Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (661)

Search Parameters:
Keywords = cryptocurrency

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 4479 KiB  
Review
Mapping the Knowledge Landscape of Money Laundering for Terrorism Financing: A Bibliometric Analysis
by Himanshu Thakkar, Saptarshi Datta, Priyam Bhadra, Siddharth Baburao Dabhade, Haresh Barot and Shankar O. Junare
J. Risk Financial Manag. 2024, 17(10), 428; https://doi.org/10.3390/jrfm17100428 - 24 Sep 2024
Viewed by 281
Abstract
This study employs a bibliometric analysis of emerging trends in money laundering for terrorism financing (ML/TF) to provide direction for future research. The authors used VOSviewer and analyzed 2577 published documents retrieved from the SCOPUS database using the PRISMA methodology. The findings reveal [...] Read more.
This study employs a bibliometric analysis of emerging trends in money laundering for terrorism financing (ML/TF) to provide direction for future research. The authors used VOSviewer and analyzed 2577 published documents retrieved from the SCOPUS database using the PRISMA methodology. The findings reveal a growing research interest in understanding the complex interplay between money laundering and terrorism financing. This research emphasizes the significance of ML/TF for economic stability, as understanding terrorism financing mechanisms allows authorities to trace and block funds going to terrorist groups, which is crucial for national security. Critical insights for policymakers underscore the need for robust legislative frameworks, effective Financial Intelligence Units (FIUs), and international collaboration to combat these global threats. This analysis offers a foundation for future research, mapping the evolving knowledge landscape in ML/TF. Full article
(This article belongs to the Special Issue Fintech, Business, and Development)
Show Figures

Figure 1

Figure 1
<p>PRISMA is used for the selection of studies for the analysis. <b>Source</b>: Compiled by the author based on PRISMA guidelines.</p>
Full article ">Figure 2
<p>Annual production over time. Source: compiled by the author using the SCOPUS database.</p>
Full article ">Figure 3
<p>Most cited countries. Source: compiled by the author from the SCOPUS database.</p>
Full article ">Figure 4
<p>The co-occurrence of keywords. Source: compiled by the author from the SCOPUS database.</p>
Full article ">Figure 5
<p>The total link strength of co-authorship links for authors. Source: compiled by the author from the SCOPUS database.</p>
Full article ">Figure 6
<p>The total link strength of co-authorship links for organizations. Source: compiled by the author from the SCOPUS database.</p>
Full article ">Figure 7
<p>The total link strength of co-Authorship links for countries. Source: compiled by the author from the SCOPUS database.</p>
Full article ">Figure 8
<p>Highest citations. Source: compiled by the author from the SCOPUS database.</p>
Full article ">Figure 9
<p>Top cited sources. Source: compiled by the author from the SCOPUS database.</p>
Full article ">Figure 10
<p>Top cited authors. Source: compiled by the author from the SCOPUS database.</p>
Full article ">Figure 11
<p>Top cited organizations. Source: compiled by the author from the SCOPUS database.</p>
Full article ">Figure 12
<p>Top cited countries. Source: compiled by the author from the SCOPUS database.</p>
Full article ">
14 pages, 539 KiB  
Article
Anti-Persistent Values of the Hurst Exponent Anticipate Mean Reversion in Pairs Trading: The Cryptocurrencies Market as a Case Study
by Mar Grande, Florentino Borondo, Juan Carlos Losada and Javier Borondo
Mathematics 2024, 12(18), 2911; https://doi.org/10.3390/math12182911 - 19 Sep 2024
Viewed by 297
Abstract
Pairs trading is a short-term speculation trading strategy based on matching a long position with a short position in two assets in the hope that their prices will return to their historical equilibrium. In this paper, we focus on identifying opportunities where mean [...] Read more.
Pairs trading is a short-term speculation trading strategy based on matching a long position with a short position in two assets in the hope that their prices will return to their historical equilibrium. In this paper, we focus on identifying opportunities where mean reversion will happen quickly, as the commission costs associated with keeping the positions open for an extended period of time can eliminate excess returns. To this end, we propose the use of the local Hurst exponent as a signal to open trades in the cryptocurrencies market. We conduct a natural experiment to show that the spread of pairs with anti-persistent values of Hurst revert to their mean significantly faster. Next, we verify that this effect is universal across pairs with different levels of co-movement. Finally, we back-test several pairs trading strategies that include H<0.5 as an indicator and check that all of them result in profits. Hence, we conclude that the Hurst exponent represents a meaningful indicator to detect pairs trading opportunities in the cryptocurrencies market. Full article
(This article belongs to the Special Issue Chaos Theory and Its Applications to Economic Dynamics)
Show Figures

Figure 1

Figure 1
<p>The green line shows the dependence of the median difference in <math display="inline"><semantics> <mrow> <mi>H</mi> <mi>M</mi> <mi>R</mi> </mrow> </semantics></math> between the control and treatment groups (<math display="inline"><semantics> <mrow> <mi>H</mi> <mi>M</mi> <msub> <mi>R</mi> <mrow> <mi>c</mi> <mi>o</mi> <mi>n</mi> <mi>t</mi> <mi>r</mi> <mi>o</mi> <mi>l</mi> </mrow> </msub> <mo>−</mo> <mi>H</mi> <mi>M</mi> <msub> <mi>R</mi> <mrow> <mi>t</mi> <mi>r</mi> <mi>e</mi> <mi>a</mi> <mi>t</mi> </mrow> </msub> </mrow> </semantics></math>) with <math display="inline"><semantics> <mrow> <mi>T</mi> <mi>W</mi> </mrow> </semantics></math>. The blue line shows how the number of trading signals triggered by <math display="inline"><semantics> <mrow> <mi>H</mi> <mo>&lt;</mo> <mn>0.5</mn> </mrow> </semantics></math> decreases as a function of <math display="inline"><semantics> <mrow> <mi>T</mi> <mi>W</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>Median <math display="inline"><semantics> <mrow> <mi>H</mi> <mi>M</mi> <mi>R</mi> </mrow> </semantics></math> for the treatment and control groups as a function of the co-movement (classified in five categories ordered from low level to high level of co-movement) according to several metrics: (<b>A</b>) correlation, (<b>B</b>) cointegration, (<b>C</b>) MI, and (<b>D</b>) DTW. In (<b>E</b>), the median difference in <math display="inline"><semantics> <mrow> <mi>H</mi> <mi>M</mi> <mi>R</mi> </mrow> </semantics></math> between the control and treatment groups as a function of the degree of co-movement for the four metrics are given. The co-movement metric is color-coded.</p>
Full article ">Figure 3
<p>Cumulative profit for the five strategies, plus the random version used in this work (see <a href="#sec2-mathematics-12-02911" class="html-sec">Section 2</a> for details).</p>
Full article ">Figure 4
<p>Boxplots comparing the duration of trades, where <math display="inline"><semantics> <mrow> <mi>M</mi> <mi>R</mi> </mrow> </semantics></math> actually happened, for positions opened when <math display="inline"><semantics> <mrow> <mi>H</mi> <mo>&lt;</mo> <mn>0.5</mn> </mrow> </semantics></math> and for positions opened when <math display="inline"><semantics> <mrow> <mi>H</mi> <mo>≥</mo> <mn>0.5</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Comparison of the median <math display="inline"><semantics> <mrow> <mi>M</mi> <mi>S</mi> <mi>O</mi> <mi>T</mi> </mrow> </semantics></math> as a function of the portfolio size between the strategy including <math display="inline"><semantics> <mrow> <mi>H</mi> <mo>&lt;</mo> <mn>0.5</mn> </mrow> </semantics></math> as a trading signal and the regular case not considering <math display="inline"><semantics> <mrow> <mi>H</mi> <mo>&lt;</mo> <mn>0.5</mn> </mrow> </semantics></math>. Each panel contains the results for each co-movement metric: (<b>A</b>) Hurst, (<b>B</b>) correlation, (<b>C</b>) MI, (<b>D</b>) DTW, and (<b>E</b>) cointegration. (<b>F</b>) represents the median difference in <math display="inline"><semantics> <mrow> <mi>M</mi> <mi>S</mi> <mi>O</mi> <mi>T</mi> </mrow> </semantics></math> between the regular version of the strategy and the one considering <math display="inline"><semantics> <mrow> <mi>H</mi> <mo>&lt;</mo> <mn>0.5</mn> </mrow> </semantics></math> for the five co-movement metrics. The co-movement metric is color-coded.</p>
Full article ">
13 pages, 1813 KiB  
Perspective
The Potential Relationship between Biomass, Biorefineries, and Bitcoin
by Georgeio Semaan, Guizhou Wang, Quoc Si Vo and Gopalakrishnan Kumar
Sustainability 2024, 16(18), 7919; https://doi.org/10.3390/su16187919 - 11 Sep 2024
Viewed by 597
Abstract
Despite advances in biofuel production and biomass processing technologies, biorefineries still experience commercialization issues. When costs exceed revenues, their long-term economic sustainability is threatened. Although integrated biorefineries have significant global potential due to process integration and product co-generation, it is crucial that they [...] Read more.
Despite advances in biofuel production and biomass processing technologies, biorefineries still experience commercialization issues. When costs exceed revenues, their long-term economic sustainability is threatened. Although integrated biorefineries have significant global potential due to process integration and product co-generation, it is crucial that they generate a positive net return, thereby incentivizing their continual operation. Nonetheless, research and development into new system designs and process integration are required to address current biorefinery inefficiencies. The integration of Bitcoin mining into biorefineries represents an innovative approach to diversify revenue streams and potentially offset costs, ensuring the economic viability and commercial success of biorefineries. When using bio-H2, a total of 3904 sats/kg fuel can be obtained as opposed to 537 sats/kg fuel when using syngas. Bitcoin, whether produced onsite or not, is an accretive asset that can offset the sales price of other produced biochemicals and biomaterials, thereby making biorefineries more competitive at offering their products. Collaborations with policy makers and industry stakeholders will be essential to address regulatory challenges and develop supportive frameworks for widespread implementation. Over time, the integration of Bitcoin mining in biorefineries could transform the financial dynamics of the bio-based products market, making them more affordable and accessible whilst pushing towards sustainable development and energy transition. Full article
(This article belongs to the Section Economic and Business Aspects of Sustainability)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Overview of proposed biorefinery approach. Gray arrows indicate the flow of value through the various process stages, highlighting key interactions and transformations.</p>
Full article ">Figure 2
<p>Bitcoin block template.</p>
Full article ">Figure 3
<p>A 2 × 2 matrix evaluating the impacts of integrating Bitcoin mining into biorefineries. High desirability/best case scenario (green); low desirability/worst case scenario (red). The central white area signifies a passive “do nothing, gain nothing” approach.</p>
Full article ">
20 pages, 332 KiB  
Article
Joint Impact of Market Volatility and Cryptocurrency Holdings on Corporate Liquidity: A Comparative Analysis of Cryptocurrency Exchanges and Other Firms
by Namryoung Lee
J. Risk Financial Manag. 2024, 17(9), 406; https://doi.org/10.3390/jrfm17090406 - 9 Sep 2024
Viewed by 368
Abstract
This study examines the impact of market volatility and cryptocurrency holdings on corporate liquidity, with a particular focus on the differences between cryptocurrency exchanges and other businesses. The analysis is based on 181 firm-year observations from 2017 to 2022, using Bitcoin volatility, VIX, [...] Read more.
This study examines the impact of market volatility and cryptocurrency holdings on corporate liquidity, with a particular focus on the differences between cryptocurrency exchanges and other businesses. The analysis is based on 181 firm-year observations from 2017 to 2022, using Bitcoin volatility, VIX, and VKOSPI as indicators of market volatility. Ordinary Least Squares (OLS) and robust regression analyses are employed to assess the relationships between these variables. It is first noted that, albeit insignificant, market volatility has a detrimental influence on company liquidity. The positive correlation for cryptocurrency exchanges, however, suggests that cryptocurrency exchanges could potentially leverage market volatility as a strategic advantage. Additionally, the study shows that cryptocurrency holdings enhance corporate liquidity, with a stronger association observed in cryptocurrency exchanges. The analysis also incorporates lagged variables to capture delayed effects, confirming that cryptocurrency holdings exert both immediate and delayed positive impacts on liquidity, likely due to effective strategic management practices within exchanges. Full article
(This article belongs to the Section Financial Technology and Innovation)
30 pages, 503 KiB  
Article
A Blockchain-Based Authentication Mechanism for Enhanced Security
by Charlotte McCabe, Althaff Irfan Cader Mohideen and Raman Singh
Sensors 2024, 24(17), 5830; https://doi.org/10.3390/s24175830 - 8 Sep 2024
Viewed by 319
Abstract
Passwords are the first line of defence against preventing unauthorised access to systems and potential leakage of sensitive data. However, the traditional reliance on username and password combinations is not enough protection and has prompted the implementation of technologies such as two-factor authentication [...] Read more.
Passwords are the first line of defence against preventing unauthorised access to systems and potential leakage of sensitive data. However, the traditional reliance on username and password combinations is not enough protection and has prompted the implementation of technologies such as two-factor authentication (2FA). While 2FA enhances security by adding a layer of verification, these techniques are not impervious to threats. Even with the implementation of 2FA, the relentless efforts of cybercriminals present formidable obstacles in securing digital spaces. The objective of this work is to implement blockchain technology as a form of 2FA. The findings of this work suggest that blockchain-based 2FA methods could strengthen digital security compared to conventional 2FA methods. Full article
Show Figures

Figure 1

Figure 1
<p>The flowchart of the proposed authentication mechanism.</p>
Full article ">Figure 2
<p>Transaction viewed in Etherscan.</p>
Full article ">Figure 3
<p>Average gas prices in gwei.</p>
Full article ">Figure 4
<p>Etherscan heatmap.</p>
Full article ">
18 pages, 1843 KiB  
Article
Capturing Tail Risks in Cryptomarkets: A New Systemic Risk Approach
by Itai Barkai, Elroi Hadad, Tomer Shushi and Rami Yosef
J. Risk Financial Manag. 2024, 17(9), 397; https://doi.org/10.3390/jrfm17090397 - 5 Sep 2024
Viewed by 442
Abstract
Using daily returns of Bitcoin, Litecoin, Ripple and Stellar, we introduce a novel risk measure for quantitative-risk management in the cryptomarket that accounts for the significant co-movements between cryptocurrencies. We find that our model has a lower error margin when forecasting the extent [...] Read more.
Using daily returns of Bitcoin, Litecoin, Ripple and Stellar, we introduce a novel risk measure for quantitative-risk management in the cryptomarket that accounts for the significant co-movements between cryptocurrencies. We find that our model has a lower error margin when forecasting the extent of future losses than traditional risk measures, such as Value-at-Risk and Expected Shortfall. Most notably, we observe this in Litecoin’s results, where Expected Shortfall, on average, overestimates the potential fall in the price of Litecoin by 8.61% and underestimates it by 3.92% more than our model. This research shows that traditional risk measures, while not necessarily inappropriate, are imperfect and incomplete representations of risk when it comes to the cryptomarket. Our model provides a suitable alternative for risk managers, who prioritize lower error margins over failure rates, and highlights the value in exploring how risk measures that incorporate the unique characteristics of cryptocurrencies can be used to supplement and complement traditional risk measures. Full article
(This article belongs to the Special Issue Financial Technologies (Fintech) in Finance and Economics)
Show Figures

Figure 1

Figure 1
<p>Scaled cryptocurrency prices over time. <b>Notes</b>: The figure shows the co-movements between different cryptocurrency prices. All prices have been scaled as follows: Bitcoin is divided by 350, Litecoin is divided by 10, Ripple is multiplied by 10, and Stellar is multiplied by 10.</p>
Full article ">Figure 2
<p>Cryptocurrency log returns separated into drawup and drawdown periods. <b>Notes</b>: Drawup periods describe low-risk market periods characterized by predominantly positive returns; drawdown periods denote predominantly negative returns and higher risk.</p>
Full article ">Figure 3
<p>Bull and bear regimes for all cryptocurrencies. <b>Notes</b>: The figure illustrates bull and bear regimes over the period from 8 August 2015 to 21 July 2019.</p>
Full article ">Figure 4
<p>Litecoin loss forecasts by systemic and traditional risk measures. <b>Notes</b>: The figure illustrates Litecoin daily loss forecasts from 8 August 2015 to 21 July 2019. Due to high volatility, the figure depicts the loss forecast in different timeframes.</p>
Full article ">Figure A1
<p>Bitcoin loss forecasts by systemic and traditional risk measures. <b>Notes</b>: The figure illustrates Bitcoin daily loss forecasts from 8 August 2015 to 21 July 2019. Due to high volatility, the figure depicts the loss forecast in different timeframes.</p>
Full article ">Figure A2
<p>Ripple loss forecasts by systemic and traditional risk measures. <b>Notes</b>: The figure illustrates Ripple daily loss forecasts from 8 August 2015 to 21 July 2019. Due to high volatility, the figure depicts the loss forecast in different timeframes.</p>
Full article ">Figure A3
<p>Stellar loss forecasts by systemic and traditional risk measures. <b>Notes</b>: The figure illustrates Stellar daily loss forecasts from 8 August 2015 to 21 July 2019. Due to high volatility, the figure depicts the loss forecast in different timeframes.</p>
Full article ">
20 pages, 434 KiB  
Article
The Main Drivers of E-Commerce Adoption: A Global Panel Data Analysis
by Cristian Paun, Cosmin Ivascu, Angel Olteteanu and Dragos Dantis
J. Theor. Appl. Electron. Commer. Res. 2024, 19(3), 2198-2217; https://doi.org/10.3390/jtaer19030107 - 30 Aug 2024
Viewed by 714
Abstract
Digitalization has become more and more important for economic activities and economic development. E-commerce, as a part of local and international trade, is of increasing importance and is highly correlated with technological progress and innovation. Our research investigates the relevance of selected drivers [...] Read more.
Digitalization has become more and more important for economic activities and economic development. E-commerce, as a part of local and international trade, is of increasing importance and is highly correlated with technological progress and innovation. Our research investigates the relevance of selected drivers that could explain the latest e-commerce adoption at global level. In our analysis, we used the UNCTAD B2C E-commerce Index (2014–2020, yearly data, covering 133 countries, 931 observations) which can be considered relevant to express an economy’s readiness to support e-commerce. E-commerce adoption is assessed in our research by the following six factors: (i) wealth, economic freedom, and economic development; (ii) access and sophistication of the financial sector; (iii) education; (iv) regulations; (v) development of ICT infrastructure; and (vi) frontier drivers (such as AI, cryptocurrencies, and blockchain technologies). In our research, we used a panel data analysis framework using hard data provided by different databases (UNCTAD, World Bank, etc.). The results we obtained confirmed that developed countries with a higher income level are higher adopters of e-commerce, financial development and the accessibility of financial services significantly help e-commerce adoption, a regulatory system (particularly economic freedom and property rights) strongly supports e-commerce adoption, education has a positive impact on e-commerce adoption, ICT infrastructure increases the adoption of e-commerce and the readiness and use of AI, and frontier technologies generate an increased adoption of e-commerce. The results we obtained are consistent with the findings of similar studies (most of them using different research methodologies) and opens the ground for interesting discussions and further research developments. The novelty of our research consists in the exhaustive perspective on e-commerce adoption drivers (including frontier technologies such as AI or blockchain) based on hard country data collected from various sources for a consistent panel of countries and a relevant number of years, providing an alternative approach to the mainstream studies on e-commerce adoption that process data from surveys, interviews, or focus groups. Full article
(This article belongs to the Topic Digital Marketing Dynamics: From Browsing to Buying)
Show Figures

Figure 1

Figure 1
<p>The structured model for e-commerce adoption.</p>
Full article ">
16 pages, 268 KiB  
Entry
The Prosumer
by Myriam Ertz, Xinyuan Cao and José Maria Barragán Maravilla
Encyclopedia 2024, 4(3), 1263-1278; https://doi.org/10.3390/encyclopedia4030082 - 27 Aug 2024
Viewed by 857
Definition
In recent years, the concept of the prosumer has garnered extensive attention across various fields, including marketing, energy consumption, and innovation research. This attention is driven by the significant role prosumers play in developing more efficient, sustainable, and health-conscious market systems, propelled by [...] Read more.
In recent years, the concept of the prosumer has garnered extensive attention across various fields, including marketing, energy consumption, and innovation research. This attention is driven by the significant role prosumers play in developing more efficient, sustainable, and health-conscious market systems, propelled by advancements in social and technological domains. Broadly defined, a prosumer is an individual who acts as both a producer and a consumer. Originally coined by Toffler in the 1980s, the term describes individuals who blur the lines between producers and consumers by engaging in the creation of value for their own use or for others. Prosumers are seen as external partners who participate in co-creation processes with organizations, contributing to innovative outcomes and the production of the products and services they consume. The concept of the prosumer, individuals who simultaneously act as producers and consumers, has gained significant attention across various sectors. This entry explores the evolving role and impact of prosumers on sustainability, innovation, and market dynamics. A comprehensive literature review and empirical analysis were conducted to understand prosumer behavior and contributions. The findings reveal that the prosumers’ roles range from significantly enhancing sustainability by generating renewable energy to promoting personalized education via teacher–prosumer models. They also drive technological advancements in fields such as 3D printing and cryptocurrency. The study concludes that prosumers have the potential to foster a more resilient and inclusive economy, although challenges such as regulatory barriers and technological dependencies must be addressed to fully leverage their contributions. Full article
(This article belongs to the Section Social Sciences)
15 pages, 297 KiB  
Article
Sorting Permutations on an nBroom
by Ranjith Rajesh, Rajan Sundaravaradhan and Bhadrachalam Chitturi
Mathematics 2024, 12(17), 2620; https://doi.org/10.3390/math12172620 - 24 Aug 2024
Viewed by 378
Abstract
With applications in computer networks, robotics, genetics, data center network optimization, cryptocurrency exchange, transportation and logistics, cloud computing, and social network analysis, the problem of sorting permutations on transposition trees under various operations is highly relevant. The goal of the problem is to [...] Read more.
With applications in computer networks, robotics, genetics, data center network optimization, cryptocurrency exchange, transportation and logistics, cloud computing, and social network analysis, the problem of sorting permutations on transposition trees under various operations is highly relevant. The goal of the problem is to sort or rearrange the markers in a predetermined order by swapping them out at the vertices of a tree in the fewest possible swaps. Only certain classes of transposition trees, like path, star, and broom, have computationally efficient algorithms for sorting permutations. In this paper, we examine the so-called nbroom transposition trees. A single broom or simply a broom is a spanning tree formed by joining the center of the star graph with one end of the path graph. A generalized version of a broom known as an nbroom is created by joining the ends of n brooms to one vertex, known as the nbroom center. By using the idea of clear path markers, we present a novel algorithm for sorting permutations on an nbroom for n>2 that reduces to a novel 2broom algorithm and that further reduces to two instances of a 1broom algorithm. Our single-broom algorithm is similar to that of Kawahara et al.; however, our proof of optimality for the same is simpler. Full article
(This article belongs to the Special Issue Graph Theory: Advanced Algorithms and Applications)
Show Figures

Figure 1

Figure 1
<p>A broom with star leaf vertices <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>v</mi> <mn>2</mn> </msub> <mo>,</mo> <mspace width="4.pt"/> <mi>and</mi> <mspace width="3.33333pt"/> <msub> <mi>v</mi> <mn>3</mn> </msub> </mrow> </semantics></math>, center <math display="inline"><semantics> <msub> <mi>v</mi> <mn>4</mn> </msub> </semantics></math> and path vertices <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mn>5</mn> </msub> <mo>,</mo> <msub> <mi>v</mi> <mn>6</mn> </msub> <mo>,</mo> <mspace width="3.33333pt"/> <mi>and</mi> <mspace width="3.33333pt"/> <msub> <mi>v</mi> <mn>7</mn> </msub> </mrow> </semantics></math>. All markers except 7 are un-homed.</p>
Full article ">Figure 2
<p>Illustration of <math display="inline"><semantics> <msup> <mi>A</mi> <mo>*</mo> </msup> </semantics></math>. (<b>a</b>) Homing <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> <mo>=</mo> <mn>6</mn> </mrow> </semantics></math>, swaps = 3. (<b>b</b>) Homing the star leaf marker 2 followed by 3, swaps = 2. (<b>c</b>) Homing <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> followed by 1, swaps = 2, (<b>d</b>) sorted broom. Total number of swaps = 7.</p>
Full article ">Figure 3
<p>A <math display="inline"><semantics> <mrow> <mn>2</mn> <mo>−</mo> <mi>b</mi> <mi>r</mi> <mi>o</mi> <mi>o</mi> <mi>m</mi> </mrow> </semantics></math> with left star leaf vertices <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>v</mi> <mn>2</mn> </msub> <mo>,</mo> <mspace width="3.33333pt"/> <mi>and</mi> <mspace width="3.33333pt"/> <msub> <mi>v</mi> <mn>3</mn> </msub> </mrow> </semantics></math>, path vertices <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mn>4</mn> </msub> <mo>,</mo> <msub> <mi>v</mi> <mn>5</mn> </msub> <mo>,</mo> <msub> <mi>v</mi> <mn>6</mn> </msub> <mo>,</mo> <msub> <mi>v</mi> <mn>7</mn> </msub> <mo>,</mo> <mspace width="3.33333pt"/> <mi>and</mi> <mspace width="3.33333pt"/> <msub> <mi>v</mi> <mn>8</mn> </msub> </mrow> </semantics></math> and right star leaf vertices <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mn>9</mn> </msub> <mo>,</mo> <msub> <mi>v</mi> <mn>10</mn> </msub> <mo>,</mo> <mspace width="3.33333pt"/> <mi>and</mi> <mspace width="3.33333pt"/> <mo>,</mo> <msub> <mi>v</mi> <mn>11</mn> </msub> </mrow> </semantics></math>. All markers except 11 are un-homed.</p>
Full article ">Figure 4
<p>Illustration of <math display="inline"><semantics> <msubsup> <mi>A</mi> <mi>n</mi> <mo>*</mo> </msubsup> </semantics></math>. (<b>a</b>) Solving the independent <math display="inline"><semantics> <mrow> <mi>b</mi> <mi>r</mi> <mi>o</mi> <mi>o</mi> <mi>m</mi> </mrow> </semantics></math> (star) formed by <math display="inline"><semantics> <mrow> <mo>{</mo> <msub> <mi>v</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>v</mi> <mn>2</mn> </msub> <mo>,</mo> <msub> <mi>v</mi> <mn>3</mn> </msub> <mo>,</mo> <msub> <mi>v</mi> <mn>4</mn> </msub> <mo>}</mo> </mrow> </semantics></math>, swaps = 3. (<b>b</b>) Homing the star leaf marker 10 and moving the markers 14 and 16 to the path, swaps = 3. (<b>c</b>) Homing the maximum clear path marker 5 followed by 11, swaps = 5. (<b>d</b>) Homing the maximum clear path marker 8, swaps = 5. (<b>e</b>) Homing the maximum clear path marker 6 followed by 14 and 16, swaps = 6. (<b>f</b>) Sorted <math display="inline"><semantics> <mrow> <mn>3</mn> <mo>−</mo> <mi>b</mi> <mi>r</mi> <mi>o</mi> <mi>o</mi> <mi>m</mi> </mrow> </semantics></math>.</p>
Full article ">
13 pages, 2325 KiB  
Article
User Acceptance of Blockchain Technology in Financial Applications: Information Security, Technology Awareness and Privacy Aspects
by Woon Kwan Tse, Xuechen Dai, Yat Ming Lee and Danqi Lu
Blockchains 2024, 2(3), 299-311; https://doi.org/10.3390/blockchains2030014 - 20 Aug 2024
Viewed by 593
Abstract
Blockchain technology is now an advanced and innovative database technology and the attributes of blockchains are apparent in a variety of industries, especially in the financial industry. One of the most famous blockchain use cases, cryptocurrencies, has provoked much interest in social network [...] Read more.
Blockchain technology is now an advanced and innovative database technology and the attributes of blockchains are apparent in a variety of industries, especially in the financial industry. One of the most famous blockchain use cases, cryptocurrencies, has provoked much interest in social network users and customers. According to CoinMarketCap’s information, the global crypto market capitalization has reached around USD 2.37 T and there are around 9975 different cryptocurrencies available in the market. Despite the fact that academia and industry have paid much attention towards the blockchain direction, there is not much research on the factors that influence customer acceptability. This paper studies blockchains from a different angle, probing the factors prompting customers to use financial applications that utilize blockchain technology. We established the model and sorted the individual factors of perceived information security, technology awareness and privacy and found that users’ acceptance is significantly affected by information security and technology awareness, while privacy does not significantly influence users. According to the findings, we provide useful insights for application developers, conclude by presenting the limitations of the research and provide guidelines for future research. Full article
(This article belongs to the Special Issue Key Technologies for Security and Privacy in Web 3.0)
Show Figures

Figure 1

Figure 1
<p>Research model.</p>
Full article ">Figure 2
<p>Data source regions.</p>
Full article ">Figure 3
<p>Survey objects’ understanding and willingness to further learn about blockchain.</p>
Full article ">Figure 4
<p>The results of the model regression (result from the SAS Enterprise Miner).</p>
Full article ">Figure 5
<p>Hypotheses test results.</p>
Full article ">
15 pages, 3383 KiB  
Article
Enhancing Value-at-Risk with Credible Expected Risk Models
by Khreshna Syuhada, Rizka Puspitasari, I Kadek Darma Arnawa, Lailatul Mufaridho, Elonasari Elonasari, Miftahul Jannah and Aniq Rohmawati
Int. J. Financial Stud. 2024, 12(3), 80; https://doi.org/10.3390/ijfs12030080 - 16 Aug 2024
Viewed by 542
Abstract
Accurate risk assessment is crucial for predicting potential financial losses. This paper introduces an innovative approach by employing expected risk models that utilize risk samples to capture comprehensive risk characteristics. The innovation lies in the integration of classical credibility theory with expected risk [...] Read more.
Accurate risk assessment is crucial for predicting potential financial losses. This paper introduces an innovative approach by employing expected risk models that utilize risk samples to capture comprehensive risk characteristics. The innovation lies in the integration of classical credibility theory with expected risk models, enhancing their stability and precision. In this study, two distinct expected risk models were developed, referred to as Model Type I and Model Type II. The Type I model involves independent and identically distributed random samples, while the Type II model incorporates time-varying stochastic processes, including heteroscedastic models like GARCH(p,q). However, these models often exhibit high variability and instability, which can undermine their effectiveness. To mitigate these issues, we applied classical credibility theory, resulting in credible expected risk models. These enhanced models aim to improve the accuracy of Value-at-Risk (VaR) forecasts, a key risk measure defined as the maximum potential loss over a specified period at a given confidence level. The credible expected risk models, referred to as CreVaR, provide more stable and precise VaR forecasts by incorporating credibility adjustments. The effectiveness of these models is evaluated through two complementary approaches: coverage probability, which assesses the accuracy of risk predictions; and scoring functions, which offer a more nuanced evaluation of prediction accuracy by comparing predicted risks with actual observed outcomes. Scoring functions are essential in further assessing the reliability of CreVaR forecasts by quantifying how closely the forecasts align with the actual data, thereby providing a more comprehensive measure of predictive performance. Our findings demonstrate that the CreVaR risk measure delivers more reliable and stable risk forecasts compared to conventional methods. This research contributes to quantitative risk management by offering a robust approach to financial risk prediction, thereby supporting better decision making for companies and financial institutions. Full article
Show Figures

Figure 1

Figure 1
<p>Illustration of the impact of sample size on variance: (<b>a</b>) shows a random variable following an exponential distribution with a parameter of 0.5, while (<b>b</b>) represents a gamma-distributed random variable with parameters 2 and 0.5. Both (<b>a</b>) and (<b>b</b>) demonstrate that, as the value of <span class="html-italic">m</span> increases, the variance of the sample mean decreases, causing <math display="inline"><semantics> <mover accent="true"> <mi>X</mi> <mo stretchy="false">¯</mo> </mover> </semantics></math> to converge towards <math display="inline"><semantics> <msub> <mi>μ</mi> <mi>X</mi> </msub> </semantics></math>.</p>
Full article ">Figure 2
<p>Comparison of expected risk of Model Type I: (<b>a</b>) shows the <math display="inline"><semantics> <mover accent="true"> <mi>X</mi> <mo stretchy="false">¯</mo> </mover> </semantics></math> probability function of the exponential random variable (0.5) and (<b>b</b>) shows the difference in the probability functions of <math display="inline"><semantics> <msub> <mover accent="true"> <mi>X</mi> <mo stretchy="false">¯</mo> </mover> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mover accent="true"> <mi>X</mi> <mo stretchy="false">¯</mo> </mover> <mrow> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 3
<p>Detailed representation of the expected risk of Model Type II: This illustration provides an analysis of the model’s volatility, highlighting the fluctuations and uncertainties inherent in its performance over time.</p>
Full article ">Figure 4
<p>Application of expected risk of Model Type II to GARCH processes: This illustration demonstrates the expected risk and volatility of Model Type II for GARCH(1,0) and GARCH(1,1) processes.</p>
Full article ">Figure 5
<p>Illustration of <math display="inline"><semantics> <msub> <mover accent="true"> <mi>X</mi> <mo stretchy="false">¯</mo> </mover> <mi>t</mi> </msub> </semantics></math> and <math display="inline"><semantics> <mrow> <mi mathvariant="script">G</mi> <mo>(</mo> <msub> <mover accent="true"> <mi>X</mi> <mo stretchy="false">¯</mo> </mover> <mi>t</mi> </msub> <mo>)</mo> </mrow> </semantics></math> derived from Bitcoin asset prices.</p>
Full article ">Figure 6
<p>This illustration demonstrates the Value-at-Risk (VaR) in the expected risk model applied to the GARCH(1,1) process, showcasing how the model estimates risk at different confidence levels. The visual includes VaR metrics for confidence levels of 90%, 95%, and 99%, providing a comprehensive view of how potential risk varies under these different thresholds. By depicting these levels, the illustration highlights the sensitivity of the risk assessment to changes in confidence levels, offering valuable insights into the robustness and precision of the VaR model within the context of the GARCH(1,1) framework.</p>
Full article ">Figure 7
<p>Illustration of the VaR forecast in the expected risk model with the GARCH(1,1) process.</p>
Full article ">Figure 8
<p>Illustration of the relationship between coverage probability and confidence level in the CreVaR forecasts of the expected risk model.</p>
Full article ">
35 pages, 1703 KiB  
Review
Cryptocurrency Price Prediction Algorithms: A Survey and Future Directions
by David L. John, Sebastian Binnewies and Bela Stantic
Forecasting 2024, 6(3), 637-671; https://doi.org/10.3390/forecast6030034 - 15 Aug 2024
Viewed by 948
Abstract
In recent years, cryptocurrencies have received substantial attention from investors, researchers and the media due to their volatile behaviour and potential for high returns. This interest has led to an expanding body of research aimed at predicting cryptocurrency prices, which are notably influenced [...] Read more.
In recent years, cryptocurrencies have received substantial attention from investors, researchers and the media due to their volatile behaviour and potential for high returns. This interest has led to an expanding body of research aimed at predicting cryptocurrency prices, which are notably influenced by a wide array of technical, sentimental, and legal factors. This paper reviews scholarly content from 2014 to 2024, employing a systematic approach to explore advanced quantitative methods for cryptocurrency price prediction. It encompasses a broad spectrum of predictive models, from early statistical analyses to sophisticated machine and deep learning algorithms. Notably, this review identifies and discusses the integration of emerging technologies such as Transformers and hybrid deep learning models, which offer new avenues for enhancing prediction accuracy and practical applicability in real-world scenarios. By thoroughly investigating various methodologies and parameters influencing cryptocurrency price predictions, including market sentiment, technical indicators, and blockchain features, this review highlights the field’s complexity and rapid evolution. The analysis identifies significant research gaps and under-explored areas, providing a foundational guideline for future studies. These guidelines aim to connect theoretical advancements with practical, profit-driven applications in cryptocurrency trading, ensuring that future research is both innovative and applicable. Full article
Show Figures

Figure 1

Figure 1
<p>Number of Blockchain.com cryptocurrency wallets and research publications related to cryptocurrency price prediction (publication data is retrieved from the SCOPUS database) (data as of final literature extraction at 1 May 2024).</p>
Full article ">Figure 2
<p>Annual Distribution of Cryptocurrency Price Prediction Publications Across Various Academic Journals (publication data is retrieved from the SCOPUS database) (data as of final literature extraction at 1 May 2024).</p>
Full article ">Figure 3
<p>Flowchart of the identification and selection of relevant papers.</p>
Full article ">Figure 4
<p>Disciplines reflected in documents relative to each database considered (data as of final literature extraction at 1 May 2024).</p>
Full article ">Figure 5
<p>Disciplines reflected in documents relative to each database considered by percentage (data as of final literature extraction at 1 May 2024).</p>
Full article ">Figure 6
<p>(<b>a</b>) Disciplines reflected in journals and conferences as publication outlets, (<b>b</b>) Distribution of results across databases (data as of final literature extraction at 1 May 2024).</p>
Full article ">Figure 7
<p>Ambiguous price charts which can be interpreted as a variety of price patterns.</p>
Full article ">Figure 8
<p>Conceptual framework for research in cryptocurrency prediction.</p>
Full article ">Figure 9
<p>Prediction results compared with actual closing prices [<a href="#B38-forecasting-06-00034" class="html-bibr">38</a>].</p>
Full article ">
22 pages, 1177 KiB  
Article
Exploring Calendar Anomalies and Volatility Dynamics in Cryptocurrencies: A Comparative Analysis of Day-of-the-Week Effects before and during the COVID-19 Pandemic
by Sonal Sahu, Alejandro Fonseca Ramírez and Jong-Min Kim
J. Risk Financial Manag. 2024, 17(8), 351; https://doi.org/10.3390/jrfm17080351 - 12 Aug 2024
Viewed by 800
Abstract
This study investigates calendar anomalies and their impact on returns and volatility patterns in the cryptocurrency market, focusing on day-of-the-week effects before and during the COVID-19 pandemic. Using advanced statistical models from the GARCH family, we analyze the returns of Binance USD, Bitcoin, [...] Read more.
This study investigates calendar anomalies and their impact on returns and volatility patterns in the cryptocurrency market, focusing on day-of-the-week effects before and during the COVID-19 pandemic. Using advanced statistical models from the GARCH family, we analyze the returns of Binance USD, Bitcoin, Binance Coin, Cardano, Dogecoin, Ethereum, Solana, Tether, USD Coin, and Ripple. Our findings reveal significant shifts in volatility dynamics and day-of-the-week effects on returns, challenging the notion of market efficiency. Notably, Bitcoin and Solana began exhibiting day-of-the-week effects during the pandemic, whereas Cardano and Dogecoin did not. During the pandemic, Binance USD, Ethereum, Tether, USD Coin, and Ripple showed multiple days with significant day-of-the-week effects. Notably, positive returns were generally observed on Sundays, whereas a shift to negative returns on Mondays was evident during the COVID-19 period. These patterns suggest that exploitable anomalies persist despite the market’s continuous operation and increasing maturity. The presence of a long-term memory in volatility highlights the need for robust trading strategies. Our research provides valuable insights for investors, traders, regulators, and policymakers, aiding in the development of effective trading strategies, risk management practices, and regulatory policies in the evolving cryptocurrency market. Full article
(This article belongs to the Special Issue Machine Learning Applications in Finance, 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Q-Q plot of residuals in the pre-COVID-19 period.</p>
Full article ">Figure 2
<p>Q-Q plot of residuals during the COVID-19 Period.</p>
Full article ">
33 pages, 5696 KiB  
Article
DiFastBit: Transaction Differentiation Scheme to Avoid Double-Spending for Fast Bitcoin Payments
by David Melo, Saúl Eduardo Pomares-Hernández, Lil María Rodríguez-Henríquez and Julio César Pérez-Sansalvador
Mathematics 2024, 12(16), 2484; https://doi.org/10.3390/math12162484 - 11 Aug 2024
Viewed by 567
Abstract
Bitcoin is a payment system that generates a decentralized digital currency without ensuring temporal constraints in its transactions; therefore, it is vulnerable to double-spending attacks. Karame has proposed a formalization for a successful double-spending attack based on meeting three requirements. This focuses on [...] Read more.
Bitcoin is a payment system that generates a decentralized digital currency without ensuring temporal constraints in its transactions; therefore, it is vulnerable to double-spending attacks. Karame has proposed a formalization for a successful double-spending attack based on meeting three requirements. This focuses on fast payment scenarios where the product is delivered immediately after the payment is announced in the mempool, without waiting for transaction confirmation. This scenario is key in Bitcoin to increase the probability of a successful double-spending attack. Different approaches have been proposed to mitigate these attacks by addressing one or more of Karame’s three requirements. These include the following: flooding every transaction without restrictions, introducing listeners/observers, avoiding isolation by blocking incoming connections, penalizing malicious users by revealing their identity, and using machine learning and bio-inspired techniques. However, to our knowledge, no proposal deterministically avoids double-spending attacks in fast payment scenarios. In this paper, we introduce DiFastBit: a distributed transaction differentiation scheme that shields Bitcoin from double-spending attacks in fast payment scenarios. To achieve this, we modeled Bitcoin from a distributed perspective of events and processes, reformulated Karame’s requirements based on Lamport’s happened-before relation (HBR), and introduced a new theorem that consolidates the reformulated requirements and establishes the necessary conditions for a successful attack on fast Bitcoin payments. Finally, we introduce the specifications for DiFastBit, formally prove its correctness, and analyze DiFastBit’s confirmation time. Full article
(This article belongs to the Special Issue Modeling and Simulation Analysis of Blockchain System)
Show Figures

Figure 1

Figure 1
<p>Illustration of a double-spending attack where two conflicting transactions, <math display="inline"><semantics> <mrow> <mi>T</mi> <mi>r</mi> <mo>(</mo> <mi>A</mi> <mo>)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>T</mi> <mi>r</mi> <mo>(</mo> <mi>B</mi> <mo>)</mo> </mrow> </semantics></math>, are being verified by different sets of nodes. The red nodes verify the dishonest transaction <math display="inline"><semantics> <mrow> <mi>T</mi> <mi>r</mi> <mo>(</mo> <mi>A</mi> <mo>)</mo> </mrow> </semantics></math>, while the blue nodes verify the honest transaction <math display="inline"><semantics> <mrow> <mi>T</mi> <mi>r</mi> <mo>(</mo> <mi>B</mi> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>This diagram illustrates the events and processes of a successful double-spending attack on fast Bitcoin payments, showing how the events <math display="inline"><semantics> <mrow> <mi>Add</mi> <mo>(</mo> <mi>Bob</mi> <mo>,</mo> <mi>MP</mi> <mo>←</mo> <mi>Tr</mi> <mo>(</mo> <mi>B</mi> <mo>)</mo> <mo>)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>r</mi> <mo>(</mo> <mi>Nodes</mi> <mo>,</mo> <mi>Tr</mi> <mo>(</mo> <mi>A</mi> <mo>)</mo> <mo>)</mo> </mrow> </semantics></math> occur concurrently.</p>
Full article ">Figure 3
<p>This figure shows the sequence diagram of the events and processes for a successful double-spending attack on fast Bitcoin payments. The causal relation between the events <math display="inline"><semantics> <mrow> <mi>r</mi> <mo>(</mo> <mi>Nodes</mi> <mo>,</mo> <mi>Tr</mi> <mo>(</mo> <mi>B</mi> <mo>)</mo> <mo>)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>r</mi> <mo>(</mo> <mi>Nodes</mi> <mo>,</mo> <mi>Tr</mi> <mo>(</mo> <mi>A</mi> <mo>)</mo> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Case 1: The proposed scheme shows a double-spending attack where Alice attempts to defraud Bob, but Bob’s transaction is confirmed on the blockchain. Blue, red, and yellow events indicate transactions added, rejected, and removed from the merchants’ mempool, respectively.</p>
Full article ">Figure 5
<p>Case 2: The proposed scheme illustrates Alice’s double-spending attack, where the malicious transaction is confirmed on the blockchain. Blue, red, and yellow events indicate transactions added, rejected, and removed from the merchants’ mempool, respectively.</p>
Full article ">Figure 6
<p>This figure shows the propagation time of 100 transactions measured in milliseconds for a set of 18,900 nodes. The data points represent the time taken for each transaction to propagate across the network.</p>
Full article ">Figure 7
<p>The graph shows the confirmation times in minutes for the last 100 blocks. The blue line represents the individual confirmation times, while the red dashed line shows the average confirmation time of 9.24 min. The shaded red area represents the standard deviation of ± 8.59 min, indicating the variability in confirmation times.</p>
Full article ">Figure 8
<p>Topology of Bitcoin with merchant nodes. Traditional Bitcoin nodes are labeled with <span class="html-italic">N</span> and shown in red. Merchant nodes are labeled with <math display="inline"><semantics> <msub> <mi>N</mi> <mi>m</mi> </msub> </semantics></math> and shown in green, with the delegated node highlighted in blue. The diagram represents a star topology with the delegated node coordinating the communication between different clusters.</p>
Full article ">Figure 9
<p>Total confirmation time for fast-payment transactions using DiFastBit. The blue line represents the total confirmation time across 100 iterations, with an average confirmation time red line of approximately 9496.74 milliseconds and a standard deviation of 622.81 milliseconds.</p>
Full article ">Figure 10
<p>Comparison of different times in the Bitcoin network. The blue line represents the confirmation times of Bitcoin. The green line shows the propagation times of Bitcoin transactions. The red line represents the confirmation times of DiFastBit.</p>
Full article ">Figure A1
<p>This diagram illustrates the events and processes of a failed double-spending attack on fast Bitcoin payments, where the causal precedence is established between the events <math display="inline"><semantics> <mrow> <mi>A</mi> <mi>d</mi> <mi>d</mi> <mo>(</mo> <mi>B</mi> <mi>o</mi> <mi>b</mi> <mo>,</mo> <mi>M</mi> <mi>P</mi> <mo>←</mo> <mi>T</mi> <mi>r</mi> <mo>(</mo> <mi>A</mi> <mo>)</mo> <mo>)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>r</mi> <mo>(</mo> <mi>B</mi> <mi>o</mi> <mi>b</mi> <mo>,</mo> <mi>T</mi> <mi>r</mi> <mo>(</mo> <mi>B</mi> <mo>)</mo> <mo>)</mo> </mrow> </semantics></math>. The red dot highlights proof by contradiction, where transaction <math display="inline"><semantics> <mrow> <mi>T</mi> <mi>r</mi> <mo>(</mo> <mi>B</mi> <mo>)</mo> </mrow> </semantics></math> is rejected, resulting in no product delivery.</p>
Full article ">Figure A2
<p>Diagram showing a failed double-spending attack on fast Bitcoin payments, where transaction <math display="inline"><semantics> <mrow> <mi>T</mi> <mi>r</mi> <mo>(</mo> <mi>A</mi> <mo>)</mo> </mrow> </semantics></math> is not propagated by Helper Nodes. The red dot indicates proof by contradiction, confirming <math display="inline"><semantics> <mrow> <mi>T</mi> <mi>r</mi> <mo>(</mo> <mi>B</mi> <mo>)</mo> </mrow> </semantics></math> and avoiding a successful double-spending attack. Vertical lines represent Bitcoin network processes, and slanted lines show message propagation time.</p>
Full article ">Figure A3
<p>This diagram illustrates a failed double-spending attack on fast Bitcoin payments. Bob receives the block with the <math display="inline"><semantics> <mrow> <mi>T</mi> <mi>r</mi> <mo>(</mo> <mi>A</mi> <mo>)</mo> </mrow> </semantics></math> transaction before delivering the product. The blue events show transactions in the local or merchants’ mempool, and the green line shows the successful confirmation of Bob’s transaction. The red line highlights the proof by contradiction, making the attack unsuccessful.</p>
Full article ">
22 pages, 2481 KiB  
Review
Blockchain Technology and Its Potential to Benefit Public Services Provision: A Short Survey
by Giorgio Piccardo, Lorenzo Conti and Alessio Martino
Future Internet 2024, 16(8), 290; https://doi.org/10.3390/fi16080290 - 9 Aug 2024
Viewed by 939
Abstract
In the last few years, blockchain has emerged as a cutting-edge technology whose main advantages are transparency, traceability, immutability, enhanced efficiency, and trust, thanks to its decentralized nature. Although many people still identify blockchain with cryptocurrencies and the financial sector, it has many [...] Read more.
In the last few years, blockchain has emerged as a cutting-edge technology whose main advantages are transparency, traceability, immutability, enhanced efficiency, and trust, thanks to its decentralized nature. Although many people still identify blockchain with cryptocurrencies and the financial sector, it has many prospective applications beyond digital currency that can serve as use cases for which traditional infrastructures have become obsolete. Governments have started exploring its potential application to public services provision, as confirmed by the increasing number of adoption initiatives, projects, and tests. As the current public administration is often perceived as slow, bureaucratic, lacking transparency, and failing to involve citizens in decision-making processes, blockchain can establish itself as a tool that enables a process of disintermediation, which can revolutionize the way in which public services are managed and provided. In this paper, we will provide a survey of the main application areas which are likely to benefit from blockchain implementation, together with examples of practical implementations carried out by both state and local governments. Later, we will discuss the main challenges that may prevent its widespread adoption, such as government expenditure, technological maturity, and lack of public awareness. Finally, we will wrap up by providing indications on future areas of research for blockchain-based technologies. Full article
Show Figures

Figure 1

Figure 1
<p>The supporting PRISMA flow diagram behind our survey.</p>
Full article ">Figure 2
<p>Distribution of the sources across the identified four main technologies.</p>
Full article ">Figure 3
<p>Distribution of the sources across the three geographical areas.</p>
Full article ">Figure 4
<p>Frequency heatmap for the number of sources (Italy and Europe).</p>
Full article ">Figure 5
<p>Frequency heatmap for the number of sources (the rest of the world).</p>
Full article ">Figure 6
<p>Distribution of the sources according to their functionalities.</p>
Full article ">
Back to TopTop