Blockchain Technology and Decentralized Governance: Is the State Still Necess...eraser Juan José Calderón
Blockchain Technology and Decentralized Governance: Is the State Still Necessary?
Marcella Atzori, Ph. D.*
ABSTRACT
The core technology of Bitcoin, the blockchain, has recently emerged as a disruptive innovation with a wide range of applications, potentially able to redesign our interactions in business, politics and society at large. Although scholarly interest in this subject is growing, a comprehensive analysis of blockchain applications from a political perspective is severely lacking to date. This paper aims to fill this gap and it discusses the key points of blockchain-based decentralized governance, which challenges to varying degrees the traditional mechanisms of State authority, citizenship and democracy. In particular, the paper verifies to which extent blockchain and decentralized platforms can be considered as hyper-political tools, capable to manage social interactions on large scale and dismiss traditional central authorities. The analysis highlights risks related to a dominant position of private powers in distributed ecosystems, which may lead to a general disempowerment of citizens and to the emergence of a stateless global society. While technological utopians urge the demise of any centralized institution, this paper advocates the role of the State as a necessary central point of coordination in society, showing that decentralization through algorithm-based consensus is an organizational theory, not a stand-alone political theory.
Keywords: Bitcoin, blockchain, Decentralized Autonomous Organizations, decentralization, democracy, Ethereum, encryption, governance, politics, State, peer-to-peer networks
Blockchain beyond fintech by ridgelift.ioUdayan Modhe
A comprehensive paper on blockchain technology. It covers blockchain technological aspects, blockchain evolution, future trends in blockchain implementation and reference architecture.
Blockchain and AI Convergence A New Era of Possibilitiesijtsrd
The convergence of blockchain technology and artificial intelligence AI is heralding a transformative era across industries. This paper explores the integration of blockchain and AI, highlighting the synergies between these two technologies and the myriad possibilities they unlock. We delve into the key areas where this convergence is making an impact, including data security, decentralized applications, autonomous systems, and more. Furthermore, we examine the challenges and considerations surrounding this integration, emphasizing the potential benefits for society, businesses, and innovation. Manish Verma "Blockchain and AI Convergence: A New Era of Possibilities" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-5 , October 2023, URL: https://www.ijtsrd.com/papers/ijtsrd59864.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/59864/blockchain-and-ai-convergence-a-new-era-of-possibilities/manish-verma
The Blockchain is a technology created with the bitcoin, which has become the world's 8th currency in terms of amounts exchanged. The Blockchain brings with it new promises of innovation in all sectors, but also of disruption of dominant economic models. By taking an interest now in its potential applications, we can be one step ahead of the next stage of the digital revolution and the advent of a "horizontal" society,
without intermediaries or centralized authority...
The Blockchain is probably set to revolutionize transactions and exchanges; in the same way that Internet enabled peer-to-peer communication, in the years to come the Blockchain will provide the means for peer-to-peer transactions under a decentralized and autonomous rationale.
Blockchain, whose origins are blended (and often blurred) with the cryptocurrency Bitcoin, is a disruptive technology with the potential to transform how goods and services are exchanged over the internet. Blockchain allows complex transactions to be carried out transparently and securely, on a distributed interaction model that ousts multiple established intermediaries, eradicating the control held by central authorities in traditional methods of digital transaction.
Research Paper
Dr Daniel Barreto's class: Leading Trends in IT.
Grade: 97%
Co-written by Christina Rentschler, Victor Gardrinier and Dean Rauschenbusch.
Date: 08/2017
Blockchain Technology and Decentralized Governance: Is the State Still Necess...eraser Juan José Calderón
Blockchain Technology and Decentralized Governance: Is the State Still Necessary?
Marcella Atzori, Ph. D.*
ABSTRACT
The core technology of Bitcoin, the blockchain, has recently emerged as a disruptive innovation with a wide range of applications, potentially able to redesign our interactions in business, politics and society at large. Although scholarly interest in this subject is growing, a comprehensive analysis of blockchain applications from a political perspective is severely lacking to date. This paper aims to fill this gap and it discusses the key points of blockchain-based decentralized governance, which challenges to varying degrees the traditional mechanisms of State authority, citizenship and democracy. In particular, the paper verifies to which extent blockchain and decentralized platforms can be considered as hyper-political tools, capable to manage social interactions on large scale and dismiss traditional central authorities. The analysis highlights risks related to a dominant position of private powers in distributed ecosystems, which may lead to a general disempowerment of citizens and to the emergence of a stateless global society. While technological utopians urge the demise of any centralized institution, this paper advocates the role of the State as a necessary central point of coordination in society, showing that decentralization through algorithm-based consensus is an organizational theory, not a stand-alone political theory.
Keywords: Bitcoin, blockchain, Decentralized Autonomous Organizations, decentralization, democracy, Ethereum, encryption, governance, politics, State, peer-to-peer networks
Blockchain beyond fintech by ridgelift.ioUdayan Modhe
A comprehensive paper on blockchain technology. It covers blockchain technological aspects, blockchain evolution, future trends in blockchain implementation and reference architecture.
Blockchain and AI Convergence A New Era of Possibilitiesijtsrd
The convergence of blockchain technology and artificial intelligence AI is heralding a transformative era across industries. This paper explores the integration of blockchain and AI, highlighting the synergies between these two technologies and the myriad possibilities they unlock. We delve into the key areas where this convergence is making an impact, including data security, decentralized applications, autonomous systems, and more. Furthermore, we examine the challenges and considerations surrounding this integration, emphasizing the potential benefits for society, businesses, and innovation. Manish Verma "Blockchain and AI Convergence: A New Era of Possibilities" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-5 , October 2023, URL: https://www.ijtsrd.com/papers/ijtsrd59864.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/59864/blockchain-and-ai-convergence-a-new-era-of-possibilities/manish-verma
The Blockchain is a technology created with the bitcoin, which has become the world's 8th currency in terms of amounts exchanged. The Blockchain brings with it new promises of innovation in all sectors, but also of disruption of dominant economic models. By taking an interest now in its potential applications, we can be one step ahead of the next stage of the digital revolution and the advent of a "horizontal" society,
without intermediaries or centralized authority...
The Blockchain is probably set to revolutionize transactions and exchanges; in the same way that Internet enabled peer-to-peer communication, in the years to come the Blockchain will provide the means for peer-to-peer transactions under a decentralized and autonomous rationale.
Blockchain, whose origins are blended (and often blurred) with the cryptocurrency Bitcoin, is a disruptive technology with the potential to transform how goods and services are exchanged over the internet. Blockchain allows complex transactions to be carried out transparently and securely, on a distributed interaction model that ousts multiple established intermediaries, eradicating the control held by central authorities in traditional methods of digital transaction.
Research Paper
Dr Daniel Barreto's class: Leading Trends in IT.
Grade: 97%
Co-written by Christina Rentschler, Victor Gardrinier and Dean Rauschenbusch.
Date: 08/2017
This thought leadership is a report detailing how Blockchain can be industrialized in ASEAN and how its potential can be unlocked across organizations.
The report also clearly illustrates the implications of Blockchain, its key developments, how it impacts countries across ASEAN and a five-point test for assessing the fit of Blockchain for specific processes, all serving to provide meaningful insights into the current state of the FinTech industry in the ASEAN region.
"This thought leadership is a report detailing how Blockchain can be industrialized in ASEAN and how its potential can be unlocked across organizations. The report also clearly illustrates the implications of Blockchain, its key developments, how it impacts countries across ASEAN and a five-point test for assessing the fit of Blockchain for specific processes, all serving to provide meaningful insights into the current state of the FinTech industry in the ASEAN region."
Blockchain is one of the biggest and most interesting technologies out right now. The Federal Government is putting in a ton of resources trying to figure this puzzle out. MongoDB is already being utilized by Federal Government Agencies today for Blockchain initiatives. Take a moment to read this white paper on how to build an enterprise Blockchain database with MongoDB. Harness the power of innovation!!!
PM me if you are interested in learning more!
Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...eraser Juan José Calderón
Using Blockchain as a Platform for Smart Cities
Christian Nãsulea, Stelian-Mihai Mic University of Bucharest, Romania.
ABSTRACT: Objectives: Incorporating new technologies into the development of smart cities means rethinking the way
different services are provided. From this perspective, Blockchain might represent the future of both smart cities and smart
communities as it offers new alteratives for individuals and institutions.
Prior Work: Blockchain was mainly perceived through its linkage with bitcoin, but recent developments have started
exploring the idea of using it for financial transactions, logistics and securing contracts. Tapscott & Tapscott (2016)have
acknowledged the potential the Blockchain Revolution had on redefining the idea of trust in both digital and local communities.
Blockchain technology has the ability to enhance transparency of local and regional institutions while also making it easier
to communicate sensitive data without compromising security and privacy.
Approach: We look at the different fields blockchain can have an impact on and we try to assess the viability of moving
towards an integrated platform for intermediating day-to-day activities between both institutions and individuals. We will
assess the advantages of digitizing and securing public and private data while also considering the potential risks this
process might involve.
Results: We aim to create a model of how blockchain might work in communities and assess its impact on the overall
economic and human development indicators.
Implications: Public administrators in many countries are starting to acknowledge blockchain’s potential in solving problems
for local communities our results will be a valuable starting point for developing local initiatives for using blockchain as a
platform for communications and transactions. Furthermore, a smart city must be a city where individuals can interact and
solve their issues quickly, using digital technologies for increased efficiency.
Value: Blockchain is thought to be the future of managing both public and private affairs. Countries such as Dubai, Singapore
and China are incorporating blockchain technology into developing smart cities. Blockchain makes us rethink many of the
different aspects of how communities can be organized, offering new alternatives and promising a more transparent and
efficient economic model.
Keywords: Digital Era, Economic Model, IoT, Technology
Many of the greatest challenges an organization faces are determining how to profit from and create disruption within their industries. How can an organization leverage blockchain solutions for growth? Where does one start? Will ICOs replace fundraising and lending as we know it?
This thought leadership is a report detailing how Blockchain can be industrialized in ASEAN and how its potential can be unlocked across organizations.
The report also clearly illustrates the implications of Blockchain, its key developments, how it impacts countries across ASEAN and a five-point test for assessing the fit of Blockchain for specific processes, all serving to provide meaningful insights into the current state of the FinTech industry in the ASEAN region.
Governance in the Blockchain Economy: A Framework and Research Agenda. Roman...eraser Juan José Calderón
ABSTRACT
Blockchain technology is often referred to as a groundbreaking innovation and the harbinger of a new economic era. Blockchains may be capable of engendering a new type of economic system: the blockchain economy. In the blockchain economy, agreed-upon transactions would be enforced autonomously, following rules defined by smart contracts. The blockchain economy would manifest itself in a new form of organizational design—decentralized autonomous organizations (DAO)—which are organizations with governance rules specified in the blockchain. We discuss the blockchain economy along dimensions defined in the IT governance literature: decision rights, accountability, and incentives. Our case study of a DAO illustrates that governance in the blockchain economy may depart radically from established notions of governance. Using the three governance dimensions, we propose a novel IT governance framework and a research agenda for governance in the blockchain economy. We challenge common assumptions in the blockchain discourse, and propose promising information systems research related to these assumptions.
Initial coin offerings (ICOs) are a new way of raising funds for projects running on blockchain technology. Similar to the role venture capital (VC) plays in financing start-ups in traditional finance, ICOs are the future of venture investing in the blockchain world. Through ICOs, exponential returns can be earned in a very short period of time. When a decentralised application is created, the start-up behind it can sell the associated coin or token early in the process for an amount based on what it thinks it’s worth.
The report Blockchain 101 brings together some general ‘descriptions’ of simple and widely used terms in the industry especially related to ‘Blockchain’ or ‘Distributed Ledger Technologies’. It provides an explanatory approach to simple terms that are easy to understand, painting a clear picture of a typical DLT function structure and operations of consensuses.
paywith.glass: A Secure, Scalable, Compliant, Privacy Preserving, Global Electronic Payments System for Cryptographically Secure Digital Assets | October 2023 | sha256:4f440bbe2e620df9b3b2d2bbef97028827d4faddf20fd617cd78cdb9f769fc99
Coft Token is known as one of the best Technology since the invention of the internet. It provides freedom support globally for anyone to participate in a permissionless and decentralized network.
Blockchain - Use Cases for The Nigerian Economy and Potential Legal RisksRilwan Shittu
It is not uncommon for people to misconceive the use, relevance or applicability of new and emerging technologies - this has been the case with the Blockchain technology as a lot of people only have a vague or inaccurate understanding of what it really means and what it can do. Some have even gone as far as saying “Blockchain is the future” and “Blockchain will save Nigeria”, etc.
This article presents a practical overview of how the technology works; the potential use cases in the Nigerian economy; the legal risks and the role of regulatory agencies in aiding the adoption and growth of the technology.
Read more below:
Blockchain- Use Cases for the Nigerian Economy and Potential Legal RisksDamilola A. Oyebayo
It is not uncommon for people to misconceive the use, relevance or applicability of new and emerging technologies - this has been the case with the Blockchain technology as a lot of people only have a vague or inaccurate understanding of what it really means and what it can do. Some have even gone as far as saying “Blockchain is the future” and “Blockchain will save Nigeria”, etc.
This article presents a practical overview of how the technology works; the potential use cases in the Nigerian economy; the legal risks and the role of regulatory agencies in aiding the adoption and growth of the technology.
Read more below:
You have been asked to explain the differences between certain categ.docxshericehewat
You have been asked to explain the differences between certain categories of crimes. For each of the following categories of crime, provide a general definition of the category of crime and give at least two detailed examples of specific crimes that fall into each category:
Crimes against persons
Crimes against property
Crimes of public morality
White-collar crime
Cyber crime
Then for the following scenarios, discuss the categories of crimes involved in each scenario and explain the specific criminal charges that you would apply to each scenario. You can utilize the Library, Internet and other resources to research the criminal statutes of a state of your choice in order to help you determine which criminal charges should be applied:
David S. was running around a public park without his clothes on, singing and shouting loudly, at 3 in the morning. Police arrived after neighbors called to complain. They saw David S. tipping over a garbage can and when they shouted for him to stop, he threw the garbage can into a car, breaking one of its side windows. The police arrested David S, His blood alcohol level was twice the legal limit.
Gary M. was arrested by the FBI when he showed up at a local mall to meet a "14 year old girl" for a date, which he arranged over the Internet. He didn't know that the "14 year old girl" was actually a 35-year old male FBI agent.
Elaine R. was an accountant working for a large corporation. She had been falsifying the accounting records and sending some of the corporate funds to her own bank accounts in an offshore bank. The corporation found out what she had been doing and reported her to the police.
Please submit your assignment.
.
You have been asked to help secure the information system and users .docxshericehewat
You have been asked to help secure the information system and users against hacking attempts. Complete the following:
Take this opportunity to describe the 4 different approaches and techniques a hacker would use to steal the organization's data.
For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event.
Include 2–3 pages of material covering the 3 discussion areas in Section 5 of your Key Assignment document (including the completed previous 4 sections).
social engineering,dumpster diving,identify theft,cyberterrorist
.
More Related Content
Similar to Global Networks 19, 3 (2019) 329–348. ISSN 1470–2266. Global.docx
This thought leadership is a report detailing how Blockchain can be industrialized in ASEAN and how its potential can be unlocked across organizations.
The report also clearly illustrates the implications of Blockchain, its key developments, how it impacts countries across ASEAN and a five-point test for assessing the fit of Blockchain for specific processes, all serving to provide meaningful insights into the current state of the FinTech industry in the ASEAN region.
"This thought leadership is a report detailing how Blockchain can be industrialized in ASEAN and how its potential can be unlocked across organizations. The report also clearly illustrates the implications of Blockchain, its key developments, how it impacts countries across ASEAN and a five-point test for assessing the fit of Blockchain for specific processes, all serving to provide meaningful insights into the current state of the FinTech industry in the ASEAN region."
Blockchain is one of the biggest and most interesting technologies out right now. The Federal Government is putting in a ton of resources trying to figure this puzzle out. MongoDB is already being utilized by Federal Government Agencies today for Blockchain initiatives. Take a moment to read this white paper on how to build an enterprise Blockchain database with MongoDB. Harness the power of innovation!!!
PM me if you are interested in learning more!
Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...eraser Juan José Calderón
Using Blockchain as a Platform for Smart Cities
Christian Nãsulea, Stelian-Mihai Mic University of Bucharest, Romania.
ABSTRACT: Objectives: Incorporating new technologies into the development of smart cities means rethinking the way
different services are provided. From this perspective, Blockchain might represent the future of both smart cities and smart
communities as it offers new alteratives for individuals and institutions.
Prior Work: Blockchain was mainly perceived through its linkage with bitcoin, but recent developments have started
exploring the idea of using it for financial transactions, logistics and securing contracts. Tapscott & Tapscott (2016)have
acknowledged the potential the Blockchain Revolution had on redefining the idea of trust in both digital and local communities.
Blockchain technology has the ability to enhance transparency of local and regional institutions while also making it easier
to communicate sensitive data without compromising security and privacy.
Approach: We look at the different fields blockchain can have an impact on and we try to assess the viability of moving
towards an integrated platform for intermediating day-to-day activities between both institutions and individuals. We will
assess the advantages of digitizing and securing public and private data while also considering the potential risks this
process might involve.
Results: We aim to create a model of how blockchain might work in communities and assess its impact on the overall
economic and human development indicators.
Implications: Public administrators in many countries are starting to acknowledge blockchain’s potential in solving problems
for local communities our results will be a valuable starting point for developing local initiatives for using blockchain as a
platform for communications and transactions. Furthermore, a smart city must be a city where individuals can interact and
solve their issues quickly, using digital technologies for increased efficiency.
Value: Blockchain is thought to be the future of managing both public and private affairs. Countries such as Dubai, Singapore
and China are incorporating blockchain technology into developing smart cities. Blockchain makes us rethink many of the
different aspects of how communities can be organized, offering new alternatives and promising a more transparent and
efficient economic model.
Keywords: Digital Era, Economic Model, IoT, Technology
Many of the greatest challenges an organization faces are determining how to profit from and create disruption within their industries. How can an organization leverage blockchain solutions for growth? Where does one start? Will ICOs replace fundraising and lending as we know it?
This thought leadership is a report detailing how Blockchain can be industrialized in ASEAN and how its potential can be unlocked across organizations.
The report also clearly illustrates the implications of Blockchain, its key developments, how it impacts countries across ASEAN and a five-point test for assessing the fit of Blockchain for specific processes, all serving to provide meaningful insights into the current state of the FinTech industry in the ASEAN region.
Governance in the Blockchain Economy: A Framework and Research Agenda. Roman...eraser Juan José Calderón
ABSTRACT
Blockchain technology is often referred to as a groundbreaking innovation and the harbinger of a new economic era. Blockchains may be capable of engendering a new type of economic system: the blockchain economy. In the blockchain economy, agreed-upon transactions would be enforced autonomously, following rules defined by smart contracts. The blockchain economy would manifest itself in a new form of organizational design—decentralized autonomous organizations (DAO)—which are organizations with governance rules specified in the blockchain. We discuss the blockchain economy along dimensions defined in the IT governance literature: decision rights, accountability, and incentives. Our case study of a DAO illustrates that governance in the blockchain economy may depart radically from established notions of governance. Using the three governance dimensions, we propose a novel IT governance framework and a research agenda for governance in the blockchain economy. We challenge common assumptions in the blockchain discourse, and propose promising information systems research related to these assumptions.
Initial coin offerings (ICOs) are a new way of raising funds for projects running on blockchain technology. Similar to the role venture capital (VC) plays in financing start-ups in traditional finance, ICOs are the future of venture investing in the blockchain world. Through ICOs, exponential returns can be earned in a very short period of time. When a decentralised application is created, the start-up behind it can sell the associated coin or token early in the process for an amount based on what it thinks it’s worth.
The report Blockchain 101 brings together some general ‘descriptions’ of simple and widely used terms in the industry especially related to ‘Blockchain’ or ‘Distributed Ledger Technologies’. It provides an explanatory approach to simple terms that are easy to understand, painting a clear picture of a typical DLT function structure and operations of consensuses.
paywith.glass: A Secure, Scalable, Compliant, Privacy Preserving, Global Electronic Payments System for Cryptographically Secure Digital Assets | October 2023 | sha256:4f440bbe2e620df9b3b2d2bbef97028827d4faddf20fd617cd78cdb9f769fc99
Coft Token is known as one of the best Technology since the invention of the internet. It provides freedom support globally for anyone to participate in a permissionless and decentralized network.
Blockchain - Use Cases for The Nigerian Economy and Potential Legal RisksRilwan Shittu
It is not uncommon for people to misconceive the use, relevance or applicability of new and emerging technologies - this has been the case with the Blockchain technology as a lot of people only have a vague or inaccurate understanding of what it really means and what it can do. Some have even gone as far as saying “Blockchain is the future” and “Blockchain will save Nigeria”, etc.
This article presents a practical overview of how the technology works; the potential use cases in the Nigerian economy; the legal risks and the role of regulatory agencies in aiding the adoption and growth of the technology.
Read more below:
Blockchain- Use Cases for the Nigerian Economy and Potential Legal RisksDamilola A. Oyebayo
It is not uncommon for people to misconceive the use, relevance or applicability of new and emerging technologies - this has been the case with the Blockchain technology as a lot of people only have a vague or inaccurate understanding of what it really means and what it can do. Some have even gone as far as saying “Blockchain is the future” and “Blockchain will save Nigeria”, etc.
This article presents a practical overview of how the technology works; the potential use cases in the Nigerian economy; the legal risks and the role of regulatory agencies in aiding the adoption and growth of the technology.
Read more below:
Similar to Global Networks 19, 3 (2019) 329–348. ISSN 1470–2266. Global.docx (20)
You have been asked to explain the differences between certain categ.docxshericehewat
You have been asked to explain the differences between certain categories of crimes. For each of the following categories of crime, provide a general definition of the category of crime and give at least two detailed examples of specific crimes that fall into each category:
Crimes against persons
Crimes against property
Crimes of public morality
White-collar crime
Cyber crime
Then for the following scenarios, discuss the categories of crimes involved in each scenario and explain the specific criminal charges that you would apply to each scenario. You can utilize the Library, Internet and other resources to research the criminal statutes of a state of your choice in order to help you determine which criminal charges should be applied:
David S. was running around a public park without his clothes on, singing and shouting loudly, at 3 in the morning. Police arrived after neighbors called to complain. They saw David S. tipping over a garbage can and when they shouted for him to stop, he threw the garbage can into a car, breaking one of its side windows. The police arrested David S, His blood alcohol level was twice the legal limit.
Gary M. was arrested by the FBI when he showed up at a local mall to meet a "14 year old girl" for a date, which he arranged over the Internet. He didn't know that the "14 year old girl" was actually a 35-year old male FBI agent.
Elaine R. was an accountant working for a large corporation. She had been falsifying the accounting records and sending some of the corporate funds to her own bank accounts in an offshore bank. The corporation found out what she had been doing and reported her to the police.
Please submit your assignment.
.
You have been asked to help secure the information system and users .docxshericehewat
You have been asked to help secure the information system and users against hacking attempts. Complete the following:
Take this opportunity to describe the 4 different approaches and techniques a hacker would use to steal the organization's data.
For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event.
Include 2–3 pages of material covering the 3 discussion areas in Section 5 of your Key Assignment document (including the completed previous 4 sections).
social engineering,dumpster diving,identify theft,cyberterrorist
.
You have been asked to participate in a local radio program to add.docxshericehewat
You have been asked to participate in a local radio program to address the role of corrections in the community. The audience is specifically interested in discussing whether corrections should be focused on one or all of the following functions:
Rehabilitation of offenders
Punishment of offenders
Isolation of chronic offenders
After carefully considering available information and points of view on the subject, decide which role you believe should be the focus of the community's corrections policy. To prepare for the program, create 5 questions you believe callers may ask. Explain your point of view on the role of corrections in the criminal justice system to each of the questions asked, and draw a connection to the topic you are researching for this course. How do issues in corrections correlate with the topic you are researching?
.
Y
o
u
h
a
v
e
bee
n
h
i
r
e
d
a
s
a c
on
s
u
l
t
an
t
b
y
y
ou
r
t
o
w
n’
s
e
m
e
r
gen
cy
m
anage
m
en
t
c
oo
r
d
i
na
t
o
r
t
o
h
e
l
p
d
e
v
e
l
o
p
e
m
e
r
gen
cy
a
c
t
i
o
n
p
l
an
s
.
O
n
e
o
f
t
h
e
r
ea
s
o
n
s
y
o
u
w
e
re
s
e
l
e
c
t
e
d
i
s
y
ou
r
e
x
pe
r
t
i
s
e
i
n
u
s
i
n
g
t
h
e
G
ene
r
a
l
B
eh
a
v
io
r
M
od
e
l
(
G
E
BM
O
)
t
o
a
s
s
e
ss
r
i
s
k
s
.
Y
ou
r
f
i
r
s
t
t
a
s
k
i
s
t
o
a
ss
e
ss
t
h
e
ha
z
a
r
dou
s
m
a
t
e
r
i
a
l
r
i
s
ks
a
t
a
l
o
c
a
l
ga
s
s
t
a
t
i
on
.
T
h
e
s
t
a
t
i
o
n
ha
s
on
e
30
,
000
-
ga
ll
o
n
unde
r
g
r
ou
n
d
s
t
o
r
ag
e
t
an
k
c
o
m
pa
r
t
m
en
t
a
l
i
z
e
d
t
o
h
o
l
d
10
,
00
0
gal
l
on
s
ea
ch
o
f
t
h
e
t
h
r
e
e
ga
s
o
li
n
e
g
r
ade
s
,
and
t
he
re
i
s
on
e
add
i
t
i
ona
l
10
,
00
0
-
gal
l
o
n
t
an
k
f
o
r
d
i
e
s
e
l
f
u
e
l
.
T
h
e
s
t
a
t
i
o
n
ha
s
f
ou
r
p
u
m
p
s
,
an
d
ea
ch
on
e c
a
n
deli
v
e
r
al
l
f
ou
r
p
r
odu
c
t
s
.
A
l
s
o
o
n
s
i
t
e
i
s
a
2
,
50
0
s
q
.
f
t
.
c
on
cr
e
t
e
b
l
o
ck
b
u
il
d
i
n
g
u
s
e
d
f
o
r
t
h
e
c
a
s
h
i
e
r
an
d r
e
t
ai
l
s
a
l
e
s
o
f
s
e
r
v
i
ce
s
t
a
t
i
o
n
an
d c
o
n
v
en
i
en
ce
s
t
o
re
i
t
e
m
s
.
T
h
e
s
t
a
t
i
o
n
i
s
l
o
c
a
t
e
d
a
t
a
bu
s
y
i
n
t
e
r
s
e
c
t
i
o
n
nea
r
t
h
e c
e
n
t
e
r
o
f
t
o
w
n
.
I
t
i
s
ad
j
a
c
en
t
t
o
s
e
v
e
r
a
l
o
t
he
r
l
o
c
a
l
bu
s
i
ne
s
s
e
s
t
ha
t
d
o a
b
r
i
s
k
bu
s
i
ne
ss
du
r
i
n
g
t
h
e
da
y.
Acr
o
s
s
t
h
e
s
t
r
ee
t
f
r
o
m
t
h
e
s
t
a
t
i
o
n
i
s
a
l
a
r
g
e
hou
s
i
n
g
d
e
v
e
l
o
p
m
en
t
w
i
t
h
a
n
e
l
e
m
en
t
a
ry
s
c
hoo
l
.
B
eh
i
n
d
t
h
e
s
t
a
t
i
o
n
i
s
a
c
i
t
y
pa
rk
w
i
t
h
p
l
a
y
g
r
ou
n
d
s
,
ba
s
e
ba
l
l
f
i
e
l
d
s
,
an
d a
l
a
r
g
e
w
oode
d
a
r
ea
.
U
s
e
t
h
e
G
EB
M
O
f
r
a
m
e
w
o
rk
t
o
a
ss
e
ss
t
h
e r
i
s
ks
r
e
l
a
t
e
d
t
o
t
h
e
f
u
e
l
s
i
n
t
h
e
unde
r
g
r
oun
d
t
an
k
s
.
Con
s
i
de
r
ph
y
s
i
c
a
l
,
c
h
e
m
i
c
al
,
an
d
na
t
u
r
a
l
ha
z
a
r
d
s
t
ha
t
m
a
y
c
on
t
r
i
bu
t
e
t
o
t
h
e
r
i
s
k
s
.
1
.
D
i
s
c
u
ss
h
o
w
y
o
u
app
li
e
d
ea
ch
o
f
t
h
e
s
t
ep
s
i
n
t
h
e
G
EB
MO
p
r
o
c
e
s
s
an
d
w
h
a
t
r
i
s
ks
y
o
u
i
den
t
i
f
i
ed
.
2
.
Pr
o
v
i
d
e r
e
c
o
mm
enda
t
i
on
s
f
o
r
p
r
e
v
en
t
i
n
g
s
pi
ll
s
o
r
r
e
l
e
a
s
e
s
.
3
.
D
i
s
c
u
ss
r
e
s
p
o
n
s
e
a
c
t
i
on
s
r
equ
i
r
e
d
i
n
t
h
e
e
v
en
t
o
f
a
s
p
i
l
l
o
r
r
e
l
ea
s
e
.
S
uppo
rt
y
ou
r
d
i
s
c
u
ss
i
o
n
w
i
t
h
app
r
op
r
i
a
t
e r
e
f
e
r
en
c
e
s
an
d
i
n
-
t
e
xt
c
i
t
a
t
i
on
s
.
.
You have been appointed as a system analyst in the IT department of .docxshericehewat
You have been appointed as a system analyst in the IT department of a selected university in Malaysia. You are responsible to develop an online admission system for the university. For this reason, you have to do an analysis and design to model the online system that could be developed later. Identify the requirements for the system and produce a software requirement specification (SRS) to document all the details.
.
You choose one and I will upload the materials for u.Choose 1 of.docxshericehewat
You choose one and I will upload the materials for u.
Choose 1 of the following 3 questions, and answer it in a paper of no more than 1000 words. Submit that paper by
November 4
at midnight PST in the appropriate IICS515 Moodle dropbox.
4. Monday October 27 lecture
Themes: Global Media Governance and Regulation; The Internet and Digital Media
Readings: Chapter 5, “The Medium: Global Technologies and Organizations,” and Chapter 6, “The Internet”
In this lecture, we discussed the definition and history of communication rights as one element or dimension of communication policy, and used it to bring to life a subject—policy—that sometimes seems abstract and technical in nature.
In doing so, we noted the evolution from a “negative” rights view of communication rights, as expressed in Article 19 of the United Nations Universal Declaration of Human Rights in 1948, to the more “positive” definition of communication rights explained in the lecture content derived from the work of Marc Raboy (and Jeremy Shtern).
Remember that “negative” does not mean “bad” here nor “positive” good. “Negative” and “positive” rights—which are ways of thinking about all human rights, not just communication rights—are instead ways of characterizing the orientation of rights toward individuals and society. Negative rights are defined in terms of freedom
from
things, and positive rights in terms of freedom
to
have or do certain things. Both negative and positive rights derive their legitimacy from fundamental and universal consideration of what it means to be human and to be treat people as human beings.
In our case study at the end of the lecture, we then discussed how a “positive” approach to communication rights could help us better understand and perhaps act against cyberbullying.
In your paper, and in your own words, define “communication rights,” and then briefly explain the evolution from the negative to the positive rights approach to communication rights.
Once you have done that, and with reference to the cyberbullying pamphlet from the Canadian government attached to your lecture notes, demonstrate how a “positive” rights approach to communication rights can help us better understand and prevent cyberbullying. In other words, what are the limitations of approaching cyberbullying from a “negative” rights perspective, and what does a “positive” approach to communication rights do to help us understand and perhaps act against cyberbullying?
Cyberbullying is a problem in international communication that affects many, especially vulnerable teenagers, as illustrated in the case of the late Amanda Todd (from British Columbia).
You do not need to use the McPhail chapter here, as it is not directly relevant to this question. Rather, draw on the lecture notes and the podcast as your sources here.
5. Wednesday October 29 lecture
Themes: Global Media Case Study in Media and the Arab World; Orientalism
Readings: Said, Edward (1978)..
You are Incident Commander and principal planner for the DRNC even.docxshericehewat
You are Incident Commander and
principal planner for the DRNC event. As you commence the planning process, consider the two fundamental types of error committed by policy makers in their reliance on intelligence reports to formulate policy. What would you do to minimize these errors from occurring and adversely affecting your policy decisions?
Min 500 words, In text references, APA format
.
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docxshericehewat
You Decide
Cryptographic Tunneling and the OSI Model
Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lecture).
Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).
.
You are working as a behavioral health specialist in a neurological .docxshericehewat
You are working as a behavioral health specialist in a neurological research center and are responsible for participant education. There are three participants to choose from: Stephanie has experienced a stroke; Jamie has experienced an amputation; and Robert has experienced a traumatic brain injury. Choose one participant to work with.
We are chosing Robert and his traumatic brain injury
Prepare
a 1,000- to 1,200-word paper that explains the functions and limitations of neural plasticity in the participant's recovery process.
Include
two to three peer-reviewed sources.
.
You are to write up a reflection (longer than 2 pages) that discusse.docxshericehewat
You are to write up a reflection (longer than 2 pages) that discusses what happened in the prisoner's dilemma activity we did in class on Monday, April 20. Some points to cover include why you took the action you took, what you thought others were going to do and why, and what actually happened. And what implications this has for situations in the work place where individuals may take different actions than might be the most beneficial for the team as a whole.
.
You can only take this assignment if you have the book Discovering t.docxshericehewat
You can only take this assignment if you have the book Discovering the Humanities. This homework needs to be done by reading Chapter Nine. It needs to be a minimum of 150 to 200 words. It needs citations and referances.
Western art and architecture has influenced and been influenced by cultures in India, China, and Japan.
Part I:
Using examples provided from this unit's reading, discuss how the artistic culture in either India, China, or Japan (select one) exhibits influence from Western cultures. Discuss, too, the reciprocal connection, specifically explaining how India, China, or Japan influenced Western art and architecture.
Part II:
Add to your post by discussing the similarities and differences between art from your selected culture (India, China, or Japan) and ancient Greek sculpture. Use examples and images to support your ideas.
.
You are to interview a woman 50 and older and write up the interview.docxshericehewat
You are to interview a woman 50 and older and write up the interview
in a 5 page MLA paper. You ask questions intended to elicit information about her life
and how it relates to the history of women in the late 20th century. Your paper
should be normal margins, 10-12 pt. font, typed and double-spaced. It should
include the approximate age of your interviewee—it does not have to include her
name.
EXAMPLE QUESTIONS ..........
What’s your first, most vivid memory? Going to my grandma and grandpa’s farm and making grandma walk me out to the outhouse for fear of a mean bannie rooster would peck me to death. He was afraid of grandma.
What was the apartment or house like that you grew up in? How many bedrooms did it have? Bathrooms? I lived with my mother and father mostly in a house in the city that had 2 bedrooms, 1 bathroom. I had to share a room with my older brother that was upstairs.
What was your bedroom like? Very simple. It had 2 beds made of feathers, a desk with a lamp and one dresser for our clothes. Dallas (my brother got the bottom 2 and I got the top 2)
Can you describe the neighborhood you grew up in? Not really. Every chance I got I went to grandma and grandpas and spent time with them. They lived deep in the country. I had one friend out there that lived about 3 miles away on the next farm. His name was Carl.
Tell me about your parents. Where were they born? When were they born? What memories do you have of them? Both parents were born in Richmond, IN. Memories include more of my mother than my father. He was a drunk that stayed out all the time. He only came home when he was ready to pass out or to beat us.
Who was more strict: your mother or your father? Do you have a vivid memory of something you did that you were disciplined for? Since mom was the main one around I would say that she was more strict. I remember one instance when I was about 16 and mom had kicked me out of the house because she was forced to work with dad being gone all the time and I was telling her that I no longer wanted to take care of my little brother because I felt like I was his mother rather than her and that I didn’t want to do anymore of the house work. It was her house she should have to clean it. She kicked me out. I was sitting on the porch crying and dad came home (sober for once) and sat on the porch with me, got me calmed down and offered to give me a ride to grandma and grandpa’s.
Did your parents have a good marriage? No they had a horrible marriage.
How did your family earn money? How did your family compare to others in the neighborhood – richer,
poorer, the same? My family earned money from my mother working in a diner. Dad worked in a mill but we rarely saw his money. We did alright but I would say that we were on the poorer end of society.
What kinds of things did your family spend money on? The necessities and that was it.
How many brothers and sisters do you have? When were they born? What memories do yo.
You are to complete TWO essays and answer the following questions. .docxshericehewat
You are to complete TWO essays and answer the following questions. Here are your questions:
1) How has the information provided in this class changed or reinforced your perspective on an issue(S). Please provide details.
2) What do you believe is the biggest challenge facing our nation and why? Be specific and detailed. What can be done to address this challenge? Be realistic and detailed in your responses.
750 - 800 words each essay
no plagiarism
.
You are the vice president of a human resources department and Susan.docxshericehewat
You are the vice president of a human resources department and Susan has been your executive assistant for one (1) year. She effectively completes her given assignments, sometimes ahead of schedule. Susan has a welcoming personality and is commended on her willingness to help when asked. As a result of her efficiency, Susan often has spare time on her hands.
In several conversations, you have spoken with Susan about taking a proactive stance and involving herself in the business to increase her knowledge base. You have suggested she attend strategic planning meetings, shadow other Business Partners, and take professional development courses geared towards human resources. Susan has not incorporated any of these suggestions.
The organization promotes and encourages employee development and has a requirement of 24 professional development (PD) hours for each employee per annual review cycle. As VP of the department, you have offered to mentor Susan; yet she has not taken advantage of the offer. Given Susan’s capabilities and potential, you want to mutually establish future performance goals and developmental opportunities to enhance her effectiveness and maximize her organizational contributions.
Susan’s professional appearance and interaction with co-workers is superb. When asked to complete a task, she fulfills the assignment willingly and with very few errors. She is well liked and respected by her peers. She has impeccable oral and written communication skills. Overall, you are pleased with her performance but want to see Susan take initiative to seek out tasks to complete rather than waiting to be told what to do.
As the VP of HR, you have been tasked with a two part assignment. In part one of this assignment you will explain the importance of performance appraisals, analyze the essential elements which should be included and describe how performance appraisals can be used to promote employee growth. In part two of this assignment you will create a performance appraisal for Susan.
Your paper should be 8-10 pages in length incorporating both parts I and II. You can either design a performance appraisal document or use an existing template. The performance appraisal should be no more than 3 pages of the total page count for the assignment. Be sure your paper addresses all of the following components:
Part I: Importance of Performance Appraisals:
Explain how performance appraisals can be used as part of employee development.
Explain why rankings are given to employees and the advantages and disadvantages of including rankings.
Address why organizations should deliver appraisals in a timely manner to employees.
Discuss the advantages and disadvantages of three different types of performance appraisals. Make a recommendation of which type of performance appraisal is most appropriate for Susan.
Provide suggestions on how the manager can give feedback on a continual basis to the employee to encourage continual development.
Part II: Sus.
You are the purchasing manager of a company that has relationships w.docxshericehewat
You are the purchasing manager of a company that has relationships with many different suppliers. All information about orders, shipments, etc. is still manually exchanged. You have discussed incorporating Internet technologies to help manage the supply chain.
In 1-2 pages, summarize the advantages of using Internet technologies versus traditional methods in supply chain management.
.
You are to briefly describe how the Bible is related to the topics c.docxshericehewat
You are to briefly describe how the Bible is related to the topics covered in the course. An integration of the Bible must be explicitly shown, in relation to a course topic, in order to receive points. In addition, at least two other outside scholarly sources (the text may count as one) should be used to substantiate the group’s position.
.
You are the manager of an accounting department and would like to hi.docxshericehewat
You are the manager of an accounting department and would like to hire another managerial accountant to focus on internal accounting. The chief executive officer (CEO) is not convinced that a managing accountant position is needed. Prepare a 2-page memo for the CEO on the following:
Explain the objectives and characteristics of an internal accounting system.
.
You are the new chief financial officer (CFO) hired by a company. .docxshericehewat
You are the new chief financial officer (CFO) hired by a company. The chief executive officer (CEO) indicates that in the past, there was little rhyme or reason for the prior CFO to approve or disapprove of large capital projects or investments that various managers proposed. You mentioned to the CEO that there are three primary methods of capital budgeting, and they are as follows:
Simple payback method
Net present value method
Internal rate of return (IRR) method
Discuss the following topics on the Group Discussion Board and write a group paper between 700–850 words. Assign topics to be written by each group member and compile it all together before submitting your group paper:
A company's cost of capital and how it is calculated
What the marginal cost of capital is and how it differs from the weighted average cost of capital
.
You are the manager of a team of six proposal-writing professionals..docxshericehewat
You are the manager of a team of six proposal-writing professionals. You are tasked with completing one 50 page formal proposal as well as a 1-2 page summary advocating funding for a new sports arena. Your supervisor, a member of the senior leadership team, wants to know how you plan to successfully accomplish the assignment. Prepare a PowerPoint Presentation to your supervisor that conveys the following information:
As manager, how will you organize the work to prepare a proposal?
What tasks will each professional be assigned and why?
What three or four communication tools will you propose be used to effectively articulate the proposal and why? (For example, formal paper-based, PowerPoint Presentation, blog, Twitter, Facebook, LinkedIn, etc.)
.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2. seek to unearth broader
implications of the blockchain for the proliferation or blockage
of global finance and
beyond. Contrasting claims about the disruptive nature of the
technology, in this article
I show that, by redeeming the positive utopia of ontic,
individualized debt, blockchains
reinforce our belief in a crisis-ridden, financialized capitalism.
Keywords BITCOIN, BLOCKCHAINS, CRYPTOLOGY,
CYBERPUNKS, CYPHERPUNKS,
DAO, DLT, ETHEREUM, HARD FORK, SMART
CONTRACTS, TECHNO-UTOPIANISM
When an unidentified individual or group named Satoshi
Nakamoto (2008) introduced
Bitcoin in October 2008, most members of the cryptography
mailing list on which the
original Bitcoin whitepaper was published were sceptical at best
(Finney 2013). It was
developed as a peer-to-peer payment system to challenge central
bank control and the
incumbents of the global financial system. Despite its initially
cautious reception, over
the years Bitcoin has gained followers and gathered momentum,
for it has been fuelled
by the discontent caused by the financial crisis of 2007/8.
Aside from seeking to build a global payment system, Bitcoin is
characterized by
openness (owed to its goal to achieve decentralization), general
access for anyone
wanting to use it, and disintermediation. Bitcoin introduced not
only a transnational
payment network, but also a technology more generally capable
3. of tracking any type
Moritz Hütten
330
of data entry in a publicly accessible, transparent, and
immutable ledger – the block-
chain. Bitcoin is often called an ‘open’ or ‘public’ blockchain.
Various foreseeable
applications of the blockchain now stray from that path. For
example, a consortium or
private party seeking an easier, more controllable and
accountable blockchain run
(Buterin 2015) is more focused on streamlining business and
maintaining control than
on realizing a political goal. Prospective applications of the
blockchain technology, or
more generally the broader concept of the distributed ledger
technology (DLT),1 now
go far beyond transnational payments, with some observers
forecasting significant
transformations for the operations of global supply chains
(Casey and Wong 2017),
land ownership (Shin 2017), and the ‘internet of things’
(Dickson 2016). In contrast to
this outright co-optation or reinterpretation of the blockchain
technology – for a
detailed discussion, see Hütten and Thiemann (2018) – other
projects have followed
the more utopian ambitions of Bitcoin for harnessing
blockchains to promote individual
freedoms and (digital) self-determination. Public blockchains
are intended to operate
4. in a decentralized and distributed fashion, with participants
staying ‘honest’ through
economic incentives and proper procedures.
The emergence and proliferation of blockchain technology has
had a contradictory
reception. While some might almost celebrate Bitcoin and the
blockchain as a ‘grass-
roots’ movement and see the blockchain as a disruptive and
possibly revolutionary
technology with which to challenge the dominance of
governments and banks alike
(Swan 2015), the ‘old guard’ might not be all that troubled by
such a daring reputation.
Central banks, government agencies and the business
community might well regard the
blockchain and DLT as a promising side of research in their
quest to streamline their
activities and transition their services to the digital realm
(Economist 2015). To consider
the contradictory but expanding uptake of blockchain
technology so far, we need to
scrutinize claims about the coming ‘blockchain revolution’
(Tapscott and Tapscott 2016)
to understand how it might affect global finance and global
supply chains, and where
the utopianism of its more idealistic advocates is heading. By
analysing a crisis that hit
a frontrunner of the public blockchain technology, Ethereum, I
explore how well public
blockchains live up to their utopian ideals, and discrepancies
between the proclaimed
governance of blockchains and existing de facto control through
expertise and
reputation. I see Ethereum as exemplifying a libertarian techno-
utopianism. When the
5. highly publicized but faultily crowdfunded venture fund called
‘The DAO’ (an instance
of a decentralized autonomous organization) was deployed on
the Ethereum blockchain,
the techno-utopianism was suspended, and developers fell back
on strong network ties.
Throughout this article I examine how the suspension of the
techno-utopianism was
conducted and what broader implications this holds for the
future of open blockchain
technology. Adopting the blockchain without maintaining the
utopian promises of
inclusion, democratization and participation could set broader
developments in motion.
A Blockchain case: Ethereum
A highly gifted programmer called Vitalik Buterin invented
Ethereum, which is one of
the most prominent open access blockchains. In 2014, the
Ethereum Foundation, a
The soft spot of hard code
331
Swiss non-profit organization, successfully collected more than
25,000 Bitcoins (then
worth about US$ 15 million) through decentralized
crowdfunding. The foundation pre-
sold about 50 million ‘Ether’, the native token of the then to be
launched Ethereum
blockchain (Buterin 2014). While Bitcoin had already
implemented more complex
6. functions like timed transactions and multi-signature
transactions, it also deliberately
limited its function to process peer-to-peer payment transactions
(Campbell-Verduy
and Goguen 2018b in this issue). Expanding on the concept of
Bitcoin, Ethereum was
meant to function as a blockchain capable of processing more
advanced interactions
between two or more parties delivering a ‘Turing-complete’
programming environment
not restricted to a few selected functions. Ethereum was
designed as an open access
blockchain capable of executing so-called smart contracts. At
the time, its CCO
Stephan Tual described Ethereum as a ‘censorship-proof “world
computer” that anyone
can program, paying exclusively for what they use and nothing
more’ (Tual 2015). To
understand what makes Ethereum different from Bitcoin
requires a deeper examination
of the concept of smart contracts.
The concept of the smart contract came from Nick Szabo (1997)
and, ever since, it
has caused confusion and been criticized for its ambiguity.
While the term ‘contract’
evokes associations with the legal concept of a contract, the
resemblance is limited.
Two dominant, rough concepts are in use – smart contracts as
smart contract code, and
smart contracts as smart legal code (Stark 2016). One can
understand a smart contract
code as a complex code stored on a blockchain, which, once
created, can act autono-
mously when called on to perform an action. Such a smart
contract code might even
7. hold balances of cryptocurrencies or control other smart
contracts. A smart contract
code can also be called a ‘smart agent’ or ‘software agent’
(Stark 2016) to exemplify a
merger of some autonomy and/or process of automatization. A
smart legal code makes
a specific case for a smart contract code in which the smart
contract might be utilized
to automatize and streamline an exchange, but it includes some
traditional legal lan-
guage to clarify responses to unforeseen events or similar
situations. Occasionally, the
term ‘smart contract’ is used more vaguely to describe a murky
combination of both
conceptualizations; thus, it describes something that fits the
definition of a smart con-
tract code, but at the same time expects it to substitute for a
legal code driven by a rather
superficial understanding of law. Furthermore, concepts of
smart contracts exemplify
the fiction of law being a politically neutral construction, while
the law is a product of
human convictions and interaction (Milhaupt and Pistor 2008:
22).
Like Bitcoin, the Ethereum blockchain is updated by a
decentralized network of
computers called ‘miners’, which provide the computational
power to run it. Unlike
Bitcoin, however, the ‘miners’ not only authenticate
transactions, but also run the smart
contracts’ executable code. While smart contracts can in theory
operate without a
blockchain, doing so can cause problems of possible downtimes
and code manipulation
(Buterin 2013). Indistinct terms like ‘cloud’ servers obscure the
8. underlying physical
server architecture and usually describe the centralized server
farms that large com-
panies like Amazon or Google often run. Contrasting this
centralization of control, open
blockchains in general and Ethereum in particular are meant to
provide dependable and
distributed networks for executing transactions and more
complex programs.
Moritz Hütten
332
Beyond the presumed gains in efficiency, Ethereum promises
empowerment and
social mobility, for anyone can freely access its blockchain,
deploy programs and be
judged by the quality of his or her work regardless of formal
titles or financial means
other than access to the internet and a device like a personal
computer. In fact, the
promises of empowerment in many blockchain projects echo
earlier enthusiasm seen
when personal computers proliferated. Personal computers
fuelled the expectation that
they would put the means of production in the hands of a self-
educated working class
able to utilize these devices to climb the social ladder by
becoming advanced knowl-
edge workers (Dyer-Witheford 2015: 9). However, promises of
empowerment through
technology are often problematic and the seemingly frictionless
brave new world of
9. digital interaction frequently reproduces or amplifies familiar
patterns of exploitation,
elitism and exclusion on gender and racial grounds – or rather
inclusion via exclusion
creating a global precariat of cybernetic capitalism (Dyer-
Witheford 2015; Economist
2017; Huws 2014). Hence, we must ask how much the
‘blockchain revolution’ can
contribute to the empowerment of civil society, especially to its
most vulnerable mem-
bers. Algorithms are step-by-step procedures for solving
mathematical problems
predominantly by computers. While the blockchain is an
emergent technology and its
future implementation in society unclear (Campbell-Verduyn
2018a), some scholars
already suggest the emergence of a new subset of law, a lex
cryptographia, marking a
merger of legal and algorithmic governance with algorithms
structuring the conduct
and interaction of agents (Wright and De Filippi 2015).
Scholars should develop a better understanding of the visions
and convictions
embedded in this technology. In contrast to the need to separate
technology from
politics, it is important to examine blockchains as an organic
whole consisting of the
technical, scientific, social, economic and political
considerations of engineers who
combine scientific, technical and sociological analyses when
envisioning technological
innovation (Callon 1993). Nigel Dodd (2015, 2017), for
example, has repeatedly
argued that one should view Bitcoin and the blockchain as a
social movement to pro-
10. mote a utopian vision for society. While many techno-activists
in the blockchain
community pride themselves on creating technological fixes for
political problems, the
utopian vision embedded in this technology is anything but
apolitical. Claims about the
profound future impact of blockchains and subsequent social
advancement (Swan
2015) must be scrutinized to unearth the foreseeable and
unforeseeable consequences
and downsides that the blockchain and its utopianism might
introduce.
Cypherpunk utopias
Examining the utopianism of the blockchain demands that we
further examine the
(activist) context from which this technology emerged. Above
all, the blockchain is a
manifestation of the movement by activists called cypherpunks
who promote the cause
of digital freedom and digital self-determination secured by
cryptography challenging
government control. Cryptography is the science and study of
writing, sending, receiv-
ing, and deciphering secret messages, including authentication,
digital signatures, the
hiding of messages (steganography), cryptanalysis, and several
other fields (May and
The soft spot of hard code
333
11. Hughes 1992). Cryptography is commonly associated with
secrecy and concealing
information and identities, but it equally concerns verifying the
authenticity of inform-
ation and identity claims. Cryptography is about securely
exchanging information
while keeping hostile third-parties from eavesdropping or
manipulating information.
Ciphers are procedures consisting of well-defined steps for the
encryption or decryption
of messages. They have been around for over two millennia and
works on cryptography
often start with the so-called Caesar’s cipher, a comparatively
simple cipher encrypting
and decrypting messages by shifting letters. Cryptography has
advanced ever since to
produce ever more complex ciphers. At the onset of the
twentieth century, cipher
machines entered the scene, such as the infamous Enigma
machine that the German
navy used in the Second World War (Kruh and Deavours 2002).
Until the 1970s, advanced cryptography was predominantly used
for military com-
munication (Holden 2017). In fact, cryptography was a closely
guarded secret with
most of the research in the field conducted by the National
Security Agency (NSA) and
the export of cryptographic devices strictly prohibited (Levy
2001). However, for
various reasons, the NSA’s control of cryptographic research
weakened from the 1970s
onwards. Furthermore, as the use of computers became more
widespread there was a
growing need for secure communication for commercial use and
this created a general
12. demand for encryption technology. IBM produced a symmetrical
encryption algorithm
called Data Encryption Standard (DES) that would become the
US government stan-
dard, although there was some controversy over the NSA’s
involvement in developing
it (Levy 2001). This development occurred alongside the
unrelated work of two cryp-
tologists, Whitefield Diffie and Martin Hellman (1976), who
engaged the academic
community with their article ‘New directions in cryptography’
(Holden 2017; Lopp
2016). Shortly before, in December 1975, Ralph C. Merkle
published an article in
which he declared that the modern digital computer could create
ciphers that were
practically unbreakable (Merkle 1978: 1). The US
counterculture movement and the
Watergate scandal greatly increased awareness of the dangers of
insecure communi-
cation channels and government overreach (Holden 2017: 208).
Advocates of publicly
available encryption viewed cryptography as a tool for
protecting civil liberties and
individual freedoms. Later, cryptologist David Chaum (1983)
wrote about crypto-
graphically secured electronic payment systems and
pseudonymous reputation systems.
Chaum discussed how downsides of electronic payments like the
danger of a third party
collecting extensive data on individual conduct could be curbed,
while maintaining the
advantages, such as traceable proofs of payment.
Towards the end of 1992, a small group interested in data
privacy and public
13. accessibility to strong cryptographic tools set itself up in the
San Francisco Bay Area;
it called its members ‘cypherpunks’, a merger of the terms
‘cipher’ and ‘cyberpunk’
(Lopp 2016), the latter being a literary genre that developed in
the 1980s. Cyberpunk
merges science-fiction scenarios with the cultural pessimism
and aggressive rebellion
of punk culture envisioning a post-nation-state world in which
global networks and
transnational corporations have become the dominant forces.
Cypherpunks subse-
quently expanded into the market anarchism envisioned by
cyberpunk literature, but
counterbalanced powerful institutions and corporations with
cryptography that
Moritz Hütten
334
empowered individuals to maintain privacy and independence.
One of the founding
members, Timothy C. May, had circulated a ‘Crypto anarchist
manifesto’ alluding to
how he expected cryptography to secure individual freedom
from government control
and proclaiming that ‘a specter is haunting the modern world,
the specter of crypto
anarchy’ (May 1988). Among others, Wei Dai, a computer
engineer who developed some
of the core concepts that would form the foundation for Bitcoin,
described his fascination
with crypto-anarchy as follows: ‘unlike the communities
14. traditionally associated with
the word “anarchy”, in a crypto-anarchy, the government is not
temporarily destroyed
but permanently forbidden and permanently unnecessary’ (Dai
1998).
For the cypherpunks, the state was the most threatening danger
and cryptography
was the tool that would liberate them from government
oppression. In the 1990s, ten-
sion between cypherpunks and government officials built up and
resulted in so-called
‘crypto wars’ (Lopp 2016). US government officials tried to ban
secure commercial
and private encryption. Eventually, cryptography was removed
from the United States
Munitions List (USML) and this gave way to the
commercialization of and public
access to cryptography. Nonetheless, tension persisted because
the cypherpunk acti-
vists’ vision conflicted with the government’s goal to gain
authority over the internet.
John Barlow (2001), a renowned activist, founding member of
the Electronic Frontier
Foundation and former member of the Grateful Dead published
an article stating that
digital natives would self-govern cyberspace without
government intervention. While
comparatively secure encryption is still available to the public,
the smouldering conflict
with governments remained and resurfaced with the ‘war on
terror’, fuelled by fears of
terrorists utilizing secure encryption to conceal their activities.
Drawing on the bigger picture, cypherpunk ideology is nested in
the ‘Californian
15. ideology’ of the tech-entrepreneurs of Silicon Valley. The
‘Californian ideology’
merges the anarchism of the New Left and the entrepreneurial
zeal of the New Right
with an optimistic techno-determinism (Barbrook and Cameron
2001). However,
engineers in Silicon Valley did not start out as the resolute
capitalists they have now
become. Radio club hobbyists and various utopian communes
flourished in the region
long before the formation of cypherpunk and even before the
rise of Silicon Valley.
The radio club hobbyists had a culture of shared knowledge and
democratic beliefs.
Through their lively interaction, they cultivated a unique set of
skills and expertise
centred on building the radio devices and fostering a DIY
hands-on mentality towards
technological problems (Lécuyer 2007). Firms drew on the
expertise the hobbyists cul-
tivated and this, in turn, led to the emergence of some of the
most advanced firms in
developing microtube technologies in the region. Contradicting
modern tales of the
lonesome genius innovator, government spending heavily
backed these developments,
especially through the US military, which, until the 1970s, was
the biggest market for
advanced microtubes and the microprocessors that eventually
followed (Lécuyer 2007).
Yet, when technology advanced and microprocessors replaced
microwave tubes, an
ideological shift accompanied the technological rupture. The
earlier socialist leaning
engineers who were promoting utopian ideals of displacing the
16. segregation between
workers and capital gave way to a different breed of
microprocessor engineers. The
next generation of engineers was meritocratic and resolutely
capitalist (Lécuyer 2007:
The soft spot of hard code
335
296). Along with the need for more highly-skilled labour came
experimentation with
unconventional working conditions, an increase in flexibility,
profit sharing and new
methods of financing, all of which served to augment the wealth
of even the middle-
class engineers. The earlier dependence of these entrepreneurs
on vast government
spending to blaze the path for their technological innovations
was quickly forgotten
(Mazzucato 2015). In a similar fashion, the surging
digitalization gave rise to the
concept of masculinized ‘immaterial labour’, as perpetuated by
the male icons of the
industry, which stands in stark contrast to frequently unwaged
and underrecognized
female labour (Dyer-Witheford 2015). Highly-skilled female
labour was crucial for the
development of cryptography; for example, women working for
the Women’s Royal
Naval Service at Bletchley Park, the ‘nerve centre’ of the
British Intelligence
establishment during the Second World War, but their
importance was not fully
17. recognized at the time (Hicks 2017: 25).
Beneath the glamorous façade of Silicon Valley’s billionaire
owners and high-
technology labour aristocracy lies a burgeoning and precarious
labour force involved
in the dangerous and toxic work associated with the production
of microprocessors
(Dyer-Witheford 2015: 61). Much of the myth of a frictionless
process seems to stem
from forgetting about the actual physical labour in which it is
grounded. This contra-
diction seems to be right at the heart of the Silicon Valley
mindset, strikingly illustrated
by the contrast between Apple HQ, where future Apple products
are designed, and the
Foxconn factories where the actual production is happening
(Dyer-Witheford 2015:
37). Crypto-anarchism often better exemplifies this egoistic
entrepreneurial mindset
than the broader social concerns of classical leftist concepts of
anarchism.
The question then is what kind of utopia springs from this
ideological background?
Brett Scott (2014) dubbed the emergence of the blockchain the
birth of the ‘techno-
leviathan’, or the vision of a deified crypto-sovereign forming
the foundation for free
individuals interacting in a (digital) world beyond coercion.
Blockchain enthusiasts
claim that governments might still exist, but they must earn
their keep by becoming
economically rational and cost-effective (Swan 2015). While
many advocates of
Bitcoin downplay the importance of the politics involved,
18. critical scholars like David
Golumbia (2015: 119) argue that Bitcoin is so strongly imbued
with political ideals that
it is best analysed as ‘politics masquerading as technology’.
Marcella Atzori (2017)
highlighted the danger of hidden forms of centralization being
injected into open
networks. The reception of the blockchain technology touches
on the broader debate
on techno-utopianism vs dystopian outlooks regarding emergent
technologies such as
high frequency trading and those using big data (Campbell-
Verduyn et al. 2017). While
advocates of a techno-utopian outlook emphasize efficiency
gains and societal wealth
and raise hopes that technology might transcend politics, critics
question the neutrality
of technology and call the public to consider the dangers of
overbearing control and
opaque techno-governance (Campbell-Verduyn et al. 2017). The
debate is open-ended,
and we do not yet know how blockchain technology will
develop in the coming years;
the critiques of technological utopias that emphasize the
possible downsides of novel
technologies are highly persuasive. In the next section, I shall
examine more closely
how this ideology manifested in a concrete application.
Moritz Hütten
336
A cypherpunk utopia in the making: the case of ‘The DAO’
19. Over the course of 2016, a team of programmers from Slock.it,
a high-profile start-up
in the Ethereum ecosystem, launched what was supposed to be
prototypical for a newly
emerging form of democratically governed, globally operating,
decentralized organiza-
tion. The team, which sought to replace management with a
merger of algorithmic
governance and human stakeholder voting, called its creation
‘The DAO’, an acronym
for decentralized autonomous organization (Buterin 2013).
While neither Slock.it nor
Buterin made the connection explicit, the concept of a DAO is
clearly grounded in the
reductionist organizational theory of Michael Jensen and
William Meckling (1976), a
point that Wright and De Filippi (2015: 15) also raised. Jensen
and Meckling believed
it possible to reduce organizations to a nexus of human
participants and contracts.
Reducing organizations to such a bare minimum falls short of
accounting for some of
their more complex aspects and reduces agents to simplistic,
insufficiently socialized
homo oeconomini (Atzori 2017: 56), but it nonetheless lends
itself well to translation
into a formal programming code.
‘The DAO’ resembled a crowdfunded venture fund, an
experiment in organizational
governance grounded in algorithmic authority (DuPont 2018).
Much of the concept
hearkens back to the crypto-anarchism at the heart of the
cypherpunk utopia, which
envisions a world in which free and anonymous individuals
20. voluntarily bind themselves
to contracts of their choosing that allow them to pursue personal
wealth and advance-
ment as a society without centralized control. Echoing
Lawrence Lessig’s infamous
statement that in cyberspace ‘code is law’ (Lessig 2006: 5), the
binding agreements of
‘The DAO’ were set forth not in legal contracts, but in the form
of a programming code
deployed on the Ethereum blockchain. According to Dupont
(2018), ‘The DAO’ could
be understood as a pseudo-legal organization run by an
assemblage of human and
‘robot’ participants. ‘Robot’ participants existed insofar as
humans were meant to
interact with algorithmic rules that self-execute and
automatically respond in a
predefined manner to human input. Human agents could become
stakeholders by
investing some of their Ether, the Ethereum blockchain’s native
token, for an initial
decentralized crowdfunding phase of 28 days. In return, they
would receive tokens
representing proportional voting and ownership rights in the
DAO and granting them
access to future profits (Jentzsch 2015: 2). Between 10,000 and
20,000 people invested
in ‘The DAO’, which equipped it with about 11.5 million Ether
valued at a total of
US$ 160 million at the time (DuPont 2018). A subsequent price
hike of Ether further
increased the DAO’s holding to the equivalent of US$ 250
million.
However, to share out profits or avoid a hostile majority vote
exploiting a minority,
21. the DAO allowed stakeholders to split from the main
organization to create a ‘child
DAO’ under its control (Jentzsch 2015: 2). Setting up a ‘child
DAO’ was supposed to
invalidate the original DAO tokens and, after a 28-day waiting
period, allow investors
to cash in their profits or stake. Some community members
voiced concerns about the
split function introducing vulnerabilities that might allow
someone to conduct a so-
called ‘race to empty’ attack (Vessens 2016). In such a case, the
attacker would use the
split function to call repeatedly to withdraw the Ether function
before the DAO tokens
The soft spot of hard code
337
he or she was holding could be updated, which effectively
allowed the attacker to drain
funds without holding the corresponding tokens. While one of
the founders of Slock.it,
Stephan Tual (2016), assured the community that no DAO funds
were at risk, on 17
June 2016 someone did execute a ‘race to empty’ attack to drain
the DAO’s funds.
Analysing crisis: the failure of the DAO
The ambitious DAO experiment never got the chance to make an
investment. Shortly
after it became operational, an unidentified hacker exploited a
flaw in the code and
22. began to drain the DAO’s funds by launching a ‘race to empty’
attack. While the DAO
was technically a third-party project and the flaw did not
endanger the Ethereum block-
chain directly, a broad alliance of developers and stakeholders
insisted on the attack
being countered to protect the funds and demanded an
intervention to reclaim the
‘stolen’ funds on the DAO’s behalf. For ‘The DAO’, proposing
such an intervention
was highly controversial and contradicted virtually all the
public statements and
discussions that had preceded the attack.
In comparing the controversy, both Ethereum and the DAO were
very specific about
the rules of their respective projects. Ethereum’s official
website (www.ethereum.org)
describes it as a ‘decentralized platform that runs smart
contracts: applications that run
exactly as programmed without any possibility of downtime,
censorship, fraud or third-
party interference’ (emphasis added). Similar statements are
found in the DAO’s terms
of use, which claim that ‘nothing in this explanation of terms or
in any other document
or communication may modify or add any additional obligations
or guarantees beyond
those set forth in the DAO’s code. … The DAO’s code controls
and sets forth all terms
of the DAO Creation.’ Both descriptions leave strikingly little
wriggle room. Ethereum
promises a strictly neutral and immutable platform removed
from any intervention on
behalf of any third party. The DAO website clearly states that
descriptions in writing
23. are educational only and that the programming code alone will
determine the DAO’s
actual intention. Essentially, anyone investing in ‘The DAO’ is
supposed to agree to
the conditions set out in the programming code rather than in
any written terms of use.
While it is doubtful that such an agreement would hold up in a
court of law, the DAO
is nonetheless clear about the conditions, and in another section
warns investors of risks
including the possible loss of all funds through unforeseen
errors and attack vectors.
Some members of the Ethereum community even argue that the
presumed ‘theft’ of
funds by the hacker was not even ‘theft’ but in line with the
DAO’s terms, since they
state that whatever the code allows someone to do would be the
intention of the code.
When the attack commenced, contrary to all previous
statements, a broad alliance
calling for action emerged and sparked a battle over how to
interpret the event at hand.
A narrow majority favoured intervention, but a substantial
minority wishing to uphold
the previous statements and agreement to abstain from
intervening on anyone’s behalf,
opposed it. The latter group viewed intervention on the DAO’s
behalf as the enforce-
ment of a special group interest. The potential conflicts of
interest inherent in some
developers of Ethereum serving as both Slock.it advisors and
DAO investors further
complicated the situation. Surprisingly, the two groups clear
descriptions did little to
24. Moritz Hütten
338
calm the situation. Instead, both argued that they were acting in
accordance with their
original statements on their preferred option and were in line
with the ‘true’ principles
of both Ethereum and the blockchain. The DAO’s technical
specifications meant that
the attacker had to wait out the 28-day prescribed time window
before being able to
assume control of the funds by siphoning them from ‘The DAO’
to a ‘child DAO’.
Various options initially seemed feasible; these ranged from
counter-attacks by so-
called white hat hacker groups seeking to return the funds to the
original stakeholders,
a softfork to censor the hacker’s transactions and a hardfork to
dismantle the DAO
altogether. The counter-attack group was able to stall the
hacker’s attempts to gain con-
trol of the funds but was unable to redeem them permanently. A
softfork would have
required miners to refrain from processing the hacker’s
transactions and generally
would have maintained the previous status quo, but it turned out
to be unsustainable for
various reasons. Eventually, the hardforking option was
discussed. This entailed most
of the miners switching to an alternative version of the
blockchain in which the DAO
hack had been undone, thereby altering the supposedly
25. immutable blockchain and
permanently departing from the previous status quo.
Because of the controversial nature of either decision, debates
erupted on public
Ethereum forums like the Reddit subforum r/Ethereum. Groups
in favour of intervening
on behalf of the DAO argued for a hardfork, while the opposing
group argued against
such an intervention. Each group developed its own crisis
narrative.
A pro-fork group favouring undoing the DAO took what it
proclaimed to be a
pragmatic stance on blockchain governance. Its members
viewed themselves as rational
actors choosing self-defence over ‘zealously’ sticking to
principles (sjalq 2016),
capable of acting if needed (HoboRobo 2016), and claiming
community consensus to
be the ultimate arbiter on the proper state of the blockchain
(yeshe257 2016). They
argued that the project was still in an early stage and should be
fixed along the way.
The pro-fork group was opposed by a smaller anti-fork group in
favour of keeping the
Ethereum blockchain unchanged. This anti-fork group voiced its
concerns about ‘moral
hazard’ resulting from community intervention (Rune4444
2016), disparaged attempts
to rescue a faulty third-party project (TheBigJort 2016) and
questioned whether the
upside of intervening on behalf of the DAO could make up for
the loss in trust in the
dependability of the network (egimo 2016). It also argued that
prior statements had
26. stated that ‘code is law’ and that hard-forking would be a major
departure from this
agreement. Many of the arguments that the anti-fork group
presented suggest that it
viewed this intervention as a repetition of those that followed
the financial crisis of
2007/8 in which the financial authorities rescued ‘too big to
fail’ banks. Vitalik Buterin
publicly posted that he favoured a hardfork (Buterin 2016).
Various mock-posts
emerged over the following days asking Buterin to fork over
small losses that occurred
sometime in the past through various mistakes.
Despite not having formal control of Ethereum, Buterin strongly
influenced the
community with his public statement. Furthermore, forking over
the DAO prompts us
to ask if there is a conflict of interest for community members
who are supposed to be
enforcing the integrity of the system but are also often involved
in a substantial
investment. Considering all previous publicly made statements,
acting to rescue a third-
The soft spot of hard code
339
party contract like the DAO was deemed to be a highly unlikely
event, but when crisis
struck, commitment to prior statements proved weak. In contrast
to previous claims
about decentralization and immutability, action was and could
27. be taken quickly.
Closer scrutiny of the DAO hack and its aftermath reveals that
what was supposed
to represent a turning point in legal authority and algorithmic
governance (or govern-
ance by algorithms) collapsed into hurried private discussions
and governance by
narrow elite networks (DuPont 2018) in which the community
served as a weak safe-
guard. Following the decision to fork, the supposedly immutable
public ledger that is
the blockchain was altered, turning the DAO’s more complex
contract into a simple
withdrawal contract in which anybody holding DAO tokens
could withdraw a corres-
ponding amount of Ether. Consequently, ‘The DAO’ was
undone, which created what
one forum member called a very different ‘social contract’ from
the one previously
implied on the Ethereum website (carver 2016).
Many observers from the banking sector and other industries
saw this as a ‘wake-
up call’, a reminder that they should consider what the word
‘public’ means in the case
of a public blockchain (cited in Rizzo 2016). Within the
Ethereum community, many
praised the outcome of this crisis episode as an exemplification
of the great flexibility
and practicability of Ethereum, while others saw it as a
violation of principle and an
instance of censorship (DuPont 2018).
Before the fork, developers and users thought that a minority
chain might form but
28. would quickly become unsustainable and die out. Instead, a
minority refused the fork
and continued to maintain the original Ethereum chain,
indicating that control is more
centralized than expected but not flawless or total. The
unaltered version of Ethereum
was first seen as a mere curiosity, but the reception quickly
changed when one of the
biggest cryptocurrency exchanges, Poloniex, opened the floor
for trading a token now
called Ethereum Classic. This shocked many members of the
community by effectively
creating a market for that token (Quentson 2016). Yet, operating
as a minority chain
seriously compromised the security of Ethereum Classic. Since
the latter now operated
on a fraction of the hash rate that had previously maintained the
undivided Ethereum
blockchain, it became vulnerable to a so-called 51 per cent
attack. Some miners who
openly supported the fork of Ethereum thought that the
vulnerability was responsible
for the attack on Ethereum Classic. Chinese miner Chandler
Guo, a highly vocal
proponent of attacking Ethereum Classic, Twittered: ‘I am
Chandler Guo, a 51% attack
on Ethereum Classic (ETC) is coming with my 98G hashrate’
(Guo 2016). While no
noteworthy attack was conducted, and Guo later became an ETC
supporter (Demartino
2016), this episode illustrated the problem previously discussed
by Nicolas T. Courtois
(2014) who problematized the ‘longest chain rule’ as a source
of vulnerability for public
blockchains running on a fraction of the hash power of the
major public blockchains.
29. Over a year later, Ethereum and Ethereum Classic trade at
prices many times higher
than when the event occurred, and investors seem to have
forgiven that moment of
murky intervention. While the event had little impact on Ether
pricing in the short run,
one can only speculate on the future forms of public blockchain
infrastructure. Many
businesses and government agencies will certainly consider that
question in their
evaluations of what to make of public blockchains.
Moritz Hütten
340
Various forum members also reiterated the idea that this would
be a lesson learned,
but only months later another start-up, Bancor, again building
on Ethereum, collected
the equivalent of US$ 150 million in Ether, thus leaving one to
question whether
lessons had indeed been learned from ‘The DAO’. Following
these events and various
other initial coin offerings (ICO), the currently common form of
crowdfunding block-
chain projects, US regulators began to scrutinize these generous
funding rounds (Engler
2017). Even more recently, the US Securities and Exchange
Commission (SEC) has
concluded that the DAO tokens were securities and cautioned
‘market participants that
offers and sales of digital assets by “virtual” organizations are
30. subject to the require-
ments of the federal securities laws’ (SEC 2017).
The DAO crisis revealed that much of this presumably ‘new’
model of governance
by algorithms could resort to very conventional responses when
under stress. When the
DAO’s faults became apparent, the Ethereum blockchain’s
ostensibly binding rules
were selectively relaxed for a project with close ties to semi-
formal leaders of the
Ethereum ecosystem and various stakeholders with conflicting
interests between their
own short-term investments and the integrity of the supporting
blockchain. The res-
ponse to crisis challenged previous claims about the neutrality
of the platform and about
having overcome focal points of control. Prior to the crisis,
stakeholders and developers
had agreed to extremely strict rules by submitting themselves to
governance by algo-
rithms (Campbell-Verduyn et. al. 2017) in the form of a highly
automatized trustless
blockchain. However, once the crisis set in, strict rules did not
function as a backstop
for guiding the community response, but instead were viewed as
unreasonable and not
binding and this therefore contributed to their suspension. Some
attempts were made to
generate a measure of ad hoc legitimacy imitating democratic
procedure by posting
non-binding voting polls on various forums and blogs. The
dynamic stemmed from the
assertion that the community mistook obscured de facto control
for better and more
responsive governance (D’Onofrio 2016).
31. From cypherpunk utopia to capitalist dystopia
Based on the analysis of ‘The DAO’ and expanding on Quinn
DuPont’s (2018)
research, some broader implications for the proliferation and
impact of the blockchain
technology can be unearthed. Following the experience with
‘The DAO’, we can better
distinguish between the facts and fictions of the proclaimed
‘blockchain revolution’.
Open/public blockchains have become a fast spreading
technology trend, but on closer
examination, claims of a ‘revolution’ are exaggerated. Analysis
of crisis and its
response reminds us that public blockchains, like most
technologies, are subject to
political influence. Ultimately, the question is what can we
expect from the expansion
of blockchain technology when it ceases to adhere to its more
utopian promises?
To answer the question, we must remember the circumstances of
the Bitcoin block-
chain’s origins. In response to the accelerating financial crisis,
Bitcoin promoted an
alternative payment system as a critique of the selective
suspension of binding rules for
banks close to the ‘apex of power’ (Pistor 2013) that were
bailed out at the public’s
expense. More was at stake than the immediate survival of the
global financial system;
The soft spot of hard code
32. 341
bailing out ‘too big to fail’ banks endangered a crucial
supporting pillar of capitalist
utopianism.
Contemporary capitalism ultimately contains its own utopian
promises, including
autonomy from society and upward mobility through
performance. The flipside of this
autonomy is the utopian notion of ontic, individualized, debt-
grounding capitalism.
Notions of debt under capitalism are very different from those
of many pre-capitalist
societies. Marcel Maus (1990), for example, describes a society
that crucially draws on
universal debt as enabling an ‘understanding of humans’
common participation in
being’ (Featherstone 2017: 64). Capitalism knows no universal
debt, and not having a
universal debt to society eventually grants the individual
autonomy from it. Ultimately,
ontic, individualized debt lays the foundation for the autonomy
of the individual at the
centre of contemporary neoliberal and libertarian thought. As
Featherstone (2017: 64)
explained:
Ontological debt is universal, infinite, and inescapable, and as a
consequence a
condition of existence itself. By contrast, the ontic version of
debt, which
emerged with the money economy and has taken on new,
democratic form in
neoliberal society, is never universal, even though it seems to
33. suture everybody
into the late capitalist economy, because this world is made up
of two classes,
creditors and debtors. In much the same way that this new debt
relation is
particular, it is also finite in the sense that there is a view that
eventually every
debt must be repaid in full and debtors will escape their bonds,
even if the state
of indebtedness seems to stretch far off into the future.
Contrasting the reasoning of Hobbes (1966), for whom the
sovereign must be the
consequence of an otherwise (fictional) constant state of
conflict resulting from
unbound individuals encountering each other in libertarian
thought, this conflict is
suspended through the notion of open space. The blockchain
sets the foundation for a
pre-political society of individuals who are not yet citizens
(Atzori 2017: 55). Liber-
tarian thought does not seek to move on to citizenship but
remains in a pre-political
state that suspends conflict through notions of open space. The
latter are crucial for
libertarian fiction, whether it is science fiction set in space, the
open space of the
imagined Wild West, or unbound cyberspace (Mühlbauer 2006).
Unable to resolve
emerging conflicts because of its distaste for political
institutions, libertarian ideology
must press forward in search of new frontiers to colonize. At its
inception, Bitcoin was
lauded as a libertarian revolution freeing the individual from
government oppression
(Cox 2013). Originally, in nineteenth-century Europe,
34. ‘libertarian’ was synonymous
with left anarchist, but since then and following the Second
World War, market radicals
began to occupy the term and to shape something one could call
‘anarchism for the
rich’ (Mühlbauer 2006: 156). David Golumbia (2015) analysed
Bitcoin as a ‘distributed
right-wing ideology’. Guardian reporter Jonathan Freedland
identified the surging fel-
lowship of Ayn Rand among the young tech-entrepreneurs
intrigued by her lionization
of ‘the alpha male capitalist entrepreneur, the man of action
who towers over the little
people and the pettifogging bureaucrats – and gets things done’
(Freedland 2017). For
Moritz Hütten
342
the heroes of Ayn Rand’s stories, even the market is too much
society to deal with in
that it hampers the unbound self-realization of the towering
individual (Mühlbauer
2006: 160). However, this fascination with zealous, genius,
entrepreneurial libertarian
thought is precisely what fuels admiration for a reckless elite
and lends itself to authori-
tarian models (Mühlbauer 2006: 159).
The global financial crisis created a situation that transformed
private debt into
(almost) universal societal debt. The future horizon of unbound
debt repayment was at
35. the brink of collapsing into a primordial state of unbound
universal and unpayable debt
threatening the very core of neoliberal and libertarian autonomy
from society. Various
commentators make claims about the disruptive and even
revolutionary nature of the
blockchain. Yet, on closer examination, for Bitcoin and the
blockchain, ‘revolutionary’
does not mean a challenge to capitalism but a challenge to its
demise. At a point when
the global financial system threatened to sink into universal and
unaccounted debt with
nobody knowing who owed what to whom, Bitcoin and the
blockchain emerged as a
promise of perfectly tracking every transaction and account
balance in existence. More
than anything, Bitcoin and blockchain technology promise to
rekindle belief in indi-
vidualized, ontic debt and, subsequently, the autonomy of the
individual at the heart of
neoliberal and libertarian thought. Ethereum followed the same
utopian vision on a
higher level of abstraction, essentially treating payments as a
subclass of contracts. It
promised to create a network automatically governed by a
predefined protocol, forging
a globally accessible opt-in society of individuals. The
utopianism of Ethereum is much
closer to the term ‘friction-free capitalism’ that Bill Gates
(1995) coined.
David Golumbia (2015: 121) describes Bitcoin as a programme
for ‘recruiting unin-
formed citizens into a neoliberal and (nominally) anti-
government political discourse’.
Bill Maurer (2016) concluded that financial professionals like
36. to see the blockchain as
a tool for ‘re-risking’ finance so that it can move away from its
‘boring’, intellectually
unstimulating fee business model. Overall, we must understand
that the ‘blockchain
revolution’ often fails to disrupt the neoliberal discourse but
rather contributes to its
redemption and to the wider ‘non-death of neoliberalism’
(Crouch 2011). Supporters
of Bitcoin or Ethereum might not feel troubled by that insight at
all, for many are
sceptical of government control and endorse the ‘free market’.
Yet, these supporters
also turn to public blockchains like Ethereum or decentralized
applications like ‘The
DAO’ to deliver the infrastructure necessary for a brighter
future under ‘friction-free
capitalism’. Such expectations might turn against them when
technological solutions
fail to produce the desired results. Without the ambition to
build better institutions on
the blockchain, or when governance failure and murky decision-
making processes are
mistaken for ‘better’ governance, the ‘blockchain revolution’
might yield very disap-
pointing results for its advocates. Eventually, public
blockchains also face a recurring
problem over the process of digitalization. When processes
become digital, ‘tired’ ideas
often become repackaged as ‘wired’ ideas (Ludlow 2001: 20).
Brett Scott (2017)
recently criticized the concept of the sharing economy for being
simply an obscured
granular rent economy. When more utopian and ambitious
projects like ‘The DAO’
fail, the more ‘tired’ ideas remain fuelled by a technology that
37. promises perfect score
keeping in the form of an incorruptible ledger without living up
to the expectations of
The soft spot of hard code
343
a techno-utopia. Without thoughtful consideration of how to
live up to ambitious goals
of democratic participation and freedom from coercion, the
blockchain risks rebranding
relationships of capitalist exploitation into ‘wired’ euphemisms.
We see the transform-
ation of granular rent extraction into fancy micro-payments, and
old-fashioned com-
modification into blockchain tokenization. At the same time, the
familiar patterns are
perpetuated, such as the financialization of the everyday (van
der Zwan 2014), attempts
to exploit new markets for financial products by banking the
unbanked, or the formaliz-
ation of landownership in rural communities. Eventually, the
blockchain could become
not only the fixture for financial practice in the narrow sense
Maurer described through
re-risking finance, but in a broader sense for capitalist utopia by
rekindling unrealistic
expectations about future repayments of individualized, debt
and unlimited commodi-
fication.
Conclusion
38. In a recent interview, Christoph Jentzsch, a DAO inventor,
criticized the blockchain
developers’ for having become overly conservative since the
DAO’s failure. Many
projects have become more centralized, and most of the recent
wave of ICOs have been
greatly overfunded (Bergmann 2017). Technological
advancement was long accom-
panied by a hope that technology would not only streamline
politics, but also possibly
transcend it altogether. Yet, examining the crisis response to
‘The DAO’, hopes of a
management-free system were disappointed because the
response to crisis revealed
strong de facto control by a programmer elite and weak
commitment to principle when
facing possible short-term losses by the community. Eventually,
the public blockchain
was all too human at its core, forming indeed the soft spot of a
utopia of governance by
hard code. The response to the crisis revealed that the public
Ethereum blockchain has
not transcended politics. The lack of proper procedures instead
leads to a mimicry of
the murky interventions that sparked discontent with the
financial system. The outcome
is in no way confined to the Ethereum blockchain, and after
studying Bitcoin, other
scholars (Atzori 2017; De Fillipi and Loveluck 2016; Musiani et
al. 2018; Pelizza and
Kuhlmann 2017) have reached similar conclusions.
Pre-crisis commitments to strict governance by algorithms and
the credo that ‘code
is law’ failed to hold up under pressure. Rather than supporting
the community in
39. troubled times, the strictness of the rules hampered the
development of proper pro-
cedures with which to handle the events. Under unforeseen
circumstances, the commit-
ments were viewed as overbearing and unreasonable, and
ultimately fuelled the
impression that compliance with the code was unrealistic. While
some community
members criticized the opaque elite governance, others mistook
the quick response for
dynamic decision making. The DAO episode also casts doubt on
the capacity of open/
public blockchains to overcome the selective favouritism that
originally fuelled
discontent with the financial system and left some forum
members wondering how big
a project must be before the developers intervene on its behalf
(andypant 2016).
More broadly, the old ideas and new crises that spread through
technology pose
implications for global finance and beyond. Increasingly,
transnationally operating
Moritz Hütten
344
actors in the blockchain ecosystem work with policy makers,
governments and firms
around the world. While not long ago blockchains were
primarily a source of concern
for politicians, lawmakers and regulators, these actors are
increasingly embracing a
40. widespread use of its applications and forecast its possible role
in ‘revolutionizing’
governance, democracy and the rule of law (Mizrahi 2017).2
Consequently, the pro-
claimed blockchain ‘revolution’ merely becomes the evolution
of the very institutions
that Nakamoto, Buterin and others had meant to challenge.
Finally, this development also holds implications for the
utopian aspects of block-
chain technology. It is said that blockchains possibly improve
the way services,
public administration and companies are organized; they can
make them more
efficient and more decentralized, but only if we understand
them as a tool with
limitations and not as a replacement for political debate. We
must keep in mind that
technology cannot be a substitute for conscious debate on how
democratization,
inclusion, emancipation and self-determination can be achieved.
Opportunities for
empowerment must be created and defended; they are not a by-
product of technology.
Technology gadgetry cannot replace political struggle. The
DAO crisis was a missed
chance to have such a debate, with many discussants simply
claiming that the
technology was still new and would perform better next time. It
was also a missed
chance to think about the underlying techno-libertarian ideology
and utopianism. Yet,
critical debate must be injected into the blockchain community
to challenge the
inherent flaws and contradictions of the underlying ideology.
My examination of the
41. utopianism of Bitcoin that is still evident in various blockchain
projects like Ethereum,
reveals the dangers that originate from this utopianism and the
now common framing
of the blockchain as a powerful accounting tool. The blockchain
runs the danger of
becoming a fixture for the crisis of financialized capitalism,
rekindling a belief in
clearly bounded ontic debt with a promise of perfect accounting
without bringing about
better, more open and inclusive institutions. Instead, the
blockchain could drive a belief
in the moral virtue of ‘tired’ ideas of capitalist rent extraction
and exploitation under
the guise of ‘wired’ ideas of digital inclusion, radical
entrepreneurship and unhampered
self-realization.
Acknowledgements
I am grateful to Max Nagel for contributing to a presentation on
the topic at the 2016 Intersections
of Finance and Society Conference in London. I also thank
Malcolm Campbell-Verduyn for his
insightful and thorough comments on an earlier draft.
Notes
1. Because the technology is new, the terminology is not yet
fully established. Sometimes the
terms ‘blockchain’ and ‘DLT’ are used interchangeably; at other
times DLT is used as a more
general term for a distributed ledger but without any clear
indication of whether it is indeed
a blockchain.
42. 2. This exemplifies the development in the EU, yet this
development is in no way confined to
the EU.
The soft spot of hard code
345
References
andypant (2016) ‘How big does a DAO have to be before we
will save it with a hard fork?’,
Reddit post, available at: https://tinyurl.com/y9y4cwsd.
Atzori, M. (2017) ‘Blockchain technology and decentralized
governance: is the state still
necessary?’, Journal of Governance & Regulation, 6 (1), 45–62,
doi: 10.22495/jgr_v6_i1_p5.
Barbrook, R. and A. Cameron (2001) ‘Californian ideology’, in
P. Ludlow (ed.) Crypto anarchy,
cyberstates, and pirate utopias, Cambridge, MA: The MIT Press,
363–88.
Barlow, J. (2001) ‘A declaration of the independence of
cyberspace’, in P. Ludlow (ed) Crypto
anarchy, cyberstates, and pirate utopias, Cambridge, MA: The
MIT Press, 27–30.
Bergmann, C. (2017) ‘“Ich finde, man sollte diese Art
Stützräder wieder Schritt für Schritt
abbauen”’, BitcoinBlog.de, 26 June, available at:
https://tinyurl.com/y9npy4jz.
43. Buterin, V. (2013) ‘Bootstrapping a decentralized autonomous
corporation: part I’, Bitcoin
Magazine, 19 September, available at:
https://bitcoinmagazine.com/articles/bootstrapping-a-
decentralized-autonomous-corporation-part-i-1379644274/.
Buterin, V. (2014) ‘Ether sale: a statistical overview’, Ethereum
Blog, 8 August, available at:
https://blog.ethereum.org/2014/08/08/ether-sale-a-statistical-
overview/.
Buterin, V. (2015) ‘On public and private blockchains’,
Ethereum Blog, 7 August, available at:
https://blog.ethereum.org/2015/08/07/on-public-and-private-
blockchains/.
Buterin, V. (2016) ‘Personal statement regarding the fork’,
Reddit post, available at:
https://tinyurl.com/y86vz6uw.
Callon, M. (1993) ‘Society in the making: the study of
technology as a tool for sociological
analysis’, in W. E. Bijker, T. P. Hughes and T. Pinch (eds) The
social construction of
technological systems, Cambridge, MA: The MIT Press, 83–
103.
Campbell-Verduyn, M. (2018a) ‘Conclusion: a block age or
blockages of global governance?’,
in M. Campbell-Verduyn (ed.) Bitcoin and beyond: the
challenges and opportunities of
blockchains for global governance, London, Routledge, 178–97.
Campbell-Verduyn, M. and M. Goguen (2018b) ‘Blockchains,
trust and action nets: extending
the pathologies of financial globalization’, Global Networks, 19
44. (1), (this issue), doi:
10.1111/glob.12214.
Campbell-Verduyn, M., M. Goguen and T. Porter (2017) ‘Big
data and algorithmic governance:
the case of financial practices’, New Political Economy, 22 (2),
219–36, doi: 10.1080/
13563467.2016.1216533.
carver (2016) ‘If you filter out the FUD, you can find
compelling, rational arguments for avoiding
a hard fork’, Reddit post, available at:
https://tinyurl.com/y8f8u3gj.
Casey, M. J. and P. Wong (2017) ‘Global supply chains are
about to get better, thanks to
blockchain’, Harvard Business Review, 13 March, available at:
https://hbr.org/2017/03/
global-supply-chains-are-about-to-get-better-thanks-to-
blockchain.
Chaum, D. (1983) ‘Blind signature for untraceable payments’,
in D. Chaum, R. L. Rivest and
A. T. Sherman (eds) Advances in cryptology proceedings of
Crypto 82, New York: Springer,
199–203, doi: 10.1007/978-1-4757-0602-4.
Courtois, N. T. (2014) ‘On the longest chain rule and
programmed self-destruction of crypto
currencies’, online archive article, available at:
https://arxiv.org/abs/1405.0534.
Cox, J. (2013) Bitcoin and digital currencies: the new world of
money and freedom, Baltimore,
MD: Laissez Faire Books.
45. Crouch, C. (2011) The strange non-death of neo-liberalism,
Cambridge: Polity Press.
D’Onofrio, A. (2016) ‘Good forking job: metaprinciples of
blockchain-based technology’,
Medium, 21 July, available at: https://tinyurl.com/y7g9ezv4.
Dai, W. (1998) ‘b-money’, Satoshi Nakamoto Institute online
literature, 1 November, available
at: http://nakamotoinstitute.org/b-money/#selection-23.216-
23.240.
De Filippi, P. and B. Loveluck (2016) ‘The invisible politics of
Bitcoin: governance crisis of a
decentralised infrastructure’, Internet Policy Review, 5 (3), doi:
10.14763/2016.3.427.
Moritz Hütten
346
Demartino, I. (2016) ‘Chandler Guo: Vitalik made “huge
mistake” in changing Ethereum
blockchain’, CoinJournal, 14 September, available at:
https://coinjournal.net/guo-and-
ethereum-classic/.
Dickson, B. (2016) ‘How blockchain can change the future of
IoT’, Venturebeat, 20 November,
available at: https://venturebeat.com/2016/11/20/how-
blockchain-can-change-the-future-of-
iot/.
Diffie, W. and M. Hellman (1976) ‘New directions in
46. cryptology’, IEE Transactions on
Information Theory, 22 (6) 644–54.
Dodd, N. (2015) ‘Utopianism and the future of money’, in P.
Aspers and N. Dodd (eds) Re-
imagining economic sociology, Oxford: Oxford University
Press, 79–102.
Dodd, N. (2017) ‘The social life of Bitcoin’, Theory, Culture
and Society, 35 (3), 35–56, doi:
10.1177/0263276417746464.
DuPont, Q. (2018) ‘Experiments in algorithmic governance: an
ethnography of “The DAO,” a
failed decentralized autonomous organization’, in M. Campbell-
Verduyn (ed.) Bitcoin and
beyond: the challenges and opportunities of blockchains for
global governance, London:
Routledge, 157–77.
Dyer-Witheford, N. (2015) Cyber-proletariat: global labour in
the digital vortex, Chicago:
University of Chicago Press.
Economist (2015) ‘The trust machine’, 31 October, available at:
https://tinyurl.com/q4xcu4t.
Economist (2017) ‘Silicon Valley’s sexism problem’, 15 April,
available at: https://tinyurl.com/
k79gkhm.
egimo (2016) ‘A hard fork to give all ETH back to DAO holders
is essentially sacrificing ETH
holders for the sake of DAO holders’, Reddit post, available at:
https://tinyurl.com/yazoup8g.
Engler, H. (2017) ‘“Initial coin offerings” present dangers to
47. investors, new challenge for US
regulators’, Reuters, 14 June, available at:
www.reuters.com/article/bc-finreg-bitcoin-ico-
idUSKBN1942HF.
Featherstone, M. (2017) Planet utopia: utopia, dystopia, and
globalisation, New York:
Routledge.
Finney, H. (2013) ‘Bitcoin and me (Hal Finney)’,
bitcointalk.org, 19 March, https://bitcointalk.org/
index.php?topic=155054.0.
Freedland, J. (2017) ‘The new age of Ayn Rand: how she won
over Trump and Silicon Valley’,
Guardian, 10 April, available at: https://tinyurl.com/lhl2sbb.
Gates, B. (1995) The road ahead, New York: Viking.
Golumbia, D. (2015) ‘Bitcoin as politics: distributed right-wing
extremism’, in G. Lovink,
N. Tkacz and P. de Vries (eds) MoneyLab reader: an
intervention in digital economy,
Amsterdam: Institute of Network Cultures, 117–31.
Guo, C. (2016) ‘I am Chandler Guo, a 51% attack on Ethereum
Classic (ETC) is coming with
my 98G hashrate’, Twitter post, 24 July, available at:
https://twitter.com/chandlerguo/status/
757191880740184064.
Hicks, M. (2017) Programmed inequality, Cambridge, MA: The
MIT Press.
Hobbes, T. (1966) Leviathan, Berlin: Suhrkamp.
HoboRobo (2016) ‘Hard forking is a feature, not a bug’, Reddit
48. post, available at:
https://tinyurl.com/ybf9j7jj.
Holden, J. (2017) The mathematics of secrets: cryptography
from Caesar ciphers to digital
encryption, Princeton: Princeton University Press.
Hütten, M. und M. Thiemann (2018) ‘Moneys at the margins:
from political experiment to
cashless societies’, in M. Campbell-Verduyn (ed.) Bitcoin and
beyond: the challenges and
opportunities of blockchains for global governance, London,
Routledge, 25–47.
Huws, U. (2014) Labor in the global digital economy: the
cybertariat comes of age, New York:
Monthly Review Press.
The soft spot of hard code
347
Jensen, M. C. and W. H. Meckling (1976) ‘Theory of the firm:
managerial behavior, agency costs
and ownership structure’, Journal of Financial Economics, 3 (4),
305–60, doi: 10.1016/
0304-405X(76)90026-X.
Jentzsch, C. (2015) ‘Decentralized autonomous organization to
automate governance’, Slock.it,
1–31, available at:
https://download.slock.it/public/DAO/WhitePaper.pdf.
49. Kruh, L. and C. Deavours (2002) ‘The commercial enigma:
beginnings of machine
cryptography’, Cryptologia, 26 (1), 1–16, doi: 10.1080/0161-
110291890731.
Lécuyer, C. (2007) Making Silicon Valley: innovation and the
growth of high tech, 1930–1970,
Cambridge, MA: MIT Press.
Lessig, L. (2006) Code: version 2.0, New York: Perseus Books
Group.
Levy, S. (2001) Crypto: how code rebels beat the government –
saving privacy in the digital age,
New York: Penguin.
Lopp, J. (2016) ‘Bitcoin and the rise of the cypherpunks’,
Coindesk, 9 April, available at:
www.coindesk.com/the-rise-of-the-cypherpunks/.
Ludlow, P. (2001) ‘New foundations: on the emergence of
sovereign cyberstates and their
governance structures’, in P. Ludlow (ed.) Crypto anarchy,
cyberstates, and pirate utopias,
Cambridge, MA: The MIT Press, 1–24.
Maurer, B. (2016) ‘Re-risking in realtime: on possible futures
for finance after the blockchain’,
Behemoth: A Journal on Civilisation, 9 (2), 82–96, doi:
10.6094/behemoth.2016.9.2.917.
Maus, M. (1990) Die Gabe, Frankfurt: Suhrkamp.
May, T. C. (1988) ‘The crypto anarchist manifesto’, available
at: http://nakamotoinstitute.org/
crypto-anarchist-manifesto/.
50. May, T. C. and E. Hughes (1992) ‘Crypto glossary’, 22
November, available at: https://nakamoto
institute.org/crypto-glossary/.
Mazzucato, M. (2015) The entrepreneurial state: debunking
public vs private sector myths,
London: Anthem Press.
Merkle, R. C. (1978) ‘Protocols for public key cryptosystems’,
available at: www.merkle.com/
papers/Protocols.pdf.
Milhaupt, C. J. and K. Pistor (2008) Law and capitalism: what
corporate crises reveal about
legal systems and economic development around the world,
Chicago: University of Chicago
Press.
Mizrahi, A. (2017) ‘European lawmaker Eva Kaili talks
blockchain, ICOs and regulations’,
Finance Magnates, 11 June, available at:
https://tinyurl.com/y8g39yr3.
Musiani, F., A. Mallard and C. Meadel (2018) ‘Governing what
wasn’t meant to be governed: a
controversy-based approach to the study of bitcoin governance’,
in M. Campbell-Verduyn
(ed.) Bitcoin and beyond: the challenges and opportunities of
blockchains for global
governance, London: Routledge, 133–56.
Mühlbauer, P. J. (2006) ‘Frontiers and dystopias: libertarian
ideology in science fiction’, in D.
Plehwe, B. Walpen and G. Neunhöffer (eds) Neoliberal
hegemony: a global critique,
51. London: Routledge, 156–70.
Nakamoto, S. (2008) ‘Bitcoin: a peer-to-peer electronic cash
system’, Bitcoin.org online article,
available at: https://bitcoin.org/bitcoin.pdf.
Pelizza, A. and S. Kuhlmann (2017) ‘Mining governance
mechanisms: innovation policy,
practice, and theory facing algorithmic decision-making’, in E.
G. Carayannis, D. F. J.
Campbell and M. P. Efthymiopoulos (eds) Handbook of cyber-
development, cyber-
democracy, and cyber-defense, Basel: Springer, 1–23.
Pistor, K. (2013) ‘A legal theory of finance’, Journal of
Comparative Economics, 41 (2),
315–30, doi: 10.1016/j.jce.2013.03.003.
Quentson, A. (2016) ‘Miners to attack Ethereum Classic after
Poloniex’s listing’, cryptocoins
news, available at: www.cryptocoinsnews.com/miners-attack-
ethereum-classic-polonixs-
listing/.
Moritz Hütten
348
Rizzo, P. (2016) ‘Why big bank consultants were watching
Ethereum’s hard fork’, Coindesk,
available at: www.coindesk.com/big-banks-consultants-
ethereum-hard-fork/.
Rune4444 (2016) ‘A “too big to fail” political hard fork is very
52. risky and could significantly hurt
Ethereum beyond what The DAO losses will cause’, Reddit
post, available at:
https://tinyurl.com/ybmhpx4k.
Scott, B. (2014) ‘Visions of a techno-leviathan: the politics of
the Bitcoin blockchain’, E-
International Relations, 1 June, available at:
https://tinyurl.com/ydachhux.
Scott, B. (2017) ‘Reversing the lies of the sharing economy’,
How We Get to Next, 6 April,
available at: https://tinyurl.com/y7vhn845.
SEC (2017) ‘SEC issues investigative report concluding DAO
tokens, a digital asset, were
securities’, US Securities and Exchange Commission, 25 July,
available at: www.sec.gov/
news/press-release/2017-131.
Shin, L. (2017) ‘The first government to secure land titles on
the bitcoin blockchain expands
project’, Forbes, 7 February, available at:
https://tinyurl.com/ycrm4ujh.
sjalg (2016) ‘Just hard fork already. Very few ppl care about the
religious zealotry over at
/r/bitcoin’, Reddit post, available at:
https://tinyurl.com/y8ytntqf.
Stark, J. (2016) ‘Making sense of blockchain smart contracts’,
Coindesk, 4 June, available at:
www.coindesk.com/making-sense-smart-contracts/.
Swan, M. (2015) Blockchain: blueprint for a new economy,
Sebastopol, CA: O’Reilley Media.
53. Szabo, N. (1997) ‘Formalizing and securing relationships on
public networks’, First Monday, 2
(9), doi: 10.5210/fm.v2i9.548.
Tapscott, D. and A. Tapscott (2016) Blockchain revolution: how
the technology behind Bitcoin
Is changing money, business, and the world, London: Penguin.
TheBigJort (2016) ‘Non-developer, “Wall Street” opinion on the
fork’, Reddit post, available at:
https://tinyurl.com/ychq2b2t.
Tual, S. (2015) ‘Ethereum launches’, Ethereum Blog, 30 July,
available at: https://blog.ethereum.org/
2015/07/30/ethereum-launches/.
Tual, S. (2016) ‘No DAO funds at risk following the Ethereum
smart contract “recursive call”
bug discovery’, Slock.it blog, 12 June, available at:
https://tinyurl.com/zmo99wh.
van der Zwan, N. (2014) ‘Making sense of financialization’,
Socio-Economic Review, 12 (1),
99–129, doi: 10.1093/ser/mwt020.
Vessens, P. (2016) ‘More ethereum attacks: race-to-empty is the
real deal’, 9 June, available at:
http://vessenes.com/more-ethereum-attacks-race-to-empty-is-
the-real-deal/.
Wright, A. and P. De Filippi (2015) ‘Decentralized blockchain
technology and the rise of Lex
Cryptographia’, SSRN, 1–58, doi: 10.2139/ssrn.2580664.
yeshe257 (2016) ‘The community not the code ... yet’, Reddit
post, available at: