Chapter

Blockchain Awareness Among Computer Science Students: A Preliminary Study

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The main goal of research was to investigate to what extent computer science students are familiar with blockchain technology (BC). The survey was conducted among the students of Cracow universities. In order to analyze deeply the results of the survey, indicators of the knowledge factor and the usage factor were developed to assess knowledge and usage of BC respectively. The main findings point out to the popular internet portals and conversations with other people as the main sources of information on BC for students. Students are less likely to obtain their information from university classes and lectures, television, radio, and other media. The percentage of active BC users almost doubles the percentage of respondents having specialized knowledge, therefore the relationship between knowledge and usage of BC is rather weak. Traditional banking and trade are the most frequently indicated areas of BC applications by the respondents. The conducted research also shows that BC may be perceived as a tool for social/technology evolution and revolution. The survey results have important implications for universities as they confirm that university curricula are not updated sufficiently quickly to keep up with the emerging technologies.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Although blockchain's main and still leading use case is cryptocurrencies, it gained popularity in other areas. Dymek et al. [8] conducted research that points out that besides traditional banking and trading usage, blockchain applications are rarely known even among computer science students. Some research papers try to use blockchain technology in favour of Internet of Things (IoT) [36,39,14]. ...
Article
Full-text available
Blockchain technology is increasingly finding traction in diverse areas such as finance, supply-chain management, and cloud services because of its ability to provide robust cybersecurity inherent in its system of having decentralized data storage. The rising complexity in the architecture of popular blockchain platforms create barriers to correct adoption of the technology. It becomes imperative that pedagogical tools are inducted in the blockchain ecosystem to address this perceived or real impediments for the uptake of the technology. We propose one of the first such pedagogical tool for training in blockchain using an adversarial sandbox adaptive serious game approach for students and technology professionals. We further propose use of AI to enhance NPC interactivity based on player’s responses. We plan to evaluate this serious game on a subjective metrics that is based on a game experience questionnaire.
Conference Paper
Full-text available
Blockchain is the most hyped disrupting technology which people are talking about for secure and transparent data management. It is one of the most promising technologies of the future but still it has not reached at the level of practical implementation in the Industry. A technology cannot be used in real use cases until understood by the users and the implementers until they have awareness about that technology. Before implementing any technology there must be awareness about the technology among the people; who implement the technology and who use the technology. This paper is the study of awareness level among the engineering students in various colleges who are going to implement the Blockchain Technology for the industry use cases and the Industries where the Blockchain Technology will be used to improve their business processes.
Article
Full-text available
This work provides a systematic literature review of blockchain-based applications across multiple domains. The aim is to investigate the current state of blockchain technology and its applications and to highlight how specific characteristics of this disruptive technology can revolutionise "business-as-usual" practices. To this end, the theoretical underpinnings of numerous research papers published in high ranked scientific journals during the last decade, along with several reports from grey literature as a means of streamlining our assessment and capturing the continuously expanding blockchain domain, are included in this review. Based on a structured, systematic review and thematic content analysis of the discovered literature, we present a comprehensive classification of blockchain-enabled applications across diverse sectors such as supply chain, business, healthcare, IoT, privacy, and data management, and we establish key themes, trends and emerging areas for research. We also point to the shortcomings identified in the relevant literature, particularly limitations the blockchain technology presents and how these limitations spawn across different sectors and industries. Building on these findings, we identify various research gaps and future exploratory directions that are anticipated to be of significant value both for academics and practitioners.
Article
Full-text available
Blockchain has numerous benefits such as decentralisation, persistency, anonymity and auditability. There is a wide spectrum of blockchain applications ranging from cryptocurrency, financial services, risk management, internet of things (IoT) to public and social services. Although a number of studies focus on using the blockchain technology in various application aspects, there is no comprehensive survey on the blockchain technology in both technological and application perspectives. To fill this gap, we conduct a comprehensive survey on the blockchain technology. In particular, this paper gives the blockchain taxonomy, introduces typical blockchain consensus algorithms, reviews blockchain applications and discusses technical challenges as well as recent advances in tackling the challenges. Moreover, this paper also points out the future directions in the blockchain technology.
Article
Full-text available
Blockchain has numerous benefits such as decentralization, persistency, anonymity and auditability. There is a wide spectrum of blockchain applications ranging from cryptocurrency, financial services, risk management, Internet of Things to public and social services. Although a number of studies focus on using the blockchain technology in various application aspects, there is no comprehensive survey on the blockchain technology in both technological and application perspectives. To fill this gap, we conduct a comprehensive survey on the blockchain technology. In particular, this paper gives the blockchain taxonomy, introduces typical blockchain consensus algorithms, reviews blockchain applications and discusses technical challenges as well as recent advances in tackling the challenges. Moreover, this paper also points out the future directions in the blockchain technology.
Conference Paper
Full-text available
As more applications are built on top of blockchain and public ledger, different approaches are developed to improve the performance of blockchain construction. Recently Intel proposed a new concept of proof-of-elapsed-time (PoET), which leverages trusted computing to enforce random waiting times for block construction. However, trusted computing component may not be perfect and 100% reliable. It is not clear, to what extent, blockchain systems based on PoET can tolerate failures of trusted computing component. The current design of PoET lacks rigorous security analysis and a theoretical foundation for assessing its strength against such attacks. To fulfill this gap, we develop a theoretical framework for evaluating a PoET based blockchain system, and show that the current design is vulnerable in the sense that adversary can jeopardize the blockchain system by only compromising \(\varTheta (\log \log n/\log n)\) fraction of the participating nodes, which is very small when n is relatively large. Based on our theoretical analysis, we also propose methods to mitigate these vulnerabilities.
Article
Full-text available
The paper tries to explore the awareness of how the present Generation Z is using the social media as well as to review its repercussion on them as an individual’s, organization and society as a system. The paper demarcates Generation Z from other branches of generation with a systematized differentiation in the behaviour, principles and choices which are constant over the time. It outlines their social media usage and intra-generational difference springing from environmental factors and personal factors. Personal factors are divided into steady and driving factors. The paper brings forward how the futuristic Generation Z’s use of social media influences them as an individual’s, organization and society. It also attempts to bring forward certain managerial repercussions and to them and a research outline. Earlier researches on access of social media by Generation Y as well as Generation Z give rise to certain queries which are yet to be answered. They laid focus mainly on the US & UK, ignoring other regions and countries (including nation like India which comprises of 28% of youths) with huge and rapidly increasing share of Generation Y’s & Z’s populations; and where the determinants of social-media usability would vary considerably; the customer set under these studies are those whose behaviour are inclined to vary as they move on the different phases of their life cycle; they tried to understand Generation Z’s social media use but misses to look at the controllers as well as aftermaths of social-media usage. The theoretical frame of reference brought forward in this paper harvests a thorough set of investigation questions and designs the pathway for considering the predecessors & outcomes of social networking used by Gen Z. It tries to identify certain ignored queries regarding Gen Z’s and their social media usability, along with also sketches practical insights for various decision makers.
Book
This book addresses what software architects and developers need to know in order to build applications based on blockchain technology, by offering an architectural view of software systems that make beneficial use of blockchains. It provides guidance on assessing the suitability of blockchain, on the roles blockchain can play in an architecture, on designing blockchain applications, and on assessing different architecture designs and tradeoffs. It also serves as a reference on blockchain design patterns and design analysis, and refers to practical examples of blockchain-based applications. The book is divided into four parts: Part I provides a general introduction to the topic and to existing blockchain platforms including Bitcoin, Ethereum, and Hyperledger Fabric, and offers examples of blockchain-based applications. Part II focuses on the functional aspects of software architecture, describing the main roles blockchain can play in an architecture, as well as its potential suitability and design process. It includes a catalogue of 15 design patterns and details how to use model-driven engineering to build blockchain-based applications. Part III covers the non-functional aspects of blockchain applications, which are cross-cutting concerns including cost, performance, security, and availability. Part IV then presents three detailed real-world use cases, offering additional insights from a practical perspective. An epilogue summarizes the book and speculates on the role blockchain and its applications can play in the future. This book focusses on the bigger picture for blockchain, covering the concepts and technical considerations in the design of blockchain-based applications. The use of mathematical formulas is limited to where they are critical. This book is primarily intended for developers, software architects and chief information officers who need to understand the basic technology, tools and methodologies to build blockchain applications. It also provides students and researchers new to this field an introduction to this hot topic.
Chapter
Legal Technology —or “Legal Tech ”—is disrupting the traditional operations and self-understanding of the legal profession . This chapter introduces the central claim of this book, namely that these developments are having and will continue to have a disruptive effect on the work of lawyers and that adapting to this new operating environment is crucial for legal professionals remaining relevant in an increasingly technology -driven world. The chapter outlines some of the main features of this on-going transformation process, describes some of the pressures it is creating for lawyers , and provides short summaries of the chapters that comprise this collection.KeywordsLegal TechBlockchainSmart contractsCryptocurrencyLegal designLegal profession
Article
Organizations work to address 'a notable absence of women in the field.'
Chapter
We cannot conclude our analysis of fundamental forces and sentiment trading without a reference to cryptocurrencies (Bitcoin, Ethereum, Litecoin, and so on).
Chapter
This chapter explores the advent of blockchain technology which is the basis for almost all of the many types and formats of virtual currencies. We review the types, uses, and the many ways in which blockchain is transforming the world of business as well as society. Among them are management tools, financial services, tourism, legal and accounting services, and the innumerable other uses due to blockchain’s impenetrability to hacking, its protection of privacy, and many other advantages afforded.
Article
A peer-to-peer crypto-currency design derived from Satoshi Nakamoto's Bitcoin. Proof-of-stake replaces proof-of-work to provide most of the network security. Under this hybrid design proof-of-work mainly provides initial minting and is largely non-essential in the long run. Security level of the network is not dependent on energy consumption in the long term thus providing an energy-efficient and more cost-competitive peer-to-peer crypto-currency. Proof-of-stake is based on coin age and generated by each node via a hashing scheme bearing similarity to Bitcoin's but over limited search space. Block chain history and transaction settlement are further protected by a centrally broadcasted checkpoint mechanism.
Article
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.
Conference Paper
We formalize the notion of a proof of work (POW). In many cryptographic protocols, a prover seeks to convince a verifier that she possesses knowledge of a secret or that a certain mathematical relation holds true. By contrast, in a POW, a prover demonstrates to a verifier that she has performed a certain amount of computational work in a specified interval of time. POWs have served as the basis of a number of security protocols in the literature, but have hitherto lacked careful characterization. In this paper, we offer definitions treating the notion of a POW and related concepts. We also introduce the dependent idea of a bread pudding protocol. Bread pudding is a dish that originated with the purpose of reusing bread that has gone stale. In the same spirit, we define a bread pudding protocol to be a POW such that the computational effort invested in the proof may be reused by the verifier to achieve a separate, useful, and verifiably correct computation. As an example of a bread pudding protocol, we show how the MicroMint scheme of Rivest and Shamir can be broken up into a collection of POWs. These POWs can not only serve in their own right as mechanisms for security protocols, but can also be harvested in order to outsource the MicroMint minting operation to a large group of untrusted computational devices.
The idea of smart contracts
  • N Szabo
Szabo, N.: The idea of smart contracts. Nick Szabo's Papers and Concise Tutorials, vol. 6 (1997)
Wnioskowanie statystyczne w przykładach i zadaniach
  • M Balcerowicz-Szkutnik
  • E Sojka
  • W Szkutnik
Balcerowicz-Szkutnik, M., Sojka, E., Szkutnik, W.: Wnioskowanie statystyczne w przykładach i zadaniach. Wydawnictwo Uniwersytetu Ekonomicznego w Katowicach, Katowice (2016)