38 C O M M U N I C AT I O N S O F T H E A C M | M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
I T I S D I F F I C U LT these days to avoid hearing about
blockchain. Blockchain is going to be the foundation
of a new business world based on smart contracts.
It is going to allow everyone to trace the provenance of
their food, the parts in the items they buy, or the ideas
they hear. It will change the way we work, the way the
economy runs, and the way we live in general.
Despite the significant potential of blockchain, it is
also difficult to find a consistent description of what
it really is. A recent Google search for “blockchain
technical papers” returned nothing but white
papers for the first three screens; not a single paper
is peer-reviewed. One of the best discussions of the
technology itself is from the National Institute of
Standards and Technology, but at 50-plus pages, it is a
bit much for a quick read.9
The purpose of this article is to look
at the basics of blockchain: the indi-
vidual components, how those com-
ponents fit together, and what changes
might be made to solve some of the
problems with blockchain technology.
This technology is far from monolithic;
some of the techniques can be used (at
surprising savings of resources and ef-
fort) if other parts are cut away.
Because there is no single set of
technical specifications, some systems
that claim to be blockchain instances
will differ from the system described
here. Much of this description is taken
from the original blockchain paper.6
While details may differ, the main
ideas stay the same.
Goals of Blockchain
The original objective of the block-
chain system was to support “an elec-
tronic payment system based on cryp-
tographic proof instead of trust …”6
While the scope of use has grown con-
siderably, the basic goals and require-
ments have remained consistent.
The first of these goals is to ensure
the anonymity of blockchain’s users.
This is accomplished by use of a pub-
lic/private key pair, in a fashion that is
reasonably well known and not rein-
vented by the blockchain technology.
Each participant is identified by the
public key, and authentication is ac-
complished through signing with the
private key. Since this is not specific
to blockchain, it is not considered
further here.
The second goal is to provide a pub-
lic record or ledger of a set of transac-
tions that cannot be altered once veri-
fied and agreed to. This was originally
designed to keep users of electronic
currency from double-spending and to
allow public audit of all transactions.
The ledger is a record of what transac-
tions have taken place, and the order
of those transactions. The use of this
ledger for verification of transactions
other than the exchange of electronic
cash has been the main extension of
the blockchain technology.
The final core goal is for the system
A Hitchhiker’s
Guide to the
Blockchain
Un.
38 C O M M U N I C AT I O N S O F T H E A C M M A.docx
1. 38 C O M M U N I C AT I O N S O F T H E A C M | M
A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
I T I S D I F F I C U LT these days to avoid hearing about
blockchain. Blockchain is going to be the foundation
of a new business world based on smart contracts.
It is going to allow everyone to trace the provenance of
their food, the parts in the items they buy, or the ideas
they hear. It will change the way we work, the way the
economy runs, and the way we live in general.
Despite the significant potential of blockchain, it is
also difficult to find a consistent description of what
it really is. A recent Google search for “blockchain
technical papers” returned nothing but white
papers for the first three screens; not a single paper
is peer-reviewed. One of the best discussions of the
technology itself is from the National Institute of
Standards and Technology, but at 50-plus pages, it is a
bit much for a quick read.9
The purpose of this article is to look
at the basics of blockchain: the indi-
vidual components, how those com-
ponents fit together, and what changes
might be made to solve some of the
problems with blockchain technology.
This technology is far from monolithic;
some of the techniques can be used (at
surprising savings of resources and ef-
2. fort) if other parts are cut away.
Because there is no single set of
technical specifications, some systems
that claim to be blockchain instances
will differ from the system described
here. Much of this description is taken
from the original blockchain paper.6
While details may differ, the main
ideas stay the same.
Goals of Blockchain
The original objective of the block-
chain system was to support “an elec-
tronic payment system based on cryp-
tographic proof instead of trust …”6
While the scope of use has grown con-
siderably, the basic goals and require-
ments have remained consistent.
The first of these goals is to ensure
the anonymity of blockchain’s users.
This is accomplished by use of a pub-
lic/private key pair, in a fashion that is
reasonably well known and not rein-
vented by the blockchain technology.
Each participant is identified by the
public key, and authentication is ac-
complished through signing with the
private key. Since this is not specific
to blockchain, it is not considered
further here.
The second goal is to provide a pub-
lic record or ledger of a set of transac-
tions that cannot be altered once veri-
3. fied and agreed to. This was originally
designed to keep users of electronic
currency from double-spending and to
allow public audit of all transactions.
The ledger is a record of what transac-
tions have taken place, and the order
of those transactions. The use of this
ledger for verification of transactions
other than the exchange of electronic
cash has been the main extension of
the blockchain technology.
The final core goal is for the system
A Hitchhiker’s
Guide to the
Blockchain
Universe
D O I : 1 0 . 1 1 4 5 / 3 3 0 3 8 6 8
Article development led by
queue.acm.org
Blockchain remains a mystery,
despite its growing acceptance.
BY JIM WALDO
http://dx.doi.org/10.1145/3303868
M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3 | C O M M
U N I C AT I O N S O F T H E A C M 39
I
5. T
E
S
/S
H
U
T
T
E
R
S
T
O
C
K
to be independent of any central or
trusted authority. This is meant to be
a peer- or participant-driven system
in which no entity has more or less
authority or trust than any other. The
design seeks to ensure the other goals
as long as more than half of the mem-
bers of the participating community
are honest.
Components of Blockchain
While there are lots of different ways to
implement a blockchain, all have three
6. major components. The first of these is
the ledger, which is the series of blocks
that are the public record of the trans-
actions and the order of those transac-
tions. Second is the consensus proto-
col, which allows all of the members of
the community to agree on the values
stored in the ledger. Finally, there is the
digital currency, which acts as a reward
for those willing to do the work of ad-
vancing the ledger. These components
work together to provide a system that
has the properties of stability, irrefut-
ability, and distribution of trust that
are the goals of the system.
The ledger is a sequence of blocks,
where each block is an ordered se-
quence of transactions of an agreed-
upon size (although the actual size
varies from system to system). The first
entry into a block is a cryptographic
hash (such as those produced by the
Secure Hash Algorithm SHA-256) of
the previous block. This prevents the
contents of the previous block from be-
ing changed, as any such change will
alter the cryptographic hash of that
block and thus can be detected by the
community. These hash functions are
easy to compute but (at least to our cur-
rent knowledge) impossible to reverse.
So once the hash of the contents of a
block is published, anyone in the com-
7. munity can easily check that the hash
is correct.
So far, this is nothing new; it is sim-
ply a Merkle chain, which has been
in use for years. The wrinkle in block-
chain is that the calculation of the hash
needs to add a nonce (some random
set of bits) to the block being hashed
until the resulting hash has a certain
number (generally six or eight) of lead-
ing zeros. Since there is no way to pre-
dict the value that will give that num-
ber of leading zeros to the hash, this is
a brute-force calculation, which is ex-
ponentially difficult on the number of
zeros required. This makes the calcula-
tion of the hash for the block computa-
tionally difficult and means any mem-
ber of the community has the chance
of coming up with an acceptable hash
with a probability that is proportional
to the amount of computing resources
the member throws at the problem.
40 C O M M U N I C AT I O N S O F T H E A C M | M
A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
for the calculation of the next block in
the chain. This requires an incentive
mechanism, which is where the third
component of the blockchain universe
8. enters the picture: digital currency.
Digital currency. The reason for a
miner to do all the computational work
to calculate the nonce and hash of a
block is that the first to do so gets an al-
location of digital currency as the first
transaction in the next block. This also
encourages other miners to accept a
block as quickly as possible, so they can
start doing the work to hash the next
block (which has likely been filled with
transactions during the time it took to
hash the previous block). Bitcoin was
the original blockchain currency and in-
centive; in September 2017 the reward
for hashing a block was 12 bitcoins8
when the exchange rate was 1 bitcoin
= ~$4,500 U.S. (prices fluctuate rather
wildly). This reward halves (for bitcoin)
every 210,000 blocks. The next halving
is expected around May 25, 2020.1
Other digital currencies work in a
similar fashion. To spend the currency,
entries are made in the then-current
block, which acts as a ledger of all the
currency exchanges for a particular
ledger/digital coin combination.
Problems with Blockchain
While blockchain was originally pro-
posed as a mechanism for trustless
digital currency, its uses have expand-
ed well beyond that particular use case.
Indeed, the emphasis seems to have bi-
9. furcated into companies that empha-
size the original use for currency (thus
the explosion of initial coin offerings,
which create new currencies) and the
use of the ledger as a general mecha-
nism for recording and ordering trans-
actions. For the first use, the claim is
that blockchain can replace outdated
notions of currency and allow a new,
private, friction-free economy. For the
latter use, the claim is that blockchain
can be used to track supply chains, cre-
ate self-enforcing contracts, and gen-
erally eliminate layers of mediation in
any transaction.
Both of these kinds of uses pres-
ent some serious problems. Many
are problems any new technology
encounters in replacing entrenched
interests, but a number of them are
technical in nature; those are the
ones discussed here.
Coming up with the hash and the right
nonce is a proof of work (and, perhaps,
luck) that can be easily verified by any-
one in the community. Those attempt-
ing to calculate the right hash value
for a block are the miners of the block-
chain world; they are exchanging com-
putation for pay.
Once a miner comes up with the right
nonce that produces the right hash, they
broadcast the result to the rest of the
10. community, and all miners start work
on the next block. The first entry in the
new block will be the hash of the last
block, and the second entry in the block
will be the creation of some amount of
currency assigned to the miner who
found the hash for the previous block.
This works only if you have a block
to start the chain. This is done in the
same way all systems get started: by
cheating and declaring a block to be
the Genesis block.
It is possible that two different min-
ers could both find, at the same time
(or close enough), a nonce that gives
a candidate hash value with the right
number of leading zeros, or that some-
one seeing a nonce that works could
claim the discovery as their own. There
could even be two different blocks be-
ing proposed as the next entry in the
chain. Dealing with such issues re-
quires the next component of the sys-
tem: the consensus protocol.
Consensus protocols are among the
most-studied aspects of distributed
systems. While it was proved some
time ago that no algorithm will guaran-
tee consensus if there is a possibility of
any kind of failure,3 a number of well-
known protocols such as Paxos4 have
been used in systems for some time
to give highly reliable mechanisms for
11. distributed agreement. In consensus
protocols such as Paxos, however, it is
assumed the systems that must reach
agreement are known.
Depending on the failure model
used, the number of systems that must
agree to reach consensus changes.
When a majority of systems agree in
such a protocol (for some definition of
majority), consensus has been reached
in systems that want to protect from
non-byzantine failure. If the system is
subject to byzantine failure, then two-
thirds of the systems (plus one) need
to agree. While the voting can be done
in peer-to-peer systems, most efficient
versions of the algorithms depend on a
leader to initiate the voting and tally the
results.
In the blockchain universe, how-
ever, there is a trust-free system, which
means there can be no leader. Further,
in the blockchain universe the number
of systems participating in validating
the transactions (that is, finding a hash
for the block with the right number of
zeros in the prefix) is not known. This
makes claims that a block is accept-
ed when 51% of the miners agree on
the block nonsense, since there is no
known value for the number of entities
trying to agree.
12. Instead, the majority is determined
by the calculation of the hash for the
next block. Since that block begins
with the hash of the previous block,
and since the likelihood of the next
block’s hash being calculated is pro-
portional to the amount of computing
resources trying to calculate the ap-
propriate hash for the next block, if a
majority of the computing power avail-
able to the miners starts to work on a
block that is seeded with the previous
hash, then that block is more likely to
be offered as the next block. This is the
reason for consensus being tied to the
longest chain, as that chain will be pro-
duced by the largest number of com-
puting resources.
This mechanism relies on the gen-
eration of a hash with the right set of
leading zeros being genuinely random.
Being random also means that on oc-
casion someone will get lucky and a
chain that is being worked on by a mi-
nority of the miners will be hashed ap-
propriately before a chain that is being
worked on by a larger amount of com-
puting resources.
In an important sense, however, this
does not matter. The blockchain uni-
verse defines a majority as the produc-
tion of an appropriate nonce and hash.
Sometimes this means more than half
of the computing power has worked on
13. the problem, but other times it might
mean only one (exceptionally lucky)
miner got the answer. This might mean
a set of transactions in a block that is
not verified first need to be rolled back,
but that is the nature of in-flight trans-
actions.
It does mean all of the miners in
the blockchain universe need to move
to a newly hashed block as the basis
M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3 | C O M M
U N I C AT I O N S O F T H E A C M 41
practice
A number of criticisms of block-
chain center on the mechanism used
to create an accepted hash for a block.
To ensure this can be discovered by
anyone, the mechanism needs to be
one that takes significant computation
but can be easily verified. To ensure
the blocks that are verified cannot be
changed, the computation needs to
be impractical to reverse. Hashing the
block using a function such as SHA-256
and requiring that a nonce value is add-
ed until some number of leading zeros
appears in the hash fits these charac-
teristics nicely. This very set of require-
ments, however, means the consensus
mechanism has intrinsic limitations.
14. Scaling. An obvious worry about
the consensus-by-hashing mechanism
used in blockchain is whether the tech-
nology can scale to the levels needed
for more general use. According to
blockchain.com, the number of con-
firmed transactions averages around
275,000 per day, with a peak over the
last year of about 380,000.2 This is an
impressive number but hardly the
400,000 transactions per minute that
major credit-card systems perform on
peak days. Blocks can currently be veri-
fied at a rate of four to six per second,
and this is the limiting factor on the
number of transactions.
While there are a number of pro-
posals to deal with scaling block-
chain, it is unclear how these fit with
the base design of the system. Making
the verification of a block difficult and
random is an important aspect of the
basic design of blockchain; this is the
proof of work that is at the core of the
trustless consensus algorithm. If the
verification of a block is made easier,
then the probabilistic guarantees of any
miner being able to discover the appro-
priate hash decreases, and the possibil-
ity of some miner with a large amount
of computing taking over the chain in-
creases. Verifying a block is meant to be
hard; that’s how the system avoids hav-
ing to trust any particular member or
15. set of members.
One mechanism suggested for scal-
ing is to shard the blockchain into a
number of different chains, so that
transactions can be done in parallel
in different chains. This is happen-
ing in the different coin exchanges;
each coin system can be thought of
as a separate shard. This introduces
its own complexity in order to have a
transaction that crosses these shards,
since the notion of ensured consis-
tency requires that all ledgers are
self-contained to allow consistency
checking within each ledger. A new
blockchain could be created to be
used for cross-blockchain transac-
tions, but the incentive mechanism
for that blockchain would be a new
electronic currency that would need
to stay within the ecosystem of this
new blockchain. Getting the interact-
ing blockchains to trust the mediating
blockchain is an unsolved problem.
There have also been attempts
to use some mechanism other than
proof of work to drive the consensus
protocol. Perhaps the best known of
these is the proof-of-stake approach,
in which a block can be calculated in
much simpler ways, and consensus is
reached when those with a majority of
the currency agree on the hashing of
16. the block. Since the amount of curren-
cy and its owners are known, this is not
subject to the problem of not knowing
the members of the community to vote.
But this does reintroduce the notion
of trust to the system; those who have
more money have more of a stake, and
therefore are trusted more than those
who have less of a stake. This is the
electronic equivalent of an oligarchy,
which has not worked particularly well
in the past but might prove more stable
in this context.
Power consumption. A second criti-
cism of blockchain technology that is
an outgrowth of the consensus mech-
anism is the amount of energy con-
sumed in the discovery of an appro-
priate hash for a block. Calculating a
hash with the appropriate number of
leading zeros requires many hashing
calculations, which in turn burn a lot
of electricity; some have claimed that
bitcoin and related cryptocurrencies
are mechanisms to transform elec-
tricity into currency. The estimates
of how much electricity is consumed
range from the low side stating that it
is about as much as is used by the city
of San Jose, CA, to the high side that
it is equivalent to Denmark’s power
consumption. No matter which model
is used for the calculation, the answer
is large.
17. The hope is that this energy drain
will diminish, perhaps by changing the
While blockchain
was originally
proposed as a
mechanism for
trustless digital
currency, its uses
have expanded
well beyond that
particular use case.
42 C O M M U N I C AT I O N S O F T H E A C M | M
A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
known cryptographic protocols could
be done in a number of ways. Doing it
on top of a system such as blockchain
is needed if the requirement that the
system be trustless (except for trusting
the software) is added. Such a trustless
system comes with a cost.
Whether the cost is worth it is a de-
cision that requires an understanding
of the various parts of the system and
how they interact. A public, unforge-
able, unchangeable ledger is possible
without cryptocurrency or a consensus
algorithm based on a difficult-to-com-
pute one-way function that is easily ver-
18. ified. Cryptocurrencies can be created
without the use of either a public led-
ger or a trustless consensus algorithm.
And consensus algorithms can be cre-
ated that do not require a financial in-
centive system or a public ledger.
Related articles
on queue.acm.org
Bitcoin’s Academic Pedigree
Arvind Narayanan and Jeremy Clark
https://queue.acm.org/detail.cfm?id=3136559
Research for Practice: Cryptocurrencies,
Blockchains, and Smart Contracts;
Hardware for Deep Learning
https://queue.acm.org/detail.cfm?id=3043967
Certificate Transparency
Ben Laurie, Google
https://queue.acm.org/detail.cfm?id=2668154
References
1. Bitcoinblockhalf.com. Bitcoin block reward halving
countdown.
2. Blockchain.com. Confirmed transactions per day,
2018; https://www.blockchain.com/charts/n-transacti
ons?daysAverageString=7.
3. Fischer, M., Lynch, N.A., Paterson, M. Impossibility of
distributed consensus with one faulty process. JACM
32,2 (1985), 374–382.
19. 4. Lamport, L. The part-time parliament. ACM Trans.
Computer Systems 16, 2 (1998), 133–169.
5. Morris, D.Z. Bitcoin is in wild upheaval after the
cancellation of the Segwit2x fork. Fortune (Nov.
12, 2017); http://fortune.com/2017/11/12/bitcoin-
upheavel-segwit2x-fork/.
6. Nakamoto, S. Bitcoin, a peer-to-peer electronic cash
system, 2008; https://bitcoin.org/bitcoin.pdf.
7. Thompson, K. Reflections on trusting trust. Commun.
ACM 27, 8 (Aug. 1984), 761–763; https://dl.acm.org/
citation.cfm?id=358210.
8. Trubetskoy, G. Electricity cost of 1 bitcoin (Sept. 2017);
https://grisha.org/blog/2017/09/28/electricity-cost-
of-1-bitcoin/.
9. Yaga, D., Mell, P., Roby, N., Scarfone, K. Blockchain
technology overview. NISTIR 8202 (Oct. 2018).
National Institute of Standards and Technology;
https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.
IR.8202.pdf.
Jim Waldo is a professor of the practice of computer
science at Harvard University, where he is also the chief
technology officer for the School of Engineering, a position
he assumed after leaving Sun Microsystems Laboratories.
Copyright held by author/owner.
Publication rights licensed to ACM.
hardware used for the hashing to some-
thing far more efficient (such as special-
ized ASICs). Making the hashing pro-
20. cess more efficient, however, is at odds
with blockchain’s fundamental mecha-
nism of trusting no one; the point is
that the verification of a block must be
difficult and random so that any miner
is equally likely to find the hash.
The energy consumption might
be less worrisome if the calculations
eating all of this power were gener-
ally useful. [email protected], for example,
uses a considerable amount of energy
by offloading analysis of background
radio-wave transmissions to Internet-
connected computers. This initiative,
based at UC Berkeley’s SETI (Search for
Extraterrestrial Intelligence) Research
Center, is trying to find signs of other
intelligent life in the universe, which is
seen by the participants as worth doing
(and paying for the extra electricity).
Perhaps the calculation used to ver-
ify the blockchain could be changed to
something that offered more than just
verification of the blockchain. Such
a calculation would need to have the
properties of being equally possible
for all miners to find (given equality of
computing resource), difficult to find,
and easy to verify. It is not clear what
this calculation might be.
Trust. Perhaps the most problem-
atic aspect of blockchain is its core
notion of being trustless. Much of the
21. complexity of the technology is caused
by this requirement. It is unclear, how-
ever, that this is even necessary for the
kinds of uses people talk about as core
to blockchain, or that the system is ac-
tually free of trust.
It is because of the lack of trust
that the system requires verification
of the block to be computationally
difficult, one-way, and easy to verify.
If this requirement of trustlessness
were dropped, then production of a
public ledger that was unchangeable
and easily verified could be done eas-
ily. Suppose such a ledger is to be used
for inter-bank transfer (which has been
suggested as a use for blockchain). In-
stead of a trustless system, however,
the users decide to trust a consortium
of major banks, the Federal Reserve
Board, and some selection of consum-
er watchdog agencies or organizations.
This consortium could choose a mem-
ber (perhaps on a rotating basis) who
is responsible for keeping the ledger
(a leader). Transactions are written to
the ledger, and when the ledger block
reaches an appropriate size, the lead-
er hashes the ledger, uses the hash to
start a new block, and continues (just
as in the current blockchain).
The difference is that there is no
need for the leader to randomly try val-
22. ues added to the block until the right
number of leading zeros is produced
in the hash. Without that requirement,
the hash can be done very quickly with
little energy expense. The block still
can’t be changed (since the hash is still
a one-way function), and any member
of the consortium (or anyone else who
has access to the ledger) can quickly
check the hash. A public, verifiable,
and unchangeable ledger can be pro-
duced in this way but at much lower
cost in both time and energy.
This does require trust in the various
members of the consortium, but verify-
ing that the consortium is not cheat-
ing on the hashing of a block would be
easy. This is not a fully centralized trust
in a single entity but, rather, trusting a
group. The larger and more varied the
group, the less likely the group would
collude. Note also that such a system
does not need an incentive mechanism
such as a digital currency to operate.
Who Do You Trust?
Maybe you really do not want to trust
anyone. Calibrating paranoia is diffi-
cult, and perhaps you really do want to
have an economic system in which no
specifiable set of entities has the ability
to collude and control the system. That
is the real reason for blockchain.
As Ken Thompson pointed out in
23. 1984, trust has to happen somewhere.7
Even if you do not trust any group to
calculate the blocks, you need to trust
the developers of the software being
used to manage the blocks, the ledgers,
and the rest. Everything from bugs to
design changes5 in the software have
led to forks in the bitcoin ecosystem
that have caused considerable churn
in those systems. If your trust is in the
security and solidity of the code, that is
a choice you make. But it is not a trust-
less system.
A public, nonrefutable, unalter-
able ledger for transactions could be
a useful tool for a number of applica-
tions. Building such a system on top of
Copyright of Communications of the ACM is the property of
Association for Computing
Machinery and its content may not be copied or emailed to
multiple sites or posted to a
listserv without the copyright holder's express written
permission. However, users may print,
download, or email articles for individual use.
THE WORLD BITCOIN CREATED
THE FIRST BIG DIGITAL CURRENCY GAVE US A
24. GLIMPSE OF A NEW ECONOMIC ORDER—ONE
THAT RAISES MORE QUESTIONS THAN ANSWERS
BITCOIN. CRYPTOCURRENCIES. SMART CONTRACTS.
MANY PEOPLE HAVE NOW heard of the
rapidly changing ecosystem of financial technology, but few
have wrapped their heads around it. Hundreds
of central banks and corporations are incubating a game-
changing technology called blockchain—and
investors are betting billions on it. Yet only 24 percent of
global financial services professionals surveyed
in 2017 by PricewaterhouseCoopers (PwC) described
themselves as “extremely” or “very” familiar with it.
Much of the public is unsure if any of this is legal, if they
understand it at all. Evangelists say it has the
power to upend entire economic systems; others, such as Emin
Gün Sirer, a block-chain researcher at
Cornell University, warn that while the technical core is
“fascinating and disruptive, there’s also a lot of
hokum out there.” How to parse the nuance—or get a handle on
what a blockchain is?
It all starts with Satoshi Nakamoto, the world’s most reclusive
pseudonymous billionaire. In October 2008
Nakamoto published a paper via an obscure Internet mailing list
detailing a design for the world’s first
blockchain: a public database distributed and synchronized
every 10 minutes across thousands of
computers, accessible to anyone and yet hackable by no one. Its
purpose? To provide a decentralized,
bulletproof record of exchange for a new digital currency
Nakamoto called Bitcoin.
Until that point, the trouble with “peer-to-peer electronic cash”
was that nobody could reliably prevent you
from spending it twice. Block-chain technology changed all that
by inscribing every transfer of Bitcoin into
25. a “distributed ledger”—a kind of digital spreadsheet that, thanks
to the laws of mathematics and
cryptography, was more inviolable than carving it in stone. The
Economist dubbed it “the trust machine.”
The technology that underpins Bitcoin quickly outgrew it,
driving a frenetic period of innovation. Think of
blockchain as a scaffolding that can hold any data that need
secure provenance: financial histories,
ownership documents, proofs of identity. This “worldwide
ledger”—as Don Tapscott, co-author of
Blockchain Revolution, calls it—is a blank slate. But the
technology, imperfect as it is, can be tapped for
evil, too, and some are pumping the brakes on the frenzy.
Here’s a guide to the digital landscape that
Satoshi Nakamoto—whoever he is—has thrust before us.
CORE CONCEPTS
CRYPTOCURRENCY A form of digital currency that relies on
the mathematics of cryptography to control
how and when units of the currency are created and to ensure
secure transfer of funds.
PEER-TO-PEER (P2P) NETWORK A web of computers linked
in a decentralized way, such that any
computer can communicate directly with any other without
going through a central server or other
administrator. Napster, the network for sharing music files that
launched in the late 1990s, popularized the
concept.
NODE A computer connected to a P2P network. The Bitcoin
network currently has thousands of nodes
spread across the globe.
DISTRIBUTED LEDGER A list of recorded, time-stamped
26. transactions that is simultaneously broadcast,
copied and verified via consensus across many different
computers in a P2P network. If every node in the
network has an identical copy of the ledger, falsified entries or
corrupted versions can be easily detected.
BLOCK A grouping of individual transaction records on a
blockchain. On the Bitcoin network, new blocks
are added to the chain every 10 minutes.
HASHING A cryptographic method that uses a mathematical
function to condense any amount of data into
a unique string of alphanumeric characters of a certain fixed
length—called a hash value. This creates an
easily verifiable digital fingerprint for the hashed data. If even
a single bit of the original data is changed or
corrupted, the fingerprint that emerges from the hash function
will be drastically different, making it easy to
http://eds.a.ebscohost.com/eds/delivery?sid=4d7023a5-8a77-
44cb-88c8-
0a64f6737b8d%40sessionmgr4008&vid=10&ReturnUrl=http%3a
%2f%2feds.a.ebscohost.com%2feds%2fdetail%2fdetail%3fvid%
3d5%26sid%3d4d7023a5-8a77-44cb-88c8-
0a64f6737b8d%40sessionmgr4008%26bdata%3dJkF1dGhUeXBl
PXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#toc
detect errors or tampering. Hashes are also “one-way”—the data
cannot be reassembled or extracted from
the fingerprint.
MINING The process by which nodes of a cryptocurrency
network compete to securely add new blocks of
transactions to a blockchain. Units of the currency are the
reward—and hence, a financial incentive to
27. ensure security. Mining involves downloading the latest version
of the blockchain’s transactions for
verification, then using brute-force computation to randomly
search for the solution to a difficult
mathematical puzzle created via hashing. The first node to
discover the correct solution “mines” that block,
adding it to the blockchain and claiming the reward associated
with it. Humans control nodes, but the
competition has nothing to do with skill: simply, the more raw
computing power a miner applies toward the
solution, the more likely he or she is to find it—a process called
proof of work.
HOW BLOCKCHAIN WORKS
How does digital currency—or any data—reliably pass back and
forth on a decentralized network full of
strangers that don’t have a reason to trust one another at all? By
generating a permanent ledger of
transactions that can’t be changed by any single network
member.
1 A blockchain transaction begins with one party agreeing to
send data to another. These data could be
anything. But because the point of a blockchain is to create a
permanent, verifiable record of exchange, the
data usually represent some valuable asset. Common examples:
units of a cryptocurrency or other financial
instrument; contracts, deeds or records of ownership; medical
information or other identity data.
peer network of computers operating the
blockchain. Every node on the network is equipped with a
procedure for verifying whether the transaction
is valid or not. (In a Bitcoin transaction, for example, the
28. network would verify whether those paying actually
have the amount of Bitcoins they say they do.) Once the
network has reached a consensus, algorithms
package up the validated transaction with other recent
transactions into a block.
hashing the data inside it, together with two other
pieces of information: the fingerprint of the preceding block and
a random number called a nonce.
s added to the blockchain with a
digital fingerprint that also mathematically encodes
the validated fingerprints of every block preceding it. These
nested fingerprints make the blockchain
increasingly secure with every new block that gets added
because altering a single bit of information
anywhere in the blockchain would drastically change not only
the fingerprint of that particular block but
every subsequent one in the chain as well.
another for the right to add the new block to the
blockchain. Their computers perform a tedious set of hash based
calculations over and over again by trial
and error, hoping to generate a solution that satisfies an
arbitrary rule defined by the network. (On the
Bitcoin blockchain, the miners are searching for solutions—or
“hash values”—that have a particular number
of zeros at the beginning.) Whoever is first to complete this
proof of work process and find the matching
solution successfully “mines” that block, earning a financial
reward.
AS AN ALTERNATIVE: Proof of work mining is energy
intensive, so some new blockchains are doing away
with it, instead using a preapproved network of “validator”
29. nodes who can notarize transactions via an
alternative process called proof of stake. Because this process
doesn’t rely on difficult hashing calculations,
it uses much less computing power (and much less electricity).
BLOCKCHAIN DEMYSTIFIED: FREQUENTLY ASKED
QUESTIONS ABOUT A RAPIDLY EXPANDING
TOPIC
1. ARE BITCOIN AND BLOCKCHAIN THE SAME?
No, but it’s easy to get them confused because they both came
into public awareness in 2008, when Satoshi
Nakamoto published his paper describing how to implement
them simultaneously. Bitcoin is one type of
cryptocurrency. What people call “blockchain” is a technology
that makes Bitcoin possible—an
infrastructure that can be used for tracking many types of
transactions. Blockchain technology exists without
Bitcoin—but not the reverse. Think of Bitcoin as a kind of
application that runs “on” the blockchain, much
like Web sites run on the Internet.
10% Predicted amount of the world’s gross domestic product
that will be stored in blockchain based
technology by 2025, according to a 2015 survey report from the
World Economic Forum.
WHO IS USING BLOCKCHAIN TECHNOLOGY?
FINANCIAL INSTITUTIONS: Global banks and investment
institutions are researching and pursuing
blockchain projects, sometimes joining forces in consortiums.
30. Since 2012 Ripple has been a thriving,
blockchain-based system for settling international transactions
among banks. Start-ups such as Bloom
intend to deploy blockchains to credit reporting, hoping to end
data breaches like the Equifax hack.
GOVERNMENTS: Delaware and Illinois use distributed ledgers
for birth certificates. A Vermont law allows
blockchain technology to verify the authenticity of legal
documents. Dubai integrated blockchains into many
of its administrative services, such as obtaining licenses. In
2016 Tunisia began issuing a blockchain-
backed version of its digital national currency called the eDinar.
TECH ENTREPRENEURS: The Ethereum network—which was
designed to support new applications,
rather than just a digital cash ecosystem like Bitcoin—is like an
App Store for blockchain start-ups.
Hundreds of projects and businesses are running on it. One
notable: We Power wants to let households
buy and sell renewable energy (from, say, roof-mounted solar
panels) directly to one another.
COPYRIGHT AND IP HOLDERS: U.K. musician Imogen Heap
started Mycelia, a tech incubator that tracks
metadata associated with creative works, cutting out
intermediaries like iTunes.
NONPROFITS AND AID GROUPS: The BitGive Foundation is
boosting the accountability of philanthropic
giving. And the United Nations World Food Program is
streamlining how it tracks and delivers assistance
to Syrian refugees in Jordan.
ACADEMIC INSTITUTIONS: Forget sheepskins. The
31. Blockcerts project wants to make all manner of
academic and professional credentials more trustworthy and
shareable.
ASSET MANAGERS: London-based Everledger is targeting the
diamond industry by recording the
attributes and provenance of each precious stone. Fine wine and
art are tracked, too.
JOURNALISTS: To push back against fake news, Civil gives
news makers a platform to create ad-free,
inalterable journalism that’s immune to outside interests
(Russia; Facebook) and supported by readers.
REGULAR PEOPLE: For migrant workers who send money to
their families back home, using
Bitcoin costs less than using Western Union, which is why an
estimated 20 percent of international
remittances between South Korea and the Philippines now rely
on it. It’s not just for cyber libertarians, and
it goes way beyond finance. Here’s an incomplete lineup:
WHY WOULD YOU USE A CRYPTOCURRENCY INSTEAD
OF A NATIONAL CURRENCY?
Imagine holding a $100 bill that buys only $50 worth of goods.
In Venezuela, where the official currency is
crashing in value, that scenario is a reality. “You’re losing
something like half of the value of your net income
every year to hyperinflation,” says venture capitalist Morris.
“People are thinking: ‘How can I stop that?’ And
they’re buying Bitcoin.”
Why would a hard-to-understand cryptocurrency with no
government guaranteeing its value as “legal
32. tender” seem like a better bet than a more traditional value-
holding commodity such as gold? For one thing,
converting Venezuelan bolivars into Bitcoin is simply a lot
easier for ordinary folks—anyone with access to
the Internet can do it. Because Bitcoin has no physical form,
you don’t have to stash it somewhere unsafe—
like a mattress or, in Venezuela’s case, a bank. Of course,
Bitcoin doesn’t have a stable value, either. But
while the bolivar has nose-dived, the value of a Bitcoin is at
least trending ever upward. In a country where
inflation is expected to exceed 2,300 percent in 2018 (according
to the International Monetary Fund), it
seems like a reasonable risk to take.
Zimbabweans have the opposite problem. After ditching its own
currency for the U.S. dollar, the country
now relies on currency imports to run its economy—and it’s
facing a shortage. Bitcoin is now common
enough that it’s even accepted by car dealers.
2 WHERE DOES THE VALUE OF A CRYPTOCURRENCY
COME FROM?
Some experts say that a cryptocurrency like Bitcoin has value
because of its security (the Bitcoin blockchain
has never been hacked—yet) or its mathematically imposed
“scarcity” (a fixed supply of 21 million Bitcoins
means they can never be devalued by “printing more money”).
Others say that they have intrinsic value
because mining them is tedious work that makes the network
stronger—in other words, there’s value in ef
ort. But what about cryptocurrencies that aren’t mined?
According to Christian Catalini of the Massachusetts
33. Institute of Technology, “value comes from consensus. We all
agree it has value.” In this sense,
cryptocurrencies may have more in common with social
networks than with central banks. “Money is a way
for society to keep track of checks and balances,” Catalini says.
“If cryptocurrencies end up being a better
way to track information,” their value is secured—whether they
represent a physical asset or just a number.
77% of the global financial services industry is expected to
adopt blockchain as part of a production system
or process by 2020, according to PwC.
SO, BITCOIN: THE FUTURE OR A FLASH IN THE PAN?
Bitcoin is the world’s most popular digital currency. But it’s
also wildly speculative, and many financial
experts point to its legendary volatility: the currency’s value
has risen more than 10-fold since 2016, but it
lost 40 percent of its value in a span of two weeks in September
2017—only to regain
(and surpass) it just as quickly. (Who knows what it will be by
the time you read this.) To others, the
network’s technical limitations—it is sluggish at handling
transactions—combined with its unsustainable
mining costs make it the equivalent of a financial time bomb.
“We don’t bet on Bit-coin,” says Charlie Morris,
chief investment officer of Next-Block Global, a firm that
invests in blockchain technology.
Bitcoin legitimized the basic economics of a global
cryptocurrency. But the next-largest “altcoin” may have
more staying power: Ether is less a cash like currency than a
“blockchain asset,” as Morris calls it, used to
power and secure the Ethereum network. Much like renting
34. virtual servers in Google’s “cloud,” developers
who want to create applications using Ethereum’s blockchain
must pay for access in tokens of Ether. The
more useful Ethereum becomes as a mainstream platform, the
more stable and valuable Ether becomes,
too. New currencies and platforms are very likely to emerge—
the race for prominence has only just begun.
ARE WE FACING THE END OF CASH?
It may seem that printed money is headed for the same fate as
newspapers. But experts say that cash is
far from dead. “We’re still using great piles of paper to pay for
things like international shipping of sea
containers,” says Vinay Gupta, CEO of Mattereum, a legal
services firm for smart contracts. “The system
is not so broken that people are willing to tear it up.” The
trouble with Bitcoin and Ether is that while they
can function as a store of value or unit of exchange, they’re not
accepted as legal tender in enough places
to compete with cash. In places such as Kenya, where few
people have traditional bank accounts and
“mobile money” services such as M-Pesa have made saving and
sending money by phone much easier
than exchanging physical cash, cryptocurrencies might seem
like a natural fit. But mining still requires a lot
of processing power—not a common resource in Africa, where
inexpensive feature phones outsell
smartphones and not many own PCs. The computations required
to secure blockchain transactions could,
in theory, happen on “your old Nokia SIM card,” Gupta says.
Still, cold, hard paper won’t soon disappear.
35. 3. IS THE BLOCKCHAIN A NEW KIND OF INTERNET?
Not quite, because the blockchain itself requires the Internet to
support and maintain its peer-to-peer
network. It’s also important to note that when people talk
informally about “the” blockchain, they’re almost
always referring to the specific system that Nakamoto
implemented to support Bit-coin. The Bitcoin
blockchain was the first distributed ledger system that didn’t
require a centralized server or organization to
support it. It’s still one of the biggest: as of November 2017 it
contains more than 130 gigabytes (140 billion
bytes) of information, and every new transaction increases its
size. But that’s still many orders of magnitude
smaller than the amount of data on the Internet, which is
estimated to be on the yottabyte scale (1024, or
septillions of bytes).
IS THE BLOCKCHAIN A NEW KIND OF INTERNET?
IF CRYPTOCURRENCIES ARE DIGITAL, WHAT POWERS
THEM?
Just because cryptocurrencies have no physical attributes
doesn’t mean that there’s no cost to using them.
The intentionally effortful process by which new Bitcoins are
“mined”—how new transactions are added to
the ledger—requires that the entire P2P network cycle through a
mind-boggling number of random
computations to validate blockchain transactions. All of that
processing requires energy.
How much energy? Start with the amount of computation. In
late 2017 the Bitcoin network’s “hash rate”
was around 10 exahashes—that’s 10 million trillion
calculations—per second. Deriving a precise energy
36. estimate from that figure is impossible because the network,
being decentralized, can’t account for
individual nodes. But credible estimates peg the Bitcoin
network’s annual electricity consumption at around
27 terawatt-hours—roughly equivalent to that of Ireland. To put
that in perspective, producing a year’s worth
of Bitcoin alone requires the equivalent of burning about 11
million tons of coal, which pours nearly 29
million tons of carbon dioxide into the atmosphere. Fueling
Bitcoin by solar power would require harnessing
more than half of the entire U.S.’s annual utility-scale solar
capacity. Ethereum’s creator, Vitalik Buterin, is
currently transitioning the network’s blockchain to a different
validation mechanism called proof of stake,
which doesn’t rely on mining at all.
Bitcoin’s larger, more decentralized network is unlikely to make
a similar move anytime soon. But Vinay
Gupta, who designed Dubai’s blockchain strategy, believes that
the same greed that motivates miners to
turn kilowatts into cryptocurrency will ultimately spur them to
innovate their way out of this scalability
problem. Venture capitalist Charlie Morris thinks that as proof-
of-stake cryptocurrencies prove their mettle
in the market, “mining will become like a little blip in history,”
he says. “People will say, ‘Remember when
we all did that—wasn’t that ridiculous?’”
WHERE DOES MINING ACTUALLY OCCUR?
country is India, at
—alone. The task is
now dominated by giant mining pools akin to
the ones in China, so the chances of a solo node mining a block
37. today
is about one in eight million. Lone operators would spend far
more on energy bills than they’d get in profits.
Want to become a mining hobbyist? Join a public mining pool.
4. ARE BLOCKCHAINS EVEN LEGAL?
Yes. But their decentralized nature and association with
Bitcoin—which has been used in illegal
transactions such as drug and arms sales—can give blockchains
an “outlaw” reputation it doesn’t
necessarily deserve. Blockchains can be used for many different
purposes, good or ill, just like Facebook,
e-mail or any other Internet technology.
ARE BLOCKCHAINS EVEN LEGAL?
WHAT DOES THE PUBLIC THINK ABOUT BLOCKCHAIN?
illegal purchases or don’t know what they’re used
for at all, according to a 2017 YouGov survey.
they had never heard of blockchain
technology; 80 percent of those who had heard of the
technology still don’t understand what it is.
U.S. companies indicated
they had little or no knowledge about
blockchain technology, according to a 2017 Deloitte survey.
HOW WILL THIS TECHNOLOGY BE USED IN THE
FUTURE?
38. Anyone building on blockchain technology is, by definition, a
futurist. Once distributed ledger technology
gets out of its training-wheels phase, what might we create with
it?
SELF-DRIVING, SELF-OWNING CARS: Instead of driving for
Uber, your car would drive itself while you
work or sleep. Blockchain-backed smart contracts could remove
middlemen like Uber and Lyft from the car-
sharing equation by automating their two basic functions—
matching cars with riders and facilitating
payments. You could also own “shares” of a car represented by
cryptocurrency tokens.
PORTABLE MEDICAL DATA: The same technology that
allows two people to exchange units of Bitcoin
without necessarily trusting each other could also vouchsafe
medical information, putting control firmly in
the hands of patients, says Brian Behlendorf, executive director
of the Linux Foundation’s Hyperledger
project, a tool kit for building blockchain applications. Patients
would receive a “‘health wallet” with their
data and histories. A doctor could go to a ledger and request
your blood type, generating an access request
on the user’s phone. “You get an audit trail of who you shared
that data with and the option to delete it when
the treatment is over,” Behlendorf says.
A GLOBAL SUPERCOMPUTER: Linking your devices to
thousands of others in a P2P network—and using
a blockchain to pay you for their use—would create a financial
incentive to support a worldwide,
decentralized supercomputer. While you sleep, your laptop and
phone could be rented by scientists who
want to run models, for example. A project called Golem is
already working on it. “The number of idle
39. laptops is so much larger than the computing power of the data
centers,” Gupta says. “Artificial intelligence,
climate modeling—all of that stuff could be accelerated 1,000-
fold.”
WHAT ARE THE LIMITATIONS AND DANGERS OF
BLOCKCHAIN?
“Blockchains provide a substrate that, if certain assumptions are
held to, is very difficult to modify ex post
facto,” says Cornell blockchain researcher Emin Gün Sirer. “But
that doesn’t mean that everything recorded
to a blockchain is true or desirable. If I get hacked and someone
steals my cryptocoins and tries to use
them, I would very much like to undo that transaction. That’s
where immutability becomes a liability.” It’s
also easy to confuse a blockchain’s theoretical immutability
with actual data security: public blockchains
like Ethereum and Bitcoin don’t actually encrypt any
information. The Linux Foundation’s Brian Behlendorf
goes one step further: “The ledger should never be used to store
personal data or anything sensitive, not
even in encrypted form,” he says, “because we know that no
matter what we encrypt today, probably in 40
or 50 years we’ll be able to decrypt it” with more advanced
technology. Some advocates speak of blockchain
as a panacea for any social problem involving trust, but that’s
blindly optimistic. For more on the limitations
of blockchain as a societal savior, see page 38.
5. HOW ARE CRYPTOCURRENCIES SECURE AND
TRUSTWORTHY?
Because they’re ultimately nothing but software, the
trustworthiness of a cryptocurrency “comes from the
code base,” says M.I.T. researcher Catalini. Anyone can gin up
40. a cryptocoin and raise funds by selling it
through an initial coin offering—even Paris Hilton did it,
lending her name to promote an obscure token. But
it’s no coincidence that the two most popular cryptocurrencies,
Bitcoin and Ether, were engineered by
computer-programming savants. That said, even coins with
impressive technical bona fides can be risky.
The DAO—a “decentralized autonomous organization” running
on Ethereum that raised over $100 million
in 2016—“had a bug” (in Catalini’s understated terms) that
allowed hackers to make of with $50 million
worth of Ether.
HOW ARE CRYPTOCURRENCIES SECURE AND
TRUSTWORTHY?
HOW DO YOU REGULATE A DECENTRALIZED SYSTEM?
Given the Wild West reputations of decentralized digital
currencies, it’s easy to assume that they were
created to dismantle or avoid financial regulation. But that’s not
quite accurate. Bitcoin is full of regulations,
after all—they’re just defined and enforced by source code (and
the collective activity of its P2P network)
rather than by governments or financial institutions. “The whole
innovation about Bitcoin is in eschewing
social governance of record keeping,” says Patrick Murck, a
lawyer who researches blockchain policy and
regulation at Harvard University’s Berkman Klein Center for
Internet and Society. Ethereum’s stated purpose—to support the
deployment of autonomous smart
contracts—is essentially regulatory. A blockchain is arguably
41. nothing but regulation: a mathematically
enforced system of rules about what can and cannot be done
with records in a database.
What always matters about financial regulation, decentralized
or not, is who gets to do the regulating and
how. “If you have a system that’s decentralized, there’s
nowhere to attach regulation—but wherever that
system gets reinter mediated [by third parties], regulation will
follow,” Murck says. In 2013 China banned
cryptocurrencies from its banking system, and last September it
ordered all domestic Bitcoin exchanges to
shut down. The U.S. and Japan are moving to regulate
cryptocurrency exchanges and “initial coin offerings”
with the same vigilance they apply to stock trading and
investment banking.
One future application of blockchain technology is in securing
digital identity records, and according to
venture capitalist Charlie Morris, new cryptocurrencies may
emerge that marry identity data with financial
information. They wouldn’t have the anonymity of Bitcoin
(Morris estimates the number of Bitcoin holders
who pay honest taxes on them to be mere hundreds). But as
digital money goes mainstream, the trade-off
in perceived security and stability may make oversight
tolerable—or even desirable. Says Murck: “If I’m
trusting you with some property to hold on my behalf and
transact with it—whether it’s Bitcoin or Beanie
Babies—then you’re either regulated or about to be regulated.”
CAN BLOCKCHAINS FAIL?
To date, the Bitcoin blockchain—the world’s first and at present
its largest and most widely used—has
never been compromised or hacked. But that doesn’t mean that
42. every blockchain is invulnerable by
definition. “There’s no such thing as a perfect technology,” says
Cornell’s Gün Sirer, co-director of the
Initiative for Cryptocurrencies and Contracts. Here are three
gaps in a blockchain’s armor:
51% ATTACK: Blockchain-backed cryptocurrency networks
rely on two bottomless resources for security:
the speed and greed of their miners. But it’s theoretically
possible to overpower both. To subvert the
blockchain’s …
Research Paper Sentence outline – Information Governance
Purpose
The purpose of this assignment is to prepare you for the
dissertation process by creating a sentence outline for a research
paper.
Description
The topic of your sentence outline is your research question.
After completing this week's Learning Activities, develop a
sentence outline.
Deliverable
Prepare a Microsoft Word document that includes the following
headings and one full sentence in each section:
· Title Page
· Abstract
· Introduction
· Literature review
· Research Method
· Results
· Discussion
· Conclusion
· Reference Page
43. Research Paper – Data Science and Big Data Analytics.
This week we discussed Bitcoin Economics. For this week's
research paper, you need to search the Internet and explain why
some businesses are accepting and other businesses are
rejecting the use of Bitcoins as a standard form of currency.
Your paper needs to identify two major companies that have
adopted Bitcoin technology.
Your paper should meet the following requirements:
• Be approximately 3-5 pages in length, not including the
required cover page and reference page.
• Follow APA guidelines. Your paper should include an
introduction, a body with fully developed content, and a
conclusion.
• Support your response with the readings from the course and
at least five peer-reviewed articles or scholarly journals to
support your positions, claims, and observations. The UC
Library is a great place to find resources.
• Be clear with well-written, concise, using excellent grammar
and style techniques. You are being graded in part on the
quality of your writing.
Problem Set #5 - Planning the Project
Question 1.
1. Identify a major public infrastructure project that is either
underway, complete, or proposed in your region. This could be
a bridge, road, building, or something of that nature. For the
project you have identified, think of as many stakeholders and
stakeholder groups as you can. Create a three-column table. In
column 1, list the stakeholders. In column 2, list what each
stakeholder wants to get from the project. In column 3, list the
influence each stakeholder has over the project.
44. Question 2.
2. How can the stakeholders change over the course of a
project? Give examples of changes in who the stakeholders are,
and in how their interests or influence over the project might
change throughout the term of the project.
Research Paper: PRIVACY POLICIES
1
HEALTH CARE PRIVACY POLICIES
2
Research Paper – Health Care Privacy Policies
Privacy in the health care industry
The healthcare industry's privacy means that what a patient tells
a health care provider, what the health care providers write
down about patients, any medications that patients take, and all
other information related to the patient are kept private. The law
requires that all the health information and medical records of a
patient have to be kept private and safe by all health care and
45. medical professionals, and all health care facilities, like the
clinics and hospitals (Patil & Seshadri, 2014). In this regard,
the law requires that anything that a patient discusses with the
doctor to be kept confidential and private between the two and
the organization they work for. When a patient goes to a new
doctor, he/she can choose to reveal his/her previous medical
records with other health doctors by giving written consent to
the earlier doctors to send medical information to the new
doctor.
Research question
How do healthcare companies address privacy in their policies?
Background
Most organizations in the health care industry prioritize the
privacy policy in every aspect of their health services. The
organizations selected for this research are Mayo Clinic, United
Health Group, and McKesson Corp. All of these organizations
declare private policies on their website and assure all their
clients/patients that there is no information regarding them or
their heath that will be shared with third parties without their
consent. For Mayo Clinic, it begins its privacy policy by first
defining protected health information, which is any information,
whether paper. Electronic, or oral that is created or received by
Mayo Clinic relating to the health care of a patient or patient
payment about medical services. Therefore, the Mayo clinic
considers the privacy of patients as part of its primary mission
in meeting the patient's needs. It has taken the necessary
precautions against disclosure or inappropriate use of patient’s
medical information.
Similarly, the UnitedHealth Group issues a clear privacy policy
to its clients. It disclaims that there is zero chance that the
information regarding patient health will be shared with third
parties without their consent. The Company's privacy policy
clearly states that its main objective is to adhere to the laws and
regulations regarding the privacy of health care information.
Thus it applies every available resource to ensure that all data
regarding health care of patients are protected and thoroughly
46. guarded against any public intrusion. The most exciting aspect
regarding the privacy policy is that they outline the few
situations and circumstances under which they are likely to
share the private information regarding the health of the clients,
including when it is a court order, or when the Company is sold
or merged with another company. However, all these situations
will be notified to the individual holder of the information with
a clear explanation of the Company's intentions. McKesson
Corp is also another health organization that commits itself to
guard the private information of their clients. The Company
explains the information that they collect from the customers,
including their health and health-related issues, their personal
contact information, their work environment, and information
that the person shares on the internet. This explanation gives
the patients an insight into the type of information that the
Company has regarding them while assuring them that it will be
kept confidential and private except in some circumstances
where they will be notified in advance.
References
McKesson Corp Privacy notice.
https://www.mckesson.com/About-McKesson/Privacy-Notice/
UnitedHealth Care Group Privacy information.
https://www.uhc.com/privacy
Mayo Clinic Notice of Privacy Practices.
https://mcmapp.mayoclinic.org/content/PrivacyPolicy.htm
Patil, H. K., & Seshadri, R. (2014). Big data security and
privacy issues in healthcare. In 2014 IEEE international
congress on big data (pp. 762-765). IEEE.
47. Running head: Bibliography on Health Care Industry Privacy
and Security 1
Bibliography on Health Care Industry Privacy and Security 8
Week 4 – Annotated Bibliography
https://mcmapp.mayoclinic.org/content/PrivacyPolicy.htm
The site describes how the Moyo clinic protects the health
information for the patients in their clinic. The preference to
have the security systems for keeping the records helps in
ensuring high security in the health care units. In the health care
units, there are different patients with different diseases and
disorders, which should never be disclosed to the patients as
well for the members of the family. The competence for Moyo
Clinic to reveal the privacy of the information such as the
patient's name, addresses, doctor's, and even the nurses' notes
has generated the entire effort to facilitate the trustworthiness
of the patients from different areas to liaise with the treatment
within the clinic.
According to the manner Moyo clinic service is handling
the patients with a lot of privacy to their records, it has
generated valid and real-valued concerns for the patients to
bring their needs to the doctors. Serving the needs of the
patients is taken as a significant concern and deserves privacy
48. within the areas as well. In turn, they have taken into
consideration the effort to ensure safer systems that encrypt the
data recorded for the patients concerning their ailments.
Employees of the Moyo clinic only access the information to
perform the expected duties. On the other hand, on violation of
rules, an employee's function may take place and disciplinary
action for the action.
Different systems and machines have been implemented in
today's clinical services and even healthcare facilities. The
methods ensure that the environment is much secure to prevent
leaking of patient's information. The security is guaranteed by
the administration, ensuring the right protocols are adhered to
promptly.
Manogaran, G., Thota, C., Lopez, D., & Sundarasekar, R.
(2017). Big data security intelligence for healthcare industry
4.0. In Cybersecurity for Industry 4.0 (pp. 103-126). Springer,
Cham.
The author of the article talks mostly on big-data issues.
This facilitates the issue of privacy in the clinical facility to
contribute to the confidentiality of data records by the doctors
and nurses to the patients. A concern to enroll the health care
facilities in the system for administration is the biggest role in
the community. In the integrated industries, it is difficult to
generate big data and find out the desired information. The
author of the journal describes the generated data as enormous
and challenging to manage. Therefore, clinics are encouraged to
have systems that are capable of holding extensive data
concerning sensor enrolment.
The large numbers that are tabulated in the clinics are hard
to manage their records as well as to their related details;
therefore, a system that can produce a scalable sensor number of
individuals is proposed. Industrial Internet of Things is valuable
to ensure the right system that can tally and keep records of big
data for a good time. The proposed Meta Cloud Redirection can
process big data and analytics into details for the value of
informative details.
49. The proposed systems for the healthcare facilities are
essential to accumulate a good record for the patients. The
privacy of the patients can be handled independently in the
systems preventing them from generating abnormal data.
Independent data can be caused by ensuring the improvement of
systems by information technology individuals are reliable to
the members. The essentials are procured in the best manner to
prevent all the measures taken in the health care facility.
Mayo Clinic Notice of Privacy Practices
The practice to produce notices to embrace privacy
contributes so much to the individuals as a measure of reminder
every moment. The concerns are made by the administration to
reinforce the ability to adapt to the environment as a measure of
protecting the patients' records. There are indeed great records
that can be handled by many of the clinical employees, which
are paramount and not supposed to be disclosed as well. The
concern to reinforce the systems that generate notices to the
employees ensures the right assistance for the individuals.
Measures are undertaken once one violates the reinforced
notices, and in turn, a punishment follows.
Moyo clinic procures notices to their employees to
empower them with the right information and let even the
patients know what is desired according to their records'
privacy. The announcement is like a repetitive update to the
employees as it is displaying information on the wall. Once the
information is displayed to the parties, there is no trick to play
around with the patients' details of the records as well.
Therefore, the specific concerns are made to develop at the
Moyo clinic, ensuring that there is an intensive measure to
value the privacy of any document for the patients.
As in the outside environment, notices are kept on the
notice boards to ensure the right follow up procedure to ensure
all rules are adhered to. Newer systems that are developed to
ensure the right privacy and produce pop up notices to the
clinical employees assist a lot in reminding the employees as
well. The notices that are given ahead facilitate the management
50. of the patient’s data privately highly.
McKesson Corp Privacy notice.
https://www.mckesson.com/About-McKesson/Privacy-Notice/
According to McKesson, the greatest value of privacy is to
the patients, customers, and even the employees who care about
the information they share. Concerning privacy evaluation to
the realistic measure in the advancement of systems'
confidentiality. Relating the documentary released on the notice
of McKesson, the value to keep the top-secret on members' data
concerning the chats and confidential information sharing is
therefore kept highly private. The realization to secure the right
decisions on information sharing enables the systems
measurable to keep records securely. Owning private website
hosts and domains is a measure to ensure that data is secured;
hence a single individual is liable to update.
An oath is essential to the individuals under the care to
ensure the right processes as well as the dominance of
information system hosting and keeping the records. The
decisions are made to evaluate the right decisions as a measure
in advancing the correct details in the documents presented.
Privacy is assured in documents by ensuring the right web
loggings, providing cookies, and ensuring that adverts are
presented to the members accessing. This ensures keeping track
of the members on the site and restricting hacking. The desire to
trace the best accesses to the sites provides encryption to the
hidden data making all seem simpler.
Privacy on the sites is essential and as well as an improved
manner of assuring the right decisions accurately. Access once
retrieving one's data is necessary to ensure the right follow up
as well. In health care units, there is the right decisive measure
to value the weight of decisions. I am therefore making the
proper processions.
Patil, H. K., & Seshadri, R. (2014). Big data security and
privacy issues in healthcare. In 2014 IEEE international
congress on big data (pp. 762-765). IEEE
In the document, the author dictates a paradigm shift in the
51. health care facility to ensure the right follow up. Once the
issues concerning the big data are settled, a consistent
development is retrieved in the systems to develop a substantial
device that can handle the big data. Migration from reactive to
proactive health care is an excellent deal in approving the right
protocols. The measure of digitizing the medical records is an
excellent change to the individuals and privately kept records.
The transfer to the systems ensures that none of the records is
lost on the way.
According to the sayings, the measure to move from the
old generation of health care to the newer generation ensures
the right strategic ratio in approving the right decisions as well
and for the essentials in the arrangements, acquiring the systems
which are liable to measure the actual generations as a measure
to evaluate the real estates in advancements as well. The
situations in managing the analysis are essential in
technological systems that are capable of handling complex
data. The more complex data in the systems are embraced by the
advancements made to retrieve complex data and ensure the
right tracing. In big data, privacy and security are vital to the
members and the entire health care unit.
The concern to ensure the right generation movement is
caught on track by the improvised systems is essential to the
members as a measure to evaluate the right decisions. To the
newer generations, there is the fact of the transfer of data to the
more modern systems and capable systems as well. The devices
are improvised to ensure the accurate analysis in the proper
manner for excellent future management.
Sethi, S. (2018). Healthcare blockchain leads to transform the
healthcare industry. International Journal of Advanced
Research, Ideas, and Innovations in Technology, 4(1), 607-608.
This journal details on transforming the health care units
in making all things accessible and minimizing the complexity.
The health care industry is more prone to developing and
acquiring the right decisions to ensure an advanced generation
of detailed data. It is believed that the blockchain is capable of
52. changing the future of the health care industry. Blockchain
encompasses the directives in attaining the desired measures as
well. The desires for the health care industry are manageable in
a single unit enabling development in the tracing manner of the
records. The transformation can be made technologically to
reveal different affairs.
According to the measures of decentralization, the proper
way to undertake the fact of developing the health care industry
in a way that is attractive to the members and the patients. The
blockchain method ensures the procedural tactics in deriving the
real generations on security and holding big data. Privacy is the
most excellent deal in reinforcing the adherence to developing
the right procedures as well. Embracing the right privacy for the
health care industry records is vital to the development of the
affairs as a measure in attaining a manageable number in the
clinics.
Different members have generated different systems that
are more secure to the data and record handling as well. The
desire to ensure the right data handling is essential and
paramount to ensure the right attractions are maintained.
Therefore, the processing of big data is manageable by the
developers of the systems or familiar individuals.
UnitedHealth Care Group Privacy information.
https://www.uhc.com/privacy
A description of personal information is described as very
essential. To the individual facilitation, it is ever necessary to
keep oneself data and records very safe and secure to the
desired generations as well. The way the information is handled
on to the websites and on to the different systems is prone to
leaking and getting known to the undesired destinations.
Therefore, tracking using the cookies and locator methods has
improvised the techniques to settle different desires as well. In
turn, to evaluate the analytical techniques, a desirable measure
to detail out the data is desired to ensure the proper transfer.
Holding on the details is desirable.
The United Health care is an essential facility to ensure
53. tracking of the patients' records and enabling easy retrieval of
data in the desired manner as well. The concern of advancing
the systems is to ensure that there is no redundancy on data
transmission and posting. The essentiality to ensure the right
decisions on handling complex data and big data is designed
over the sites and posted for rectifications. The desires are
prone to reaching the desired measures as well. Activation of
the systems and advancement of the systems assures the
management of developed productions in the industry.
Different sites over the world are generated and managed
from the same servers, which in turn facilitate the production.
Complex data is handled in different systems making it the right
grounds of growth. The development of state clinics is an
achievement in the handling of operations as well. Results are
attained in practicing the proper process as well in the industry.
Dicussion II – Information Governance
Suppose you were asked to develop an Information Governance
Strategic Plan for your organization, describe the steps you
would take. Be specific.
Reference:
Smallwood, R. F. (2014). Information Governance : Concepts,
Strategies, and Best Practices.
Wiley. ISBN: 9781118218303
APA Format
250 – 350 Words
54. 1 Scholarly Reference.
Discussion I - Data Science and Big Data Analytics.
This week's discussion centers around the concept of
Blockchain. There is still much confusion regarding what
Blockchain is and what it is not. Please discuss your
explanation of Blockchain to include why it has been gaining so
much popularity.
Please make your initial post and two response posts
substantive. A substantive post will do at least TWO of the
following:
· Ask an interesting, thoughtful question pertaining to the topic
· Answer a question (in detail) posted by another student or the
instructor
· Provide extensive additional information on the topic
· Explain, define, or analyze the topic in detail
· Share an applicable personal experience
· Provide an outside source (for example, an article from the UC
Library) that applies to the topic, along with additional
information about the topic or the source (please cite properly
in APA)
· Make an argument concerning the topic.
At least one scholarly source should be used in the initial
discussion thread. Be sure to use information from your
readings and other sources from the UC Library. Use proper
citations and references in your post.
References:
WALDO, J. (2019). A Hitchhiker’s Guide to the Blockchain
Universe. Communications of the ACM, 62(3), 38–42.
https://doi.org/10.1145/3303868
PAVLUS, J. (2018). The World Bitcoin Created. Scientific
American, 318(1), 32–37. Retrieved from
55. http://search.ebscohost.com/login.aspx?direct=true&AuthType=
shib&db=buh&AN=126727561&site=eds-live
Discussion III – Planning the Project
Week 5 – Stake Holder Management
Reflect on the assigned readings for Week 5 and then type a two
page paper regarding what you thought was the most important
concept(s), method(s), term(s), and/or any other thing that you
felt was worthy of your understanding.
Define and describe what you thought was worthy of your
understanding in half a page, and then explain why you felt it
was important, how you will use it, and/or how important it is
in project planning.
Reference:
Watt, A. (2019). Project Management, 2nd Edition. BCcampus
Open Education.
https://opentextbc.ca/projectmanagement/