2022
DOI: 10.1007/s42979-022-01020-4
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity, Data Privacy and Blockchain: A Review

Abstract: In this paper, we identify and review key challenges to bridge the knowledge-gap between SME’s, companies, organisations, businesses, government institutions and the general public in adopting, promoting and utilising Blockchain technology. The challenges indicated are Cybersecurity and Data privacy in this instance. Additional challenges are set out supported by literature, in researching data security management systems and legal frameworks to ascertaining the types and varieties of valid encryption, data ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 101 publications
(37 citation statements)
references
References 32 publications
0
37
0
Order By: Relevance
“…In summary, the challenges that the digitalization of firms, institutions and society in general presents in this day and age are cybersecurity and user privacy (Wylde et al 2022 ). Specifically, maintaining a balance between the anonymity of users and the traceability of the transaction (Fujitani et al 2021 ); guaranteeing security and privacy of financial data in the face of a tendency towards open banking (Liao et al 2022 ), financial scamming, and hacking (Zhao 2021 ).…”
Section: Directions For Future Researchmentioning
confidence: 99%
“…In summary, the challenges that the digitalization of firms, institutions and society in general presents in this day and age are cybersecurity and user privacy (Wylde et al 2022 ). Specifically, maintaining a balance between the anonymity of users and the traceability of the transaction (Fujitani et al 2021 ); guaranteeing security and privacy of financial data in the face of a tendency towards open banking (Liao et al 2022 ), financial scamming, and hacking (Zhao 2021 ).…”
Section: Directions For Future Researchmentioning
confidence: 99%
“…For example, some suppliers may lack the necessary infrastructure and resources to participate in BC-based physical object tracing (Klöckner et al 2022 ). Considering the realization of data storage and sharing purposes, the vulnerability of BC to external threats may create the risk of sensitive data loss or exposure (Wylde et al 2022 ). Even though some of the other purposes of the BC project can create efficiency gains, we assume that investors are aware of the ongoing concerns and risks associated with other purposes and will therefore perceive the potential business value to be lower than for the cost/time saving purpose.…”
Section: Literature Review Theoretical Background and Hypotheses Deve...mentioning
confidence: 99%
“…Another prominent advantage in the purchasing domain is the information transfer directly between the customer and supplier information systems. This helps avoid errors, alterations, and likely fraud [36].…”
Section: Bitnationmentioning
confidence: 99%
“…This information can be invaluable in ensuring the safety and efficiency of your operations. This information allows you to identify problems promptly and make appropriate decisions [36].…”
Section: Bitnationmentioning
confidence: 99%
See 1 more Smart Citation