Background Information
This is a paper review conducted on one of the papers written by the students. It aims at looking at the content, organization, style, mastery, methods, applications and quality of the work, in order to gain an in-sight about the main aspects associated with the delivering leadership recognized in a particular project. Rules of grammar, punctuation, sentence structure, among other aspects of writing are looked into in this paper review.
The aim of origin paper
The paper that is being reviewed was a response to the question below:
What are the leadership styles and qualities most appropriate to complete projects and operational activities? To do this the following check list will be used.
Assessment High/ Med/Low HML | H/M/L | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1 | Content Is the content of the manuscript likely to be of interest to sophisticated managers or scholars interested in managing projects in business? If not, are there key parts missing or is the manuscript misaligned with what you believe is essential to this discipline? | H | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2 |
Organization Is the manuscript organized in clear and logical manner? If not, how can it be improved? Checklist guide: Introduction: Explains the: purpose of the paper ” scope and any relevant limitations ” context by providing the rationale of any case study examples Theoretical Framework: Includes: ” intelligent discussion of ALL required readings ” evidence of additional knowledge through further cited references ” concisely refers to relevant theory relating to the topic Data/Evidence used in Case Study Examples Includes: ” Explanation of the context of the source of data used (validity of observational data if yours in what way is this of value? Explain its context to your experience or others that you have drawn this evidence or data from) ” Highlights any data/evidence characteristics (ie this may be limited to a specific type of organisation e.g. an NGO or public sector organisation or a global business corporation etc. ” Highlights limitations (e.g. this may be an example in a rapidly changing environment so things may have changed drastically since this example was experienced) Discussion and Evaluation of Data/Evidence Findings This should compare the theory identified with the data and evidence presented. It should demonstrate that: ” Evidence or data is clearly and concisely presented ” Evidence or data is shown to be valid and credible (i.e. it is convincing) and relevant to the argument ” Theory and observation of evidence is well matched (i.e. no extraneous un-discussed data/evidence is introduced but not commented upon or that theories/concepts are not introduced that are not then used to compare with presented data/evidence)Conclusions 8 DPM This should wrap up the paper and not introduce anything new. It should: ” Clearly and concisely summarize the purpose of the paper and how it was fulfilled ” It should clearly and concisely summarize the main findings or observations ” It should highlight just a few of the most salient and critical and useful findings |
Booked Venue | Type of Event | Setup |
Empress 5 | Press conference | Auditorium |
Esplanade 1& 2 | Buffet lunch | Banquet rounds |
Istana 2 & 3 | Breakout Rooms | Boardroom style |
Connaught | Training Rooms | U shaped |
Empress 4 & 5 | Closing Dinner | Cabaret style |
Banquet Event Order
Account:
Post as: Sales Manager Address: 76 Bras Basah Road Singapore, 189558 |
Event Date: 18 August 2023 | ||||
Contact:+65
Phone:+65 6338 8333 Fax:+65 6339 6866 |
|||||
Deposit: $137,8000
Payment: N/A |
Booked By: Carol Goh
Catering Sales Manager: Student Name Banquet Operations Manager: Carol Goh |
||||
Banquet Event Details | |||||
Time | Booked Venue | Type of Event | Setup Required | Guarantee Pax | Expected Pax |
7pm 11pm | Hall 1 | Closing dinner | cabaret style | 312 | 300 |
Event Flow | ||
From | To | Remarks |
7:00 pm | 7:30 am | Guests arrive and are welcomed with a drink reception. |
7:30 pm | 8:00 pm | Guests are seated for dinner. |
8:00 pm | 9:00 pm | Dinner is served. |
9:00 pm | 10:00 pm | Speeches and awards ceremony. |
10:00 pm | 11:00 pm | Entertainment and Event concludes. |
MENU | SETUP | ||||||||||
Appetizer:
Soup:
Main Course:
Dessert:
|
|
||||||||||
AUDIO VISUAL | |||||||||||
|
|||||||||||
BEVERAGE | |||||||||||
Soft drinks ” Fruit juices ” Sparkling water
Posted on | by Laureen
IntroductionBlockchain belongs to the number of technologies that are gaining momentum in various industries due to their hypothesized ability to change the world by improving the principles of data management. The technology was first presented more than ten years ago, and the number of its potential applications has significantly increased since then. The use of blockchain in various business activities presents an interesting research topic since it allows keeping track of its evolution. This paper presents a review of twenty research papers focused on the real and potential business applications of blockchain. Problem Statement, Significance, and ObjectivesIn the modern world, the emergence of blockchain technologies is often regarded as one of the most promising trends that will help people to revolutionize a wide range of processes that impact peoples quality of life. Being aware of the key achievements of blockchain-based services and companies, some individuals are likely to overestimate the actual success of these technologies and start promoting the unrealistic image of blockchain. Therefore, the research problem that explains the need to review the existing literature about the blockchain technology in business is based on potential incoherencies between the hard-driving ambitions of blockchain proponents and the actual situation with their use in commercial activities. To put it in other words, the research problem that encouraged the creation of the paper is centered on the necessity to categorize various studies in the field to separate the real-life uses of blockchain in different aspects of business operations from propositions for future research. Achieving the goal above will help understand the state of the art. The problem of ambitions versus reality exists in any field of research, and its practical implications make it specifically important. About blockchain in business, the problem deserves special attention since its proposed applications are numerous. The significance of the research problem is inextricably connected to blockchains status of disruptive technology. In the context of commercial activities, disruptive innovations alter the existing systems of business values and the principles of competition. Taking that into account, if the universal use of such technologies is not preceded by many years of thorough research focused on both theoretical and practical challenges, it can lead to a variety of large-scale problems and crises. Studying blockchain technologies and their real and planned applications in business is a significant task due to the projected benefits of their universal implementation. The latter is expected to drastically change the basic approaches to business-making by eliminating the need for some excessive steps in business operations and reducing bureaucracy. Apart from numerous process optimization opportunities typically associated with blockchain, it is necessary to conduct literature reviews devoted to the chosen topic because of the technologys said ability to transform business ethics. According to popular opinions, the key advantage of blockchain relates to the mechanisms helping to establish trust-based relationships between some parties and revolutionize this process. Using the logic of independent researchers and blockchain proponents who support this viewpoint, it is possible to say that in the fullness of time, blockchain will lead to the extinction of fraud in the business. Taking into account the potential benefits associated with this goal, it is particularly important to contribute to blockchain research by reviewing the available studies and evaluating the practicality of some far-reaching propositions and scientific claims. To summarize the points presented above, blockchain research is a very young scientific field, and any contributions are required to help separate the practically viable applications of the technology from statements that are still groundless. With that in mind, this literature review is aimed at reaching the following objectives:
The Review of LiteratureCryptocurrencies, Payment Opportunities, and Associated DisadvantagesThe first important theme that is present in academic papers devoted to blockchain relates to new payment opportunities that are available to customers and possess numerous advantages compared to more traditional options. Speaking about the topic, it is necessary to pay attention to cryptocurrencies, a widely discussed but controversial topic. In their research on payment options and new opportunities to find clients and make some businesses more visible and valuable, many authors focus on bitcoin, its uses in the international market, and related threats (Grinberg, 2012; Grover, Kar, & Vigneswara, 2018; White, 2017). The earliest known application of the blockchain technology, bitcoin, presents a digital currency that is decentralized, partially anonymous, not backed by any legal entities or governments, and cannot be redeemed for other commodities (Grinberg, 2012, p. 160). Among the widely acknowledged advantages of its use is integrity, being immune to inflation and deflation rates, and increased affordability of international financial transactions, and new opportunities for underbanked populations (Sun, Yan, & Zhang, 2016; Grinberg, 2012; Önder & Treiblmaier, 2018). Therefore, since its emergence, bitcoin has been regarded as a promising innovation. The use of cryptocurrencies is also supposed to benefit some small businesses due to the lack of limitations related to the number of payments. Considering their advantages such as liquidity and the ability to make payments instantly, the proponents of such payment systems state that they can become the best option for micropayments (Grinberg, 2012; Grover et al., 2018). The opportunity to accept micropayments can be listed among the most important applications of blockchain technology in business to consumer transactions. To some extent, it changes the principles of competition and helps customers to make donations to support some organizations that face the problems of political censorship (Grinberg, 2012). Using the proof-of-work system that ensures the safety of monetary transactions, cryptocurrencies and e-commerce micropayments are generally believed to improve the flow of online business activities (Belle, 2017). Thus, opportunities related to micropayments make cryptocurrencies a driver of change that enables businesses to receive funding from interested parties all over the world. Despite the perceived ability of cryptocurrencies to simplify business-making and improve its security, modern researchers list a variety of risk factors that mainly relate to legal definitions and the implementation of anti-terrorism laws and policies. Being a combination of game theory and cryptography, the technology makes the exchange of monetary resources less controlled by official financial institutions, thus causing specific problems (Belle, 2017, p. 280). For instance, the availability of fast and anonymous transactions is sometimes believed to contribute to crime rates, especially when it comes to the illegal drug trade and the sponsorship of terrorism (Grinberg, 2012). Apart from that, the criticism of cryptocurrencies in B2C activities can be related to energy economy considerations. As it is stated in the study by Belle (2017), some types of blockchain that utilize the proof-of-work methods are a waste of computing power since the amount of energy used to create the bitcoin blockchain is almost equal to the energy consumption rates in some Central Asian countries (p. 281). Based on that, the applications of cryptocurrencies in contemporary businesses are limited due to the legal status of electronic cash systems and access to resources. Despite the existing disadvantages, many scholars still believe that further research will help individuals involved in businesses to benefit from the use of cryptocurrencies. As an example, Önder and Treiblmaier (2018) suppose that by adopting digital currencies everywhere and studying their benefits for end-customers, it is possible to facilitate the work of new customer-to-customer markets in the tourist industry. Continuing on research directions, it needs to be said that similar to valuable goods in the physical world, digital money can be stolen by criminals or simply lost due to several reasons such as security flaws (Grinberg, 2012). New approaches to proof-of-work mechanisms to be used in peer-to-peer payment systems have been outlined by Chinese researchers (Zhao, Fan, & Yan, 2016). To address the actual security concerns raised by bitcoin cash opposers, it is possible to increase the total number of nodes participating in mining activities, thus minimizing the opportunity to conduct successful majority attacks (Zhao et al., 2016). Overall, despite blockchain technologies significantly increase the number of available payment options, cryptocurrencies are not used universally. Identity Management, Fraud Prevention, and Consumer ProtectionIt is clear from modern researchers findings that new payment options are not the only application of blockchain technology in the world of business. Innovations in blockchain research are usually centered on commercial benefits and the ways to increase some businesses competitive advantage (Grover et al., 2018; Önder & Treiblmaier, 2018). Despite that, more attention is now being paid to blockchain technologies in solving some global challenges that relate both to businesses and ethical issues. For example, blockchain-based projects are supposed to help improve some commonly used business models and providing new tools for personal data management (Kewell, Adams, & Parry, 2017). However, particular methods helping to achieve these goals are not widely discussed in the existing literature. Financial inclusion is especially important for businesses since it strengthens the links between entrepreneurs and their target clients, thus impacting sales volumes and other important performance indicators. According to Kewell et al. (2017) who study the links between blockchain and social good, the technology can be used to reduce financially excluded populations by providing new solutions for managing peoples data. Identity management and authentication are among the promising applications of blockchain in B2G business models (Grover et al., 2018). Blockchain-based applications for the formation of legal identity are supposed to improve global business processes in four different ways. They include the following: ensuring compliance with immigration policies, addressing national security concerns, increasing political engagement with the help of new options for voters, and making crimes that involve the misuse of others data less common (Grover et al., 2018; Kewell et al., 2017; Zhao et al., 2016). To achieve the fourth objective, Kewell et al. (2017) believe, it is pivotal to decentralize identity, reverse the process of its formation to build identities from the bottom up, and enable users to manage their profiles and hide some attributes for safety (p. 434). Nowadays, companies and initiatives involved in the development of such systems include the Blockchain Border Bank, BitNation, and the ID2020 project (Kewell et al., 2017). It is immediately apparent from the points above that business applications of the blockchain technology are not limited to methods that improve low-level events in business and are focused on profit maximization. Apart from helping businesses to prevent consumer fraud, modern uses of the technology in question allow protecting the safety of clients data with the help of the trusted user interface. The latter is supposed to facilitate instant social sharing, make it easier for clients to share information, and reduce numerous risks related to malicious software and data privacy (Grover et al., 2018, p. 330; Kewell et al., 2017; Hawlitschek, Notheisen, & Teubner, 2018). Despite its numerous advantages, the trusted user interface and some problems peculiar to its creation are underresearched. According to Hawlitschek et al. (2018), the issue manifests itself in the absence of clear terminology since the word trust and other key terms tend to have dissimilar meanings depending on the context. The studies by Hawlitschek et al. (2018) and Kewell et al. (2017) share some similarities when it comes to the future of the trusted user interface. According to them, the impact of the human factor (peoples understanding of trust in business, technical aptitude, and personal experience) presents a limitation that negatively affects progress. Smart Contracts in Various Industries and Theyre PotentialThe use of smart contracts to reach agreements and define the rights and responsibilities of interested parties is a common application of blockchain in business. A smart contract is usually defined as a transaction protocol executing the terms of a contract, and its applications in business are numerous (Zheng, Xie, Dai, Chen, & Wang, 2018, p. 370). Even though such contracts possess numerous advantages when it comes to business-making, they are not immune to cyber-attacks. There have been several cases of smart contract hacks resulting in the loss of funds, and vulnerability is a factor that prevents the global implementation of this tool (Zheng et al., 2018). Speaking about the benefits of using blockchain and smart contracts in business, many researchers refer to new opportunities related to paperwork processing (Guo & Liang, 2016; Mengelkamp, Notheisen, Beer, Dauer, & Weinhardt, 2018). For example, smart contracts can be effectively used in financial services to control the interactions between the key trading parties and ensure the timeliness of payments (Guo & Liang, 2016). Therefore, despite smart contracts vulnerability to cybercrime, their use is beneficial to operate costs. In modern studies devoted to blockchain in business, smart contracts are often seen as an option that saves time and ensures the safety of transactions. In particular, the article by Guo and Liang (2016) mentions some problems surrounding large financial transactions such as the need to use the letters of credit for risk elimination. Since they include over thirty different documents that should be prepared, checked, and delivered, these letters create numerous operational risks (Guo & Liang, 2016). With the help of the technology being discussed, it is possible to create smart contracts responsible for performing this procedure, and therefore, reduce the time needed for document processing to one hour (Guo & Liang, 2016). In general, smart contracts present a blockchain-based tool that can be implemented in any type of business since such contracts add credibility to agreements and facilitate the timely fulfillment of contract provisions (Zheng et al., 2018). The feature that makes them valuable for modern businesses is the immutability of contract provisions: parties signing a smart contract are supposed to have no opportunities to falsify any data to pursue their interests (Zheng et al., 2018). Also, the use of self-executing contracts can be beneficial to businesses since they are based on the principles of data transparency and the updatability of information any events that relate to the collaboration of parties become visible to all participants instantly (García-Bañuelos, Ponomarev, Dumas, & Weber, 2017; Zheng et al., 2018; Sun et al., 2016). As it follows from the benefits listed above, the features of smart contracts make them a good option for various types of businesses. As the chosen research articles demonstrate, smart contracts can be successfully applied to business activities in different industries. For instance, Mengelkamp et al. (2018) utilize blockchain technology to create a model of a local energy market, the mechanism of which is based on a self-executing contract on a non-public blockchain written in Solidity. The model allows using smart contracts to control the release of payments and process orders placed by consumers (Mengelkamp et al., 2018). Similar to Mengelkamp et al. (2018), García-Bañuelos et al. (2017) utilize Solidity supported by Ethereum to demonstrate the uses of self-executing contracts for the optimization of business activities with the intent of reducing initialization costs and maximizing the throughput of operations. In addition to local electricity markets, smart contracts can find extensive use in land registration businesses and even help to regulate conflicts in relationships. The second generation of blockchain technology allows conducting several transactions right after a particular event (García-Bañuelos et al., 2017). If the principle is applied to land registries, the system automatically withdraws tax payments, transfers funds, and changes property titles once a sales transaction is conducted (García-Bañuelos et al., 2017). Apart from the registration of property, the creation of self-executing contracts helps regulate any types of relationships, ranging from the collaborative work of two suppliers to matrimonial alliances (Beck, Avital, Rossi, & Thatcher, 2017; García-Bañuelos et al., 2017). As an example, according to Beck et al. (2017), Ethereum allows creating contracts that introduce the rules helping to divide marital property in case of divorce. The examples found in the reviewed literature prove the point that smart contracts apply to different businesses. However, the extent to which it can affect industries that involve contractors that do not know each other and have to make international payments presents a significant concern. Discussing the research propositions related to blockchain in the tourist industry, Önder and Treiblmaier (2018) suggest that smart contracts present an ideal option for such contractors and, therefore, they can change the future of customer-to-customer tourism marketplaces. Continuing on the relevance of smart contracts to long-distance business partnerships, Sikorski, Haughton, and Kraft (2017) list their potential uses in the construction and the chemical industries to prove that this tool will revolutionize business processes. Given that self-executing agreements leave no room for fraud, their use can help address the problem of construction delays caused by the breach of promises such as the non-payment of salaries, insufficient financing, and similar factors (Sikorski et al., 2017). The suggestions above that refer to the great opportunities of smart contracts in business process optimization are also supported by Viriyasitavat, Da Xu, Bi, and Sapsomboon (2018) who study their potential in the context of cyber manufacturing. The Role of Blockchain in Supply Chains: Management and TraceabilitySupply chains involve multiple risks related to the presence of untrustworthy contracting parties, the complexity of business operations, cybercrime, and other factors. Analyzing risk mitigation in supply chains, the studies by Tian (2016), Tieman and Darun (2017), Apte and Petrovsky (2016), and Saberi, Kouhizadeh, Sarkis, and Shen (2018) list the actual and potential applications of blockchain technology that facilitate the delivery of services and goods from suppliers to end-users. The benefits of the technology in supply chains found in the existing literature include increases in transparency and synergy due to well-organized inter- and intra-level collaboration, risk management opportunities, the absence of single points of failure, and quality assurance. Understanding the importance of product quality in the delivery of perishable goods, modern researchers discuss the uses of blockchain in the food industry. For instance, Tieman and Darun (2017) apply it to the supply of halal food in both non-Muslim and Muslim countries and theorize about the benefits of blockchain-based supply chains. In their understanding, the ability of blockchain to improve the traceability of alimentary goods and immediately report any parties defaults from their obligations are particularly important in the halal food industry due to strict quality standards and related penalties (Tieman & Darun, 2017). Just like Tieman and Darun (2017), Tian (2016) studies traceability in food supply chains with special attention to the prevention of food fraud. In contrast to the previous researchers, he demonstrates the compatibility of different technologies such as blockchain and RFID and offers the following advantages of his theoretical model: opportunities for real-time product tracking, the credibility of product safety data, and fraud prevention (Tian, 2016). Therefore, an important research problem related to the supply chain applications of the technology being discussed is the ability to propel food safety inspections to the next level. The security of supply chains in different industries remains an open question despite the statements made by many researchers interested in the given topic. The work by Apte and Petrovsky (2016) reviews the state of the art in business applications of the technology and summarizes the key suggestions related to the advantages of blockchain for supply chains (traceability, fraud prevention, the timeliness of delivery, etc). In their discussion, the researchers focus on the production of pharmaceutical drugs. The findings listed in the given work align with the propositions of other researchers who center their analysis on supply chain management in other industries. In line with the previously mentioned researchers, Apte and Petrovsky (2016) list traceability, the immutability of key data, and the speed of operation as the most promising features of blockchain technologies. Even though these benefits characterize the uses of blockchain in supply chains positively, modern scholars acknowledge that the technology is now incapable of replacing traditional quality and auditing processes (Apte & Petrovsky, 2016, p. 77; Tian, 2016). To some extent, the limitations related to the reliability of blockchain-based systems for supply chain management are distilled down to issues with equipment and cybersecurity mentioned in the studies by Belle (2017), Grinberg (2012), Hawlitschek et al. (2018), and other authors. These potential problem areas include the possibility of majority attacks that allow entering unwanted transactions into blockchain-based systems. About supply chain management and the peculiarities of the field, the problems can manifest themselves in changes in product quality documentation, exclusivity, preferred suppliers, and logistics strategies (Apte & Petrovsky, 2016, p. 77). To be put in other words, many issues surrounding the uses of blockchain in supply chains are inextricably connected to different parties competing interests. Summarizing the findings related to the applications of blockchain technologies in supply chain management, it is possible to say that despite their increased data traceability, their use does not guarantee the absence of mistakes or opportunities for data falsification. Generalizing on the technologys ability to revolutionize product tracking in supply chains, Apte and Petrovsky (2016) state that blockchain is of great help when it comes to delivery, but its use does not alleviate the need for quality audits (p. 78). Similar ideas are expressed in the study by Saberi et al. (2018) that lists security challenges among the greatest barriers to the implementation of blockchain in supply chain management. According to Saberi et al. (2018), the establishment of blockchain-based systems can help to achieve sustainability, but success will be heavily dependent on the quality of technical solutions for overcoming inter- and intra-organizational barriers. Judging from the positions of other specialists whose works are listed in the section, the majority of modern authors recognize the critical role of further research based on practical cases in unlocking the full potential of blockchain-based solutions for supply chains. Gaps in the Reviewed LiteratureAll studies included in the review discuss the applications of blockchain in business in a detailed way, but there is still a range of problems that require attention and additional research. To begin with, when it comes to the discussion of real-life projects that are based on blockchain technologies, the majority of studies tend to list the same examples such as Everledger, Ethereum, Bitcoin, and some websites that provide cryptocurrency exchange services. As for the additional examples that deal with financial services and other fields of business, they are not always analyzed with attention to the history of development and their actual financial outcomes. Based on that, many studies from the list review only the most well-known examples of blockchain-based businesses, whereas the increased focus is placed on theorizing, planning, and outlining new opportunities. The tendency is manifested in the chosen works to a different degree. For instance, the studies by Önder and Treiblmaier (2018) and Tieman and Darun (2017) are focused solely on research propositions related to blockchain in the tourism industry and halal food supply. Therefore, the first important gap presents the relation between the actual uses of the blockchain (with the analysis of practical outcomes) and the proposed applications that are still untested. In addition to that, the existing gaps include a range of problems linked to the barriers to blockchain implementation. Almost all studies included in the review apply the principles of critical thinking to the discussed uses of blockchain in business and present several concerns related to the practical aspects of the technologys applications. Despite that, taking into account the state of things in blockchain research, practically implementable strategies that would help overcome these barriers are not proposed, and this problem presents a significant research gap. Speaking about the issues that require further research centered on practical problem solving, it is pivotal to mention the absence of legal frameworks that would help businesses that utilize blockchain and cryptocurrencies to build effective partnership relationships and avoid jurisdictional issues (Grinberg, 2012; Belle, 2017). Also, the approaches to the prevention of criminal activities using blockchain are not thoroughly discussed in the studies. One more research gap that deserves attention is related to the optimization of blockchain-based tools for businesses. Although modern authors pay close attention to the ability of blockchain to make business processes more focused and efficient, the discussion seems to be limited by the recognition of its operating disadvantages. Interestingly, this research gap is the most obvious in the studies devoted to the supply chain applications of blockchain technologies. For instance, many authors acknowledge the high implementation costs of blockchain-based supply chain management systems, but no solutions are presented (Tian, 2016; Grover et al., 2018; Saberi et al., 2018). Based on that, it is possible to say that many gaps in the available literature are directly related to blockchains actual immaturity and the financial peculiarities of disruptive technologies. ConclusionTo sum it up, blockchain technology is supposed to be a promising innovation that has the potential to revolutionize a range of business processes in various industries. As it follows from the existing studies, the current applications of blockchain in business include new payment options due to the emergence of cryptocurrencies, micropayments, self-executing contracts that reduce fraud, e-commerce, and many others. At the same time, some initiatives and suggestions are not fully implemented into practice and require further research. They include the use of blockchain for personality identification, reducing the number of financially underserved people, product tracking in supply chains, the creation of smart cities, new opportunities for voters and property owners, and so on. According to the review, the key advantages of blockchain in the world of business include increased credibility of transactions, new conflict resolution principles in commercial relationships, and customer satisfaction due to the transparency of businesses. Additionally, among these benefits are the speed of international financial operations, new tools to verify the quality of goods and services, the effectiveness of financial inclusion strategies, and the transformation of competition in the global market. Although the degree to which the potential of blockchain in business is unlocked constantly increases, several research gaps still need to be addressed to make the best use of the technology in question. These gaps are strictly interconnected with real and potential problems that occur during the development and implementation of blockchain-based tools for businesses. Among them are high implementation costs, the existing threats to the security of assets, and inconsistencies between the actual applications of blockchain and legal systems in different countries. In general, despite the presence of detailed projects that aim to adopt blockchain for various purposes, many applications of the technology are still in the pilot stage. Taking these problems into consideration, it is possible to conclude that researchers in the field still need to fill in several gaps directly related to practice and real interactions in business. ReferencesApte, S., & Petrovsky, N. (2016). Will blockchain technology revolutionize excipient supply chain management? Journal of Excipients and Food Chemicals, 7(3), 7678. Web. Beck, R., Avital, M., Rossi, M., & Thatcher, J. B. (2017). Blockchain technology in business and information systems research. Business and Information Systems Engineering, 59(6), 381384. Belle, I. (2017). The architecture, engineering and construction industry and blockchain technology. In G. Ji & Z. Tong (Eds.), Digital Culture p‡ Proceedings of 2017 National Conference on Digital Technologies in Architectural Education and DADA 2017 International Conference on Digital Architecture (pp. 279284). Nanjing, China: China Architecture Industry Publishers. Web. García-Bañuelos, L., Ponomarev, A., Dumas, M., & Weber, I. (2017). Optimized execution of business processes on the blockchain. In J. Carmona, G. Engels, & A. Kumar (Eds.), Business Process Management/: The Proceedings of the 15th International Conference (BPM 2017) (pp. 130146). Barcelona, Spain: Springer. Web. Grinberg, R. (2012). Bitcoin: An innovative alternative digital currency. Hastings Science & Technology Law Journal, 4, 159207. Web. Grover, P., Kar, A. K., & Vigneswara, P. (2018). Blockchain for businesses: A systematic literature review
Posted on | by Laureen
AbstractThe present article sets out to employ the ever-evolving knowledge of design science in information science research to conceptualize the problem of incorrect academic certifications doing rounds in places of employment or in academic institutions, which primarily originates from illegal activities such as forgery or identity theft. To prevent these instances, we propose an electronic web-based Certification Verification Program. Using the Stakeholders perspectives to understand the problem and implement an effective and efficient web-based artifact aimed at dealing with this menace, the article discusses the various phases and processes entailed in enlisting the stakeholders concerns, proposing a solution to the problem, prototyping, and building and evaluating the artifact against specific benchmarks, such as utility and efficiency of the proposed artifact in real-world settings. Through the incorporation of various security levels, authentications, and user and content access control mechanisms in each of the components that function to serve the different stakeholders, in our case the sender, receiver, and controller, this article sufficiently demonstrates how the Certifications Verification Program could be beneficial to all stakeholders, particularly with regard to ensuring transparency and accountability in policies and privacy practices, ensuring the quality of data, enhancing data collection limitation, guaranteeing purpose specification, and safeguarding the consent of users. IntroductionAlthough the boundaries and contours of design sciences continue to experience numerous definitions and refinements as we progress deeper into the 21st century, and in spite of the fact that the sciences of design are seen as a comparatively new entrant to the prism of methodologies, paradigms, and perspectives that have been dominated by ongoing debates formerly only positioned as positivist versus interpretive and quantitative versus qualitative (Purao et al, 2008), academics and practitioners are in agreement about the fundamental importance and value of the subfield to the information systems discipline (March & Storey 2008). Although this shift became visible in the information systems (IS) discipline only since the mid-1990s, according to these authors, design science has in the past received widespread attention and indeed practiced as an important mode of research in other specialized disciplines, including architecture, building economics and engineering. The seminal works of Hevner et al (2004) highlighted design science research as a clear alternative to the IS discipline, leading to the progression of two paradigms that characterized research in the IS discipline, namely behavioral research and design science. The present article seeks to utilize the knowledge that has so far been gathered in design science to design, implement and evaluate a proposed information technology artifact, known as the Certifications Verification System, which could be used not only to prevent some illegal activities associated with paper-based certificates but also facilitate the storage, management, and retrieval of academic certifications papers for students. Available literature demonstrates that such an artifact, if well designed and implemented, could have the capacity to improve the efficiency and performance of business/learning institutions (March & Storey 2008), but also maximize their value and competitiveness (Germonprez et al 2011). To understand the dynamics of the proposed IT artifact, it is important to provide an overview of design science research, as follows. An Overview of Design Science ResearchHevner et al (2004) acknowledge that the design-science paradigm in IS discipline &seeks to extend the boundaries of human and organizational capabilities by creating new and innovative artifacts (p. 75). The paradigm is placed at the confluence of people, organizations, and technology (Hevner et al 2004), and is endowed with the functionality of developing, implementing, using, and managing information systems within organizational contexts with the view to change existing situations into preferred ones. Design science researchers operating within organizational contexts can therefore utilize information technology (IT), among other resources, to design and outline work systems and processes through which critical organizational objectives are achieved. Simon cited in March & Storey (2008) noted that design science research is grounded in two important phases, namely (1) the definition of the problem space, and (2) optimization techniques to search it. According to these authors, the problem space denotes the desired end situation, the present organizational situation, and the variations between the desired end situation and the present situation. The optimization techniques, on their part, denote actions that may be taken by design and management professionals to eradicate acknowledged variations between the desired end state and the present state. Hence, it is important to note that &the representation of design problems and the generation and evaluation of design solutions are the major tasks in design science research (March & Storey 2008, p. 726). As noted by these authors, the challenges for design science research in the IS field to develop and evaluate IT artifacts that facilitate management and IT, staff, too, among other things, (1) describe desired organizational information processing capabilities and their relationship with present and desired organizational situations, and (2) develop actions that enable them to implement information processing capabilities that move the organization towards desired situations (p. 726). It is the major purpose of this paper to develop and evaluate an IT artifact known as the Certifications Verification System, based on the central tenets of design science research in the IS discipline. The Certifications Verification SystemThe emergence of information technology (IT) and related applications continue to create novel challenges for the education system, not only in terms of building IT-oriented infrastructure to transfer content and learning materials in between the students and the instructors but also in ensuring the students are graded efficiently and results disseminated to the students in a secure cost-effective way. Today, more than ever before, IT professionals and experts in the education sector are working with increasingly complex problems to come up with technology solutions that not only assist in moving information around from one region or place to another, but also facilitate connections between groups of students, learning institutions, and external learning resources (Rye 2009). Most of these technologies, as typically suggested in Shields (2011), have been focused on the provision of on-line course materials, grading and distance education; however, this article seeks to design, develop and evaluate a unique IT-enabled artifact that can account for students academic progress and provide certifications to students who have successfully attained the set educational goals. The need to design and develop the Certifications Verification System arises from the corresponding demands to (1) safeguard educational quality though the processing and dispensing of authenticated certificates to students and employers, (2) expand access to the certificates for students, (3) increase economic competitiveness for institutions which adopt the proposed system, and (4) facilitate inclusion and equitable distribution of the certificates in a rapidly expanding global information system. Every certification program, whether paper-based or automated, has its own vulnerabilities which include identity theft and forgeries (Gorard 2010). Considering that certificates are the physical evidence of our academic achievements needed to support further studies and gain formal employment, ensuring that the programs design is flawless is of utmost importance to learning institutions. The proposed IT-oriented artifact must therefore not only expose and address challenges related to such system vulnerabilities but must also address privacy and confidentiality issues if the system is to achieve the desired end state and sufficiently meet its demands as outlined above. Representation of Design ProblemsFirst, it is imperative to note that the representation of design problems for the proposed Certifications Verification Program will be conceptualized around three stakeholders, namely: (1) the receiver potential new employer or educational facility, (2) the controller a graduated person who is going to control the access permissions and authorizations, and (3) the sender an academic institution that processes the certification. Each of these stakeholders has some demands and concerns (design problems), conceptualized, and illustrated as follows. The receiverThis stakeholder demands the right certification and the right person, primarily driven by real or perceived concerns about the circulation of fake certifications and identity fraud. It has been reported in the literature that these illegal activities emerge due to paper-based certificates (Murthy 2011), not mentioning that some online sites engaged in providing fake certificates to potential customers (Shields 2011). This article will focus on two such illegal activities, namely: ForgeryForgery is defined in State v. Lutes,38 Wn.2d 475, 479, 230 P.2d 786 (1951), as & the false making of an instrument, which purports on the face of it to be good and valid for the purposes for which it was created, with a design to defraud any person or persons&.( State v. Goranson 1965). Unfortunately, the convergence of the technology revolution witnessed in the 21st century has made the creation of fake paper-based documents a reality. In recent years, there are a number of sites available on the Internet which issue fake degree certificates. It is a growing trade worldwide in counterfeit university degree certificates and academic transcripts, which in turn creates potential damage to the universities and employment systems. In May 2004, an audit showed that around 463 employees in the federal government in the US had fake academic degrees (Murthy, 2011). Identity FraudIdentity fraud occurs when an individual &with malicious intent consciously creates the semblance of an identity that does not belong to him, using the identity of someone else or of a non-existing person (Koops and Leenes 2006). In the scope and context of this article, identity fraud involves a person who, with prior knowledge, wrongfully and deceitfully obtains and uses personal or academic data of another person and passes them as own, characteristically for economic or academic gains. In recent years, the internet has become a fertile ground for criminals to acquire data of other people without their consent and passing them as their own to achieve selfish interests (US Department of Justice n.d.). Identity fraud can best be described by the works of sociologist and criminologist Cressey (1973) cited in Malgwi & Rakovski (2009), who developed the Fraud Triangle Theory to argue that fraud is likely to occur due to one or more of the three elements in the fraud triangle: perceived pressure, perceived opportunities, and rationalization. Figure 1 illustrates the elements of the Fraud Triangle Theory. As described by Malgwi & Rakovski (2009), the pressure is what causes a person to commit fraud, and can be ignited by a multiplicity of variables, including medical bills, expensive tastes, and addiction problems, among others. Most of the time, pressure arises from a significant financial need/problem. Opportunity is the ability to commit fraud. Because fraudsters dont wish to be caught, they must also believe that their activities will not be detected. Opportunity is created by weak internal controls, poor management oversight, and/or through the use of ones position and authority. Failure to establish adequate procedures to detect fraudulent activity also increases the opportunity for fraud to occur. Rationalization is a crucial component in most frauds and involves a person reconciling his/her behavior (stealing) with the commonly accepted norms of decency and trust (Malgwi & Rakovski 2009). The ControllerThe controller, who in this context happens to be the graduate, must have the necessary control and access permissions and authorizations to ensure that his data are only accessed by the authorized person. Consequently, it is in order to conceptualize privacy concerns and access control needs in the proposed IT-oriented artifact. Privacy concernsPrivacy is a serious issue in any electronic transaction. Culnan (2000) defines privacy as &the ability of an individual to control the terms under which their personal information is acquired and used. An individuals privacy, as such, is always in an inherent state of tension, since it must be defined in conjunction with the capabilities of others to transact business and even to control their own privacy. Privacy has four basic categories: information privacy, bodily privacy, communications privacy, and territorial privacy. Internet privacy is mostly information privacy, which means the ability of the individual to control information about ones self. Invasions of privacy occur when individuals cannot maintain a substantial degree of control over their personal information and its use (Davies 1996). In the last two decades, record access has received much attention from legislators and regulators. On the other hand, privacy protection laws have affected the accessibility and therefore the appraisal of records containing personally identifiable information. The privacy statutes have attempted to protect individual privacy by legislating what information may be collected, the circumstances under which it may be retained, and to whom the data may be released; and by prescribing remedies for violations and sanctions against violators (Barritt 1986). According to above, the concept of (PII) had been defined as any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individuals identity, such as name, social security number, date and place of birth, mothers maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information (Gallagher 2010). Access Control NeedsAccess control approaches combine cryptographic protection and authorization access control to enforce access control via selective encryption, which implies the receiver can access and decrypt only the data they are authorized to access. Most of these approaches contain a structure called the user tree hierarchy, which represents the relationship between receiver and information items (Hue et al 2011). The challenge here is to satisfy the controllers needs, depending on his rights, by giving him full control of access to his information, with a multi-level of permission such as the permission to view, download or print. The SenderThe sender, who in this context comprises the academic institution charged with the responsibility of processing certifications, must put security concerns at the center of the whole exercise for the model to succeed. Security is defined as &the protection of data against accidental or intentional disclosure to unauthorized persons, or unauthorized modifications or destruction (Yazdanifard et al 2011). The sender concerns could be within some security attributes level or computer infections, conceptualized as follows. Security ConcernsSecurity is the combination of processes, procedures, and systems used to ensure confidentiality, authentication, and integrity of data (Akhlaq et al 2006). The senders concerns are to make sure of the security of the information sent via the infrastructure by employing four security attributes, namely: confidentiality, authentication, integrity, and non-repudiation. In confidentiality, the sender must have the capacity to keep the information sent unreadable to unauthorized users, while in authentication, the sender must demonstrate the capacity to decipher the identity of the receiver to avoid identity fraud, which leads to loss of critical data to unauthorized users. The integrity component denotes the senders capacity to ensure that the information sent is not illegally altered or destroyed during transmission. Finally, non-repudiation entails putting in place mechanisms that will ensure the infrastructure will acknowledge that it indeed sent information or data to the receiver (Akhlaq et al 2006). Infections and IntrusionsComputer infections, such as viruses and worms, spread over networks of contacts between computers, with different types of networks being exploited by different types of infections. The structure of contact networks affects the rate and extent of spreading computer infections (Balthrop et al 2004). The sender must bear concerns of being affected by any of these viruses and worms through his connection to other networks. Additionally, the sender must bear concerns for intrusion threat, which is defined as the potential possibility of a deliberate unauthorized attempt to access information, manipulate information, or render a system unreliable or unusable (Kumar 1995). The figure next page represents an illustration of the conceptualization of the problem from stakeholders perspectives. Designing the Components of the SolutionIn order to synthesize the solution, it is imperative to understand the critical components of the solution, described as follows. The Internet and the WebIn common usage, the words Internet and Web are often used interchangeably. Although they are strongly related, there are some differences between them. The term Internet, in particular, is the more general term and implicitly includes physical aspects of the underlying networks as well as mechanisms such as email and peer-to-peer activities that are not directly associated with the Web. The term Web, on the other hand, is associated with the information stored and available on the Internet. It is also used to indicate other complex networks of information, such as webs of scientific citations, social relations, or even protein interactions (Baldi et al 2003). The Web has ushered an era of anytime, anywhere, any place communication. Widely accepted standards such as HTML use the Web to fully function (Aalst& Kumar 2003). Consequently, it is ideal to use the internet in designing the solution, particularly in availing a link between the different stakeholders, due to its availability, ease of accessibility, and low cost. XML Exchange LanguageThe proposed solution is based on web service technology, which relies on XML for communicating the service request and response messages. XML is a data exchange technology, which has not only rapidly evolved into an international standard but has also permeated every sector of business from aviation and accounting to weather and workflow. In technical terms, XML is a subset of SGML (Standard Generalized Markup Language), modified and optimized for delivery over the Web (Aalst & Kumar 2003). By using structured data formats like XML the developers have the benefit to get great flexibility on the application because it has the capability to define the contents of documents through a set of elements or tags (Aalst& Kumar 2003). Additionally, XML provides a structured representation of data that can be implemented broadly and is easy to deploy. Evidence from the literature demonstrates that XML provides a data standard which can encode the content, semantics, and schemata for a wide variety of cases ranging from simple to complex, implying that it can be used to mark up a purchase order, an invoice, payment advice, a doctors prescription and information about people and organizations, among other functionalities (Aalst & Kumar 2003). Overall, XML ensures that structured data will be uniform and understandable across a variety of applications, vendors, and customers. The resulting interoperability has provided the impetus for a new generation of business and electronic commerce Web applications to grow (Aalst& Kumar 2003). Consequently, with XML language, which gives us the ability to connect different applications with different data types, the solution will rely on its capacity to transfer massages among the different stakeholders. Access ControlIdentity Based Access Control (IBAC)Under this model, permissions to access a resource are directly associated with a subjects identifier (e.g., a user name). Access to the resource is only granted when such an association exists. An example of IBAC is the use of Access Control Lists (ACL), commonly found in operating systems and network security services. An ACL contains a list of users and their access rights such as read, write, or execute (Yuan & Tong 2005). Role-Based Access Control (RBAC)The RBAC model restricts access to a resource based on the business function or role the subject is performing. The permissions to access a resource are then assigned to the appropriate role or roles, rather than directly assigned to subject identifiers (Yuan & Tong 2005). Lattice-Based Access Control (LBAC)The LBAC model is manageable when there are a relatively small number of static security labels and categories (as the total combinations of labels and categories are potentially n*m), and therefore is only effective for certain coarsely-grained security scenarios and lacks flexibility and scalability (Yuan & Tong 2005). In our solution, we think the most appropriate model to use is the Role Based Access Control (RBAC). With this access control model, the controller will be allowed to give permission to the appropriate role or roles to access the information. AntivirusAn antivirus can be described as a protective software primarily designed to protect computers and networks from malicious software, which include: viruses, Trojans, Keyloggers, hijackers, dialers, and other codes that vandalizes or steals the computer contents. Anyone who accesses other networks on a regular basis using the internet should develop and implement an antivirus strategy (Patil et al 2010). Antivirus products are categorized into three major divisions: Internet Security [IS], Total Security [TS], and Antivirus [AV]. Antivirus products are primarily focused on detecting and remedying viruses and Spyware, while Internet Security products provide all the virus and Spyware removal features of an AV, as well as additional functions to provide greater internet protection. These features may include protection against phishing, rootkit detection, firewalls, and scanning of web pages and HTTP data. Total Security products provide data migration and backup features on top of all security features common to IS products (Patil et al 2010). The most recent updated antivirus programs, that going to be used in the solution, will guarantee secure transaction of data among stakeholders. Characteristics of the SolutionAs noted by Hevner et al (2004), the solution to the problem will be characterized &with respect to the artifacts use (intention to use), perceived usefulness, and impact on individuals and organizations (net benefits) depending on the system, service, and information quality (p. 77). Based on the above, it is in order to develop constructs and models that provide a unique problem-solving approach for developing an IT-oriented artifact that could allow all stakeholders to share information. A design framework for the Certifications Verification System would therefore entail the following key characteristics: ComponentsComponents entail &technological subunits that can be combined to form higher-level technologies (Adomavicius et al 2008, p. 786). Here, we conceptualize the use of XML queries by the sender (institutions holding critical certifications information) using either synchronous or asynchronous techniques. The XML query will contain metadata fields for use by the controller, but will also be constructed in such a manner that it will allow for specific control attributes to be used. ProductsProducts entail &technologies that interact with the user in a given usage context (Adomavicius et al 2008, p. 786). Here, we conceptualize the use of full access control by the controller, which inarguably allows them to provide access to the receiver (potential employers or institutions of learning). InfrastructureInfrastructure entails &technologies that support and extend the use of product technologies (Adomavicius et al 2008, p. 786). Here, we conceptualize the use of a website on the internet which provides the controller with a basic account. The controller can log into the website with the correct authorizations and access their certifications for downloading, printing, or sending to the receiver (potential employers or institutions of learning). The figure next page illustrates the proposed solution to this problem. The PrototypeAccording to Ambler (2012), &prototyping is an iterative analysis technique in which users are actively involved in the mocking-up of the UI [User Interface] for a system. This author further notes that prototypes serve several functions, which include (1) analysis artifact enables IT, professionals, to explore the problem space with other stakeholders, (2) requirements artifact enables the initial envisioning of the system, and (3) design artifact enables IT, experts, to explore the solution space of the proposed system. The proposed prototype is design-oriented, implying that it will enable the developers to explore the solution space for the proposed IT artifact. This further implies that the proposed prototype will not only have the capacity to determine the artifacts desired functionality and its architecture but will be instrumental in creating the actual artifact (Peffers et al 2008). The prototype for the proposed solution will have three components, namely (1) the controller component, (2) the receiver component, and (3) the sender component. Each of these components is discussed in detail below. The Controller ComponentThe Controller Registration ProcessIn order to use the artifact, the controller will have to register in order to get the subject identifiers (username and password). The registration process is made up of simple steps as elaborated in the figure next page, which illustrates the controllers registration model. Considering that the artifact is web-based, the controller has to register through the proposed website. This diagram represents the interface of the controllers registration form. The form is designed to collect important information about the controller such as names, school ID, email address, and date of birth among others. This information is saved in the sender database and has to be matched by inputted data whenever someone wants to log in as a controller. This ensures that only the selected controller accesses the account, thereby guaranteeing accountability if the account is misused. The second step is to verify the provided information with the sender database. If the provided data does not match with the sender data the registration process will terminate. If not the system will send an e-mail to the controller, including their user name and password. The purpose of using this method in the registration process is to implement the easiest way for the controller to create his account, rather than make them contact the university to apply for the account. We are assuming that only the controller knows this information, so, no one else can provide it but them. Moreover, we are assuming that the controllers e-mail will be in the sender database, so no one will receive the user name and password except the real graduated person from the university. The figure next page shows the interface of the controller registration form, and also demonstrates the key pieces of recommended information to create the controller account. The Controller Sign-in ProcessAfter the controller receives the registration e-mail which consists of their user name, password, and the link of the sign-in page, they can now enter the artifact web service, as shown in Figure 6 The Controller Interface DesignAfter the controller sign in successfully to the web artifact, he will be directed to the controller interface, which contains the elements that make him with full control generated from the web links to the receiver. These elements are outlined in the following table. Table 1: Elements in the Controller Interface Design.
|