800–2823. https://doi.org/10.1177/1461444817733133.
Shin, D., Lee, S., Hwang, Y., 2017. How do credibility and utility affect the user experience of health informatics services? Comput. Hum. Behav. 67, 292–302. https://
doi.org/10.1016/j.chb.2016.11.007.
Tian, H., Chen, Y., Jiang, H., Huang, Y., Nan, F., Chen, Y., 2019. Public auditing for trusted cloud storage services. IEEE Secur. Priv. 17, 10–22. https://doi.org/10.
1109/MSEC.2018.2875880.
Vidan, G., Lehdonvirta, V., 2018. Mine the gap: Bitcoin and the maintenance of trustlessness. New Media Soc. https://doi.org/10.1177/1461444818786220.
D.D.H. Shin Telematics and Informatics 45 (2019) 101278
11

More Related Content

What's hot

Connecting Bitcoin Blockchain with Digital Learning Chain Structure in Educat...
Connecting Bitcoin Blockchain with Digital Learning Chain Structure in Educat...Connecting Bitcoin Blockchain with Digital Learning Chain Structure in Educat...
Connecting Bitcoin Blockchain with Digital Learning Chain Structure in Educat...eraser Juan José Calderón
 
Diseño del Smart Contract Blockchain: ejemplo para Real Estate
Diseño del Smart Contract Blockchain: ejemplo para Real EstateDiseño del Smart Contract Blockchain: ejemplo para Real Estate
Diseño del Smart Contract Blockchain: ejemplo para Real EstateJosé Luis Casal
 
Blockchain and its Potential in Education. Cristina Turcu , Cornel Turcu , Iu...
Blockchain and its Potential in Education. Cristina Turcu , Cornel Turcu , Iu...Blockchain and its Potential in Education. Cristina Turcu , Cornel Turcu , Iu...
Blockchain and its Potential in Education. Cristina Turcu , Cornel Turcu , Iu...eraser Juan José Calderón
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET Journal
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyRiddhiPawar5
 
Education revolution and how blockchain is helping
Education revolution and how blockchain is helpingEducation revolution and how blockchain is helping
Education revolution and how blockchain is helpingBlockchain Council
 
Application of Blockchain and Smart Contracts on the Internet of Things
Application of Blockchain and Smart Contracts on the Internet of ThingsApplication of Blockchain and Smart Contracts on the Internet of Things
Application of Blockchain and Smart Contracts on the Internet of ThingsCSCJournals
 
An Overview: The future of Blockchain Technology in Education. Khadija Mansou...
An Overview: The future of Blockchain Technology in Education. Khadija Mansou...An Overview: The future of Blockchain Technology in Education. Khadija Mansou...
An Overview: The future of Blockchain Technology in Education. Khadija Mansou...eraser Juan José Calderón
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...ijtsrd
 
Blockchain for the internet of things a systematic literature review
Blockchain for the internet of things  a systematic literature reviewBlockchain for the internet of things  a systematic literature review
Blockchain for the internet of things a systematic literature revieweraser Juan José Calderón
 
Jehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieeeJehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieeeIT Strategy Group
 
Understanding blockchaintechnology
Understanding blockchaintechnologyUnderstanding blockchaintechnology
Understanding blockchaintechnologySubhashKumar329
 
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...eraser Juan José Calderón
 
IRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET Journal
 
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Dr. Kotrappa Sirbi
 
Distributed ledger technical research in central bank of brazil
Distributed ledger technical research in central bank of brazilDistributed ledger technical research in central bank of brazil
Distributed ledger technical research in central bank of brazilmustafa sarac
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMEUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMIJNSA Journal
 

What's hot (20)

Connecting Bitcoin Blockchain with Digital Learning Chain Structure in Educat...
Connecting Bitcoin Blockchain with Digital Learning Chain Structure in Educat...Connecting Bitcoin Blockchain with Digital Learning Chain Structure in Educat...
Connecting Bitcoin Blockchain with Digital Learning Chain Structure in Educat...
 
Diseño del Smart Contract Blockchain: ejemplo para Real Estate
Diseño del Smart Contract Blockchain: ejemplo para Real EstateDiseño del Smart Contract Blockchain: ejemplo para Real Estate
Diseño del Smart Contract Blockchain: ejemplo para Real Estate
 
Blockchain and its Potential in Education. Cristina Turcu , Cornel Turcu , Iu...
Blockchain and its Potential in Education. Cristina Turcu , Cornel Turcu , Iu...Blockchain and its Potential in Education. Cristina Turcu , Cornel Turcu , Iu...
Blockchain and its Potential in Education. Cristina Turcu , Cornel Turcu , Iu...
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Emily rutland blockchain
Emily rutland blockchainEmily rutland blockchain
Emily rutland blockchain
 
Education revolution and how blockchain is helping
Education revolution and how blockchain is helpingEducation revolution and how blockchain is helping
Education revolution and how blockchain is helping
 
Application of Blockchain and Smart Contracts on the Internet of Things
Application of Blockchain and Smart Contracts on the Internet of ThingsApplication of Blockchain and Smart Contracts on the Internet of Things
Application of Blockchain and Smart Contracts on the Internet of Things
 
An Overview: The future of Blockchain Technology in Education. Khadija Mansou...
An Overview: The future of Blockchain Technology in Education. Khadija Mansou...An Overview: The future of Blockchain Technology in Education. Khadija Mansou...
An Overview: The future of Blockchain Technology in Education. Khadija Mansou...
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
 
Blockchain for the internet of things a systematic literature review
Blockchain for the internet of things  a systematic literature reviewBlockchain for the internet of things  a systematic literature review
Blockchain for the internet of things a systematic literature review
 
Jehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieeeJehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieee
 
Understanding blockchaintechnology
Understanding blockchaintechnologyUnderstanding blockchaintechnology
Understanding blockchaintechnology
 
PKI IN Government Identity Management Systems
PKI IN Government Identity Management SystemsPKI IN Government Identity Management Systems
PKI IN Government Identity Management Systems
 
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
 
IRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature Survey
 
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
 
Distributed ledger technical research in central bank of brazil
Distributed ledger technical research in central bank of brazilDistributed ledger technical research in central bank of brazil
Distributed ledger technical research in central bank of brazil
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMEUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
 

Similar to Blockchain technology main

block chain in indian public sector.pdf
block chain in indian public sector.pdfblock chain in indian public sector.pdf
block chain in indian public sector.pdfakshay pateriya
 
A REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIESA REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIESIRJET Journal
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using BlockchainIRJET Journal
 
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docx
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docxRunning head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docx
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docxtoddr4
 
Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...
Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...
Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...eraser Juan José Calderón
 
MT 410_HRM_BCT_SP 2024.pptx
MT 410_HRM_BCT_SP 2024.pptxMT 410_HRM_BCT_SP 2024.pptx
MT 410_HRM_BCT_SP 2024.pptxShreyaBanerjee52
 
Supply Chain Effects of Implementing Blockchain Technology for L.docx
Supply Chain Effects of Implementing Blockchain Technology for L.docxSupply Chain Effects of Implementing Blockchain Technology for L.docx
Supply Chain Effects of Implementing Blockchain Technology for L.docxcalvins9
 
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docx
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docxCitation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docx
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docxrichardnorman90310
 
Chain of a_lifetime_december2014
Chain of a_lifetime_december2014Chain of a_lifetime_december2014
Chain of a_lifetime_december2014Carlo Bertolazzi
 
PLAGIARISM SCAN REPORT11Plagiarised89Unique.docx
PLAGIARISM SCAN REPORT11Plagiarised89Unique.docxPLAGIARISM SCAN REPORT11Plagiarised89Unique.docx
PLAGIARISM SCAN REPORT11Plagiarised89Unique.docxinfantsuk
 
LD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxLD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxstirlingvwriters
 
Industrializing Blockchain in ASEAN
Industrializing Blockchain in ASEANIndustrializing Blockchain in ASEAN
Industrializing Blockchain in ASEANVarun Mittal
 
Industrializing Blockchain in ASEAN
Industrializing Blockchain in ASEANIndustrializing Blockchain in ASEAN
Industrializing Blockchain in ASEANVarun Mittal
 
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...IRJET Journal
 
Improving blockchain security for the internet of things: challenges and sol...
Improving blockchain security for the internet of things:  challenges and sol...Improving blockchain security for the internet of things:  challenges and sol...
Improving blockchain security for the internet of things: challenges and sol...IJECEIAES
 
Blockchain for Real Estate Industry
Blockchain for Real Estate IndustryBlockchain for Real Estate Industry
Blockchain for Real Estate IndustryScientific Review SR
 
Industrializing Blockchain in ASEAN
Industrializing Blockchain in ASEANIndustrializing Blockchain in ASEAN
Industrializing Blockchain in ASEANSahil Gupta
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxgerardkortney
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityIJNSA Journal
 

Similar to Blockchain technology main (20)

Blockchain
BlockchainBlockchain
Blockchain
 
block chain in indian public sector.pdf
block chain in indian public sector.pdfblock chain in indian public sector.pdf
block chain in indian public sector.pdf
 
A REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIESA REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIES
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
 
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docx
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docxRunning head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docx
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docx
 
Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...
Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...
Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...
 
MT 410_HRM_BCT_SP 2024.pptx
MT 410_HRM_BCT_SP 2024.pptxMT 410_HRM_BCT_SP 2024.pptx
MT 410_HRM_BCT_SP 2024.pptx
 
Supply Chain Effects of Implementing Blockchain Technology for L.docx
Supply Chain Effects of Implementing Blockchain Technology for L.docxSupply Chain Effects of Implementing Blockchain Technology for L.docx
Supply Chain Effects of Implementing Blockchain Technology for L.docx
 
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docx
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docxCitation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docx
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docx
 
Chain of a_lifetime_december2014
Chain of a_lifetime_december2014Chain of a_lifetime_december2014
Chain of a_lifetime_december2014
 
PLAGIARISM SCAN REPORT11Plagiarised89Unique.docx
PLAGIARISM SCAN REPORT11Plagiarised89Unique.docxPLAGIARISM SCAN REPORT11Plagiarised89Unique.docx
PLAGIARISM SCAN REPORT11Plagiarised89Unique.docx
 
LD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxLD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docx
 
Industrializing Blockchain in ASEAN
Industrializing Blockchain in ASEANIndustrializing Blockchain in ASEAN
Industrializing Blockchain in ASEAN
 
Industrializing Blockchain in ASEAN
Industrializing Blockchain in ASEANIndustrializing Blockchain in ASEAN
Industrializing Blockchain in ASEAN
 
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
 
Improving blockchain security for the internet of things: challenges and sol...
Improving blockchain security for the internet of things:  challenges and sol...Improving blockchain security for the internet of things:  challenges and sol...
Improving blockchain security for the internet of things: challenges and sol...
 
Blockchain for Real Estate Industry
Blockchain for Real Estate IndustryBlockchain for Real Estate Industry
Blockchain for Real Estate Industry
 
Industrializing Blockchain in ASEAN
Industrializing Blockchain in ASEANIndustrializing Blockchain in ASEAN
Industrializing Blockchain in ASEAN
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital Identity
 

Recently uploaded

Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRlizamodels9
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555kikilily0909
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsHajira Mahmood
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxFarihaAbdulRasheed
 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiologyDrAnita Sharma
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)DHURKADEVIBASKAR
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |aasikanpl
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsssuserddc89b
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptArshadWarsi13
 

Recently uploaded (20)

Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutions
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiology
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
 
Volatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -IVolatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -I
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physics
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
 

Blockchain technology main

  • 1. Contents lists available at ScienceDirect Telematics and Informatics journal homepage: www.elsevier.com/locate/tele Blockchain: The emerging technology of digital trust Don D.H. Shin ⁎ College of Communication and Media Sciences, Zayed University, Abu Dhabi, UAE A R T I C L E I N F O Keywords: Blockchain Blockchain service Perceived security Perceived privacy Digital trust A B S T R A C T Trust in individual relationships with blockchain has become an increasingly prominent issue. This study introduces a key heuristic used to assess trust in blockchain by analyzing how privacy and security concerns about blockchains have an impact on the user’s attitude and be- havior. It proposes a blockchain user model by integrating security and privacy as primary in- fluencing factors of trust and behavioral intent. The results from a user experience model of blockchain users confirm that the model explains user experience and predicts behavioral intent of blockchain. The results establish users’ cognitive role in embedding privacy and security in blockchain. The research contributes to the ongoing research by clarifying the role and dimen- sion of trust in relation to security and privacy in blockchains and provides heuristic implications for academia and industry. 1. Introduction Blockchains have experienced exponential growth over the last few years (Kshetri, 2018). Blockchain technology, in particular the cryptocurrency mania of 2017, has created a great deal of disruptive buzz in the industry. As blockchain rises beyond being just another buzz-word, the variety of blockchain applications ranges from healthcare, financial, transportation, risk management and media to public and social services (Grover et al., 2019). While blockchains afford a new window of opportunities for interaction and decentralized transactions, a wide variety of security and privacy have risen as thorny issues in the blockchain environment (Joshi et al., 2018). Security considerations specifically override all other considerations in blockchain. Blockchain provides decentralized, peer-to-peer security for all transactions, yet many blockchain security vulnerabilities remain (Kshetri, 2017). The key to continued growth is addressing the security issues facing blockchains (Vidan and Lehdonvirta, 2018). How to ensure privacy and security in blockchains has been a critical issue in the success of blockchains (Du et al., 2019). Despite the growing issue over vulnerability, there is a lack of research on the concern of privacy and security in blockchains, leading to a limited understanding on how security concerns and trust influence the experience of blockchains. As blockchains mature, the degree to which users trust the services, interactions, and organizations behind them becomes increasingly critical (Bancroft and Reid, 2017). When users interact within blockchains, they expect that they will receive the products they paid for and that their data will not be abused (Casino et al., 2019). While it is obvious that trust matters in digital contexts (Tian et al., 2019), there has been a lack of clarity about what trust is, how it works/can be formed, and what truly constitutes digital trust (Park et al., 2018). This study makes a heuristic contribution to filling the existing gap in the literature and creating the essential linkages between the level of privacy and security and the effects of the extent on trust. Aiming to conceptualize digital trust through blockchains, this study examines blockchain users’ cognitive process of security and privacy and its impact on intention by highlighting how trust is https://doi.org/10.1016/j.tele.2019.101278 Received 4 June 2019; Received in revised form 2 August 2019; Accepted 12 September 2019 ⁎ Address: P.O. Box 144534, Abu Dhabi, UAE. Tel.: +97125993488. E-mail address: dshin1030@gmail.com. Telematics and Informatics 45 (2019) 101278 Available online 17 September 2019 0736-5853/ © 2019 Elsevier Ltd. All rights reserved. T
  • 2. generated and how it leads to user behavioral intention in blockchains. Although numerous studies have investigated user privacy concerns and firm security practices in a diverse technological en- vironment (e.g., (Kshetri, 2013, 2014, 2017; Shin, 2010), it has remained unknown how privacy/security aspects in the emerging blockchain context affect an individual’s cognitive process of acceptance (Seigel and Sarma, 2019). This study discusses a user cognitive model of blockchains in generating a security/trust and trust model of blockchain adoption. With this model in place, the current study proposes means to configure and evaluate users’ perceived security and privacy of their blockchain experiences. With the following research questions in focus, the study conceptualizes digital trust in the new context of the blockchain era. RQ1: What is the relationship between users’ trust in blockchain platforms, their security and privacy concerns, and their blockchain adoption and use? RQ2: How user trust is developed and how it influences user behavior in the blockchain environment? What role does trust/ distrust play in the acceptance of blockchains? How can digital trust be measured and operationalized in the digital era? With the inquires in place, it securitizes the effects of privacy and security in blockchain experience and behaviors. The findings open windows of opportunity for user-centered evaluation and an analytical method for assessing user experience for future blockchain environments. Ongoing research has shown that improved privacy measures increase perceived security, which leads to increased intention to adopt technology services (Carmen and Lopez, 2018; Shin, 2011; Tian et al., 2019). This study advances current understanding by further showing how trust is related and generated, and, in turn, affects perceived privacy and security. This relation implies a positive feedback loop of trust shedding light on the new roles of trust in emerging digital contexts. The loop in the blockchain context should interest both researchers and industries. From a scholarly standpoint, the findings provide an insightful framework of a blockchain experience model by recognizing antecedents of user intention to adopt a blockchain relative to privacy and security. The value of our approach is examining the cognitive aspects of security and embedding it privacy and security in a user-focused way. Despite extensive research on the factors that affect users to experience and use technologies in general (Kim et al., 2019; Kim and Yun, 2007), blockchain user research in terms of user-centered privacy and security has been rare. This research addresses this aspect by uncovering users’ cognitive process of security/privacy in blockchains. This academic work also offers practical guidelines for practitioners. The findings should guide firms developing blockchain in fostering user trust by ensuring anonymity, protecting users from security threats, and assisting them to track a misuse of their data. As cryptocurrency industries such as bitcoin face the difficulties of establishing a sustainable and trusting environment (Lemieux, 2016), blockchain industries should see this study’s results helpful for future development. 2. Literature review 2.1. Blockchain, security, and the future of digital trust The societal implications of blockchain technology are immense. Blockchain has provided financial services to a great number of customers without access to banking via online, debit cards and ATMs. It has additionally allowed micropayments and microloans to people in disadvantaged socio-economic circumstances, unravelling a complete new form of advantage for the world economy (Shin, 2019). Another example of a social implication is within a section of social enterprise where lack of trust is a specific issue (Park, 2018). Blockchain technology produces a meaningful means of finding a way around the challenges of corruption. The decentralized characteristics of the blockchain and smart-contracts mean that an agreement built on its platform does not need a separate party. As smart-contracts are basically computer code, contractual conditions could be translated into logical functions which trigger subse- quently when set conditions are met. It is feasible to add clauses in smart agreements which specify that obligations are met if certain results are accomplished. Smart agreements may even be used to govern the circulation of currency. Blockchain continues to gain momentum in a myriad of use cases across a wide variety of industries. Firms are increasing their investments in blockchain to transform how they deliver products and services, gain new insights to obtain a competitive edge, and improve their financial and operational performance (Marsal-Llacuna, 2018). The fact that blockchain ledger records are secure, sequential, and immutable is improving the security of customer information as well as business and transaction records (Macrinici et al., 2018). Ironically, such a trust-based mechanism is blockchain’s most vulnerable point (Kshetri, 2017). Information and services of blockchains are vulnerable to manipulation by hackers or foreign powers, and personal data are not necessarily private. As blockchain develops in different sectors of various domains, security-related issues become prime factors in determining the success of the blockchain economy (Pink et al., 2018). Blockchain will continue to change the future of digital transactions in the new data economy and transform the nature of digital trust (Filippi and Hassan, 2016; Shin and Park, 2019). Digital trust in blockchain can be defined as enabling user heuristics made between security and privacy that reflect their level of confidence. Digital trust is a kind of user heuristics in blockchain. Blockchain users are likely cope with the perceived risk, security, and privacy, and overload by using heuristics that minimize their cognitive effort and time, through the use of cognitive heuristics. Digital trust as cognitive heuristics constitute information processing methods to make decisions more quickly and with less effort than more complex methods, and thus they reduce cognitive load during security assessment. 2.2. Concerns over privacy in blockchain Security and privacy are critical to the blockchain technology since it can exist without an authorized third party. Blockchain security issues are closely related to concerns over privacy in blockchains (Kshetri, 2018). Although distributed ledger technology is encrypted, it is not held in a single place. Firms do not have complete control over the data. Due to this decentralized structure, user D.D.H. Shin Telematics and Informatics 45 (2019) 101278 2
  • 3. data might be diverted through many different servers when being processed in blockchains. Data in a blockchain are vulnerable and can be accessed by other people in the chain. When data are encrypted intentionally or mistakenly before transmitting to a chain, nobody can access the data unless they are decoded. Despite privacy-enhancing technologies, blockchain transactions are vulnerable to hacking throughout chain nodes. These produce metadata and statistical analysis that can produce information even from en- crypted data, allowing for pattern recognition (Leon et al., 2017). Against the privacy issues, the EU as well as the US impose very strict rules and regulations in regard to data privacy. The EU establishes the General Data Protection Regulation, which imposes clear conditions for consent and data retention, requires firms to protect the individual data and privacy of people for transactions in the EU. It also prohibits personal data from leaving the EU, giving users eventual and sheer control over all their data. GDPR might hamper industry innovation in blockchain technologies, while on the other, opens windows of opportunities in the use of blockchain technologies as a venue for enforcing GDPR. When blockchain entails the processing of personal data, it raises legal compliance questions. The regulations inform data protection laws and corporate trust-building strategies. 3. Research model and hypothesis development As blockchain-based services provides various innovative features, it is critical to recognize what users’ expectations are and how they are formed and how users’ recognized confirmation affects satisfaction, which then influences intentions. Theory of Reasoned Action (TRA) can be a good frame for this task as the theory explains the relationship between attitudes and behaviors within human action (Shin, 2013). The theory explains how behavioral intent is created or caused by human attitudes and subjective norms. TRA is used in this study as a lens to examine the UX of blockchain security and privacy. TRA is right for this analysis since it is structured to describe user behaviors as a function of belief, evaluation, and performance of beliefs based on cognitive processes. As blockchain systems afford users unique experiences, TRA can be extended by incorporating blockchain-specific factors (such as privacy and security) as antecedents of trust and utility/convenience as a performance value. 3.1. Attitude toward blockchain Per the theory of reasoned action (TRA), peoples’ action of a certain behavior is influenced by their behavioral intention to perform the behavior, and behavioral intention is affected by a person’s attitudes (Shin, 2013). As the direct antecedent of behavior, behavioral intent is the cognitive expression of individual preparation to carry out a given behavior (Shin, 2010). Per TRA, attitude toward a behavior is stated as a person’s belief of performing the target behavior. An individual’s attitude toward a behavior is decided by his/her belief and valuations. As the TRA has been widely applied to diverse technological contexts particularly emerging technologies, the key premises of the TRA also apply in a blockchain context (Fig. 1). H1. Attitude toward blockchain has a positive influence on the intention to adopt blockchain. 3.2. Perceived security Given the rising concerns over security in blockchain (Joshi et al., 2018), this research addresses the influence of users’ recognized security on intention to adopt blockchains. Shin (2010) defines perceived security as the extent to which a user considers that doing things in certain contexts is secure and safe. Subjective security can be considered as the reflecting image of risk affinity. Kim and Yun (2007) show that a perceived security is fundamentally determined by a user’s feelings of control in an online system. Security in a mediated online platform may not depend on technical aspects of security alone (Shin, 2010). A low subjective security can be the most serious reason for a refusal to adopt technological services (Mou et al., 2017). Numerous studies have confirmed that negative subjective security thwarts users from accepting online services (Shin, 2013). There has been continuous research in conceptualizing and theorizing a set of factors that elucidates the role of subjective security. In accordance with ongoing research, this study examines security from a user-centric view that addresses not only technical Fig. 1. Blockchain trust model. D.D.H. Shin Telematics and Informatics 45 (2019) 101278 3
  • 4. features, such as authentication and confidentiality but also the people’s cognitive feeling of security and emotional comfortability. In terms of blockchains, users’ assessment of security can differ from physical security levels (Vidan and Lehdonvirta, 2018). While a technical evaluation of security is grounded on scientific solutions, it is the individuals’ assessments of security that affect intention and behavior (Mou et al., 2017; Shin, 2010). Although numerous studies have examined the function of perceived security in various contexts, only a few have applied it to a blockchain context. It is useful to examine user dimension of security and its link to trust in the blockchain context. H2. Perceived security positively influences users’ trust in blockchain. H3. Perceived security positively influences users’ attitudes toward blockchain. 3.3. Perceived privacy Similar to perceived security, perceived privacy is critical in blockchains. In this study, perceived privacy is seen as the extent to which a user considers that his or her information is protected and will not be misused (Casalo et al., 2007). Privacy is often interchangeably used with the issue of security, as a subset thereof, computer security (Park et al., 2018). Information privacy is one of the most critical issues in various technological environments (Miyazaki, 2001; Shin, 2011). The concept of privacy has been conceived as a user’s capacity to manage and maneuver the conditions by which his/her personal information is collected and processed (Carmen and Lopez, 2018). The degree to which blockchain users believe that a blockchain service ensures their privacy may also have an influence on their trust of the service. Blockchain services influence perceptions of a service’s privacy assurance through distributed ledger functions. Research confirms that positive perceptions of service privacy protection via features increase regard for and trust in the firm (Kim et al., 2015; Shin, 2011). For example, Diakopoulos and Koliska (2016) found that sharing information acquisition procedures enhances users’ feelings of security and trust. Similarly, (Klinger and Svensson, 2018) argue that having a clear privacy procedure, which clarifies how the firm would use user data and information, leads to trust in a service. People are likely to give personal information to service providers if the latter displays privacy seals or privacy statements (Kim and Yun, 2007). Based on the ongoing literature, it can be hypothesized that the degree to which blockchain users think a blockchain service ensures their privacy favorably affect their overall attitude and trust in the providers and the service itself. H4. Perceived privacy positively influences users’ trust in blockchain. H5. Perceived privacy positively influences users’ attitudes toward blockchain. 3.4. Trust Trust is a key component in blockchain technology (Shin, 2019). People do not require an established trust relationship if transactions are carried out on a distributed ledger. If each participant in the transaction trusts the blockchain itself, they do not need to directly trust each other. Whether and how users trust blockchain plays a critical role in blockchain success. In this regard, trust is proposed as a key factor. Trust is seen as assured reliance on the character or capability that the willingness of a user to be vulnerable to the actions of another user based on the belief that the other will conduct a certain action (Shin, 2011). Given this definition, trust can be seen as a consequent factor of privacy and security and as an antecedent factor to attitudes toward blockchain. In online contexts, trust has been consistently found to be a key factor in exchanges involving risk. Research in e-commerce and digital technologies has consistently found trust to be strongly related to user acceptance (Mou and Shin, 2018; Shin, 2011). Research by Shin, Lee, and Hwang (Shin et al., 2017) found a significant impact of trust on behavioral outcomes. The higher the users’ trust in the online service, the less effort users will need to validate details of those services to evaluate their reality and legitimacy. With a trusted service, users would experience convenience and ease of using as they have less need of checking or examining authenticity and legitimacy (Bianchi and Brockner, 2012). As trust has recently been considered key issue in digital media and technologies (Shin and Biocca, 2018), it is opportune to examine if trust in a blockchain service influences or is influenced by what factors. As trust is key to the process of digital transaction, it is critical to test what promotes trust in a blockchain service. H6. Trust positively influences users’ attitudes toward blockchain. 4. Methodology 4.1. Survey procedure To understand overarching views on users’ perspectives, presurvey interviews were performed 1) to confirm factors validated from the other research; 2) to draw blockchain-specific features; and 3) to generate the survey measurements. In-depth interview subjects were recruited from graduate students registered in classes in a university. A total of 20 people were presurveyed. The sample comprises 8 male and 12 female subjects. As most blockchain users fit the demographics of young user groups, a student sample can be justified in this study. Participants expressed their opinions on security, privacy, risk, and feelings about blockchains on memos and then post the memos under the types prepared by the researchers. The reliability and the validity of the measurements were assessed through a pretest. A total of 43 subjects participated in the pretest. Respondents were asked about their general view on the questionnaire and expressed any trouble they may have encountered in the measurements. Opinion and comments from the pretest were incorporated into a survey questionnaire. Lastly, the wording of measurements was finally edited. D.D.H. Shin Telematics and Informatics 45 (2019) 101278 4
  • 5. Following the pretest, a contracted survey firm performed a four-week web survey (see Appendix for the survey). A total of 391 responses were gathered (21% response rate; 52.2% were female and 47.8% were male). After dropping error responses through data filtering, 363 quality responses were finalized as the usable sample. The final sample shows general trends of blockchain users in general. Young people indeed are the dominant users of blockchains (Casino et al., 2019). The chosen sample is well matched matched to a general population of blockchains (Table 1). 4.2. Scales and measurements The final measurements comprised 15 items, with three items per factor. All of the items were derived from the TRA literature and user study frameworks (see the Appendix for the item questionnaire). A pretest was performed: 20 people with previous and/or current users of blockchain services participated in the pretest over a ten-day interval. For the reliability of the measurements, Cronbach’s alpha was used. Correlation coefficients were utilized to evaluate the concurrent validity of the instrument. The scores for this measurement ranged from 0.823 to 0.965, indicating highly suitable construct reliability (Table 2). The analysis of confirmatory factor analysis showed that the items had acceptable factor loadings. To assess validity, a simple linear correlation was used to assess the significance of the relationship. The appropriate level of intercorrelations among the variables showed no critical multi- collinearity problems. Furthermore, discriminant validity (factors are distinct and uncorrelated) is verified as the square root of the average variance extracted (AVE) is higher than the largest correlation of that factor with any other factor. All of the goodness-of-fit indices were within acceptable ranges and indicate that the model of the research has good fitness. 5. Results The hypothesized causal paths were tested, and all the hypotheses were confirmed (Table 3). The results confirm the model and highlight heuristic functions of trust in the formation of user behaviors. The results reveal the underlying antecedent roles of users’ privacy and security in shaping users’ behavioral intent of blockchain. Security is found to be a higher effect on trust than perceived privacy (β = 0.23, CR = 2.688; β = 0.18; CR = 2.704). The model also showed a significant positive effect of trust on attitude (H6), implying the mediating effect of trust on the relation between security/privacy and attitude. The explanatory powers of constructs were verified (Fig. 2). Perceived security and privacy together account for 23% of the Table 1 Demographics of Survey Respondents. Age (years) Percent Under 20 94 21–35 170 36–45 29 Blockchain experience 1–5 104 6–9 97 10–12 99 > 1 year 63 Gender Female 182 Male 180 No response 1 Table 2 Reliability and Validity. Variables Mean SD Cronbach’s alpha AVE Composite reliability Perceived privacy 5.18 1.404 0.866 0.751 0.710 4.85 1.642 4.66 1.740 Perceived security 5.60 1.203 0.868 0.743 0.896 5.37 1.275 5.10 1.011 Trust 3.90 1.151 0.920 0.757 0.903 3.96 1.089 4.19 1.418 5.09 1.413 Attitude 5.13 1.414 0.970 0.850 0.944 5.05 1.416 Intention 4.98 1.380 0.940 0.663 0.855 4.63 1.485 4.61 1.461 D.D.H. Shin Telematics and Informatics 45 (2019) 101278 5
  • 6. variance in trust. Trust, along with privacy and security, charged 27% of the variance in attitude toward behavior, which in turn described 72% of the variance of intent. Potential underlying effects can be inferred in the model from the high R2 of 72%. 5.1. Mediating roles of trust As trust was found to play a significant role between security/privacy and attitude, it is worthwhile to extend the model by examining the mediating roles of trust. This task will be significant, as research literature has consistently shown that trust plays a significant role (Shin, 2010; Chang et al., 2016). The relationship between privacy and security is an indirect effect of the influence of the trust mediator. The consistent findings regarding trust warrant the significant role of trust in the blockchain context. The effect of trust on other variables was analyzed with mediating regression. This research tested the mediating effect using the multiple-step method of Hayes (2013). Per the proposed steps, the significant links were verified between the independent variable and the mediating variable and between the dependent variable (intention) and the mediating variable. Subsequently, mediation is verified if the effect of the independent variable on the dependent variable is decreased by the mediating variable. The mediating effect test is complete when the direct effect becomes insignificant. The first step is to show that the causal variable trust is correlated with security. Perceived security was used as the criterion variable in a regression equation and perceived privacy was analyzed as a predictor. The influence of privacy largely accounted for the variance in the hypothesized mediator trust (t = 3.82, F = 14.31, p < .001). It showed that there is an effect that may be mediated. Then, perceived privacy was correlated with trust. Trust was used as the criterion variable in the regression equation and perceived privacy was used as a predictor. This step established that trust significantly explains the variance in the dependent variable security (t = 4.24, F = 18.31, p < .001). Third, a regression test was done to show whether trust affects perceived security. Trust and privacy were used as predictors, and security was analyzed with the criterion variable in a regression equation. The result was significant (t = 2.91, F = 8.41, p < .001). Lastly, a regression model was used to test whether trust completely mediates the privacy-security relationship. It was regressed with security as the dependent variable and privacy and trust as the independent variables. The effects were insignificant (t = 1.12, p = .28) when the significant effect of the hypothesized mediator trust (t = 3.79, p < .001) was partitioned out. Hence, trust was found as a partial mediator (but close to full mediator) between privacy and security (Fig. 3 & Table 4). This illustrates that users should completely trust the blockchains to ensure that the information provided by users in the transaction would not be misused and is warranted for the protection of personal privacy. It then generates a positive attitude and triggers use intention. This showed users’ concern with issues of personal information protection for blockchains. Users pay attention to the issue of trust in the protection of personal data by blockchains in terms of transaction security. Cognitive trust has a positive mediating effect on the relationship Table 3 Results of Hypothesis Testing. Path Standardized Coefficients S.E. t-value H1: Attitude → Intent 0.85 0.038 2.684** H2: Security → Attitude 0.11 0.079 1.782* H3: Security → Trust 0.18 0.090 2.704** H4: Privacy → Trust 0.23 0.098 2.688** H5: Privacy → Attitude 0.17 0.088 2.228** H6: Trust → Attitude 0.38 0.052 7.082** * p < .05. ** p < .001. Fig. 2. A user trust model of blockchain. D.D.H. Shin Telematics and Informatics 45 (2019) 101278 6
  • 7. between privacy concern and security. The mediating effects are in line with the role of the trust mechanism in blockchain and related services overall. The heuristic role of trust is critical to the development of critical determinants in blockchain. In ongoing literature, trust has been found just one of the factors facilitating adoption (Buchanan et al., 2007; Shin, 2010). In the blockchain context, trust represents more than one of the factors for user decisions; it may be understood by users as a facilitator or a catalytic cue that plays a key role in triggering and forming the user experience of blockchains. In this light, the domain of trust in blockchain can be broadened to include diverse roles at different dimensions. The model shows that trust plays a crucial part in the stimulation and generation of user motivation, attitudes, and behaviors. This finding has valuable and heuristic implications for both academia and industry. While the findings confirm previous research on trust, they further clarify the applicability of trust in emerging technology areas. Previous research on trust have consistently confirmed that user trust plays a role in establishing a person’s cognitive decision and behavior (Alexander et al., 2018; Carmen and Lopez, 2018; Shin, 2010). The role of trust in blockchains, however, has not been extensively examined despite the increasing popularity of blockchain-based services. Trust plays a key role in blockchain where credibility, transparency, and accuracy have been considered key criteria, carrying out users’ wishes while interacting with blockchain. In other words, trust can be a heuristic providing users with mental shortcuts to form judgments and make decisions: How blockchains are formed, how data are collected and analyzed, and how transparent and accurate transactions are provided are highly dependent upon trust. 6. Discussion Blockchain technology is exceedingly recognized and rapidly diffused due to its decentralized infrastructure and peer-to-peer nature. These characteristics have the potential to support a plethora of requirements in diverse areas and applications, but at the same time they engender inherent concerns over privacy and security issues. Given these concerns, this study develops an under- pinning model of trust-based blockchain to explore the user cognitive processes leading to the formation of motivational attitude and behavioral intent to experience blockchain. Despite an exponential growth in blockchains, there is limited research on their potential effect on trust, security, and purchase intentions. This study makes a relevant contribution to fill the existing gap in the knowledge by creating the fundamental linkages between level of security/privacy and the effects of the extent on trust. The importance of the user model lies in identifying the role played by security and privacy in generating trust. This study empirically examines the relationship among security and privacy and trust created through blockchains. In line with previous studies that has examined the influence of security and trust (e.g., (Shin, 2010; Lemieux, 2016; Mou et al., 2017), findings from this research provide heuristic support for the user trust model in this study. The results show that in the face of complexity and choice, blockchain users predominantly resorted to the heuristic of trust to make judgements on privacy and security assessment. The results enhance our understanding of users’ attitudes and the behavior of blockchain with regard to privacy dimension and offer implications for sustainable blockchain services. The results of the structural and measurement model test lend support to the proposed arguments. The proposed model produced a satisfactory fit to the observed data, and all the paths in the model were statistically significant and conceptually meaningful, in line with previous findings and trust research (e.g., Shin, 2010). The results show that the model establishes decent predictive powers and justifies behavioral experiences in blockchains. The study develops the measurements of perceived security and privacy as the key antecedents of trust in blockchain experience. Trust SecurityPrivacy Security= b + 2*Privacy+ 3*trust 2 = (not sig.); (p<.001) Security= c + 4*Privacy (p<.001) Trust=a + 1*Privacy (p<.001) Blockchain Transaction Fig. 3. The results of the mediation analysis. Table 4 The Mediating Effects of Trust. Model p-value Trust = β0 + β1*Privacy 0.001 Security = β0 + β1*trust 0.001 Security = β0 + β1*Privacy 0.001 Security = β0 + β1*Privacy + β2*trust 0.001 D.D.H. Shin Telematics and Informatics 45 (2019) 101278 7
  • 8. Two key factors nicely reflect current blockchain development: 1) people have concerns about privacy breaches and the vulnerability of security matters, and 2) perceived privacy and security directly influence trust in blockchain adoption. A lot of aspects of trust is explained by user-based security/privacy, as seen in the R square (67%). Given the high level of its variance, it can be inferred that user trust is formed through the users’ cognitive processing of security and privacy. Obviously, while technological security and objective privacy measures may be essential, so is how users perceive and process such external stimuli, and complete transactions are as critical as technological features. Users described that being assured and positive was vital and emphasized the affordance of being able to explore new experiences in digital virtual spaces (Chang et al., 2016; Shin, 2010). Enhanced assurance of security and ensured privacy would lead to improved perception of trust. While previous studies have found that trust plays a key dimension in establishing a user’s behavioral intention and behavior (e.g., Buchanan et al., 2007; Roca et al., 2009), it has remained unclear how trust is influenced by what variables and how users’ trust is formed. Our model advances previous literature by elucidating the relationships among trust, risk, privacy, and in an emerging technology context. The results confirm that trust is somehow and someway associated with to the assessments of security and privacy. This effect, together with the path of perceived security to trust, suggests a mediating effect of privacy on trust through security. This effect is consistent with findings by Shin (Shin, 2010) and Palmer, Bailey and Faraj (Palmer et al., 2000) on the mediating role of trust in online services. From the model, it can be inferred that trust is formed from the users’ cognitive domain rather than given as a package from the outside. Trust is heavily influenced by users’ perceived notions about how secure and private blockchain services are. Hence, user- generated trust is influenced by users’ intrinsic traits, such as an existing tendency toward new technologies, credible characteristics, and demographic factors. Previous studies have found that trust is influenced by users’ existing intrinsic factors (e.g., Shin et al., 2017). Thus, it is worthwhile to test the effects of the moderating role of demographic factors on trust. 6.1. Findings from moderation effect We used Chow tests (F-test) to check the significance of the statistical difference between the strength of relationship among the variables from the two groups. The moderation effects were obvious in the all paths in the model. Other studies on the antecedents of user’s judgments of security and privacy has researched primarily on technical or objective factors. Based on the study, it can be argued that dispositional tendencies, in particular user’s general propensity to trust things and others, also influence security and privacy. Users who were more trusting had more positive views of security and privacy. Users who are more trusting show more favorable attitudes and intention. People with trust are more likely to believe their data are treated fairly and security is secure. 6.2. Implications: how is trust generated? As trust becomes a central factor in blockchains as well as emerging technologies, many people wonder about the role of trust in user heuristics and how trust is generated and sustained throughout the continued usage. These issues are related to theoretical matters as well as practical strategies. The results produce meaningful implications for user-study scholars as well as the blockchain industry. From a theoretical standpoint, the study improves our knowledge about the roles of and relations among security, trust, and privacy. As the importance of trust has increased, numerous researchers call for rigorous research to validate the heuristic link between the function of trust and its antecedents in technologies (Shin, 2010; Mou et al., 2017). To examine that link, this study approaches trust in relation to perceived security and privacy. It was found that security and privacy as determinants of trust, subsequently influencing attitude and behavioral decision. This finding further suggests that the trust plays a heuristic role in the kind and type of information that a user willingly shares with blockchain communities. While extensive studies have noted the effects of privacy and security on trust in diverse technological contexts, few have extensively examined the topic (particularly the link among factors that trigger user action) in the emerging blockchain context, leaving this question unclarified: With what cognitive processing is trust generated and to what extent are users sensitive regarding security/privacy and in what ways? While further studies should continue to research the questions, the theoretical contributions of this research lie in the examination of blockchain services in relation to a user cognitive process of trust. There has been a tendency to consider trust as an external stimulus underplaying users’ internal cognitive process formulating their own trust. As shown in the findings, trust is influenced by users’ own perceived security and privacy, which are also influenced by users’ intrinsic traits. The notion of trust may not be an issue of reflecting what users actually can trust, but what users would like to believe and achieve eventually. The findings indirectly imply that perceptions of trust are not purely objective responses to blockchain transactions. Rather, the findings in this study lends robust support to the argument that similar to perceptions of information in general, perceived security and privacy in blockchain services are like beauty: they are in the eye of the beholder. Security and privacy can be more subjective perceptions held by users rather than objective criteria (Dennis et al., 2012). There are various dimensions by which we can measure how “secure and private” a service is. Security and privacy depend on users’ perceptions and experiences. While security and privacy have been popular topics in digital technologies, such heuristics are socially created and cognitively reconstructed within users’ cognitive schemas. Rather than such issues being uniformly or collectively provided to users, users actively and conscientiously forge their own versions of security and privacy based on their intrinsic dimensions of trust and/or their own schematic experiences (Shin and Park, 2019). That is, security and privacy are cog- nitively constructed realities of their own making (constructivism) as they depend upon users’ perceptions. Regarding blockchain cognitive model, industry can gain useful insights from our results in terms of user strategies and novel business models for blockchains. From the notable role of security/privacy in relation to trust, firms may expend greater efforts to comprehend users’ experiences of security-related issues and how these experiences are generated and impact motivational attitude. D.D.H. Shin Telematics and Informatics 45 (2019) 101278 8
  • 9. Attitude toward individual blockchains can be variously affected by the varying levels of risk/privacy/security. Industry can develop a sustainable security-risk protocol that operates different security policies in blockchain depending on various individuals with differing levels of appropriate privacy practices. As for trust, industries must develop a trust-based channel with users by establishing comprehensive standards and participating privacy-seal programs adhere to those standards. The trust heuristics show the need for industry and public policymakers to be aware that users can and will depend on simplified heuristics as a basis for security/privacy judgement, particularly within an environment where substantial complexity and choice exist. Firms should establish user trust in blockchain security by ensuring that their services are performed in accordance with customers’ expectations that they provide trustworthy services and that they keep their com- mitments. Blockchain firms should inform users that risk-taking and privacy concerns are potentially significant and critical concerns before customers sign up and adopt blockchain services. The service providers should establish transparent guidelines and data protection policies to deliver the same level of social privacy found offline (Park, 2018). It is necessary to put in place a range of security and privacy-enhancing measures. The trusting bondages between participants and users would lead to the success of the sustainable development of blockchains. 6.3. Conceptualizing and measuring digital trust Considering the fast-developing technology of the digital environment, this research proposes insights into the conceptualization of security behaviors associated with blockchains and into strategic implications for developing trust-based services. As people adopt blockchains as a new means to interact and become informed, obtain information, acquire contents, and communicate with others, blockchains evolve into a stable, innovative services. Yet, to continue their sustainability, blockchains face critical hurdles to overcome, and user trust is perhaps the most critical hurdle. Blockchain providers need to enhance the understanding of user ex- periences concerning the dimension of trust and the effect of security on intention to adopt. Our findings offer a solid foundation for the firms to develop a user trust evaluation framework to develop user-based new services in the blockchain era. The proposed trust model provides an effective venue to comprehend market potential through a lens of user experiences and prototyping market profiles. Based on the results, we can suggest a conceptual framework of digital trust designed to help figure out what constitutes digital trust and establish why it matters (Fig. 4). The components of the framework comprise three drivers: environment, experience, and technologies. The framework considers the factors that determine the quality of interactions between two parties using a blockchain medium: users, who are on the giving side of trust, and the firms that manage the platforms. Contextual factors include laws and regulations like GDPR or third-trusted parties that make the experience convenient and seamless. The results hint the modes of cognitive heuristics that information blockchain users utilize when assessing what sources and information to trust blockchain services. The study concludes with an agenda for future research on digital trust that should be better conceptualized the role and influence of digital heuristics in privacy/security evaluation in blockchain contexts. 6.4. Limitations and future studies While the findings of this research are legitimate, the results must be taken with caution for the following causes. First, the subjects of this study might not represent the overall population as the majority of blockchain users remain junior population. The respondents of the research were collected as representatives of young students. It may not offer an inclusive persona of entire blockchain populations; rather, it only shows a snapshot of a subset of user profiles. Future studies may examine personas from diverse clusters of users in longitudinal tests. Second, the user model in this study may not be an overarching model, since it left out possibly critical effects. One possible path is that of from privacy to security and/or vice versa. Users’ perceived security of blockchains certainly influences their perceived privacy. One’s belief that blockchains would keep up with privacy rules depends on how secure the blockchain actually is. This relationship can be mutual, but it can be influenced more by the effect of security on privacy and less by the reverse direction. As the model excluded potentially critical paths for parsimony reason, future studies should further investigate. Future studies should also develop a more sophisticated instrument based on a thorough conceptual works. Third, for parsimony reason, the study excluded possible external factors (different platform, service conditions, and service quality), as blockchains are in still in an early stage of development. Wide dissimilarities in services across different blockchains may exist, and user perception and behavior should vary accordingly. Given the notable increase variance of usage in user experience research, future research should heavily consider various factors as covariates. Fig. 4. Digital Trust. D.D.H. Shin Telematics and Informatics 45 (2019) 101278 9
  • 10. Despite the limitations, this study opens a window of opportunity for better understanding of digital trust in future emerging ecology. Numerous issues remain unanswered and a series of issues remain unanswered as blockchains continue to evolve. This study took an exploratory step in that direction. Declaration of Competing Interest The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. Appendix:. Measurement instruments Constructs Measure items Sources Perceived priv- acy PP1: I am confident that I know all the parties who collect the information I provide during the use of blockchains. PP2: I am aware of the exact nature of information that will be collected during the use of blockchains. PP3: I am not concerned that the information I submitted on the blockchains could be misused. Carmen and Lopez (2018); Kim et al. (2019); Shin (2010) Perceived se- curity PS1: I believe the information I provide with blockchains will be handled by appropriate processes. PS2: I am confident that the private information I provide with SNS will be secured. PS3: I believe only legitimate parties may view the information I provide with the blockchains. Shin (2010) Trust TR1: Blockchain is a trustworthy service TR2: I can count on blockchains to protect my privacy. TR3: Blockchain can be relied on to keep its promises. Dennis et al. (2012); Shin (2010) Attitude A1: I would have positive feelings towards blockchains in general. A2: The thought of using blockchains is appealing to me. A3: It would be a good idea to use blockchains. Shin (2017) Intention to use I1: I intend to use blockchains in the future. I2: I intend to visit blockchains sites as much as possible. I3: I intend to continue using blockchains in the future. Shin (2017) References Alexander, V., Collin, B., Zak, P., 2018. Why trust an algorithm? Performance, cognition, and neurophysiology. Comput. Hum. Behav. 89, 279–288. https://doi.org/ 10.1016/j.chb.2018.07.026. Bancroft, A., Reid, P., 2017. Challenging the techno-politics of anonymity: the case of cryptomarket users. Inf., Commun. Soc. 20 (4), 497–512. https://doi.org/10. 1080/1369118X.2016.1187643. Bianchi, E.C., Brockner, J., 2012. In the eyes of the beholder? Organ. Behav. Hum. Decis. Process. 118 (1), 46–59. https://doi.org/10.1016/j.obhdp.2011.12.005. Buchanan, T., Paine, C., Joinson, A.N., Reips, U.-D., 2007. Development of measures of online privacy concern and protection for use on the internet. J. Am. Soc. Inform. Sci. Technol. 58 (2), 157–165. Carmen, R., Lopez, F., 2018. Modelling privacy-aware trust negotiations. Comput. Secur. 77, 773–789. https://doi.org/10.1016/j.cose.2017.09.015. Casalo, L., Flavian, C., Guinaliiu, M., 2007. The role of security, privacy, usability and reputation in the development of online banking. Online Inf. Rev. 31 (5), 583–603. https://doi.org/10.1108/14684520710832315. Casino, F., Dasalis, T., Patskis, C., 2019. A systematic literature review of blockchain-based applications. Telematics Inf. https://doi.org/10.1016/j.tele.2018.11.006. Chang, S., Chih, W., Liou, D., Yang, Y., 2016. The mediation of cognitive attitude for online shopping. Inf. Technol. People 29 (3), 618–646. https://doi.org/10.1108/ ITP-08-2014-0172. Dennis, A., Roberts, L., Cutis, A., Kowalczyk, S., Hasty, B., 2012. Trust Is in the Eye of the Beholder. Inf. Syst. Res. 23 (2), 546–558. https://doi.org/10.1287/isre.1110. 0364. Diakopoulos, N., Koliska, M., 2016. Algorithmic Transparency in the News Media. Digital Journalism. https://doi.org/10.1080/21670811.2016.1208053. Du, W., Pan, S., Leidner, D., Ying, W., 2019. Affordances, experimentation and actualization of FinTech: a blockchain implementation study. J. Strategic Inf. Syst. https://doi.org/10.1016/j.jsis.2018.10.002. Filippi, P., Hassan, S., 2016. Blockchain technology as a regulatory technology: From code is law to law is code. First Monday 21 (12). https://doi.org/10.5210/fm. v21i12.7113. Grover, P., Kumar, K., Janssen, M., Vigneswara, P., 2019. Perceived usefulness, ease of use and user acceptance of blockchain technology for digital transactions. Enterprise Information Systems. In-press. https://doi.org/10.1080/17517575.2019.1599446. Hayes, A.F., 2013. Introduction to mediation, moderation, and conditional process analysis. Guilford Press, New York, NY. US. Leon, D., Stalick, A., Jilepali, A., Haney, M., Sheldon, F., 2017. Blockchain: properties and misconceptions. Asia Pacific J. Innovation Entrepreneurship 11 (3), 286–300. https://doi.org/10.1108/APJIE-12-2017-034. Joshi, A., Han, M., Wang, Y., 2018. A survey on security and privacy issues of blockchain technology. Math. Found. Comput. 1 (2), 121–147. https://doi.org/10.3934/ mfc.2018007. Kim, G., Chung, K., & Shin, D., 2015. Do people purchase a robot because of its coolness?. In: Human Robot Interaction’15, March 2–5, Portland, Oregon, USA. Kim, D., Park, K., Park, Y., Ahn, J., 2019. Willingness to provide personal information: Perspective of privacy calculus in IoT services. Comput. Hum. Behav. 92, 273–281. https://doi.org/10.1016/j.chb.2018.11.022. Kim, K.-H., Yun, H., 2007. Cying for me, Cying for us: Relational dialectics in a Korean social network site. J. Comput.-Mediated Commun. 13 (1) article 15. Klinger, U., Svensson, J., 2018. The end of media logics? On algorithms and agency. New Media Soc. https://doi.org/10.1177/1461444818779750. Kshetri, N., 2018. Blockchain’s roles in meeting key supply chain management objectives. Int. J. Inf. Manage. 39 (1), 80–89. https://doi.org/10.1016/j.ijinfomgt.2017. 12.005. Kshetri, N., 2017. Blockchain's roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41 (10), 1027–1038. https://doi.org/10.1016/j.telpol. 2017.09.003. Kshetri, N., 2013. Privacy and security issues in cloud computing: the role of institutions and institutional evolution. Telecommun. Policy 37 (4), 372–386. D.D.H. Shin Telematics and Informatics 45 (2019) 101278 10
  • 11. Kshetri, N., 2014. Big data‫׳‬s impact on privacy, security and consumer welfare. Telecommun. Policy 38 (11), 1134–1145. Lemieux, V., 2016. Trusting records: is Blockchain technology the answer? Rec. Manage. J. 26 (2), 10–139. https://doi.org/10.1108/RMJ-12-2015-0042. Macrinici, D., Cartofeanu, C., Gao, S., 2018. Smart contract applications within blockchain technology: a systematic mapping study. Telematics Inform. 35 (8), 2337–2354. https://doi.org/10.1016/j.tele.2018.10.004. Marsal-Llacuna, M., 2018. Future living framework: is blockchain the next enabling network? Technol. Forecast. Soc. Chang. 128, 226–234. https://doi.org/10.1016/j. techfore.2017.12.005. Miyazaki, A.D., 2001. Consumer Perceptions of Privacy and Security Risks for Online Shopping. J. Cons. Affairs 35 (1), 27–32. Mou, J., Shin, D., 2018. Effects of social popularity and time scarcity on online consumer behavior regarding smart healthcare products: An eye-tracking approach. Comput. Hum. Behav. 78, 74–89. https://doi.org/10.1016/j.chb.2017.08.049. Mou, J., Shin, D., Cohen, J., 2017. Trust and risk in consumer acceptance of e-services. Electron. Commerce Res. 17 (2), 255–288. https://doi.org/10.1007/s10660- 015-9205-4. Palmer, J.W., Bailey, J.P., Faraj, S., 2000. The role of intermediaries in the development of trust on the WWW. J. Comput.-Mediated Commun. 5 (3). http://jcmc. indiana.edu/vol5/issue3/palmer.html. Park, Y., 2018. Social antecedents and consequences of political privacy. New Media Soc. 20 (7), 2352–2369. https://doi.org/10.1177/1461444817716677. Park, Y., Chung, J., Shin, D., 2018. The structuration of digital ecosystem, privacy, and big data intelligence. Am. Behav. Sci. 62 (1), 1319–1337. https://doi.org/10. 1177/0002764218787863. Pink, S., Lanzeni, D., Horst, H., 2018. Data anxieties: finding trust in everyday digital mess. Big Data Soc. 5 (1), 1–10. https://doi.org/10.1177/2053951718756685. Roca, J.C., García, J.J., de la Vega, J.J., 2009. The importance of perceived trust, security and privacy in online trading systems. Inf. Manage. Comput. Secur. 17 (2), 96–113. https://doi.org/10.1108/09685220910963983. Seigel, J., Sarma, S., 2019. A cognitive protection system for the Internet of Things. IEEE Secur. Priv. 17, 40–48. https://doi.org/10.1109/MSEC.2018.2884860. Shin, D., 2010. The effects of trust, security and privacy in social networking: a security-based approach to understand the pattern of adoption. Interact. Comput. 22 (5), 428–438. https://doi.org/10.1016/j.intcom.2010.05.001. Shin, D., 2011. Understanding e-book users: Uses and gratification expectancy model. New Media Soc. 13 (2), 260–278. https://doi.org/10.1177/1461444810372163. Shin, D., 2013. User experience in social commerce: in friends we trust. Behav. Inf. Technol. 32 (1), 52–67. https://doi.org/10.1080/0144929X.2012.692167. Shin, D., 2017. Conceptualizing and measuring quality of experience of the Internet of things: Exploring how quality is perceived by users. Inf. Manage. 54 (8), 998–1011. https://doi.org/10.1016/j.im.2017.02.006. Shin, D., 2019. A living lab as socio-technical ecosystem: evaluating the Korean living lab of Internet of things. Government Inf. Q. 36, 264–275. https://doi.org/10. 1016/j.giq.2018.08.001. Shin, D., Park, Y., 2019. Role of fairness, accountability, and transparency in algorithmic affordance. Comput. Hum. Behav. 98, 277–284. https://doi.org/10.1016/j. chb.2019.04.019. Shin, D., Biocca, F., 2018. Exploring immersive experience in journalism what makes people empathize with and embody immersive journalism? New Media Soc. 20 (8), 2800–2823. https://doi.org/10.1177/1461444817733133. Shin, D., Lee, S., Hwang, Y., 2017. How do credibility and utility affect the user experience of health informatics services? Comput. Hum. Behav. 67, 292–302. https:// doi.org/10.1016/j.chb.2016.11.007. Tian, H., Chen, Y., Jiang, H., Huang, Y., Nan, F., Chen, Y., 2019. Public auditing for trusted cloud storage services. IEEE Secur. Priv. 17, 10–22. https://doi.org/10. 1109/MSEC.2018.2875880. Vidan, G., Lehdonvirta, V., 2018. Mine the gap: Bitcoin and the maintenance of trustlessness. New Media Soc. https://doi.org/10.1177/1461444818786220. D.D.H. Shin Telematics and Informatics 45 (2019) 101278 11