Fachbuch, 2019
100 Seiten
1 Introduction
1.1 Research Gap and Research Question
1.2 Motivation
1.3 Value Proposition
1.4 Outline
2 Background
2.1 Centralized, Decentralized & Distributed Systems
2.2 Blockchain Technology
2.3 Data Security
2.4 IT Risk Management
2.5 Previous research
3 Qualitative Research Methodology
3.1 Data Collection Method
3.2 Focus Interview
3.3 Ontology & Epistemology
3.4 Content Analysis
3.5 Data Presentation
3.6 Scientific Quality Criteria
4 Results for Risk Identification
4.1 Interview Participants
4.2 Identified Risks
4.3 Differences in Public and Private Blockchains
5 Discussion / Explanation of identified Risks and Differences
5.1 Identified Risks
5.2 Differences public and private blockchains
6 Quantitative Research Methodology
6.1 Online Survey Design
6.2 Data Analysis & Visualization
6.3 Scientific Quality Criteria
7 Results for Risk Evaluation
7.1 Survey Participants
7.2 Research Results
8 Discussion & Implications of the Results from the Risk Evaluation
8.1 Discussion
8.2 Implications of Results
9 Limitations of the Research
10 Conclusion
11 References
The primary research objective is to identify and evaluate threats to data integrity within public blockchain systems. By employing a dual-method approach, the study aims to determine the likelihood and potential consequences of these risks, while also comparing integrity-related differences between public and private blockchain architectures to support organizational decision-making.
2.2.3 Bitcoin Blockchain Design
The bitcoin blockchain is a chain of blocks which contain financial transactions. Every block is linked to the previous block by including the hash of the previous block, which proves that a certain state was valid at the defined point of time, because the past cannot be changed without a very high investment in computing power. This is due to the parent / child relationship that blocks have. A block contains the hash of the previous block header, therefore if a block changes all subsequent would have to change too. Therefore a block gets more secure the more subsequent blocks exist (Antonopoulos, 2015). A valid hash for a block has to start with a defined number of zero bits. To find the hash of the block POW is used. After successful finding a suitable hash, the miner is rewarded with a mining incentive, which depends on the block height. The bitcoin network is a collection of individual nodes, that operate in a distributed manner, and can be joined by anyone without any special permission, which is also called a permissionless public blockchain (more on that in Chapter 2.2.5).
Bitcoin increases the level of privacy for users by eliminating the trusted third party, normally used for validating financial transactions (Nakamoto, 2008). The simplified blockchain header in Figure 2 shows the inclusion of the Merkle root of all transactions. Within the bitcoin network, all transactions are at the bottom of the tree and hashed in pairs of 2, until only one (the Merkle root) hash remains. This procedure can work with an arbitrarily number of transactions and the Merkle root will always be 32 Byte. Figure 3 shows what a Merkle tree of bitcoin transactions looks like. Bitcoin uses the collision free hash algorithm SHA256 (Bashir, 2018).
1 Introduction: Provides the motivation for the study, highlights the current research gap regarding data integrity in blockchain systems, and outlines the core research questions.
2 Background: Delivers foundational knowledge on decentralized systems, blockchain architecture, data security (CIA triad), and IT risk management frameworks.
3 Qualitative Research Methodology: Describes the explorative research design, justifying the use of in-depth focus interviews to identify blockchain-specific integrity risks.
4 Results for Risk Identification: Presents the findings from the qualitative interviews, detailing 11 identified risks to data integrity in public blockchain systems.
5 Discussion / Explanation of identified Risks and Differences: Provides an analytical breakdown of the identified risks and explores the fundamental integrity differences between public and private chains.
6 Quantitative Research Methodology: Explains the design of the online survey used to evaluate the identified risks through numerical likelihood and consequence metrics.
7 Results for Risk Evaluation: Shows the quantitative outcomes of the survey, visualizing the impact and occurrence probability of the risks in a matrix format.
8 Discussion & Implications of the Results from the Risk Evaluation: Interprets the risk scores, discusses practical implications for organizations, and suggests mitigation strategies.
9 Limitations of the Research: Addresses the constraints of the study, including sample size, research method limitations, and potential biases.
10 Conclusion: Summarizes the study’s findings, confirms that blockchain is not inherently insecure, and proposes directions for future research.
Blockchain, Data Integrity, Risk Management, Public Blockchain, Private Blockchain, Data Security, IT Governance, Smart Contracts, Consensus Attack, Qualitative Research, Quantitative Analysis, Risk Assessment, 51% Attack, Distributed Ledger, Information Security
The work primarily focuses on assessing data integrity risks specifically within public blockchain systems and identifying how these risks compare to those found in private blockchain environments.
The key themes include blockchain technology design, data security fundamentals (the CIA triad), IT risk management standards, and the comparison of public versus private blockchain architectures.
The main goal is to identify threats to data integrity in public blockchains and to evaluate these risks through a combination of qualitative expert interviews and quantitative surveys to provide actionable insights for organizations.
The author uses a mixed-methods approach: a qualitative phase involving semi-structured focus interviews with experts for risk identification, followed by a quantitative phase using an online survey for risk evaluation and prioritization.
The main body systematically explores blockchain fundamentals, establishes a research methodology, identifies 11 specific data integrity risks, and evaluates these risks regarding their likelihood of occurrence and their consequences on data.
Essential keywords include Blockchain, Data Integrity, Risk Management, Public/Private Blockchain, Information Security, Consensus Attack, and Smart Contract vulnerabilities.
The author analyzes differences such as consensus models, code quality, susceptibility to 51% attacks, and the level of data privacy, noting that public chains provide more decentralization while private chains offer more controlled, permissioned environments.
The study highlights risks such as 51% consensus attacks, poor quality of smart contract code, the existence of alternative chains (forks), and the potential for trust issues regarding protocol developers and third-party service providers.
No. While the study identifies significant risks, the author emphasizes that there is currently no evidence that blockchain technology should be considered insecure, but rather that these risks must be carefully managed before implementation.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

