2020
DOI: 10.1016/j.ijinfomgt.2020.102090
|View full text |Cite
|
Sign up to set email alerts
|

Using the security triad to assess blockchain technology in public sector applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
64
1
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 118 publications
(67 citation statements)
references
References 64 publications
0
64
1
2
Order By: Relevance
“…More importantly, the disruptive properties of blockchain data might be legally problematic with respect to certain laws. For example, the fact that no one can easily remove or modify information off the blockchain might conflict with several European Union laws, such as the 1995 Directive or the GDPR [83].…”
Section: ) Costs and Risksmentioning
confidence: 99%
“…More importantly, the disruptive properties of blockchain data might be legally problematic with respect to certain laws. For example, the fact that no one can easily remove or modify information off the blockchain might conflict with several European Union laws, such as the 1995 Directive or the GDPR [83].…”
Section: ) Costs and Risksmentioning
confidence: 99%
“…participants, which is hypothetical for such an attack (Warkentin and Orgeron, 2020; Kamble the computing power of the entire participant network and could vote to remove all the Kamble et al 2019;Chang et al 2020a). This means that an attacker controls 51 per cent of security challenge includes "51% attack" in blockchain (Warkentin and Orgeron, 2020; to undo or change a particular chain without affecting all the blocks associated with it. Another less likely that a greedy attacker looking to intermeddle with a chain to defraud, would be able (2017) revealed that as the block is chain to the next as well as the one before it, it becomes are security challenges in the blockchain.…”
Section: Blockchain Security and Privacy Challengesmentioning
confidence: 99%
“…For example, empirical research conducted by Herian study finds that blockchain technology is still vulnerable to manipulation, which means there irrespective of the decentralised transparent structure of blockchain technology, the present and privacy of the individual from those who created blockchain (Upadhyay, 2020). However, et al 2021) from the attacker (Warkentin and Orgeron, 2020), individual personal information One of the technological challenges facing blockchain is the security challenges (Kouhizadeh stakeholders who are in the operations and supply chain of the firms to participate in using a suspicious behaviour (Yin et al 2019). This may pose a serious challenge to various sources and apply search criteria to fit, index, and a cluster is an ideal approach to detect that can collect and analyse data automatically from blockchain bitcoin and other external data perform an illicit transaction, implementing predictive capacity and a machine learning system However, due to the criminality on this open network design that will draw criminals to is to disguise transactions that are used to capture illegal transactions (O'Leary, 2018).…”
Section: Blockchain Security and Privacy Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…For more complex systems, Schmitz and Pape (2020) recommend using comprehensive approaches, one of which is a lightweight, domain-specific framework to support information security decision-making. One of the promising methods may be blockchain technology (Warkentin & Orgeron, 2020). Brožová, Šup, Rydval, Sadok, and Bednar (2016) apply the semantic network to develop a decision-making network and network process that considers qualitative and quantitative data.…”
Section: Literature Reviewmentioning
confidence: 99%