SlideShare a Scribd company logo
1 of 55
38 C O M M U N I C AT I O N S O F T H E A C M | M
A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
I T I S D I F F I C U LT these days to avoid hearing about
blockchain. Blockchain is going to be the foundation
of a new business world based on smart contracts.
It is going to allow everyone to trace the provenance of
their food, the parts in the items they buy, or the ideas
they hear. It will change the way we work, the way the
economy runs, and the way we live in general.
Despite the significant potential of blockchain, it is
also difficult to find a consistent description of what
it really is. A recent Google search for “blockchain
technical papers” returned nothing but white
papers for the first three screens; not a single paper
is peer-reviewed. One of the best discussions of the
technology itself is from the National Institute of
Standards and Technology, but at 50-plus pages, it is a
bit much for a quick read.9
The purpose of this article is to look
at the basics of blockchain: the indi-
vidual components, how those com-
ponents fit together, and what changes
might be made to solve some of the
problems with blockchain technology.
This technology is far from monolithic;
some of the techniques can be used (at
surprising savings of resources and ef-
fort) if other parts are cut away.
Because there is no single set of
technical specifications, some systems
that claim to be blockchain instances
will differ from the system described
here. Much of this description is taken
from the original blockchain paper.6
While details may differ, the main
ideas stay the same.
Goals of Blockchain
The original objective of the block-
chain system was to support “an elec-
tronic payment system based on cryp-
tographic proof instead of trust …”6
While the scope of use has grown con-
siderably, the basic goals and require-
ments have remained consistent.
The first of these goals is to ensure
the anonymity of blockchain’s users.
This is accomplished by use of a pub-
lic/private key pair, in a fashion that is
reasonably well known and not rein-
vented by the blockchain technology.
Each participant is identified by the
public key, and authentication is ac-
complished through signing with the
private key. Since this is not specific
to blockchain, it is not considered
further here.
The second goal is to provide a pub-
lic record or ledger of a set of transac-
tions that cannot be altered once veri-
fied and agreed to. This was originally
designed to keep users of electronic
currency from double-spending and to
allow public audit of all transactions.
The ledger is a record of what transac-
tions have taken place, and the order
of those transactions. The use of this
ledger for verification of transactions
other than the exchange of electronic
cash has been the main extension of
the blockchain technology.
The final core goal is for the system
A Hitchhiker’s
Guide to the
Blockchain
Universe
D O I : 1 0 . 1 1 4 5 / 3 3 0 3 8 6 8
Article development led by
queue.acm.org
Blockchain remains a mystery,
despite its growing acceptance.
BY JIM WALDO
http://dx.doi.org/10.1145/3303868
M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3 | C O M M
U N I C AT I O N S O F T H E A C M 39
I
M
A
G
E
B
Y
A
N
D
R
I
J
B
O
R
Y
S
A
S
S
O
C
I
A
T
E
S
/S
H
U
T
T
E
R
S
T
O
C
K
to be independent of any central or
trusted authority. This is meant to be
a peer- or participant-driven system
in which no entity has more or less
authority or trust than any other. The
design seeks to ensure the other goals
as long as more than half of the mem-
bers of the participating community
are honest.
Components of Blockchain
While there are lots of different ways to
implement a blockchain, all have three
major components. The first of these is
the ledger, which is the series of blocks
that are the public record of the trans-
actions and the order of those transac-
tions. Second is the consensus proto-
col, which allows all of the members of
the community to agree on the values
stored in the ledger. Finally, there is the
digital currency, which acts as a reward
for those willing to do the work of ad-
vancing the ledger. These components
work together to provide a system that
has the properties of stability, irrefut-
ability, and distribution of trust that
are the goals of the system.
The ledger is a sequence of blocks,
where each block is an ordered se-
quence of transactions of an agreed-
upon size (although the actual size
varies from system to system). The first
entry into a block is a cryptographic
hash (such as those produced by the
Secure Hash Algorithm SHA-256) of
the previous block. This prevents the
contents of the previous block from be-
ing changed, as any such change will
alter the cryptographic hash of that
block and thus can be detected by the
community. These hash functions are
easy to compute but (at least to our cur-
rent knowledge) impossible to reverse.
So once the hash of the contents of a
block is published, anyone in the com-
munity can easily check that the hash
is correct.
So far, this is nothing new; it is sim-
ply a Merkle chain, which has been
in use for years. The wrinkle in block-
chain is that the calculation of the hash
needs to add a nonce (some random
set of bits) to the block being hashed
until the resulting hash has a certain
number (generally six or eight) of lead-
ing zeros. Since there is no way to pre-
dict the value that will give that num-
ber of leading zeros to the hash, this is
a brute-force calculation, which is ex-
ponentially difficult on the number of
zeros required. This makes the calcula-
tion of the hash for the block computa-
tionally difficult and means any mem-
ber of the community has the chance
of coming up with an acceptable hash
with a probability that is proportional
to the amount of computing resources
the member throws at the problem.
40 C O M M U N I C AT I O N S O F T H E A C M | M
A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
for the calculation of the next block in
the chain. This requires an incentive
mechanism, which is where the third
component of the blockchain universe
enters the picture: digital currency.
Digital currency. The reason for a
miner to do all the computational work
to calculate the nonce and hash of a
block is that the first to do so gets an al-
location of digital currency as the first
transaction in the next block. This also
encourages other miners to accept a
block as quickly as possible, so they can
start doing the work to hash the next
block (which has likely been filled with
transactions during the time it took to
hash the previous block). Bitcoin was
the original blockchain currency and in-
centive; in September 2017 the reward
for hashing a block was 12 bitcoins8
when the exchange rate was 1 bitcoin
= ~$4,500 U.S. (prices fluctuate rather
wildly). This reward halves (for bitcoin)
every 210,000 blocks. The next halving
is expected around May 25, 2020.1
Other digital currencies work in a
similar fashion. To spend the currency,
entries are made in the then-current
block, which acts as a ledger of all the
currency exchanges for a particular
ledger/digital coin combination.
Problems with Blockchain
While blockchain was originally pro-
posed as a mechanism for trustless
digital currency, its uses have expand-
ed well beyond that particular use case.
Indeed, the emphasis seems to have bi-
furcated into companies that empha-
size the original use for currency (thus
the explosion of initial coin offerings,
which create new currencies) and the
use of the ledger as a general mecha-
nism for recording and ordering trans-
actions. For the first use, the claim is
that blockchain can replace outdated
notions of currency and allow a new,
private, friction-free economy. For the
latter use, the claim is that blockchain
can be used to track supply chains, cre-
ate self-enforcing contracts, and gen-
erally eliminate layers of mediation in
any transaction.
Both of these kinds of uses pres-
ent some serious problems. Many
are problems any new technology
encounters in replacing entrenched
interests, but a number of them are
technical in nature; those are the
ones discussed here.
Coming up with the hash and the right
nonce is a proof of work (and, perhaps,
luck) that can be easily verified by any-
one in the community. Those attempt-
ing to calculate the right hash value
for a block are the miners of the block-
chain world; they are exchanging com-
putation for pay.
Once a miner comes up with the right
nonce that produces the right hash, they
broadcast the result to the rest of the
community, and all miners start work
on the next block. The first entry in the
new block will be the hash of the last
block, and the second entry in the block
will be the creation of some amount of
currency assigned to the miner who
found the hash for the previous block.
This works only if you have a block
to start the chain. This is done in the
same way all systems get started: by
cheating and declaring a block to be
the Genesis block.
It is possible that two different min-
ers could both find, at the same time
(or close enough), a nonce that gives
a candidate hash value with the right
number of leading zeros, or that some-
one seeing a nonce that works could
claim the discovery as their own. There
could even be two different blocks be-
ing proposed as the next entry in the
chain. Dealing with such issues re-
quires the next component of the sys-
tem: the consensus protocol.
Consensus protocols are among the
most-studied aspects of distributed
systems. While it was proved some
time ago that no algorithm will guaran-
tee consensus if there is a possibility of
any kind of failure,3 a number of well-
known protocols such as Paxos4 have
been used in systems for some time
to give highly reliable mechanisms for
distributed agreement. In consensus
protocols such as Paxos, however, it is
assumed the systems that must reach
agreement are known.
Depending on the failure model
used, the number of systems that must
agree to reach consensus changes.
When a majority of systems agree in
such a protocol (for some definition of
majority), consensus has been reached
in systems that want to protect from
non-byzantine failure. If the system is
subject to byzantine failure, then two-
thirds of the systems (plus one) need
to agree. While the voting can be done
in peer-to-peer systems, most efficient
versions of the algorithms depend on a
leader to initiate the voting and tally the
results.
In the blockchain universe, how-
ever, there is a trust-free system, which
means there can be no leader. Further,
in the blockchain universe the number
of systems participating in validating
the transactions (that is, finding a hash
for the block with the right number of
zeros in the prefix) is not known. This
makes claims that a block is accept-
ed when 51% of the miners agree on
the block nonsense, since there is no
known value for the number of entities
trying to agree.
Instead, the majority is determined
by the calculation of the hash for the
next block. Since that block begins
with the hash of the previous block,
and since the likelihood of the next
block’s hash being calculated is pro-
portional to the amount of computing
resources trying to calculate the ap-
propriate hash for the next block, if a
majority of the computing power avail-
able to the miners starts to work on a
block that is seeded with the previous
hash, then that block is more likely to
be offered as the next block. This is the
reason for consensus being tied to the
longest chain, as that chain will be pro-
duced by the largest number of com-
puting resources.
This mechanism relies on the gen-
eration of a hash with the right set of
leading zeros being genuinely random.
Being random also means that on oc-
casion someone will get lucky and a
chain that is being worked on by a mi-
nority of the miners will be hashed ap-
propriately before a chain that is being
worked on by a larger amount of com-
puting resources.
In an important sense, however, this
does not matter. The blockchain uni-
verse defines a majority as the produc-
tion of an appropriate nonce and hash.
Sometimes this means more than half
of the computing power has worked on
the problem, but other times it might
mean only one (exceptionally lucky)
miner got the answer. This might mean
a set of transactions in a block that is
not verified first need to be rolled back,
but that is the nature of in-flight trans-
actions.
It does mean all of the miners in
the blockchain universe need to move
to a newly hashed block as the basis
M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3 | C O M M
U N I C AT I O N S O F T H E A C M 41
practice
A number of criticisms of block-
chain center on the mechanism used
to create an accepted hash for a block.
To ensure this can be discovered by
anyone, the mechanism needs to be
one that takes significant computation
but can be easily verified. To ensure
the blocks that are verified cannot be
changed, the computation needs to
be impractical to reverse. Hashing the
block using a function such as SHA-256
and requiring that a nonce value is add-
ed until some number of leading zeros
appears in the hash fits these charac-
teristics nicely. This very set of require-
ments, however, means the consensus
mechanism has intrinsic limitations.
Scaling. An obvious worry about
the consensus-by-hashing mechanism
used in blockchain is whether the tech-
nology can scale to the levels needed
for more general use. According to
blockchain.com, the number of con-
firmed transactions averages around
275,000 per day, with a peak over the
last year of about 380,000.2 This is an
impressive number but hardly the
400,000 transactions per minute that
major credit-card systems perform on
peak days. Blocks can currently be veri-
fied at a rate of four to six per second,
and this is the limiting factor on the
number of transactions.
While there are a number of pro-
posals to deal with scaling block-
chain, it is unclear how these fit with
the base design of the system. Making
the verification of a block difficult and
random is an important aspect of the
basic design of blockchain; this is the
proof of work that is at the core of the
trustless consensus algorithm. If the
verification of a block is made easier,
then the probabilistic guarantees of any
miner being able to discover the appro-
priate hash decreases, and the possibil-
ity of some miner with a large amount
of computing taking over the chain in-
creases. Verifying a block is meant to be
hard; that’s how the system avoids hav-
ing to trust any particular member or
set of members.
One mechanism suggested for scal-
ing is to shard the blockchain into a
number of different chains, so that
transactions can be done in parallel
in different chains. This is happen-
ing in the different coin exchanges;
each coin system can be thought of
as a separate shard. This introduces
its own complexity in order to have a
transaction that crosses these shards,
since the notion of ensured consis-
tency requires that all ledgers are
self-contained to allow consistency
checking within each ledger. A new
blockchain could be created to be
used for cross-blockchain transac-
tions, but the incentive mechanism
for that blockchain would be a new
electronic currency that would need
to stay within the ecosystem of this
new blockchain. Getting the interact-
ing blockchains to trust the mediating
blockchain is an unsolved problem.
There have also been attempts
to use some mechanism other than
proof of work to drive the consensus
protocol. Perhaps the best known of
these is the proof-of-stake approach,
in which a block can be calculated in
much simpler ways, and consensus is
reached when those with a majority of
the currency agree on the hashing of
the block. Since the amount of curren-
cy and its owners are known, this is not
subject to the problem of not knowing
the members of the community to vote.
But this does reintroduce the notion
of trust to the system; those who have
more money have more of a stake, and
therefore are trusted more than those
who have less of a stake. This is the
electronic equivalent of an oligarchy,
which has not worked particularly well
in the past but might prove more stable
in this context.
Power consumption. A second criti-
cism of blockchain technology that is
an outgrowth of the consensus mech-
anism is the amount of energy con-
sumed in the discovery of an appro-
priate hash for a block. Calculating a
hash with the appropriate number of
leading zeros requires many hashing
calculations, which in turn burn a lot
of electricity; some have claimed that
bitcoin and related cryptocurrencies
are mechanisms to transform elec-
tricity into currency. The estimates
of how much electricity is consumed
range from the low side stating that it
is about as much as is used by the city
of San Jose, CA, to the high side that
it is equivalent to Denmark’s power
consumption. No matter which model
is used for the calculation, the answer
is large.
The hope is that this energy drain
will diminish, perhaps by changing the
While blockchain
was originally
proposed as a
mechanism for
trustless digital
currency, its uses
have expanded
well beyond that
particular use case.
42 C O M M U N I C AT I O N S O F T H E A C M | M
A R C H 2 0 1 9 | V O L . 6 2 | N O . 3
practice
known cryptographic protocols could
be done in a number of ways. Doing it
on top of a system such as blockchain
is needed if the requirement that the
system be trustless (except for trusting
the software) is added. Such a trustless
system comes with a cost.
Whether the cost is worth it is a de-
cision that requires an understanding
of the various parts of the system and
how they interact. A public, unforge-
able, unchangeable ledger is possible
without cryptocurrency or a consensus
algorithm based on a difficult-to-com-
pute one-way function that is easily ver-
ified. Cryptocurrencies can be created
without the use of either a public led-
ger or a trustless consensus algorithm.
And consensus algorithms can be cre-
ated that do not require a financial in-
centive system or a public ledger.
Related articles
on queue.acm.org
Bitcoin’s Academic Pedigree
Arvind Narayanan and Jeremy Clark
https://queue.acm.org/detail.cfm?id=3136559
Research for Practice: Cryptocurrencies,
Blockchains, and Smart Contracts;
Hardware for Deep Learning
https://queue.acm.org/detail.cfm?id=3043967
Certificate Transparency
Ben Laurie, Google
https://queue.acm.org/detail.cfm?id=2668154
References
1. Bitcoinblockhalf.com. Bitcoin block reward halving
countdown.
2. Blockchain.com. Confirmed transactions per day,
2018; https://www.blockchain.com/charts/n-transacti
ons?daysAverageString=7.
3. Fischer, M., Lynch, N.A., Paterson, M. Impossibility of
distributed consensus with one faulty process. JACM
32,2 (1985), 374–382.
4. Lamport, L. The part-time parliament. ACM Trans.
Computer Systems 16, 2 (1998), 133–169.
5. Morris, D.Z. Bitcoin is in wild upheaval after the
cancellation of the Segwit2x fork. Fortune (Nov.
12, 2017); http://fortune.com/2017/11/12/bitcoin-
upheavel-segwit2x-fork/.
6. Nakamoto, S. Bitcoin, a peer-to-peer electronic cash
system, 2008; https://bitcoin.org/bitcoin.pdf.
7. Thompson, K. Reflections on trusting trust. Commun.
ACM 27, 8 (Aug. 1984), 761–763; https://dl.acm.org/
citation.cfm?id=358210.
8. Trubetskoy, G. Electricity cost of 1 bitcoin (Sept. 2017);
https://grisha.org/blog/2017/09/28/electricity-cost-
of-1-bitcoin/.
9. Yaga, D., Mell, P., Roby, N., Scarfone, K. Blockchain
technology overview. NISTIR 8202 (Oct. 2018).
National Institute of Standards and Technology;
https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.
IR.8202.pdf.
Jim Waldo is a professor of the practice of computer
science at Harvard University, where he is also the chief
technology officer for the School of Engineering, a position
he assumed after leaving Sun Microsystems Laboratories.
Copyright held by author/owner.
Publication rights licensed to ACM.
hardware used for the hashing to some-
thing far more efficient (such as special-
ized ASICs). Making the hashing pro-
cess more efficient, however, is at odds
with blockchain’s fundamental mecha-
nism of trusting no one; the point is
that the verification of a block must be
difficult and random so that any miner
is equally likely to find the hash.
The energy consumption might
be less worrisome if the calculations
eating all of this power were gener-
ally useful. [email protected], for example,
uses a considerable amount of energy
by offloading analysis of background
radio-wave transmissions to Internet-
connected computers. This initiative,
based at UC Berkeley’s SETI (Search for
Extraterrestrial Intelligence) Research
Center, is trying to find signs of other
intelligent life in the universe, which is
seen by the participants as worth doing
(and paying for the extra electricity).
Perhaps the calculation used to ver-
ify the blockchain could be changed to
something that offered more than just
verification of the blockchain. Such
a calculation would need to have the
properties of being equally possible
for all miners to find (given equality of
computing resource), difficult to find,
and easy to verify. It is not clear what
this calculation might be.
Trust. Perhaps the most problem-
atic aspect of blockchain is its core
notion of being trustless. Much of the
complexity of the technology is caused
by this requirement. It is unclear, how-
ever, that this is even necessary for the
kinds of uses people talk about as core
to blockchain, or that the system is ac-
tually free of trust.
It is because of the lack of trust
that the system requires verification
of the block to be computationally
difficult, one-way, and easy to verify.
If this requirement of trustlessness
were dropped, then production of a
public ledger that was unchangeable
and easily verified could be done eas-
ily. Suppose such a ledger is to be used
for inter-bank transfer (which has been
suggested as a use for blockchain). In-
stead of a trustless system, however,
the users decide to trust a consortium
of major banks, the Federal Reserve
Board, and some selection of consum-
er watchdog agencies or organizations.
This consortium could choose a mem-
ber (perhaps on a rotating basis) who
is responsible for keeping the ledger
(a leader). Transactions are written to
the ledger, and when the ledger block
reaches an appropriate size, the lead-
er hashes the ledger, uses the hash to
start a new block, and continues (just
as in the current blockchain).
The difference is that there is no
need for the leader to randomly try val-
ues added to the block until the right
number of leading zeros is produced
in the hash. Without that requirement,
the hash can be done very quickly with
little energy expense. The block still
can’t be changed (since the hash is still
a one-way function), and any member
of the consortium (or anyone else who
has access to the ledger) can quickly
check the hash. A public, verifiable,
and unchangeable ledger can be pro-
duced in this way but at much lower
cost in both time and energy.
This does require trust in the various
members of the consortium, but verify-
ing that the consortium is not cheat-
ing on the hashing of a block would be
easy. This is not a fully centralized trust
in a single entity but, rather, trusting a
group. The larger and more varied the
group, the less likely the group would
collude. Note also that such a system
does not need an incentive mechanism
such as a digital currency to operate.
Who Do You Trust?
Maybe you really do not want to trust
anyone. Calibrating paranoia is diffi-
cult, and perhaps you really do want to
have an economic system in which no
specifiable set of entities has the ability
to collude and control the system. That
is the real reason for blockchain.
As Ken Thompson pointed out in
1984, trust has to happen somewhere.7
Even if you do not trust any group to
calculate the blocks, you need to trust
the developers of the software being
used to manage the blocks, the ledgers,
and the rest. Everything from bugs to
design changes5 in the software have
led to forks in the bitcoin ecosystem
that have caused considerable churn
in those systems. If your trust is in the
security and solidity of the code, that is
a choice you make. But it is not a trust-
less system.
A public, nonrefutable, unalter-
able ledger for transactions could be
a useful tool for a number of applica-
tions. Building such a system on top of
Copyright of Communications of the ACM is the property of
Association for Computing
Machinery and its content may not be copied or emailed to
multiple sites or posted to a
listserv without the copyright holder's express written
permission. However, users may print,
download, or email articles for individual use.
THE WORLD BITCOIN CREATED
THE FIRST BIG DIGITAL CURRENCY GAVE US A
GLIMPSE OF A NEW ECONOMIC ORDER—ONE
THAT RAISES MORE QUESTIONS THAN ANSWERS
BITCOIN. CRYPTOCURRENCIES. SMART CONTRACTS.
MANY PEOPLE HAVE NOW heard of the
rapidly changing ecosystem of financial technology, but few
have wrapped their heads around it. Hundreds
of central banks and corporations are incubating a game-
changing technology called blockchain—and
investors are betting billions on it. Yet only 24 percent of
global financial services professionals surveyed
in 2017 by PricewaterhouseCoopers (PwC) described
themselves as “extremely” or “very” familiar with it.
Much of the public is unsure if any of this is legal, if they
understand it at all. Evangelists say it has the
power to upend entire economic systems; others, such as Emin
Gün Sirer, a block-chain researcher at
Cornell University, warn that while the technical core is
“fascinating and disruptive, there’s also a lot of
hokum out there.” How to parse the nuance—or get a handle on
what a blockchain is?
It all starts with Satoshi Nakamoto, the world’s most reclusive
pseudonymous billionaire. In October 2008
Nakamoto published a paper via an obscure Internet mailing list
detailing a design for the world’s first
blockchain: a public database distributed and synchronized
every 10 minutes across thousands of
computers, accessible to anyone and yet hackable by no one. Its
purpose? To provide a decentralized,
bulletproof record of exchange for a new digital currency
Nakamoto called Bitcoin.
Until that point, the trouble with “peer-to-peer electronic cash”
was that nobody could reliably prevent you
from spending it twice. Block-chain technology changed all that
by inscribing every transfer of Bitcoin into
a “distributed ledger”—a kind of digital spreadsheet that, thanks
to the laws of mathematics and
cryptography, was more inviolable than carving it in stone. The
Economist dubbed it “the trust machine.”
The technology that underpins Bitcoin quickly outgrew it,
driving a frenetic period of innovation. Think of
blockchain as a scaffolding that can hold any data that need
secure provenance: financial histories,
ownership documents, proofs of identity. This “worldwide
ledger”—as Don Tapscott, co-author of
Blockchain Revolution, calls it—is a blank slate. But the
technology, imperfect as it is, can be tapped for
evil, too, and some are pumping the brakes on the frenzy.
Here’s a guide to the digital landscape that
Satoshi Nakamoto—whoever he is—has thrust before us.
CORE CONCEPTS
CRYPTOCURRENCY A form of digital currency that relies on
the mathematics of cryptography to control
how and when units of the currency are created and to ensure
secure transfer of funds.
PEER-TO-PEER (P2P) NETWORK A web of computers linked
in a decentralized way, such that any
computer can communicate directly with any other without
going through a central server or other
administrator. Napster, the network for sharing music files that
launched in the late 1990s, popularized the
concept.
NODE A computer connected to a P2P network. The Bitcoin
network currently has thousands of nodes
spread across the globe.
DISTRIBUTED LEDGER A list of recorded, time-stamped
transactions that is simultaneously broadcast,
copied and verified via consensus across many different
computers in a P2P network. If every node in the
network has an identical copy of the ledger, falsified entries or
corrupted versions can be easily detected.
BLOCK A grouping of individual transaction records on a
blockchain. On the Bitcoin network, new blocks
are added to the chain every 10 minutes.
HASHING A cryptographic method that uses a mathematical
function to condense any amount of data into
a unique string of alphanumeric characters of a certain fixed
length—called a hash value. This creates an
easily verifiable digital fingerprint for the hashed data. If even
a single bit of the original data is changed or
corrupted, the fingerprint that emerges from the hash function
will be drastically different, making it easy to
http://eds.a.ebscohost.com/eds/delivery?sid=4d7023a5-8a77-
44cb-88c8-
0a64f6737b8d%40sessionmgr4008&vid=10&ReturnUrl=http%3a
%2f%2feds.a.ebscohost.com%2feds%2fdetail%2fdetail%3fvid%
3d5%26sid%3d4d7023a5-8a77-44cb-88c8-
0a64f6737b8d%40sessionmgr4008%26bdata%3dJkF1dGhUeXBl
PXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#toc
detect errors or tampering. Hashes are also “one-way”—the data
cannot be reassembled or extracted from
the fingerprint.
MINING The process by which nodes of a cryptocurrency
network compete to securely add new blocks of
transactions to a blockchain. Units of the currency are the
reward—and hence, a financial incentive to
ensure security. Mining involves downloading the latest version
of the blockchain’s transactions for
verification, then using brute-force computation to randomly
search for the solution to a difficult
mathematical puzzle created via hashing. The first node to
discover the correct solution “mines” that block,
adding it to the blockchain and claiming the reward associated
with it. Humans control nodes, but the
competition has nothing to do with skill: simply, the more raw
computing power a miner applies toward the
solution, the more likely he or she is to find it—a process called
proof of work.
HOW BLOCKCHAIN WORKS
How does digital currency—or any data—reliably pass back and
forth on a decentralized network full of
strangers that don’t have a reason to trust one another at all? By
generating a permanent ledger of
transactions that can’t be changed by any single network
member.
1 A blockchain transaction begins with one party agreeing to
send data to another. These data could be
anything. But because the point of a blockchain is to create a
permanent, verifiable record of exchange, the
data usually represent some valuable asset. Common examples:
units of a cryptocurrency or other financial
instrument; contracts, deeds or records of ownership; medical
information or other identity data.
peer network of computers operating the
blockchain. Every node on the network is equipped with a
procedure for verifying whether the transaction
is valid or not. (In a Bitcoin transaction, for example, the
network would verify whether those paying actually
have the amount of Bitcoins they say they do.) Once the
network has reached a consensus, algorithms
package up the validated transaction with other recent
transactions into a block.
hashing the data inside it, together with two other
pieces of information: the fingerprint of the preceding block and
a random number called a nonce.
s added to the blockchain with a
digital fingerprint that also mathematically encodes
the validated fingerprints of every block preceding it. These
nested fingerprints make the blockchain
increasingly secure with every new block that gets added
because altering a single bit of information
anywhere in the blockchain would drastically change not only
the fingerprint of that particular block but
every subsequent one in the chain as well.
another for the right to add the new block to the
blockchain. Their computers perform a tedious set of hash based
calculations over and over again by trial
and error, hoping to generate a solution that satisfies an
arbitrary rule defined by the network. (On the
Bitcoin blockchain, the miners are searching for solutions—or
“hash values”—that have a particular number
of zeros at the beginning.) Whoever is first to complete this
proof of work process and find the matching
solution successfully “mines” that block, earning a financial
reward.
AS AN ALTERNATIVE: Proof of work mining is energy
intensive, so some new blockchains are doing away
with it, instead using a preapproved network of “validator”
nodes who can notarize transactions via an
alternative process called proof of stake. Because this process
doesn’t rely on difficult hashing calculations,
it uses much less computing power (and much less electricity).
BLOCKCHAIN DEMYSTIFIED: FREQUENTLY ASKED
QUESTIONS ABOUT A RAPIDLY EXPANDING
TOPIC
1. ARE BITCOIN AND BLOCKCHAIN THE SAME?
No, but it’s easy to get them confused because they both came
into public awareness in 2008, when Satoshi
Nakamoto published his paper describing how to implement
them simultaneously. Bitcoin is one type of
cryptocurrency. What people call “blockchain” is a technology
that makes Bitcoin possible—an
infrastructure that can be used for tracking many types of
transactions. Blockchain technology exists without
Bitcoin—but not the reverse. Think of Bitcoin as a kind of
application that runs “on” the blockchain, much
like Web sites run on the Internet.
10% Predicted amount of the world’s gross domestic product
that will be stored in blockchain based
technology by 2025, according to a 2015 survey report from the
World Economic Forum.
WHO IS USING BLOCKCHAIN TECHNOLOGY?
FINANCIAL INSTITUTIONS: Global banks and investment
institutions are researching and pursuing
blockchain projects, sometimes joining forces in consortiums.
Since 2012 Ripple has been a thriving,
blockchain-based system for settling international transactions
among banks. Start-ups such as Bloom
intend to deploy blockchains to credit reporting, hoping to end
data breaches like the Equifax hack.
GOVERNMENTS: Delaware and Illinois use distributed ledgers
for birth certificates. A Vermont law allows
blockchain technology to verify the authenticity of legal
documents. Dubai integrated blockchains into many
of its administrative services, such as obtaining licenses. In
2016 Tunisia began issuing a blockchain-
backed version of its digital national currency called the eDinar.
TECH ENTREPRENEURS: The Ethereum network—which was
designed to support new applications,
rather than just a digital cash ecosystem like Bitcoin—is like an
App Store for blockchain start-ups.
Hundreds of projects and businesses are running on it. One
notable: We Power wants to let households
buy and sell renewable energy (from, say, roof-mounted solar
panels) directly to one another.
COPYRIGHT AND IP HOLDERS: U.K. musician Imogen Heap
started Mycelia, a tech incubator that tracks
metadata associated with creative works, cutting out
intermediaries like iTunes.
NONPROFITS AND AID GROUPS: The BitGive Foundation is
boosting the accountability of philanthropic
giving. And the United Nations World Food Program is
streamlining how it tracks and delivers assistance
to Syrian refugees in Jordan.
ACADEMIC INSTITUTIONS: Forget sheepskins. The
Blockcerts project wants to make all manner of
academic and professional credentials more trustworthy and
shareable.
ASSET MANAGERS: London-based Everledger is targeting the
diamond industry by recording the
attributes and provenance of each precious stone. Fine wine and
art are tracked, too.
JOURNALISTS: To push back against fake news, Civil gives
news makers a platform to create ad-free,
inalterable journalism that’s immune to outside interests
(Russia; Facebook) and supported by readers.
REGULAR PEOPLE: For migrant workers who send money to
their families back home, using
Bitcoin costs less than using Western Union, which is why an
estimated 20 percent of international
remittances between South Korea and the Philippines now rely
on it. It’s not just for cyber libertarians, and
it goes way beyond finance. Here’s an incomplete lineup:
WHY WOULD YOU USE A CRYPTOCURRENCY INSTEAD
OF A NATIONAL CURRENCY?
Imagine holding a $100 bill that buys only $50 worth of goods.
In Venezuela, where the official currency is
crashing in value, that scenario is a reality. “You’re losing
something like half of the value of your net income
every year to hyperinflation,” says venture capitalist Morris.
“People are thinking: ‘How can I stop that?’ And
they’re buying Bitcoin.”
Why would a hard-to-understand cryptocurrency with no
government guaranteeing its value as “legal
tender” seem like a better bet than a more traditional value-
holding commodity such as gold? For one thing,
converting Venezuelan bolivars into Bitcoin is simply a lot
easier for ordinary folks—anyone with access to
the Internet can do it. Because Bitcoin has no physical form,
you don’t have to stash it somewhere unsafe—
like a mattress or, in Venezuela’s case, a bank. Of course,
Bitcoin doesn’t have a stable value, either. But
while the bolivar has nose-dived, the value of a Bitcoin is at
least trending ever upward. In a country where
inflation is expected to exceed 2,300 percent in 2018 (according
to the International Monetary Fund), it
seems like a reasonable risk to take.
Zimbabweans have the opposite problem. After ditching its own
currency for the U.S. dollar, the country
now relies on currency imports to run its economy—and it’s
facing a shortage. Bitcoin is now common
enough that it’s even accepted by car dealers.
2 WHERE DOES THE VALUE OF A CRYPTOCURRENCY
COME FROM?
Some experts say that a cryptocurrency like Bitcoin has value
because of its security (the Bitcoin blockchain
has never been hacked—yet) or its mathematically imposed
“scarcity” (a fixed supply of 21 million Bitcoins
means they can never be devalued by “printing more money”).
Others say that they have intrinsic value
because mining them is tedious work that makes the network
stronger—in other words, there’s value in ef
ort. But what about cryptocurrencies that aren’t mined?
According to Christian Catalini of the Massachusetts
Institute of Technology, “value comes from consensus. We all
agree it has value.” In this sense,
cryptocurrencies may have more in common with social
networks than with central banks. “Money is a way
for society to keep track of checks and balances,” Catalini says.
“If cryptocurrencies end up being a better
way to track information,” their value is secured—whether they
represent a physical asset or just a number.
77% of the global financial services industry is expected to
adopt blockchain as part of a production system
or process by 2020, according to PwC.
SO, BITCOIN: THE FUTURE OR A FLASH IN THE PAN?
Bitcoin is the world’s most popular digital currency. But it’s
also wildly speculative, and many financial
experts point to its legendary volatility: the currency’s value
has risen more than 10-fold since 2016, but it
lost 40 percent of its value in a span of two weeks in September
2017—only to regain
(and surpass) it just as quickly. (Who knows what it will be by
the time you read this.) To others, the
network’s technical limitations—it is sluggish at handling
transactions—combined with its unsustainable
mining costs make it the equivalent of a financial time bomb.
“We don’t bet on Bit-coin,” says Charlie Morris,
chief investment officer of Next-Block Global, a firm that
invests in blockchain technology.
Bitcoin legitimized the basic economics of a global
cryptocurrency. But the next-largest “altcoin” may have
more staying power: Ether is less a cash like currency than a
“blockchain asset,” as Morris calls it, used to
power and secure the Ethereum network. Much like renting
virtual servers in Google’s “cloud,” developers
who want to create applications using Ethereum’s blockchain
must pay for access in tokens of Ether. The
more useful Ethereum becomes as a mainstream platform, the
more stable and valuable Ether becomes,
too. New currencies and platforms are very likely to emerge—
the race for prominence has only just begun.
ARE WE FACING THE END OF CASH?
It may seem that printed money is headed for the same fate as
newspapers. But experts say that cash is
far from dead. “We’re still using great piles of paper to pay for
things like international shipping of sea
containers,” says Vinay Gupta, CEO of Mattereum, a legal
services firm for smart contracts. “The system
is not so broken that people are willing to tear it up.” The
trouble with Bitcoin and Ether is that while they
can function as a store of value or unit of exchange, they’re not
accepted as legal tender in enough places
to compete with cash. In places such as Kenya, where few
people have traditional bank accounts and
“mobile money” services such as M-Pesa have made saving and
sending money by phone much easier
than exchanging physical cash, cryptocurrencies might seem
like a natural fit. But mining still requires a lot
of processing power—not a common resource in Africa, where
inexpensive feature phones outsell
smartphones and not many own PCs. The computations required
to secure blockchain transactions could,
in theory, happen on “your old Nokia SIM card,” Gupta says.
Still, cold, hard paper won’t soon disappear.
3. IS THE BLOCKCHAIN A NEW KIND OF INTERNET?
Not quite, because the blockchain itself requires the Internet to
support and maintain its peer-to-peer
network. It’s also important to note that when people talk
informally about “the” blockchain, they’re almost
always referring to the specific system that Nakamoto
implemented to support Bit-coin. The Bitcoin
blockchain was the first distributed ledger system that didn’t
require a centralized server or organization to
support it. It’s still one of the biggest: as of November 2017 it
contains more than 130 gigabytes (140 billion
bytes) of information, and every new transaction increases its
size. But that’s still many orders of magnitude
smaller than the amount of data on the Internet, which is
estimated to be on the yottabyte scale (1024, or
septillions of bytes).
IS THE BLOCKCHAIN A NEW KIND OF INTERNET?
IF CRYPTOCURRENCIES ARE DIGITAL, WHAT POWERS
THEM?
Just because cryptocurrencies have no physical attributes
doesn’t mean that there’s no cost to using them.
The intentionally effortful process by which new Bitcoins are
“mined”—how new transactions are added to
the ledger—requires that the entire P2P network cycle through a
mind-boggling number of random
computations to validate blockchain transactions. All of that
processing requires energy.
How much energy? Start with the amount of computation. In
late 2017 the Bitcoin network’s “hash rate”
was around 10 exahashes—that’s 10 million trillion
calculations—per second. Deriving a precise energy
estimate from that figure is impossible because the network,
being decentralized, can’t account for
individual nodes. But credible estimates peg the Bitcoin
network’s annual electricity consumption at around
27 terawatt-hours—roughly equivalent to that of Ireland. To put
that in perspective, producing a year’s worth
of Bitcoin alone requires the equivalent of burning about 11
million tons of coal, which pours nearly 29
million tons of carbon dioxide into the atmosphere. Fueling
Bitcoin by solar power would require harnessing
more than half of the entire U.S.’s annual utility-scale solar
capacity. Ethereum’s creator, Vitalik Buterin, is
currently transitioning the network’s blockchain to a different
validation mechanism called proof of stake,
which doesn’t rely on mining at all.
Bitcoin’s larger, more decentralized network is unlikely to make
a similar move anytime soon. But Vinay
Gupta, who designed Dubai’s blockchain strategy, believes that
the same greed that motivates miners to
turn kilowatts into cryptocurrency will ultimately spur them to
innovate their way out of this scalability
problem. Venture capitalist Charlie Morris thinks that as proof-
of-stake cryptocurrencies prove their mettle
in the market, “mining will become like a little blip in history,”
he says. “People will say, ‘Remember when
we all did that—wasn’t that ridiculous?’”
WHERE DOES MINING ACTUALLY OCCUR?
country is India, at
—alone. The task is
now dominated by giant mining pools akin to
the ones in China, so the chances of a solo node mining a block
today
is about one in eight million. Lone operators would spend far
more on energy bills than they’d get in profits.
Want to become a mining hobbyist? Join a public mining pool.
4. ARE BLOCKCHAINS EVEN LEGAL?
Yes. But their decentralized nature and association with
Bitcoin—which has been used in illegal
transactions such as drug and arms sales—can give blockchains
an “outlaw” reputation it doesn’t
necessarily deserve. Blockchains can be used for many different
purposes, good or ill, just like Facebook,
e-mail or any other Internet technology.
ARE BLOCKCHAINS EVEN LEGAL?
WHAT DOES THE PUBLIC THINK ABOUT BLOCKCHAIN?
illegal purchases or don’t know what they’re used
for at all, according to a 2017 YouGov survey.
they had never heard of blockchain
technology; 80 percent of those who had heard of the
technology still don’t understand what it is.
U.S. companies indicated
they had little or no knowledge about
blockchain technology, according to a 2017 Deloitte survey.
HOW WILL THIS TECHNOLOGY BE USED IN THE
FUTURE?
Anyone building on blockchain technology is, by definition, a
futurist. Once distributed ledger technology
gets out of its training-wheels phase, what might we create with
it?
SELF-DRIVING, SELF-OWNING CARS: Instead of driving for
Uber, your car would drive itself while you
work or sleep. Blockchain-backed smart contracts could remove
middlemen like Uber and Lyft from the car-
sharing equation by automating their two basic functions—
matching cars with riders and facilitating
payments. You could also own “shares” of a car represented by
cryptocurrency tokens.
PORTABLE MEDICAL DATA: The same technology that
allows two people to exchange units of Bitcoin
without necessarily trusting each other could also vouchsafe
medical information, putting control firmly in
the hands of patients, says Brian Behlendorf, executive director
of the Linux Foundation’s Hyperledger
project, a tool kit for building blockchain applications. Patients
would receive a “‘health wallet” with their
data and histories. A doctor could go to a ledger and request
your blood type, generating an access request
on the user’s phone. “You get an audit trail of who you shared
that data with and the option to delete it when
the treatment is over,” Behlendorf says.
A GLOBAL SUPERCOMPUTER: Linking your devices to
thousands of others in a P2P network—and using
a blockchain to pay you for their use—would create a financial
incentive to support a worldwide,
decentralized supercomputer. While you sleep, your laptop and
phone could be rented by scientists who
want to run models, for example. A project called Golem is
already working on it. “The number of idle
laptops is so much larger than the computing power of the data
centers,” Gupta says. “Artificial intelligence,
climate modeling—all of that stuff could be accelerated 1,000-
fold.”
WHAT ARE THE LIMITATIONS AND DANGERS OF
BLOCKCHAIN?
“Blockchains provide a substrate that, if certain assumptions are
held to, is very difficult to modify ex post
facto,” says Cornell blockchain researcher Emin Gün Sirer. “But
that doesn’t mean that everything recorded
to a blockchain is true or desirable. If I get hacked and someone
steals my cryptocoins and tries to use
them, I would very much like to undo that transaction. That’s
where immutability becomes a liability.” It’s
also easy to confuse a blockchain’s theoretical immutability
with actual data security: public blockchains
like Ethereum and Bitcoin don’t actually encrypt any
information. The Linux Foundation’s Brian Behlendorf
goes one step further: “The ledger should never be used to store
personal data or anything sensitive, not
even in encrypted form,” he says, “because we know that no
matter what we encrypt today, probably in 40
or 50 years we’ll be able to decrypt it” with more advanced
technology. Some advocates speak of blockchain
as a panacea for any social problem involving trust, but that’s
blindly optimistic. For more on the limitations
of blockchain as a societal savior, see page 38.
5. HOW ARE CRYPTOCURRENCIES SECURE AND
TRUSTWORTHY?
Because they’re ultimately nothing but software, the
trustworthiness of a cryptocurrency “comes from the
code base,” says M.I.T. researcher Catalini. Anyone can gin up
a cryptocoin and raise funds by selling it
through an initial coin offering—even Paris Hilton did it,
lending her name to promote an obscure token. But
it’s no coincidence that the two most popular cryptocurrencies,
Bitcoin and Ether, were engineered by
computer-programming savants. That said, even coins with
impressive technical bona fides can be risky.
The DAO—a “decentralized autonomous organization” running
on Ethereum that raised over $100 million
in 2016—“had a bug” (in Catalini’s understated terms) that
allowed hackers to make of with $50 million
worth of Ether.
HOW ARE CRYPTOCURRENCIES SECURE AND
TRUSTWORTHY?
HOW DO YOU REGULATE A DECENTRALIZED SYSTEM?
Given the Wild West reputations of decentralized digital
currencies, it’s easy to assume that they were
created to dismantle or avoid financial regulation. But that’s not
quite accurate. Bitcoin is full of regulations,
after all—they’re just defined and enforced by source code (and
the collective activity of its P2P network)
rather than by governments or financial institutions. “The whole
innovation about Bitcoin is in eschewing
social governance of record keeping,” says Patrick Murck, a
lawyer who researches blockchain policy and
regulation at Harvard University’s Berkman Klein Center for
Internet and Society. Ethereum’s stated purpose—to support the
deployment of autonomous smart
contracts—is essentially regulatory. A blockchain is arguably
nothing but regulation: a mathematically
enforced system of rules about what can and cannot be done
with records in a database.
What always matters about financial regulation, decentralized
or not, is who gets to do the regulating and
how. “If you have a system that’s decentralized, there’s
nowhere to attach regulation—but wherever that
system gets reinter mediated [by third parties], regulation will
follow,” Murck says. In 2013 China banned
cryptocurrencies from its banking system, and last September it
ordered all domestic Bitcoin exchanges to
shut down. The U.S. and Japan are moving to regulate
cryptocurrency exchanges and “initial coin offerings”
with the same vigilance they apply to stock trading and
investment banking.
One future application of blockchain technology is in securing
digital identity records, and according to
venture capitalist Charlie Morris, new cryptocurrencies may
emerge that marry identity data with financial
information. They wouldn’t have the anonymity of Bitcoin
(Morris estimates the number of Bitcoin holders
who pay honest taxes on them to be mere hundreds). But as
digital money goes mainstream, the trade-off
in perceived security and stability may make oversight
tolerable—or even desirable. Says Murck: “If I’m
trusting you with some property to hold on my behalf and
transact with it—whether it’s Bitcoin or Beanie
Babies—then you’re either regulated or about to be regulated.”
CAN BLOCKCHAINS FAIL?
To date, the Bitcoin blockchain—the world’s first and at present
its largest and most widely used—has
never been compromised or hacked. But that doesn’t mean that
every blockchain is invulnerable by
definition. “There’s no such thing as a perfect technology,” says
Cornell’s Gün Sirer, co-director of the
Initiative for Cryptocurrencies and Contracts. Here are three
gaps in a blockchain’s armor:
51% ATTACK: Blockchain-backed cryptocurrency networks
rely on two bottomless resources for security:
the speed and greed of their miners. But it’s theoretically
possible to overpower both. To subvert the
blockchain’s …
Research Paper Sentence outline – Information Governance
Purpose
The purpose of this assignment is to prepare you for the
dissertation process by creating a sentence outline for a research
paper.
Description
The topic of your sentence outline is your research question.
After completing this week's Learning Activities, develop a
sentence outline.
Deliverable
Prepare a Microsoft Word document that includes the following
headings and one full sentence in each section:
· Title Page
· Abstract
· Introduction
· Literature review
· Research Method
· Results
· Discussion
· Conclusion
· Reference Page
Research Paper – Data Science and Big Data Analytics.
This week we discussed Bitcoin Economics. For this week's
research paper, you need to search the Internet and explain why
some businesses are accepting and other businesses are
rejecting the use of Bitcoins as a standard form of currency.
Your paper needs to identify two major companies that have
adopted Bitcoin technology.
Your paper should meet the following requirements:
• Be approximately 3-5 pages in length, not including the
required cover page and reference page.
• Follow APA guidelines. Your paper should include an
introduction, a body with fully developed content, and a
conclusion.
• Support your response with the readings from the course and
at least five peer-reviewed articles or scholarly journals to
support your positions, claims, and observations. The UC
Library is a great place to find resources.
• Be clear with well-written, concise, using excellent grammar
and style techniques. You are being graded in part on the
quality of your writing.
Problem Set #5 - Planning the Project
Question 1.
1. Identify a major public infrastructure project that is either
underway, complete, or proposed in your region. This could be
a bridge, road, building, or something of that nature. For the
project you have identified, think of as many stakeholders and
stakeholder groups as you can. Create a three-column table. In
column 1, list the stakeholders. In column 2, list what each
stakeholder wants to get from the project. In column 3, list the
influence each stakeholder has over the project.
Question 2.
2. How can the stakeholders change over the course of a
project? Give examples of changes in who the stakeholders are,
and in how their interests or influence over the project might
change throughout the term of the project.
Research Paper: PRIVACY POLICIES
1
HEALTH CARE PRIVACY POLICIES
2
Research Paper – Health Care Privacy Policies
Privacy in the health care industry
The healthcare industry's privacy means that what a patient tells
a health care provider, what the health care providers write
down about patients, any medications that patients take, and all
other information related to the patient are kept private. The law
requires that all the health information and medical records of a
patient have to be kept private and safe by all health care and
medical professionals, and all health care facilities, like the
clinics and hospitals (Patil & Seshadri, 2014). In this regard,
the law requires that anything that a patient discusses with the
doctor to be kept confidential and private between the two and
the organization they work for. When a patient goes to a new
doctor, he/she can choose to reveal his/her previous medical
records with other health doctors by giving written consent to
the earlier doctors to send medical information to the new
doctor.
Research question
How do healthcare companies address privacy in their policies?
Background
Most organizations in the health care industry prioritize the
privacy policy in every aspect of their health services. The
organizations selected for this research are Mayo Clinic, United
Health Group, and McKesson Corp. All of these organizations
declare private policies on their website and assure all their
clients/patients that there is no information regarding them or
their heath that will be shared with third parties without their
consent. For Mayo Clinic, it begins its privacy policy by first
defining protected health information, which is any information,
whether paper. Electronic, or oral that is created or received by
Mayo Clinic relating to the health care of a patient or patient
payment about medical services. Therefore, the Mayo clinic
considers the privacy of patients as part of its primary mission
in meeting the patient's needs. It has taken the necessary
precautions against disclosure or inappropriate use of patient’s
medical information.
Similarly, the UnitedHealth Group issues a clear privacy policy
to its clients. It disclaims that there is zero chance that the
information regarding patient health will be shared with third
parties without their consent. The Company's privacy policy
clearly states that its main objective is to adhere to the laws and
regulations regarding the privacy of health care information.
Thus it applies every available resource to ensure that all data
regarding health care of patients are protected and thoroughly
guarded against any public intrusion. The most exciting aspect
regarding the privacy policy is that they outline the few
situations and circumstances under which they are likely to
share the private information regarding the health of the clients,
including when it is a court order, or when the Company is sold
or merged with another company. However, all these situations
will be notified to the individual holder of the information with
a clear explanation of the Company's intentions. McKesson
Corp is also another health organization that commits itself to
guard the private information of their clients. The Company
explains the information that they collect from the customers,
including their health and health-related issues, their personal
contact information, their work environment, and information
that the person shares on the internet. This explanation gives
the patients an insight into the type of information that the
Company has regarding them while assuring them that it will be
kept confidential and private except in some circumstances
where they will be notified in advance.
References
McKesson Corp Privacy notice.
https://www.mckesson.com/About-McKesson/Privacy-Notice/
UnitedHealth Care Group Privacy information.
https://www.uhc.com/privacy
Mayo Clinic Notice of Privacy Practices.
https://mcmapp.mayoclinic.org/content/PrivacyPolicy.htm
Patil, H. K., & Seshadri, R. (2014). Big data security and
privacy issues in healthcare. In 2014 IEEE international
congress on big data (pp. 762-765). IEEE.
Running head: Bibliography on Health Care Industry Privacy
and Security 1
Bibliography on Health Care Industry Privacy and Security 8
Week 4 – Annotated Bibliography
https://mcmapp.mayoclinic.org/content/PrivacyPolicy.htm
The site describes how the Moyo clinic protects the health
information for the patients in their clinic. The preference to
have the security systems for keeping the records helps in
ensuring high security in the health care units. In the health care
units, there are different patients with different diseases and
disorders, which should never be disclosed to the patients as
well for the members of the family. The competence for Moyo
Clinic to reveal the privacy of the information such as the
patient's name, addresses, doctor's, and even the nurses' notes
has generated the entire effort to facilitate the trustworthiness
of the patients from different areas to liaise with the treatment
within the clinic.
According to the manner Moyo clinic service is handling
the patients with a lot of privacy to their records, it has
generated valid and real-valued concerns for the patients to
bring their needs to the doctors. Serving the needs of the
patients is taken as a significant concern and deserves privacy
within the areas as well. In turn, they have taken into
consideration the effort to ensure safer systems that encrypt the
data recorded for the patients concerning their ailments.
Employees of the Moyo clinic only access the information to
perform the expected duties. On the other hand, on violation of
rules, an employee's function may take place and disciplinary
action for the action.
Different systems and machines have been implemented in
today's clinical services and even healthcare facilities. The
methods ensure that the environment is much secure to prevent
leaking of patient's information. The security is guaranteed by
the administration, ensuring the right protocols are adhered to
promptly.
Manogaran, G., Thota, C., Lopez, D., & Sundarasekar, R.
(2017). Big data security intelligence for healthcare industry
4.0. In Cybersecurity for Industry 4.0 (pp. 103-126). Springer,
Cham.
The author of the article talks mostly on big-data issues.
This facilitates the issue of privacy in the clinical facility to
contribute to the confidentiality of data records by the doctors
and nurses to the patients. A concern to enroll the health care
facilities in the system for administration is the biggest role in
the community. In the integrated industries, it is difficult to
generate big data and find out the desired information. The
author of the journal describes the generated data as enormous
and challenging to manage. Therefore, clinics are encouraged to
have systems that are capable of holding extensive data
concerning sensor enrolment.
The large numbers that are tabulated in the clinics are hard
to manage their records as well as to their related details;
therefore, a system that can produce a scalable sensor number of
individuals is proposed. Industrial Internet of Things is valuable
to ensure the right system that can tally and keep records of big
data for a good time. The proposed Meta Cloud Redirection can
process big data and analytics into details for the value of
informative details.
The proposed systems for the healthcare facilities are
essential to accumulate a good record for the patients. The
privacy of the patients can be handled independently in the
systems preventing them from generating abnormal data.
Independent data can be caused by ensuring the improvement of
systems by information technology individuals are reliable to
the members. The essentials are procured in the best manner to
prevent all the measures taken in the health care facility.
Mayo Clinic Notice of Privacy Practices
The practice to produce notices to embrace privacy
contributes so much to the individuals as a measure of reminder
every moment. The concerns are made by the administration to
reinforce the ability to adapt to the environment as a measure of
protecting the patients' records. There are indeed great records
that can be handled by many of the clinical employees, which
are paramount and not supposed to be disclosed as well. The
concern to reinforce the systems that generate notices to the
employees ensures the right assistance for the individuals.
Measures are undertaken once one violates the reinforced
notices, and in turn, a punishment follows.
Moyo clinic procures notices to their employees to
empower them with the right information and let even the
patients know what is desired according to their records'
privacy. The announcement is like a repetitive update to the
employees as it is displaying information on the wall. Once the
information is displayed to the parties, there is no trick to play
around with the patients' details of the records as well.
Therefore, the specific concerns are made to develop at the
Moyo clinic, ensuring that there is an intensive measure to
value the privacy of any document for the patients.
As in the outside environment, notices are kept on the
notice boards to ensure the right follow up procedure to ensure
all rules are adhered to. Newer systems that are developed to
ensure the right privacy and produce pop up notices to the
clinical employees assist a lot in reminding the employees as
well. The notices that are given ahead facilitate the management
of the patient’s data privately highly.
McKesson Corp Privacy notice.
https://www.mckesson.com/About-McKesson/Privacy-Notice/
According to McKesson, the greatest value of privacy is to
the patients, customers, and even the employees who care about
the information they share. Concerning privacy evaluation to
the realistic measure in the advancement of systems'
confidentiality. Relating the documentary released on the notice
of McKesson, the value to keep the top-secret on members' data
concerning the chats and confidential information sharing is
therefore kept highly private. The realization to secure the right
decisions on information sharing enables the systems
measurable to keep records securely. Owning private website
hosts and domains is a measure to ensure that data is secured;
hence a single individual is liable to update.
An oath is essential to the individuals under the care to
ensure the right processes as well as the dominance of
information system hosting and keeping the records. The
decisions are made to evaluate the right decisions as a measure
in advancing the correct details in the documents presented.
Privacy is assured in documents by ensuring the right web
loggings, providing cookies, and ensuring that adverts are
presented to the members accessing. This ensures keeping track
of the members on the site and restricting hacking. The desire to
trace the best accesses to the sites provides encryption to the
hidden data making all seem simpler.
Privacy on the sites is essential and as well as an improved
manner of assuring the right decisions accurately. Access once
retrieving one's data is necessary to ensure the right follow up
as well. In health care units, there is the right decisive measure
to value the weight of decisions. I am therefore making the
proper processions.
Patil, H. K., & Seshadri, R. (2014). Big data security and
privacy issues in healthcare. In 2014 IEEE international
congress on big data (pp. 762-765). IEEE
In the document, the author dictates a paradigm shift in the
health care facility to ensure the right follow up. Once the
issues concerning the big data are settled, a consistent
development is retrieved in the systems to develop a substantial
device that can handle the big data. Migration from reactive to
proactive health care is an excellent deal in approving the right
protocols. The measure of digitizing the medical records is an
excellent change to the individuals and privately kept records.
The transfer to the systems ensures that none of the records is
lost on the way.
According to the sayings, the measure to move from the
old generation of health care to the newer generation ensures
the right strategic ratio in approving the right decisions as well
and for the essentials in the arrangements, acquiring the systems
which are liable to measure the actual generations as a measure
to evaluate the real estates in advancements as well. The
situations in managing the analysis are essential in
technological systems that are capable of handling complex
data. The more complex data in the systems are embraced by the
advancements made to retrieve complex data and ensure the
right tracing. In big data, privacy and security are vital to the
members and the entire health care unit.
The concern to ensure the right generation movement is
caught on track by the improvised systems is essential to the
members as a measure to evaluate the right decisions. To the
newer generations, there is the fact of the transfer of data to the
more modern systems and capable systems as well. The devices
are improvised to ensure the accurate analysis in the proper
manner for excellent future management.
Sethi, S. (2018). Healthcare blockchain leads to transform the
healthcare industry. International Journal of Advanced
Research, Ideas, and Innovations in Technology, 4(1), 607-608.
This journal details on transforming the health care units
in making all things accessible and minimizing the complexity.
The health care industry is more prone to developing and
acquiring the right decisions to ensure an advanced generation
of detailed data. It is believed that the blockchain is capable of
changing the future of the health care industry. Blockchain
encompasses the directives in attaining the desired measures as
well. The desires for the health care industry are manageable in
a single unit enabling development in the tracing manner of the
records. The transformation can be made technologically to
reveal different affairs.
According to the measures of decentralization, the proper
way to undertake the fact of developing the health care industry
in a way that is attractive to the members and the patients. The
blockchain method ensures the procedural tactics in deriving the
real generations on security and holding big data. Privacy is the
most excellent deal in reinforcing the adherence to developing
the right procedures as well. Embracing the right privacy for the
health care industry records is vital to the development of the
affairs as a measure in attaining a manageable number in the
clinics.
Different members have generated different systems that
are more secure to the data and record handling as well. The
desire to ensure the right data handling is essential and
paramount to ensure the right attractions are maintained.
Therefore, the processing of big data is manageable by the
developers of the systems or familiar individuals.
UnitedHealth Care Group Privacy information.
https://www.uhc.com/privacy
A description of personal information is described as very
essential. To the individual facilitation, it is ever necessary to
keep oneself data and records very safe and secure to the
desired generations as well. The way the information is handled
on to the websites and on to the different systems is prone to
leaking and getting known to the undesired destinations.
Therefore, tracking using the cookies and locator methods has
improvised the techniques to settle different desires as well. In
turn, to evaluate the analytical techniques, a desirable measure
to detail out the data is desired to ensure the proper transfer.
Holding on the details is desirable.
The United Health care is an essential facility to ensure
tracking of the patients' records and enabling easy retrieval of
data in the desired manner as well. The concern of advancing
the systems is to ensure that there is no redundancy on data
transmission and posting. The essentiality to ensure the right
decisions on handling complex data and big data is designed
over the sites and posted for rectifications. The desires are
prone to reaching the desired measures as well. Activation of
the systems and advancement of the systems assures the
management of developed productions in the industry.
Different sites over the world are generated and managed
from the same servers, which in turn facilitate the production.
Complex data is handled in different systems making it the right
grounds of growth. The development of state clinics is an
achievement in the handling of operations as well. Results are
attained in practicing the proper process as well in the industry.
Dicussion II – Information Governance
Suppose you were asked to develop an Information Governance
Strategic Plan for your organization, describe the steps you
would take. Be specific.
Reference:
Smallwood, R. F. (2014). Information Governance : Concepts,
Strategies, and Best Practices.
Wiley. ISBN: 9781118218303
APA Format
250 – 350 Words
1 Scholarly Reference.
Discussion I - Data Science and Big Data Analytics.
This week's discussion centers around the concept of
Blockchain. There is still much confusion regarding what
Blockchain is and what it is not. Please discuss your
explanation of Blockchain to include why it has been gaining so
much popularity.
Please make your initial post and two response posts
substantive. A substantive post will do at least TWO of the
following:
· Ask an interesting, thoughtful question pertaining to the topic
· Answer a question (in detail) posted by another student or the
instructor
· Provide extensive additional information on the topic
· Explain, define, or analyze the topic in detail
· Share an applicable personal experience
· Provide an outside source (for example, an article from the UC
Library) that applies to the topic, along with additional
information about the topic or the source (please cite properly
in APA)
· Make an argument concerning the topic.
At least one scholarly source should be used in the initial
discussion thread. Be sure to use information from your
readings and other sources from the UC Library. Use proper
citations and references in your post.
References:
WALDO, J. (2019). A Hitchhiker’s Guide to the Blockchain
Universe. Communications of the ACM, 62(3), 38–42.
https://doi.org/10.1145/3303868
PAVLUS, J. (2018). The World Bitcoin Created. Scientific
American, 318(1), 32–37. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&AuthType=
shib&db=buh&AN=126727561&site=eds-live
Discussion III – Planning the Project
Week 5 – Stake Holder Management
Reflect on the assigned readings for Week 5 and then type a two
page paper regarding what you thought was the most important
concept(s), method(s), term(s), and/or any other thing that you
felt was worthy of your understanding.
Define and describe what you thought was worthy of your
understanding in half a page, and then explain why you felt it
was important, how you will use it, and/or how important it is
in project planning.
Reference:
Watt, A. (2019). Project Management, 2nd Edition. BCcampus
Open Education.
https://opentextbc.ca/projectmanagement/

More Related Content

Similar to 38 C O M M U N I C AT I O N S O F T H E A C M M A.docx

Blockchain- Ammar Ahmad.pdf
Blockchain- Ammar Ahmad.pdfBlockchain- Ammar Ahmad.pdf
Blockchain- Ammar Ahmad.pdfArcadePrinters
 
Exploring blockchain technology and its potential applications for education
Exploring blockchain technology and its potential applications for educationExploring blockchain technology and its potential applications for education
Exploring blockchain technology and its potential applications for educationeraser Juan José Calderón
 
P5 to blockchain or not to blockchain
P5 to blockchain or not to blockchainP5 to blockchain or not to blockchain
P5 to blockchain or not to blockchaindevid8
 
Blockchain. A Guide For Beginners
Blockchain. A Guide For BeginnersBlockchain. A Guide For Beginners
Blockchain. A Guide For BeginnersElifTech
 
SpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceSpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceAlecHo7
 
How Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudHow Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudShikhaKonda
 
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdfHow Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdfPeeterParkar
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of BlockchainSota Watanabe
 
Blockchain: An Innovative Technology
Blockchain: An Innovative TechnologyBlockchain: An Innovative Technology
Blockchain: An Innovative TechnologyIJSRED
 
BASIC INTRODUCTION TO BLOCKCHAIN - JOEL SUMANTH RAJ.pdf
BASIC INTRODUCTION TO BLOCKCHAIN  - JOEL SUMANTH RAJ.pdfBASIC INTRODUCTION TO BLOCKCHAIN  - JOEL SUMANTH RAJ.pdf
BASIC INTRODUCTION TO BLOCKCHAIN - JOEL SUMANTH RAJ.pdfJOELCONTACTS
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
Blockchain mechanism for IET Mauritius Network
Blockchain mechanism for IET Mauritius NetworkBlockchain mechanism for IET Mauritius Network
Blockchain mechanism for IET Mauritius Networkcharles okaformbah
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek Jaiswal
 
Blockchain and the New Internet 25-May-2015
Blockchain and the New Internet 25-May-2015Blockchain and the New Internet 25-May-2015
Blockchain and the New Internet 25-May-2015Doug Callaway
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyNimmy Solomon
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
 
Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper Mike Nejad
 
Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionDSCIITPatna
 

Similar to 38 C O M M U N I C AT I O N S O F T H E A C M M A.docx (20)

Blockchain- Ammar Ahmad.pdf
Blockchain- Ammar Ahmad.pdfBlockchain- Ammar Ahmad.pdf
Blockchain- Ammar Ahmad.pdf
 
Exploring blockchain technology and its potential applications for education
Exploring blockchain technology and its potential applications for educationExploring blockchain technology and its potential applications for education
Exploring blockchain technology and its potential applications for education
 
P5 to blockchain or not to blockchain
P5 to blockchain or not to blockchainP5 to blockchain or not to blockchain
P5 to blockchain or not to blockchain
 
Blockchain. A Guide For Beginners
Blockchain. A Guide For BeginnersBlockchain. A Guide For Beginners
Blockchain. A Guide For Beginners
 
SpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceSpaceChain - Blockchain in Space
SpaceChain - Blockchain in Space
 
How Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The CloudHow Blockchain Technology Is Evolving In The Cloud
How Blockchain Technology Is Evolving In The Cloud
 
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdfHow Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
How Blockchain Technology Is Evolving In The Cloud - GoDgtl.pdf
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of Blockchain
 
Blockchain: An Innovative Technology
Blockchain: An Innovative TechnologyBlockchain: An Innovative Technology
Blockchain: An Innovative Technology
 
BASIC INTRODUCTION TO BLOCKCHAIN - JOEL SUMANTH RAJ.pdf
BASIC INTRODUCTION TO BLOCKCHAIN  - JOEL SUMANTH RAJ.pdfBASIC INTRODUCTION TO BLOCKCHAIN  - JOEL SUMANTH RAJ.pdf
BASIC INTRODUCTION TO BLOCKCHAIN - JOEL SUMANTH RAJ.pdf
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
Blockchain mechanism for IET Mauritius Network
Blockchain mechanism for IET Mauritius NetworkBlockchain mechanism for IET Mauritius Network
Blockchain mechanism for IET Mauritius Network
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
 
Blockchain and the New Internet 25-May-2015
Blockchain and the New Internet 25-May-2015Blockchain and the New Internet 25-May-2015
Blockchain and the New Internet 25-May-2015
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
 
Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper
 
Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 Session
 

More from domenicacullison

5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docx5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docxdomenicacullison
 
5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docx5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docxdomenicacullison
 
5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docx5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docxdomenicacullison
 
4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docx4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docxdomenicacullison
 
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docxdomenicacullison
 
5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docx5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docxdomenicacullison
 
4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docx4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docxdomenicacullison
 
492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docx492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docxdomenicacullison
 
4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docx4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docxdomenicacullison
 
47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docx47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docxdomenicacullison
 
4To Replace with name Comment by Sharon Rose Use down ar.docx
4To  Replace with name Comment by Sharon Rose Use down ar.docx4To  Replace with name Comment by Sharon Rose Use down ar.docx
4To Replace with name Comment by Sharon Rose Use down ar.docxdomenicacullison
 
5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docx5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docxdomenicacullison
 
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docxdomenicacullison
 
5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docx5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docxdomenicacullison
 
5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docx5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docxdomenicacullison
 
5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docx5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docxdomenicacullison
 
465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docx465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docxdomenicacullison
 
450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docx450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docxdomenicacullison
 
459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docx459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docxdomenicacullison
 
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docxdomenicacullison
 

More from domenicacullison (20)

5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docx5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docx
 
5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docx5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docx
 
5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docx5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docx
 
4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docx4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docx
 
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
 
5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docx5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docx
 
4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docx4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docx
 
492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docx492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docx
 
4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docx4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docx
 
47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docx47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docx
 
4To Replace with name Comment by Sharon Rose Use down ar.docx
4To  Replace with name Comment by Sharon Rose Use down ar.docx4To  Replace with name Comment by Sharon Rose Use down ar.docx
4To Replace with name Comment by Sharon Rose Use down ar.docx
 
5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docx5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docx
 
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docx
 
5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docx5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docx
 
5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docx5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docx
 
5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docx5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docx
 
465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docx465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docx
 
450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docx450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docx
 
459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docx459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docx
 
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

38 C O M M U N I C AT I O N S O F T H E A C M M A.docx

  • 1. 38 C O M M U N I C AT I O N S O F T H E A C M | M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3 practice I T I S D I F F I C U LT these days to avoid hearing about blockchain. Blockchain is going to be the foundation of a new business world based on smart contracts. It is going to allow everyone to trace the provenance of their food, the parts in the items they buy, or the ideas they hear. It will change the way we work, the way the economy runs, and the way we live in general. Despite the significant potential of blockchain, it is also difficult to find a consistent description of what it really is. A recent Google search for “blockchain technical papers” returned nothing but white papers for the first three screens; not a single paper is peer-reviewed. One of the best discussions of the technology itself is from the National Institute of Standards and Technology, but at 50-plus pages, it is a bit much for a quick read.9 The purpose of this article is to look at the basics of blockchain: the indi- vidual components, how those com- ponents fit together, and what changes might be made to solve some of the problems with blockchain technology. This technology is far from monolithic; some of the techniques can be used (at surprising savings of resources and ef-
  • 2. fort) if other parts are cut away. Because there is no single set of technical specifications, some systems that claim to be blockchain instances will differ from the system described here. Much of this description is taken from the original blockchain paper.6 While details may differ, the main ideas stay the same. Goals of Blockchain The original objective of the block- chain system was to support “an elec- tronic payment system based on cryp- tographic proof instead of trust …”6 While the scope of use has grown con- siderably, the basic goals and require- ments have remained consistent. The first of these goals is to ensure the anonymity of blockchain’s users. This is accomplished by use of a pub- lic/private key pair, in a fashion that is reasonably well known and not rein- vented by the blockchain technology. Each participant is identified by the public key, and authentication is ac- complished through signing with the private key. Since this is not specific to blockchain, it is not considered further here. The second goal is to provide a pub- lic record or ledger of a set of transac- tions that cannot be altered once veri-
  • 3. fied and agreed to. This was originally designed to keep users of electronic currency from double-spending and to allow public audit of all transactions. The ledger is a record of what transac- tions have taken place, and the order of those transactions. The use of this ledger for verification of transactions other than the exchange of electronic cash has been the main extension of the blockchain technology. The final core goal is for the system A Hitchhiker’s Guide to the Blockchain Universe D O I : 1 0 . 1 1 4 5 / 3 3 0 3 8 6 8 Article development led by queue.acm.org Blockchain remains a mystery, despite its growing acceptance. BY JIM WALDO http://dx.doi.org/10.1145/3303868 M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3 | C O M M U N I C AT I O N S O F T H E A C M 39 I
  • 5. T E S /S H U T T E R S T O C K to be independent of any central or trusted authority. This is meant to be a peer- or participant-driven system in which no entity has more or less authority or trust than any other. The design seeks to ensure the other goals as long as more than half of the mem- bers of the participating community are honest. Components of Blockchain While there are lots of different ways to implement a blockchain, all have three
  • 6. major components. The first of these is the ledger, which is the series of blocks that are the public record of the trans- actions and the order of those transac- tions. Second is the consensus proto- col, which allows all of the members of the community to agree on the values stored in the ledger. Finally, there is the digital currency, which acts as a reward for those willing to do the work of ad- vancing the ledger. These components work together to provide a system that has the properties of stability, irrefut- ability, and distribution of trust that are the goals of the system. The ledger is a sequence of blocks, where each block is an ordered se- quence of transactions of an agreed- upon size (although the actual size varies from system to system). The first entry into a block is a cryptographic hash (such as those produced by the Secure Hash Algorithm SHA-256) of the previous block. This prevents the contents of the previous block from be- ing changed, as any such change will alter the cryptographic hash of that block and thus can be detected by the community. These hash functions are easy to compute but (at least to our cur- rent knowledge) impossible to reverse. So once the hash of the contents of a block is published, anyone in the com-
  • 7. munity can easily check that the hash is correct. So far, this is nothing new; it is sim- ply a Merkle chain, which has been in use for years. The wrinkle in block- chain is that the calculation of the hash needs to add a nonce (some random set of bits) to the block being hashed until the resulting hash has a certain number (generally six or eight) of lead- ing zeros. Since there is no way to pre- dict the value that will give that num- ber of leading zeros to the hash, this is a brute-force calculation, which is ex- ponentially difficult on the number of zeros required. This makes the calcula- tion of the hash for the block computa- tionally difficult and means any mem- ber of the community has the chance of coming up with an acceptable hash with a probability that is proportional to the amount of computing resources the member throws at the problem. 40 C O M M U N I C AT I O N S O F T H E A C M | M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3 practice for the calculation of the next block in the chain. This requires an incentive mechanism, which is where the third component of the blockchain universe
  • 8. enters the picture: digital currency. Digital currency. The reason for a miner to do all the computational work to calculate the nonce and hash of a block is that the first to do so gets an al- location of digital currency as the first transaction in the next block. This also encourages other miners to accept a block as quickly as possible, so they can start doing the work to hash the next block (which has likely been filled with transactions during the time it took to hash the previous block). Bitcoin was the original blockchain currency and in- centive; in September 2017 the reward for hashing a block was 12 bitcoins8 when the exchange rate was 1 bitcoin = ~$4,500 U.S. (prices fluctuate rather wildly). This reward halves (for bitcoin) every 210,000 blocks. The next halving is expected around May 25, 2020.1 Other digital currencies work in a similar fashion. To spend the currency, entries are made in the then-current block, which acts as a ledger of all the currency exchanges for a particular ledger/digital coin combination. Problems with Blockchain While blockchain was originally pro- posed as a mechanism for trustless digital currency, its uses have expand- ed well beyond that particular use case. Indeed, the emphasis seems to have bi-
  • 9. furcated into companies that empha- size the original use for currency (thus the explosion of initial coin offerings, which create new currencies) and the use of the ledger as a general mecha- nism for recording and ordering trans- actions. For the first use, the claim is that blockchain can replace outdated notions of currency and allow a new, private, friction-free economy. For the latter use, the claim is that blockchain can be used to track supply chains, cre- ate self-enforcing contracts, and gen- erally eliminate layers of mediation in any transaction. Both of these kinds of uses pres- ent some serious problems. Many are problems any new technology encounters in replacing entrenched interests, but a number of them are technical in nature; those are the ones discussed here. Coming up with the hash and the right nonce is a proof of work (and, perhaps, luck) that can be easily verified by any- one in the community. Those attempt- ing to calculate the right hash value for a block are the miners of the block- chain world; they are exchanging com- putation for pay. Once a miner comes up with the right nonce that produces the right hash, they broadcast the result to the rest of the
  • 10. community, and all miners start work on the next block. The first entry in the new block will be the hash of the last block, and the second entry in the block will be the creation of some amount of currency assigned to the miner who found the hash for the previous block. This works only if you have a block to start the chain. This is done in the same way all systems get started: by cheating and declaring a block to be the Genesis block. It is possible that two different min- ers could both find, at the same time (or close enough), a nonce that gives a candidate hash value with the right number of leading zeros, or that some- one seeing a nonce that works could claim the discovery as their own. There could even be two different blocks be- ing proposed as the next entry in the chain. Dealing with such issues re- quires the next component of the sys- tem: the consensus protocol. Consensus protocols are among the most-studied aspects of distributed systems. While it was proved some time ago that no algorithm will guaran- tee consensus if there is a possibility of any kind of failure,3 a number of well- known protocols such as Paxos4 have been used in systems for some time to give highly reliable mechanisms for
  • 11. distributed agreement. In consensus protocols such as Paxos, however, it is assumed the systems that must reach agreement are known. Depending on the failure model used, the number of systems that must agree to reach consensus changes. When a majority of systems agree in such a protocol (for some definition of majority), consensus has been reached in systems that want to protect from non-byzantine failure. If the system is subject to byzantine failure, then two- thirds of the systems (plus one) need to agree. While the voting can be done in peer-to-peer systems, most efficient versions of the algorithms depend on a leader to initiate the voting and tally the results. In the blockchain universe, how- ever, there is a trust-free system, which means there can be no leader. Further, in the blockchain universe the number of systems participating in validating the transactions (that is, finding a hash for the block with the right number of zeros in the prefix) is not known. This makes claims that a block is accept- ed when 51% of the miners agree on the block nonsense, since there is no known value for the number of entities trying to agree.
  • 12. Instead, the majority is determined by the calculation of the hash for the next block. Since that block begins with the hash of the previous block, and since the likelihood of the next block’s hash being calculated is pro- portional to the amount of computing resources trying to calculate the ap- propriate hash for the next block, if a majority of the computing power avail- able to the miners starts to work on a block that is seeded with the previous hash, then that block is more likely to be offered as the next block. This is the reason for consensus being tied to the longest chain, as that chain will be pro- duced by the largest number of com- puting resources. This mechanism relies on the gen- eration of a hash with the right set of leading zeros being genuinely random. Being random also means that on oc- casion someone will get lucky and a chain that is being worked on by a mi- nority of the miners will be hashed ap- propriately before a chain that is being worked on by a larger amount of com- puting resources. In an important sense, however, this does not matter. The blockchain uni- verse defines a majority as the produc- tion of an appropriate nonce and hash. Sometimes this means more than half of the computing power has worked on
  • 13. the problem, but other times it might mean only one (exceptionally lucky) miner got the answer. This might mean a set of transactions in a block that is not verified first need to be rolled back, but that is the nature of in-flight trans- actions. It does mean all of the miners in the blockchain universe need to move to a newly hashed block as the basis M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3 | C O M M U N I C AT I O N S O F T H E A C M 41 practice A number of criticisms of block- chain center on the mechanism used to create an accepted hash for a block. To ensure this can be discovered by anyone, the mechanism needs to be one that takes significant computation but can be easily verified. To ensure the blocks that are verified cannot be changed, the computation needs to be impractical to reverse. Hashing the block using a function such as SHA-256 and requiring that a nonce value is add- ed until some number of leading zeros appears in the hash fits these charac- teristics nicely. This very set of require- ments, however, means the consensus mechanism has intrinsic limitations.
  • 14. Scaling. An obvious worry about the consensus-by-hashing mechanism used in blockchain is whether the tech- nology can scale to the levels needed for more general use. According to blockchain.com, the number of con- firmed transactions averages around 275,000 per day, with a peak over the last year of about 380,000.2 This is an impressive number but hardly the 400,000 transactions per minute that major credit-card systems perform on peak days. Blocks can currently be veri- fied at a rate of four to six per second, and this is the limiting factor on the number of transactions. While there are a number of pro- posals to deal with scaling block- chain, it is unclear how these fit with the base design of the system. Making the verification of a block difficult and random is an important aspect of the basic design of blockchain; this is the proof of work that is at the core of the trustless consensus algorithm. If the verification of a block is made easier, then the probabilistic guarantees of any miner being able to discover the appro- priate hash decreases, and the possibil- ity of some miner with a large amount of computing taking over the chain in- creases. Verifying a block is meant to be hard; that’s how the system avoids hav- ing to trust any particular member or
  • 15. set of members. One mechanism suggested for scal- ing is to shard the blockchain into a number of different chains, so that transactions can be done in parallel in different chains. This is happen- ing in the different coin exchanges; each coin system can be thought of as a separate shard. This introduces its own complexity in order to have a transaction that crosses these shards, since the notion of ensured consis- tency requires that all ledgers are self-contained to allow consistency checking within each ledger. A new blockchain could be created to be used for cross-blockchain transac- tions, but the incentive mechanism for that blockchain would be a new electronic currency that would need to stay within the ecosystem of this new blockchain. Getting the interact- ing blockchains to trust the mediating blockchain is an unsolved problem. There have also been attempts to use some mechanism other than proof of work to drive the consensus protocol. Perhaps the best known of these is the proof-of-stake approach, in which a block can be calculated in much simpler ways, and consensus is reached when those with a majority of the currency agree on the hashing of
  • 16. the block. Since the amount of curren- cy and its owners are known, this is not subject to the problem of not knowing the members of the community to vote. But this does reintroduce the notion of trust to the system; those who have more money have more of a stake, and therefore are trusted more than those who have less of a stake. This is the electronic equivalent of an oligarchy, which has not worked particularly well in the past but might prove more stable in this context. Power consumption. A second criti- cism of blockchain technology that is an outgrowth of the consensus mech- anism is the amount of energy con- sumed in the discovery of an appro- priate hash for a block. Calculating a hash with the appropriate number of leading zeros requires many hashing calculations, which in turn burn a lot of electricity; some have claimed that bitcoin and related cryptocurrencies are mechanisms to transform elec- tricity into currency. The estimates of how much electricity is consumed range from the low side stating that it is about as much as is used by the city of San Jose, CA, to the high side that it is equivalent to Denmark’s power consumption. No matter which model is used for the calculation, the answer is large.
  • 17. The hope is that this energy drain will diminish, perhaps by changing the While blockchain was originally proposed as a mechanism for trustless digital currency, its uses have expanded well beyond that particular use case. 42 C O M M U N I C AT I O N S O F T H E A C M | M A R C H 2 0 1 9 | V O L . 6 2 | N O . 3 practice known cryptographic protocols could be done in a number of ways. Doing it on top of a system such as blockchain is needed if the requirement that the system be trustless (except for trusting the software) is added. Such a trustless system comes with a cost. Whether the cost is worth it is a de- cision that requires an understanding of the various parts of the system and how they interact. A public, unforge- able, unchangeable ledger is possible without cryptocurrency or a consensus algorithm based on a difficult-to-com- pute one-way function that is easily ver-
  • 18. ified. Cryptocurrencies can be created without the use of either a public led- ger or a trustless consensus algorithm. And consensus algorithms can be cre- ated that do not require a financial in- centive system or a public ledger. Related articles on queue.acm.org Bitcoin’s Academic Pedigree Arvind Narayanan and Jeremy Clark https://queue.acm.org/detail.cfm?id=3136559 Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning https://queue.acm.org/detail.cfm?id=3043967 Certificate Transparency Ben Laurie, Google https://queue.acm.org/detail.cfm?id=2668154 References 1. Bitcoinblockhalf.com. Bitcoin block reward halving countdown. 2. Blockchain.com. Confirmed transactions per day, 2018; https://www.blockchain.com/charts/n-transacti ons?daysAverageString=7. 3. Fischer, M., Lynch, N.A., Paterson, M. Impossibility of distributed consensus with one faulty process. JACM 32,2 (1985), 374–382.
  • 19. 4. Lamport, L. The part-time parliament. ACM Trans. Computer Systems 16, 2 (1998), 133–169. 5. Morris, D.Z. Bitcoin is in wild upheaval after the cancellation of the Segwit2x fork. Fortune (Nov. 12, 2017); http://fortune.com/2017/11/12/bitcoin- upheavel-segwit2x-fork/. 6. Nakamoto, S. Bitcoin, a peer-to-peer electronic cash system, 2008; https://bitcoin.org/bitcoin.pdf. 7. Thompson, K. Reflections on trusting trust. Commun. ACM 27, 8 (Aug. 1984), 761–763; https://dl.acm.org/ citation.cfm?id=358210. 8. Trubetskoy, G. Electricity cost of 1 bitcoin (Sept. 2017); https://grisha.org/blog/2017/09/28/electricity-cost- of-1-bitcoin/. 9. Yaga, D., Mell, P., Roby, N., Scarfone, K. Blockchain technology overview. NISTIR 8202 (Oct. 2018). National Institute of Standards and Technology; https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST. IR.8202.pdf. Jim Waldo is a professor of the practice of computer science at Harvard University, where he is also the chief technology officer for the School of Engineering, a position he assumed after leaving Sun Microsystems Laboratories. Copyright held by author/owner. Publication rights licensed to ACM. hardware used for the hashing to some- thing far more efficient (such as special- ized ASICs). Making the hashing pro-
  • 20. cess more efficient, however, is at odds with blockchain’s fundamental mecha- nism of trusting no one; the point is that the verification of a block must be difficult and random so that any miner is equally likely to find the hash. The energy consumption might be less worrisome if the calculations eating all of this power were gener- ally useful. [email protected], for example, uses a considerable amount of energy by offloading analysis of background radio-wave transmissions to Internet- connected computers. This initiative, based at UC Berkeley’s SETI (Search for Extraterrestrial Intelligence) Research Center, is trying to find signs of other intelligent life in the universe, which is seen by the participants as worth doing (and paying for the extra electricity). Perhaps the calculation used to ver- ify the blockchain could be changed to something that offered more than just verification of the blockchain. Such a calculation would need to have the properties of being equally possible for all miners to find (given equality of computing resource), difficult to find, and easy to verify. It is not clear what this calculation might be. Trust. Perhaps the most problem- atic aspect of blockchain is its core notion of being trustless. Much of the
  • 21. complexity of the technology is caused by this requirement. It is unclear, how- ever, that this is even necessary for the kinds of uses people talk about as core to blockchain, or that the system is ac- tually free of trust. It is because of the lack of trust that the system requires verification of the block to be computationally difficult, one-way, and easy to verify. If this requirement of trustlessness were dropped, then production of a public ledger that was unchangeable and easily verified could be done eas- ily. Suppose such a ledger is to be used for inter-bank transfer (which has been suggested as a use for blockchain). In- stead of a trustless system, however, the users decide to trust a consortium of major banks, the Federal Reserve Board, and some selection of consum- er watchdog agencies or organizations. This consortium could choose a mem- ber (perhaps on a rotating basis) who is responsible for keeping the ledger (a leader). Transactions are written to the ledger, and when the ledger block reaches an appropriate size, the lead- er hashes the ledger, uses the hash to start a new block, and continues (just as in the current blockchain). The difference is that there is no need for the leader to randomly try val-
  • 22. ues added to the block until the right number of leading zeros is produced in the hash. Without that requirement, the hash can be done very quickly with little energy expense. The block still can’t be changed (since the hash is still a one-way function), and any member of the consortium (or anyone else who has access to the ledger) can quickly check the hash. A public, verifiable, and unchangeable ledger can be pro- duced in this way but at much lower cost in both time and energy. This does require trust in the various members of the consortium, but verify- ing that the consortium is not cheat- ing on the hashing of a block would be easy. This is not a fully centralized trust in a single entity but, rather, trusting a group. The larger and more varied the group, the less likely the group would collude. Note also that such a system does not need an incentive mechanism such as a digital currency to operate. Who Do You Trust? Maybe you really do not want to trust anyone. Calibrating paranoia is diffi- cult, and perhaps you really do want to have an economic system in which no specifiable set of entities has the ability to collude and control the system. That is the real reason for blockchain. As Ken Thompson pointed out in
  • 23. 1984, trust has to happen somewhere.7 Even if you do not trust any group to calculate the blocks, you need to trust the developers of the software being used to manage the blocks, the ledgers, and the rest. Everything from bugs to design changes5 in the software have led to forks in the bitcoin ecosystem that have caused considerable churn in those systems. If your trust is in the security and solidity of the code, that is a choice you make. But it is not a trust- less system. A public, nonrefutable, unalter- able ledger for transactions could be a useful tool for a number of applica- tions. Building such a system on top of Copyright of Communications of the ACM is the property of Association for Computing Machinery and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. THE WORLD BITCOIN CREATED THE FIRST BIG DIGITAL CURRENCY GAVE US A
  • 24. GLIMPSE OF A NEW ECONOMIC ORDER—ONE THAT RAISES MORE QUESTIONS THAN ANSWERS BITCOIN. CRYPTOCURRENCIES. SMART CONTRACTS. MANY PEOPLE HAVE NOW heard of the rapidly changing ecosystem of financial technology, but few have wrapped their heads around it. Hundreds of central banks and corporations are incubating a game- changing technology called blockchain—and investors are betting billions on it. Yet only 24 percent of global financial services professionals surveyed in 2017 by PricewaterhouseCoopers (PwC) described themselves as “extremely” or “very” familiar with it. Much of the public is unsure if any of this is legal, if they understand it at all. Evangelists say it has the power to upend entire economic systems; others, such as Emin Gün Sirer, a block-chain researcher at Cornell University, warn that while the technical core is “fascinating and disruptive, there’s also a lot of hokum out there.” How to parse the nuance—or get a handle on what a blockchain is? It all starts with Satoshi Nakamoto, the world’s most reclusive pseudonymous billionaire. In October 2008 Nakamoto published a paper via an obscure Internet mailing list detailing a design for the world’s first blockchain: a public database distributed and synchronized every 10 minutes across thousands of computers, accessible to anyone and yet hackable by no one. Its purpose? To provide a decentralized, bulletproof record of exchange for a new digital currency Nakamoto called Bitcoin. Until that point, the trouble with “peer-to-peer electronic cash” was that nobody could reliably prevent you from spending it twice. Block-chain technology changed all that by inscribing every transfer of Bitcoin into
  • 25. a “distributed ledger”—a kind of digital spreadsheet that, thanks to the laws of mathematics and cryptography, was more inviolable than carving it in stone. The Economist dubbed it “the trust machine.” The technology that underpins Bitcoin quickly outgrew it, driving a frenetic period of innovation. Think of blockchain as a scaffolding that can hold any data that need secure provenance: financial histories, ownership documents, proofs of identity. This “worldwide ledger”—as Don Tapscott, co-author of Blockchain Revolution, calls it—is a blank slate. But the technology, imperfect as it is, can be tapped for evil, too, and some are pumping the brakes on the frenzy. Here’s a guide to the digital landscape that Satoshi Nakamoto—whoever he is—has thrust before us. CORE CONCEPTS CRYPTOCURRENCY A form of digital currency that relies on the mathematics of cryptography to control how and when units of the currency are created and to ensure secure transfer of funds. PEER-TO-PEER (P2P) NETWORK A web of computers linked in a decentralized way, such that any computer can communicate directly with any other without going through a central server or other administrator. Napster, the network for sharing music files that launched in the late 1990s, popularized the concept. NODE A computer connected to a P2P network. The Bitcoin network currently has thousands of nodes spread across the globe. DISTRIBUTED LEDGER A list of recorded, time-stamped
  • 26. transactions that is simultaneously broadcast, copied and verified via consensus across many different computers in a P2P network. If every node in the network has an identical copy of the ledger, falsified entries or corrupted versions can be easily detected. BLOCK A grouping of individual transaction records on a blockchain. On the Bitcoin network, new blocks are added to the chain every 10 minutes. HASHING A cryptographic method that uses a mathematical function to condense any amount of data into a unique string of alphanumeric characters of a certain fixed length—called a hash value. This creates an easily verifiable digital fingerprint for the hashed data. If even a single bit of the original data is changed or corrupted, the fingerprint that emerges from the hash function will be drastically different, making it easy to http://eds.a.ebscohost.com/eds/delivery?sid=4d7023a5-8a77- 44cb-88c8- 0a64f6737b8d%40sessionmgr4008&vid=10&ReturnUrl=http%3a %2f%2feds.a.ebscohost.com%2feds%2fdetail%2fdetail%3fvid% 3d5%26sid%3d4d7023a5-8a77-44cb-88c8- 0a64f6737b8d%40sessionmgr4008%26bdata%3dJkF1dGhUeXBl PXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#toc detect errors or tampering. Hashes are also “one-way”—the data cannot be reassembled or extracted from the fingerprint. MINING The process by which nodes of a cryptocurrency network compete to securely add new blocks of transactions to a blockchain. Units of the currency are the reward—and hence, a financial incentive to
  • 27. ensure security. Mining involves downloading the latest version of the blockchain’s transactions for verification, then using brute-force computation to randomly search for the solution to a difficult mathematical puzzle created via hashing. The first node to discover the correct solution “mines” that block, adding it to the blockchain and claiming the reward associated with it. Humans control nodes, but the competition has nothing to do with skill: simply, the more raw computing power a miner applies toward the solution, the more likely he or she is to find it—a process called proof of work. HOW BLOCKCHAIN WORKS How does digital currency—or any data—reliably pass back and forth on a decentralized network full of strangers that don’t have a reason to trust one another at all? By generating a permanent ledger of transactions that can’t be changed by any single network member. 1 A blockchain transaction begins with one party agreeing to send data to another. These data could be anything. But because the point of a blockchain is to create a permanent, verifiable record of exchange, the data usually represent some valuable asset. Common examples: units of a cryptocurrency or other financial instrument; contracts, deeds or records of ownership; medical information or other identity data. peer network of computers operating the blockchain. Every node on the network is equipped with a procedure for verifying whether the transaction is valid or not. (In a Bitcoin transaction, for example, the
  • 28. network would verify whether those paying actually have the amount of Bitcoins they say they do.) Once the network has reached a consensus, algorithms package up the validated transaction with other recent transactions into a block. hashing the data inside it, together with two other pieces of information: the fingerprint of the preceding block and a random number called a nonce. s added to the blockchain with a digital fingerprint that also mathematically encodes the validated fingerprints of every block preceding it. These nested fingerprints make the blockchain increasingly secure with every new block that gets added because altering a single bit of information anywhere in the blockchain would drastically change not only the fingerprint of that particular block but every subsequent one in the chain as well. another for the right to add the new block to the blockchain. Their computers perform a tedious set of hash based calculations over and over again by trial and error, hoping to generate a solution that satisfies an arbitrary rule defined by the network. (On the Bitcoin blockchain, the miners are searching for solutions—or “hash values”—that have a particular number of zeros at the beginning.) Whoever is first to complete this proof of work process and find the matching solution successfully “mines” that block, earning a financial reward. AS AN ALTERNATIVE: Proof of work mining is energy intensive, so some new blockchains are doing away with it, instead using a preapproved network of “validator”
  • 29. nodes who can notarize transactions via an alternative process called proof of stake. Because this process doesn’t rely on difficult hashing calculations, it uses much less computing power (and much less electricity). BLOCKCHAIN DEMYSTIFIED: FREQUENTLY ASKED QUESTIONS ABOUT A RAPIDLY EXPANDING TOPIC 1. ARE BITCOIN AND BLOCKCHAIN THE SAME? No, but it’s easy to get them confused because they both came into public awareness in 2008, when Satoshi Nakamoto published his paper describing how to implement them simultaneously. Bitcoin is one type of cryptocurrency. What people call “blockchain” is a technology that makes Bitcoin possible—an infrastructure that can be used for tracking many types of transactions. Blockchain technology exists without Bitcoin—but not the reverse. Think of Bitcoin as a kind of application that runs “on” the blockchain, much like Web sites run on the Internet. 10% Predicted amount of the world’s gross domestic product that will be stored in blockchain based technology by 2025, according to a 2015 survey report from the World Economic Forum. WHO IS USING BLOCKCHAIN TECHNOLOGY? FINANCIAL INSTITUTIONS: Global banks and investment institutions are researching and pursuing blockchain projects, sometimes joining forces in consortiums.
  • 30. Since 2012 Ripple has been a thriving, blockchain-based system for settling international transactions among banks. Start-ups such as Bloom intend to deploy blockchains to credit reporting, hoping to end data breaches like the Equifax hack. GOVERNMENTS: Delaware and Illinois use distributed ledgers for birth certificates. A Vermont law allows blockchain technology to verify the authenticity of legal documents. Dubai integrated blockchains into many of its administrative services, such as obtaining licenses. In 2016 Tunisia began issuing a blockchain- backed version of its digital national currency called the eDinar. TECH ENTREPRENEURS: The Ethereum network—which was designed to support new applications, rather than just a digital cash ecosystem like Bitcoin—is like an App Store for blockchain start-ups. Hundreds of projects and businesses are running on it. One notable: We Power wants to let households buy and sell renewable energy (from, say, roof-mounted solar panels) directly to one another. COPYRIGHT AND IP HOLDERS: U.K. musician Imogen Heap started Mycelia, a tech incubator that tracks metadata associated with creative works, cutting out intermediaries like iTunes. NONPROFITS AND AID GROUPS: The BitGive Foundation is boosting the accountability of philanthropic giving. And the United Nations World Food Program is streamlining how it tracks and delivers assistance to Syrian refugees in Jordan. ACADEMIC INSTITUTIONS: Forget sheepskins. The
  • 31. Blockcerts project wants to make all manner of academic and professional credentials more trustworthy and shareable. ASSET MANAGERS: London-based Everledger is targeting the diamond industry by recording the attributes and provenance of each precious stone. Fine wine and art are tracked, too. JOURNALISTS: To push back against fake news, Civil gives news makers a platform to create ad-free, inalterable journalism that’s immune to outside interests (Russia; Facebook) and supported by readers. REGULAR PEOPLE: For migrant workers who send money to their families back home, using Bitcoin costs less than using Western Union, which is why an estimated 20 percent of international remittances between South Korea and the Philippines now rely on it. It’s not just for cyber libertarians, and it goes way beyond finance. Here’s an incomplete lineup: WHY WOULD YOU USE A CRYPTOCURRENCY INSTEAD OF A NATIONAL CURRENCY? Imagine holding a $100 bill that buys only $50 worth of goods. In Venezuela, where the official currency is crashing in value, that scenario is a reality. “You’re losing something like half of the value of your net income every year to hyperinflation,” says venture capitalist Morris. “People are thinking: ‘How can I stop that?’ And they’re buying Bitcoin.” Why would a hard-to-understand cryptocurrency with no government guaranteeing its value as “legal
  • 32. tender” seem like a better bet than a more traditional value- holding commodity such as gold? For one thing, converting Venezuelan bolivars into Bitcoin is simply a lot easier for ordinary folks—anyone with access to the Internet can do it. Because Bitcoin has no physical form, you don’t have to stash it somewhere unsafe— like a mattress or, in Venezuela’s case, a bank. Of course, Bitcoin doesn’t have a stable value, either. But while the bolivar has nose-dived, the value of a Bitcoin is at least trending ever upward. In a country where inflation is expected to exceed 2,300 percent in 2018 (according to the International Monetary Fund), it seems like a reasonable risk to take. Zimbabweans have the opposite problem. After ditching its own currency for the U.S. dollar, the country now relies on currency imports to run its economy—and it’s facing a shortage. Bitcoin is now common enough that it’s even accepted by car dealers. 2 WHERE DOES THE VALUE OF A CRYPTOCURRENCY COME FROM? Some experts say that a cryptocurrency like Bitcoin has value because of its security (the Bitcoin blockchain has never been hacked—yet) or its mathematically imposed “scarcity” (a fixed supply of 21 million Bitcoins means they can never be devalued by “printing more money”). Others say that they have intrinsic value because mining them is tedious work that makes the network stronger—in other words, there’s value in ef ort. But what about cryptocurrencies that aren’t mined? According to Christian Catalini of the Massachusetts
  • 33. Institute of Technology, “value comes from consensus. We all agree it has value.” In this sense, cryptocurrencies may have more in common with social networks than with central banks. “Money is a way for society to keep track of checks and balances,” Catalini says. “If cryptocurrencies end up being a better way to track information,” their value is secured—whether they represent a physical asset or just a number. 77% of the global financial services industry is expected to adopt blockchain as part of a production system or process by 2020, according to PwC. SO, BITCOIN: THE FUTURE OR A FLASH IN THE PAN? Bitcoin is the world’s most popular digital currency. But it’s also wildly speculative, and many financial experts point to its legendary volatility: the currency’s value has risen more than 10-fold since 2016, but it lost 40 percent of its value in a span of two weeks in September 2017—only to regain (and surpass) it just as quickly. (Who knows what it will be by the time you read this.) To others, the network’s technical limitations—it is sluggish at handling transactions—combined with its unsustainable mining costs make it the equivalent of a financial time bomb. “We don’t bet on Bit-coin,” says Charlie Morris, chief investment officer of Next-Block Global, a firm that invests in blockchain technology. Bitcoin legitimized the basic economics of a global cryptocurrency. But the next-largest “altcoin” may have more staying power: Ether is less a cash like currency than a “blockchain asset,” as Morris calls it, used to power and secure the Ethereum network. Much like renting
  • 34. virtual servers in Google’s “cloud,” developers who want to create applications using Ethereum’s blockchain must pay for access in tokens of Ether. The more useful Ethereum becomes as a mainstream platform, the more stable and valuable Ether becomes, too. New currencies and platforms are very likely to emerge— the race for prominence has only just begun. ARE WE FACING THE END OF CASH? It may seem that printed money is headed for the same fate as newspapers. But experts say that cash is far from dead. “We’re still using great piles of paper to pay for things like international shipping of sea containers,” says Vinay Gupta, CEO of Mattereum, a legal services firm for smart contracts. “The system is not so broken that people are willing to tear it up.” The trouble with Bitcoin and Ether is that while they can function as a store of value or unit of exchange, they’re not accepted as legal tender in enough places to compete with cash. In places such as Kenya, where few people have traditional bank accounts and “mobile money” services such as M-Pesa have made saving and sending money by phone much easier than exchanging physical cash, cryptocurrencies might seem like a natural fit. But mining still requires a lot of processing power—not a common resource in Africa, where inexpensive feature phones outsell smartphones and not many own PCs. The computations required to secure blockchain transactions could, in theory, happen on “your old Nokia SIM card,” Gupta says. Still, cold, hard paper won’t soon disappear.
  • 35. 3. IS THE BLOCKCHAIN A NEW KIND OF INTERNET? Not quite, because the blockchain itself requires the Internet to support and maintain its peer-to-peer network. It’s also important to note that when people talk informally about “the” blockchain, they’re almost always referring to the specific system that Nakamoto implemented to support Bit-coin. The Bitcoin blockchain was the first distributed ledger system that didn’t require a centralized server or organization to support it. It’s still one of the biggest: as of November 2017 it contains more than 130 gigabytes (140 billion bytes) of information, and every new transaction increases its size. But that’s still many orders of magnitude smaller than the amount of data on the Internet, which is estimated to be on the yottabyte scale (1024, or septillions of bytes). IS THE BLOCKCHAIN A NEW KIND OF INTERNET? IF CRYPTOCURRENCIES ARE DIGITAL, WHAT POWERS THEM? Just because cryptocurrencies have no physical attributes doesn’t mean that there’s no cost to using them. The intentionally effortful process by which new Bitcoins are “mined”—how new transactions are added to the ledger—requires that the entire P2P network cycle through a mind-boggling number of random computations to validate blockchain transactions. All of that processing requires energy. How much energy? Start with the amount of computation. In late 2017 the Bitcoin network’s “hash rate” was around 10 exahashes—that’s 10 million trillion calculations—per second. Deriving a precise energy
  • 36. estimate from that figure is impossible because the network, being decentralized, can’t account for individual nodes. But credible estimates peg the Bitcoin network’s annual electricity consumption at around 27 terawatt-hours—roughly equivalent to that of Ireland. To put that in perspective, producing a year’s worth of Bitcoin alone requires the equivalent of burning about 11 million tons of coal, which pours nearly 29 million tons of carbon dioxide into the atmosphere. Fueling Bitcoin by solar power would require harnessing more than half of the entire U.S.’s annual utility-scale solar capacity. Ethereum’s creator, Vitalik Buterin, is currently transitioning the network’s blockchain to a different validation mechanism called proof of stake, which doesn’t rely on mining at all. Bitcoin’s larger, more decentralized network is unlikely to make a similar move anytime soon. But Vinay Gupta, who designed Dubai’s blockchain strategy, believes that the same greed that motivates miners to turn kilowatts into cryptocurrency will ultimately spur them to innovate their way out of this scalability problem. Venture capitalist Charlie Morris thinks that as proof- of-stake cryptocurrencies prove their mettle in the market, “mining will become like a little blip in history,” he says. “People will say, ‘Remember when we all did that—wasn’t that ridiculous?’” WHERE DOES MINING ACTUALLY OCCUR? country is India, at —alone. The task is now dominated by giant mining pools akin to the ones in China, so the chances of a solo node mining a block
  • 37. today is about one in eight million. Lone operators would spend far more on energy bills than they’d get in profits. Want to become a mining hobbyist? Join a public mining pool. 4. ARE BLOCKCHAINS EVEN LEGAL? Yes. But their decentralized nature and association with Bitcoin—which has been used in illegal transactions such as drug and arms sales—can give blockchains an “outlaw” reputation it doesn’t necessarily deserve. Blockchains can be used for many different purposes, good or ill, just like Facebook, e-mail or any other Internet technology. ARE BLOCKCHAINS EVEN LEGAL? WHAT DOES THE PUBLIC THINK ABOUT BLOCKCHAIN? illegal purchases or don’t know what they’re used for at all, according to a 2017 YouGov survey. they had never heard of blockchain technology; 80 percent of those who had heard of the technology still don’t understand what it is. U.S. companies indicated they had little or no knowledge about blockchain technology, according to a 2017 Deloitte survey. HOW WILL THIS TECHNOLOGY BE USED IN THE FUTURE?
  • 38. Anyone building on blockchain technology is, by definition, a futurist. Once distributed ledger technology gets out of its training-wheels phase, what might we create with it? SELF-DRIVING, SELF-OWNING CARS: Instead of driving for Uber, your car would drive itself while you work or sleep. Blockchain-backed smart contracts could remove middlemen like Uber and Lyft from the car- sharing equation by automating their two basic functions— matching cars with riders and facilitating payments. You could also own “shares” of a car represented by cryptocurrency tokens. PORTABLE MEDICAL DATA: The same technology that allows two people to exchange units of Bitcoin without necessarily trusting each other could also vouchsafe medical information, putting control firmly in the hands of patients, says Brian Behlendorf, executive director of the Linux Foundation’s Hyperledger project, a tool kit for building blockchain applications. Patients would receive a “‘health wallet” with their data and histories. A doctor could go to a ledger and request your blood type, generating an access request on the user’s phone. “You get an audit trail of who you shared that data with and the option to delete it when the treatment is over,” Behlendorf says. A GLOBAL SUPERCOMPUTER: Linking your devices to thousands of others in a P2P network—and using a blockchain to pay you for their use—would create a financial incentive to support a worldwide, decentralized supercomputer. While you sleep, your laptop and phone could be rented by scientists who want to run models, for example. A project called Golem is already working on it. “The number of idle
  • 39. laptops is so much larger than the computing power of the data centers,” Gupta says. “Artificial intelligence, climate modeling—all of that stuff could be accelerated 1,000- fold.” WHAT ARE THE LIMITATIONS AND DANGERS OF BLOCKCHAIN? “Blockchains provide a substrate that, if certain assumptions are held to, is very difficult to modify ex post facto,” says Cornell blockchain researcher Emin Gün Sirer. “But that doesn’t mean that everything recorded to a blockchain is true or desirable. If I get hacked and someone steals my cryptocoins and tries to use them, I would very much like to undo that transaction. That’s where immutability becomes a liability.” It’s also easy to confuse a blockchain’s theoretical immutability with actual data security: public blockchains like Ethereum and Bitcoin don’t actually encrypt any information. The Linux Foundation’s Brian Behlendorf goes one step further: “The ledger should never be used to store personal data or anything sensitive, not even in encrypted form,” he says, “because we know that no matter what we encrypt today, probably in 40 or 50 years we’ll be able to decrypt it” with more advanced technology. Some advocates speak of blockchain as a panacea for any social problem involving trust, but that’s blindly optimistic. For more on the limitations of blockchain as a societal savior, see page 38. 5. HOW ARE CRYPTOCURRENCIES SECURE AND TRUSTWORTHY? Because they’re ultimately nothing but software, the trustworthiness of a cryptocurrency “comes from the code base,” says M.I.T. researcher Catalini. Anyone can gin up
  • 40. a cryptocoin and raise funds by selling it through an initial coin offering—even Paris Hilton did it, lending her name to promote an obscure token. But it’s no coincidence that the two most popular cryptocurrencies, Bitcoin and Ether, were engineered by computer-programming savants. That said, even coins with impressive technical bona fides can be risky. The DAO—a “decentralized autonomous organization” running on Ethereum that raised over $100 million in 2016—“had a bug” (in Catalini’s understated terms) that allowed hackers to make of with $50 million worth of Ether. HOW ARE CRYPTOCURRENCIES SECURE AND TRUSTWORTHY? HOW DO YOU REGULATE A DECENTRALIZED SYSTEM? Given the Wild West reputations of decentralized digital currencies, it’s easy to assume that they were created to dismantle or avoid financial regulation. But that’s not quite accurate. Bitcoin is full of regulations, after all—they’re just defined and enforced by source code (and the collective activity of its P2P network) rather than by governments or financial institutions. “The whole innovation about Bitcoin is in eschewing social governance of record keeping,” says Patrick Murck, a lawyer who researches blockchain policy and regulation at Harvard University’s Berkman Klein Center for Internet and Society. Ethereum’s stated purpose—to support the deployment of autonomous smart contracts—is essentially regulatory. A blockchain is arguably
  • 41. nothing but regulation: a mathematically enforced system of rules about what can and cannot be done with records in a database. What always matters about financial regulation, decentralized or not, is who gets to do the regulating and how. “If you have a system that’s decentralized, there’s nowhere to attach regulation—but wherever that system gets reinter mediated [by third parties], regulation will follow,” Murck says. In 2013 China banned cryptocurrencies from its banking system, and last September it ordered all domestic Bitcoin exchanges to shut down. The U.S. and Japan are moving to regulate cryptocurrency exchanges and “initial coin offerings” with the same vigilance they apply to stock trading and investment banking. One future application of blockchain technology is in securing digital identity records, and according to venture capitalist Charlie Morris, new cryptocurrencies may emerge that marry identity data with financial information. They wouldn’t have the anonymity of Bitcoin (Morris estimates the number of Bitcoin holders who pay honest taxes on them to be mere hundreds). But as digital money goes mainstream, the trade-off in perceived security and stability may make oversight tolerable—or even desirable. Says Murck: “If I’m trusting you with some property to hold on my behalf and transact with it—whether it’s Bitcoin or Beanie Babies—then you’re either regulated or about to be regulated.” CAN BLOCKCHAINS FAIL? To date, the Bitcoin blockchain—the world’s first and at present its largest and most widely used—has never been compromised or hacked. But that doesn’t mean that
  • 42. every blockchain is invulnerable by definition. “There’s no such thing as a perfect technology,” says Cornell’s Gün Sirer, co-director of the Initiative for Cryptocurrencies and Contracts. Here are three gaps in a blockchain’s armor: 51% ATTACK: Blockchain-backed cryptocurrency networks rely on two bottomless resources for security: the speed and greed of their miners. But it’s theoretically possible to overpower both. To subvert the blockchain’s … Research Paper Sentence outline – Information Governance Purpose The purpose of this assignment is to prepare you for the dissertation process by creating a sentence outline for a research paper. Description The topic of your sentence outline is your research question. After completing this week's Learning Activities, develop a sentence outline. Deliverable Prepare a Microsoft Word document that includes the following headings and one full sentence in each section: · Title Page · Abstract · Introduction · Literature review · Research Method · Results · Discussion · Conclusion · Reference Page
  • 43. Research Paper – Data Science and Big Data Analytics. This week we discussed Bitcoin Economics. For this week's research paper, you need to search the Internet and explain why some businesses are accepting and other businesses are rejecting the use of Bitcoins as a standard form of currency. Your paper needs to identify two major companies that have adopted Bitcoin technology. Your paper should meet the following requirements: • Be approximately 3-5 pages in length, not including the required cover page and reference page. • Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. • Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations. The UC Library is a great place to find resources. • Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. Problem Set #5 - Planning the Project Question 1. 1. Identify a major public infrastructure project that is either underway, complete, or proposed in your region. This could be a bridge, road, building, or something of that nature. For the project you have identified, think of as many stakeholders and stakeholder groups as you can. Create a three-column table. In column 1, list the stakeholders. In column 2, list what each stakeholder wants to get from the project. In column 3, list the influence each stakeholder has over the project.
  • 44. Question 2. 2. How can the stakeholders change over the course of a project? Give examples of changes in who the stakeholders are, and in how their interests or influence over the project might change throughout the term of the project. Research Paper: PRIVACY POLICIES 1 HEALTH CARE PRIVACY POLICIES 2 Research Paper – Health Care Privacy Policies Privacy in the health care industry The healthcare industry's privacy means that what a patient tells a health care provider, what the health care providers write down about patients, any medications that patients take, and all other information related to the patient are kept private. The law requires that all the health information and medical records of a patient have to be kept private and safe by all health care and
  • 45. medical professionals, and all health care facilities, like the clinics and hospitals (Patil & Seshadri, 2014). In this regard, the law requires that anything that a patient discusses with the doctor to be kept confidential and private between the two and the organization they work for. When a patient goes to a new doctor, he/she can choose to reveal his/her previous medical records with other health doctors by giving written consent to the earlier doctors to send medical information to the new doctor. Research question How do healthcare companies address privacy in their policies? Background Most organizations in the health care industry prioritize the privacy policy in every aspect of their health services. The organizations selected for this research are Mayo Clinic, United Health Group, and McKesson Corp. All of these organizations declare private policies on their website and assure all their clients/patients that there is no information regarding them or their heath that will be shared with third parties without their consent. For Mayo Clinic, it begins its privacy policy by first defining protected health information, which is any information, whether paper. Electronic, or oral that is created or received by Mayo Clinic relating to the health care of a patient or patient payment about medical services. Therefore, the Mayo clinic considers the privacy of patients as part of its primary mission in meeting the patient's needs. It has taken the necessary precautions against disclosure or inappropriate use of patient’s medical information. Similarly, the UnitedHealth Group issues a clear privacy policy to its clients. It disclaims that there is zero chance that the information regarding patient health will be shared with third parties without their consent. The Company's privacy policy clearly states that its main objective is to adhere to the laws and regulations regarding the privacy of health care information. Thus it applies every available resource to ensure that all data regarding health care of patients are protected and thoroughly
  • 46. guarded against any public intrusion. The most exciting aspect regarding the privacy policy is that they outline the few situations and circumstances under which they are likely to share the private information regarding the health of the clients, including when it is a court order, or when the Company is sold or merged with another company. However, all these situations will be notified to the individual holder of the information with a clear explanation of the Company's intentions. McKesson Corp is also another health organization that commits itself to guard the private information of their clients. The Company explains the information that they collect from the customers, including their health and health-related issues, their personal contact information, their work environment, and information that the person shares on the internet. This explanation gives the patients an insight into the type of information that the Company has regarding them while assuring them that it will be kept confidential and private except in some circumstances where they will be notified in advance. References McKesson Corp Privacy notice. https://www.mckesson.com/About-McKesson/Privacy-Notice/ UnitedHealth Care Group Privacy information. https://www.uhc.com/privacy Mayo Clinic Notice of Privacy Practices. https://mcmapp.mayoclinic.org/content/PrivacyPolicy.htm Patil, H. K., & Seshadri, R. (2014). Big data security and privacy issues in healthcare. In 2014 IEEE international congress on big data (pp. 762-765). IEEE.
  • 47. Running head: Bibliography on Health Care Industry Privacy and Security 1 Bibliography on Health Care Industry Privacy and Security 8 Week 4 – Annotated Bibliography https://mcmapp.mayoclinic.org/content/PrivacyPolicy.htm The site describes how the Moyo clinic protects the health information for the patients in their clinic. The preference to have the security systems for keeping the records helps in ensuring high security in the health care units. In the health care units, there are different patients with different diseases and disorders, which should never be disclosed to the patients as well for the members of the family. The competence for Moyo Clinic to reveal the privacy of the information such as the patient's name, addresses, doctor's, and even the nurses' notes has generated the entire effort to facilitate the trustworthiness of the patients from different areas to liaise with the treatment within the clinic. According to the manner Moyo clinic service is handling the patients with a lot of privacy to their records, it has generated valid and real-valued concerns for the patients to bring their needs to the doctors. Serving the needs of the patients is taken as a significant concern and deserves privacy
  • 48. within the areas as well. In turn, they have taken into consideration the effort to ensure safer systems that encrypt the data recorded for the patients concerning their ailments. Employees of the Moyo clinic only access the information to perform the expected duties. On the other hand, on violation of rules, an employee's function may take place and disciplinary action for the action. Different systems and machines have been implemented in today's clinical services and even healthcare facilities. The methods ensure that the environment is much secure to prevent leaking of patient's information. The security is guaranteed by the administration, ensuring the right protocols are adhered to promptly. Manogaran, G., Thota, C., Lopez, D., & Sundarasekar, R. (2017). Big data security intelligence for healthcare industry 4.0. In Cybersecurity for Industry 4.0 (pp. 103-126). Springer, Cham. The author of the article talks mostly on big-data issues. This facilitates the issue of privacy in the clinical facility to contribute to the confidentiality of data records by the doctors and nurses to the patients. A concern to enroll the health care facilities in the system for administration is the biggest role in the community. In the integrated industries, it is difficult to generate big data and find out the desired information. The author of the journal describes the generated data as enormous and challenging to manage. Therefore, clinics are encouraged to have systems that are capable of holding extensive data concerning sensor enrolment. The large numbers that are tabulated in the clinics are hard to manage their records as well as to their related details; therefore, a system that can produce a scalable sensor number of individuals is proposed. Industrial Internet of Things is valuable to ensure the right system that can tally and keep records of big data for a good time. The proposed Meta Cloud Redirection can process big data and analytics into details for the value of informative details.
  • 49. The proposed systems for the healthcare facilities are essential to accumulate a good record for the patients. The privacy of the patients can be handled independently in the systems preventing them from generating abnormal data. Independent data can be caused by ensuring the improvement of systems by information technology individuals are reliable to the members. The essentials are procured in the best manner to prevent all the measures taken in the health care facility. Mayo Clinic Notice of Privacy Practices The practice to produce notices to embrace privacy contributes so much to the individuals as a measure of reminder every moment. The concerns are made by the administration to reinforce the ability to adapt to the environment as a measure of protecting the patients' records. There are indeed great records that can be handled by many of the clinical employees, which are paramount and not supposed to be disclosed as well. The concern to reinforce the systems that generate notices to the employees ensures the right assistance for the individuals. Measures are undertaken once one violates the reinforced notices, and in turn, a punishment follows. Moyo clinic procures notices to their employees to empower them with the right information and let even the patients know what is desired according to their records' privacy. The announcement is like a repetitive update to the employees as it is displaying information on the wall. Once the information is displayed to the parties, there is no trick to play around with the patients' details of the records as well. Therefore, the specific concerns are made to develop at the Moyo clinic, ensuring that there is an intensive measure to value the privacy of any document for the patients. As in the outside environment, notices are kept on the notice boards to ensure the right follow up procedure to ensure all rules are adhered to. Newer systems that are developed to ensure the right privacy and produce pop up notices to the clinical employees assist a lot in reminding the employees as well. The notices that are given ahead facilitate the management
  • 50. of the patient’s data privately highly. McKesson Corp Privacy notice. https://www.mckesson.com/About-McKesson/Privacy-Notice/ According to McKesson, the greatest value of privacy is to the patients, customers, and even the employees who care about the information they share. Concerning privacy evaluation to the realistic measure in the advancement of systems' confidentiality. Relating the documentary released on the notice of McKesson, the value to keep the top-secret on members' data concerning the chats and confidential information sharing is therefore kept highly private. The realization to secure the right decisions on information sharing enables the systems measurable to keep records securely. Owning private website hosts and domains is a measure to ensure that data is secured; hence a single individual is liable to update. An oath is essential to the individuals under the care to ensure the right processes as well as the dominance of information system hosting and keeping the records. The decisions are made to evaluate the right decisions as a measure in advancing the correct details in the documents presented. Privacy is assured in documents by ensuring the right web loggings, providing cookies, and ensuring that adverts are presented to the members accessing. This ensures keeping track of the members on the site and restricting hacking. The desire to trace the best accesses to the sites provides encryption to the hidden data making all seem simpler. Privacy on the sites is essential and as well as an improved manner of assuring the right decisions accurately. Access once retrieving one's data is necessary to ensure the right follow up as well. In health care units, there is the right decisive measure to value the weight of decisions. I am therefore making the proper processions. Patil, H. K., & Seshadri, R. (2014). Big data security and privacy issues in healthcare. In 2014 IEEE international congress on big data (pp. 762-765). IEEE In the document, the author dictates a paradigm shift in the
  • 51. health care facility to ensure the right follow up. Once the issues concerning the big data are settled, a consistent development is retrieved in the systems to develop a substantial device that can handle the big data. Migration from reactive to proactive health care is an excellent deal in approving the right protocols. The measure of digitizing the medical records is an excellent change to the individuals and privately kept records. The transfer to the systems ensures that none of the records is lost on the way. According to the sayings, the measure to move from the old generation of health care to the newer generation ensures the right strategic ratio in approving the right decisions as well and for the essentials in the arrangements, acquiring the systems which are liable to measure the actual generations as a measure to evaluate the real estates in advancements as well. The situations in managing the analysis are essential in technological systems that are capable of handling complex data. The more complex data in the systems are embraced by the advancements made to retrieve complex data and ensure the right tracing. In big data, privacy and security are vital to the members and the entire health care unit. The concern to ensure the right generation movement is caught on track by the improvised systems is essential to the members as a measure to evaluate the right decisions. To the newer generations, there is the fact of the transfer of data to the more modern systems and capable systems as well. The devices are improvised to ensure the accurate analysis in the proper manner for excellent future management. Sethi, S. (2018). Healthcare blockchain leads to transform the healthcare industry. International Journal of Advanced Research, Ideas, and Innovations in Technology, 4(1), 607-608. This journal details on transforming the health care units in making all things accessible and minimizing the complexity. The health care industry is more prone to developing and acquiring the right decisions to ensure an advanced generation of detailed data. It is believed that the blockchain is capable of
  • 52. changing the future of the health care industry. Blockchain encompasses the directives in attaining the desired measures as well. The desires for the health care industry are manageable in a single unit enabling development in the tracing manner of the records. The transformation can be made technologically to reveal different affairs. According to the measures of decentralization, the proper way to undertake the fact of developing the health care industry in a way that is attractive to the members and the patients. The blockchain method ensures the procedural tactics in deriving the real generations on security and holding big data. Privacy is the most excellent deal in reinforcing the adherence to developing the right procedures as well. Embracing the right privacy for the health care industry records is vital to the development of the affairs as a measure in attaining a manageable number in the clinics. Different members have generated different systems that are more secure to the data and record handling as well. The desire to ensure the right data handling is essential and paramount to ensure the right attractions are maintained. Therefore, the processing of big data is manageable by the developers of the systems or familiar individuals. UnitedHealth Care Group Privacy information. https://www.uhc.com/privacy A description of personal information is described as very essential. To the individual facilitation, it is ever necessary to keep oneself data and records very safe and secure to the desired generations as well. The way the information is handled on to the websites and on to the different systems is prone to leaking and getting known to the undesired destinations. Therefore, tracking using the cookies and locator methods has improvised the techniques to settle different desires as well. In turn, to evaluate the analytical techniques, a desirable measure to detail out the data is desired to ensure the proper transfer. Holding on the details is desirable. The United Health care is an essential facility to ensure
  • 53. tracking of the patients' records and enabling easy retrieval of data in the desired manner as well. The concern of advancing the systems is to ensure that there is no redundancy on data transmission and posting. The essentiality to ensure the right decisions on handling complex data and big data is designed over the sites and posted for rectifications. The desires are prone to reaching the desired measures as well. Activation of the systems and advancement of the systems assures the management of developed productions in the industry. Different sites over the world are generated and managed from the same servers, which in turn facilitate the production. Complex data is handled in different systems making it the right grounds of growth. The development of state clinics is an achievement in the handling of operations as well. Results are attained in practicing the proper process as well in the industry. Dicussion II – Information Governance Suppose you were asked to develop an Information Governance Strategic Plan for your organization, describe the steps you would take. Be specific. Reference: Smallwood, R. F. (2014). Information Governance : Concepts, Strategies, and Best Practices. Wiley. ISBN: 9781118218303 APA Format 250 – 350 Words
  • 54. 1 Scholarly Reference. Discussion I - Data Science and Big Data Analytics. This week's discussion centers around the concept of Blockchain. There is still much confusion regarding what Blockchain is and what it is not. Please discuss your explanation of Blockchain to include why it has been gaining so much popularity. Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following: · Ask an interesting, thoughtful question pertaining to the topic · Answer a question (in detail) posted by another student or the instructor · Provide extensive additional information on the topic · Explain, define, or analyze the topic in detail · Share an applicable personal experience · Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA) · Make an argument concerning the topic. At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. References: WALDO, J. (2019). A Hitchhiker’s Guide to the Blockchain Universe. Communications of the ACM, 62(3), 38–42. https://doi.org/10.1145/3303868 PAVLUS, J. (2018). The World Bitcoin Created. Scientific American, 318(1), 32–37. Retrieved from
  • 55. http://search.ebscohost.com/login.aspx?direct=true&AuthType= shib&db=buh&AN=126727561&site=eds-live Discussion III – Planning the Project Week 5 – Stake Holder Management Reflect on the assigned readings for Week 5 and then type a two page paper regarding what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding. Define and describe what you thought was worthy of your understanding in half a page, and then explain why you felt it was important, how you will use it, and/or how important it is in project planning. Reference: Watt, A. (2019). Project Management, 2nd Edition. BCcampus Open Education. https://opentextbc.ca/projectmanagement/