Opportunities and Risks of Blockchain Technologies (Dagstuhl Seminar 17132)

This report documents the program and the outcomes of Dagstuhl Seminar 17132 "Opportunities and Risks of Blockchain Technologies". Blockchain-based applications such as Bitcoin or Ethereum are emerging technologies, but a dramatic increase in industrial and academic interest in the technology is evident. Start-­ups and large financial players are working intensely on blockchain-based applications, making this one of the most promising drivers of financial innovation. However, the design and implementation of blockchain-based systems requires deep technical know-how in various areas, as well as consideration of economic and societal issues. These opportunities and challenges provided the starting point for the Dagstuhl Seminar where we analyzed and synthesized the current body of knowledge on the emerging landscape of blockchain technologies. We linked cryptographic economic systems to already established research streams around trust-related issues in payment systems and digital currencies, and digital asset management.

[1]  Lars Nyre,et al.  The mediated construction of reality , 2018, New Media Soc..

[2]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[3]  Jürgen Bott Central bank money and blockchain: A payments perspective , 2017 .

[4]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[5]  Jan Mendling,et al.  Untrusted Business Process Monitoring and Execution Using Blockchain , 2016, BPM.

[6]  Victoria L. Lemieux,et al.  Trusting records: is Blockchain technology the answer? , 2016 .

[7]  S. Kemp,et al.  The concept of near money in loyalty programmes , 2016 .

[8]  Don Tapscott,et al.  Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World , 2016 .

[9]  Jan Marco Leimeister,et al.  Why different trust relationships matter for information systems users , 2016, Eur. J. Inf. Syst..

[10]  Mounaim Cortet,et al.  PSD2: The digital transformation accelerator for banks , 2016 .

[11]  M. Mainelli,et al.  Sharing Ledgers for Sharing Economies: An Exploration of Mutual Distributed Ledgers (Aka Blockchain Technology) , 2015 .

[12]  Jan Damsgaard,et al.  The race to dominate the mobile payments platform: Entry and expansion strategies , 2015, Electron. Commer. Res. Appl..

[13]  Stefan Henningsson,et al.  The new normal: Market cooperation in the mobile payments ecosystem , 2015, Electron. Commer. Res. Appl..

[14]  Christian Decker,et al.  A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.

[15]  Jay F. Nunamaker,et al.  The Last Research Mile: Achieving Both Rigor and Relevance in Information Systems Research , 2015, J. Manag. Inf. Syst..

[16]  Linus Nyman,et al.  Understanding Code Forking in Open Source Software: An examination of code forking, its effect on open source software, and how it is viewed and practiced by developers , 2015 .

[17]  Hong Yan,et al.  Examining Mobile Payment User Adoption from the Perspective of Trust , 2015 .

[18]  Jonas Hedman,et al.  Business Models for NFC Based Mobile Payments , 2015 .

[19]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[20]  Randall Davenport,et al.  Taking-up and pursuit of the business of insurance and reinsurance , 2014 .

[21]  Kalle Lyytinen,et al.  Symbolic Action Research in Information Systems: Introduction to the Special Issue , 2014, MIS Q..

[22]  François-Xavier de Vaujany,et al.  Applying and theorizing institutional frameworks in IS research: A systematic analysis from 1999 to 2009 , 2014, Inf. Technol. People.

[23]  Norman Shaw The mediating influence of trust in the adoption of the mobile wallet , 2014 .

[24]  George M. Giaglis,et al.  Towards an Agenda for Information Systems Research on Digital Currencies and Bitcoin , 2014, BIS.

[25]  Göran Goldkuhl,et al.  Preconditions for public sector e-infrastructure development , 2013, Inf. Organ..

[26]  A. Hevner,et al.  Positioning and Presenting Design Science Research for Maximum Impact , 2013, MIS Q..

[27]  Robin Teigland,et al.  Breaking Out of the Bank in Europe - Exploring Collective Emergent Institutional Entrepreneurship Through Bitcoin , 2013 .

[28]  R. Bollen The Legal Status of Online Currencies: Are Bitcoins the Future? , 2013 .

[29]  Ola Henfridsson,et al.  Balancing platform control and external contribution in third‐party development: the boundary resources model , 2013, Inf. Syst. J..

[30]  Jan Marco Leimeister,et al.  Understanding the Formation of Trust in IT Artifacts , 2012, ICIS.

[31]  Jesús M. González-Barahona,et al.  A Comprehensive Study of Software Forks: Dates, Reasons and Outcomes , 2012, OSS.

[32]  Tuure Tuunanen,et al.  (Hidden) social influences in switching mobile service platforms , 2012, ICEC '12.

[33]  Viswanath Venkatesh,et al.  Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..

[34]  C. Foley,et al.  Poultry in Motion: A Study of International Trade Finance Practices , 2011, Journal of Political Economy.

[35]  Michael R. Wade,et al.  A Comprehensive Review and Synthesis of Open Source Research , 2010, J. Assoc. Inf. Syst..

[36]  D. Helbing Systemic Risks in Society and Economics , 2010 .

[37]  Jan Pries-Heje,et al.  Explanatory Design Theory , 2010, Bus. Inf. Syst. Eng..

[38]  S. Rivard,et al.  Positioning the institutional perspective in information systems research , 2009, J. Inf. Technol..

[39]  吕一旭 Yixu Lu 引言 (Introduction) , 2009, Provincial China.

[40]  Robert J. Kauffman,et al.  The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application , 2008, Electron. Commer. Res. Appl..

[41]  Tomi Dahlberg,et al.  Past, present and future of mobile payments research: A literature review , 2008, Electron. Commer. Res. Appl..

[42]  Nicholas Hopper,et al.  Combating Double-Spending Using Cooperative P2P Systems , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[43]  M. Markus The governance of free/open source software projects: monolithic, multidimensional, or configurational? , 2007 .

[44]  Jaap-Henk Hoepman,et al.  Distributed Double Spending Prevention , 2007, Security Protocols Workshop.

[45]  Brian Fitzgerald,et al.  The Transformation of Open Source Software , 2006, MIS Q..

[46]  John R. Searle,et al.  Social ontology , 2006 .

[47]  John R. Searle,et al.  What is an institution? , 2005, Journal of Institutional Economics.

[48]  George Stephanides,et al.  The concept of security and trust in electronic payments , 2005, Comput. Secur..

[49]  Kevin Crowston,et al.  Effective work practices for software engineering: free/libre open source software development , 2004, WISER '04.

[50]  F. Nah A study on tolerable waiting time: how long are Web users willing to wait? , 2004, AMCIS.

[51]  B. Bruno The Social Construction of Reality. A Treatise in the Sociol... , 2004 .

[52]  Andrew Lockhart,et al.  Network security hacks , 2004 .

[53]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..

[54]  W. Scott Institutional carriers: reviewing modes of transporting ideas over time and space and considering their consequences , 2003 .

[55]  J. Rochet,et al.  Platform competition in two sided markets , 2003 .

[56]  J. Tirole,et al.  Some Simple Economics of Open Source , 2002 .

[57]  Melissa A. Schilling Technology Success and Failure in Winner-Take-All Markets: The Impact of Learning Orientation, Timing, and Network Externalities , 2002 .

[58]  Anol Bhattacherjee,et al.  Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..

[59]  D. Snow,et al.  Framing Processes and Social Movements: An Overview and Assessment , 2000 .

[60]  Edgar A. Whitley,et al.  The Construction of Social Reality , 1999 .

[61]  Eric S. Raymond,et al.  The cathedral and the bazaar , 1998, First Monday.

[62]  David Lorge Parnas,et al.  Software aging , 1994, Proceedings of 16th International Conference on Software Engineering.

[63]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[64]  Stuart Haber,et al.  How to time-stamp a digital document , 1990, Journal of Cryptology.

[65]  M. Fischer,et al.  Impossibility of distributed consensus with one faulty process , 1985, JACM.

[66]  R. Shostak,et al.  The Byzantine Generals Problem , 1982, TOPL.

[67]  E. A. Akkoyunlu,et al.  Some constraints and tradeoffs in the design of network communications , 1975, SOSP.

[68]  David Laidler,et al.  The Definition of Money: Theoretical and Empirical Problems , 1969 .

[69]  Roman Beck,et al.  Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.

[70]  Robin Teigland,et al.  Jumping on the Blockchain Bandwagon: Lessons of the Past and Outlook to the Future , 2016, ICIS.

[71]  P. Sestoft,et al.  An Actuarial Programming Language for Life Insurance and Pensions , 2013 .

[72]  Robert Viseur,et al.  Forks impacts and motivations in free and open source projects , 2012 .

[73]  Ashley A. Bush,et al.  Platform Evolution: Coevolution of Platform Architecture, Governance, and Environmental Dynamics , 2010 .

[74]  Steve Evans,et al.  Succeeding through service innovation : a service perspective for education, research, business and government , 2008 .

[75]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[76]  Qweak Collaboration Willem T. H. van Oers The Institutions , 2007 .

[77]  Izak Benbasat,et al.  A Descriptive Content Analysis of Trust-Building Measures in B2B Electronic Marketplaces , 2006, Commun. Assoc. Inf. Syst..

[78]  S. van der Hof,et al.  Code As Law , 2006 .

[79]  George Kesidis,et al.  Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.

[80]  Leon van der Torre,et al.  Analyzing Control Trust in Normative Multiagent Systems , 2005, Bled eConference.

[81]  K. Lertwachara,et al.  NET Institute* www.NETinst.org , 2005 .

[82]  J. Juga,et al.  Problems and Prospects for Intermodal Transport: Theoretical Tools for Practical Breakthroughs? , 2001 .

[83]  D. Eastlake,et al.  Secure Hash Algorithm-1 , 2001 .

[84]  General Agreement on Tariffs and Trade,et al.  International trade. Statistics , 1993 .

[85]  Manuel Blum,et al.  Non-interactive zero-knowledge and its applications , 1988, STOC '88.

[86]  N. Luhmann Vertrauen : ein Mechanismus der Reduktion sozialer Komplexität , 1973 .

[87]  13-th IEEE International Conference on Peer-to-Peer Computing Information Propagation in the Bitcoin Network , 2022 .

[88]  13-th IEEE International Conference on Peer-to-Peer Computing Have a Snack, Pay with Bitcoins , 2022 .