What methodology are you planning to use? Quantitative Qualitative Applied –>What is the population you would like to address? Where will you select your sample from?
–>Proposed Topic:
–>What methodology are you planning to use?
Quantitative
Qualitative
Applied
–>What is the population you would like to address? Where will you select your sample from?
–>Theoretical Framework/Background
What theories covered in the program are associated with your topic?
–> Describe the connection of the topic to the program goals and courses.
–>Proposed Topic:
Briefly discuss a proposed topic in your discipline. For the Proposed Topic, please present a succinct description of your dissertation research focus.
Be as specific as possible and cite the current scholarship that has noted the research focus as an area of needed inquiry.
–>What methodology are you planning to use?
Quantitative
Qualitative
Applied
–>What is the population you would like to address? Where will you select your sample from?
Quantitative studies should include a sample selected from a large population across multiple schools,
districts, or organizations. Describe the target population for your study. This involves the representative
population for the individuals you plan to recruit for the study. Include an approximate size of this target
population. This can typically be found using a resource such as the U.S. BLS. Then follow with a description
of the location of your recruitment site, meaning the specific organization, social media group, or site(s)
where you will recruit this target population as study participants. Note. For studies that involve no live
subjects, you will describe the location from where you will gather the archival raw data for your study.
–>Theoretical Framework/Background
What theories covered in the program are associated with your topic?
You likely reviewed many theories within your discipline across your doctoral coursework. Here, you will
choose theories (1, 2, or maybe 3) that will serve as the lens to view your research focus. Consult your
Professor/Chair for guidance, and then list the theory or theories that will comprise the theoretical lens
for the study. Follow with a description of how and why the theory or theories are best to use as the study’s theoretical foundation.
–> Describe the connection of the topic to the program goals and courses.
How is your topic connected to specific goals in your program(Information Technology)? Refer to the Graduate Catalog for your program's goals.
,
Blockchain technology security and privacy issues
Name
Institutional affiliation
Course
Instructor
Date
Blockchain technology security and privacy issues
Currently, there are hundreds of blockchain, each offering unique solutions to problems. These blockchain differ in design, function and security guarantees. Lin & Liao, (2017) stated there have been increasingly stakes in using blockchain technology across various applications to significant investments in the development of blockchain technology within different industries. It is expected that blockchain will bring about significant changes to many businesses and systems. Privacy has become an issue with the increased adoption of blockchain. Distributed trust hence privacy and security is the center of every blockchain technology (Lin & Liao, 2017; Nabben, 2021). The technology industry is generally regarded as a trustless environment riddled with numerous thefts and frauds. Blockchain privacy and security provide users with desirable features such as autonomy, immutability, decentralization and integrity. With these features, privacy and security can be guaranteed.
The rise in blockchain technology and advancements within the sector has caught the attention of various industry titans. Academics and industrialists are the main points of focus as they are the groups or populations likely to adopt blockchain technology in mass and will be affected by privacy issues on a mass scale. This paper will adopt a qualitative research study format borrowing information from previously done studies. Secondary data will be largely used in the analysis. A descriptive research design will be employed as it asks important questions related to who, what, when, where, and how. It will seek to explore and describe the privacy and security issues systematically within blockchain technology.
de Haro-Olmo, Varela-Vaca, & Álvarez-Bermejo, (2020) investigated the concept of blockchain technology from an anonymity and privacy perspective. The authors sought to answer various questions related to privacy; "How does blockchain use anonymity to guarantee privacy?" "What are the disadvantages of blockchain to adapt to the GDPR?" "How were the problems encountered addressed?" "Proposals for future research offered by the publications." These four research questions aim to evaluate the range and manner in which blockchain considers anonymity ad privacy. It sought to understand the techniques which can be implemented and understand any problems, if any and any future proposals which are currently unresolved and ought to be fixed.
The study did not utilize any human participants; instead, data was collected from secondary sources. The researchers collected data from search engines for scientific publications and bibliographic materials. The keyword for the search was blockchain, privacy and anonymity. The study restricted the data collected from 2016 until 2018. The study found different approaches which can be utilized to address the relationship between privacy ad identity anonymity, which is a crucial factor in blockchain technology. This was brought about by a variety of fields in blockchain applications. The results showed that of the several methods used to attain anonymity ad privacy, those that attain conditional anonymity do so mainly because of the centralized models, which call for the several entities to identify the participating elements and validate the transaction.
Reference
de Haro-Olmo, F. J., Varela-Vaca, Á. J., & Álvarez-Bermejo, J. A. (2020). Blockchain from the perspective of privacy and anonymisation: a systematic literature review. Sensors, 20(24), 7171.
Lin, I. C., & Liao, T. C. (2017). A survey of blockchain security issues and challenges. Int. J. Netw. Secur., 19(5), 653-659.
Nabben, K. (2021). Blockchain Security as “People Security”: Applying Sociotechnical Security to Blockchain Technology. Frontiers in Computer Science, 62.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.