Communications of The Association For Information Systems Communications of The Association For Information Systems
Communications of The Association For Information Systems Communications of The Association For Information Systems
Volume 45 Article 25
12-2019
Recommended Citation
Murray, M. (2019). Tutorial: A Descriptive Introduction to the Blockchain. Communications of the
Association for Information Systems, 45, pp-pp. https://doi.org/10.17705/1CAIS.04525
This material is brought to you by the AIS Journals at AIS Electronic Library (AISeL). It has been accepted for
inclusion in Communications of the Association for Information Systems by an authorized administrator of AIS
Electronic Library (AISeL). For more information, please contact elibrary@aisnet.org.
C ommunications of the
A ssociation for
I nformation
S ystems
Abstract:
Blockchain technology, which supports the bitcoin cryptocurrency, has risen to prominence as the technology that will
transform how business transactions occur and parties manage assets over the Internet. A decentralized system, the
blockchain provides a way to digitally record and securely store verifiable and immutable transactions, which
eliminates the need for trusted third-party intermediaries. While simplistically described as a decentralized ledger, the
blockchain is a complex technology that integrates peer-to-peer networking, cryptography, and distributed consensus.
In this paper, I explain blockchain’s components, describe how a blockchain works, identify use case examples from
various industries, explore potentials and limitations, and speculate on the progressive adoption of the blockchain as a
transformative technology.
This manuscript underwent editorial review. It was received 12/16/2018 and was with the author for 2 months for 2 revisions. Eric
Ngai served as Associate Editor.
1 Introduction
Blockchain technology, a decentralized ledger technology, provides a trusted and secure platform for
digitally recording and securely storing verifiable and permanent transactions between multiple parties in
the digitized networked world. Accordingly, the technology eliminates the need for costly middleman
validation and verification processes. Blockchain technology first supported the Bitcoin cryptocurrency and
remains the foundation from which other blockchains have emerged. While Bitcoin’s future remains
volatile, many have touted blockchain as the technology that will transform how business transactions
occur and parties manage assets over the Internet. While blockchain remains in the early stages of the
technology adoption lifecycle, its acceptance has begun to rapidly expand beyond innovators to early
adopters (Rogers, 2003).
A complex technology, blockchain at its core refers to “an open, distributed ledger that can record
transactions between two parties efficiently and in a verifiable and permanent way" (Iansiti & Lakhani,
2017, p. 4). However, the term decentralized ledger better describes the technology; the blockchain relies
on variations of distributed computing principles (Herlihy, 2019). Rather than being distributed, networked
computers duplicate the entire blockchain in a peer-to-peer fashion. The blockchain is decentralized—not
stored in a single location—which makes it more difficult to hack or exploit. The ledger holds details of all
transactions that the blockchain has processed. Transactions are verified and validated through a process
that employs cryptography and digital signatures and groups such transactions into blocks that all the
computers that participate in a blockchain network regularly replicate and reconcile through consensus. In
short, the blockchain integrates three concepts: peer-to-peer networks, public-key/private-key
cryptography, and distributed consensus. One needs to understand the intricacies involved in
orchestrating the blockchain’s technologies to conceive its usefulness and benefits. In this paper, I explain
blockchain’s components, describe how a blockchain works, identify example use cases from various
industries, explore its potential and limitations, and speculate on the progressive adoption of the
blockchain as a transformative technology.
Researchers have hailed blockchain technology as having the potential to revolutionize business, redefine
companies, and reshape economies (Iansiti & Lakhani, 2017). They have attributed this disruptive
potential largely to three factors: decentralization, the elimination of trusted intermediaries (Kaushal &
Tyle, 2015), and a transaction system that supports irreversible transactions and an immutable ledger
(Boaventura, 2018). They have frequently cited the benefits inherent in these features as motivations for
organizations to adopt blockchain technology. Table 1 lists various blockchain traits mapped to commonly
cited benefits. Blockchain remains in its infancy, so we have yet to try and test its benefits. However,
genuine interest in and momentum around blockchain exists. The International Data Corporation (IDC)
has forecasted an annual compound growth rate in blockchain spending of 81.2 percent until at least 2021
(Shirer & Goepfert, 2018), and Gartner has predicted this decade will end with blockchain business value
growing to US$360 billion and surging to US$3.1 trillion by 2030 (Kandaswamy & Furlonger, 2018).
Table 1. Often-cited Blockchain Benefits
the Bitcoin blockchain. The first two fields contain basic information such as software version and
timestamp. Blockchain uses cryptographic hashing to uniquely identify each block, but it retains only the
identifier of the previous block in the block header of the current block. Blockchain also uses cryptographic
hashing via a Merkle tree root to create a unique summary identifier of all transactions included in the
block. The remaining two fields, the difficulty target and the nonce, relate to the proof-of-work consensus
protocol that Blockchain uses to create new blocks (i.e., mining in Bitcoin). I describe hashing and Merkle
trees in detail in Section 4.2 and consensus mechanisms in Section 4.3.
Table 2. Metadata Fields in a Bitcoin Blockchain Block Header
Field Description
Software version Denotes validation rules used in this version of the blockchain software.
Timestamp Creation time of the block (seconds from Unix epoch time)
Previous block identifier Hash of the previous block’s block header
Merkle root Unique summary identifier derived from the hashes of all transactions included in the block
The difficulty target level of the consensus mechanism mathematical challenge—in Bitcoin,
Difficulty target this level relates to the number of leading zeros that the hash of the block header needs to
include
Nonce Numerical value that solves the mathematical challenge
One can find a detailed specification of the Bitcoin block header in the online Bitcoin developer reference at
https://bitcoin.org/en/developer-reference#block-headers
Public blockchains are open ledgers, and one can use online block explorers to examine blockchain
transactions. Figure 2 shows sample information that BlockExplorer (www.blockexplorer.com), an open
source Bitcoin block explorer, reports. The block number, also referred to as the block height, appears at
the top immediately followed by the block header hash that uniquely identifies the block. The block
summary reports the number of transactions, the size of the block in bytes, and block header metadata. If
available, the explorer also reports the type of hardware used to create or mine the block. In this instance,
a node running the Antminer brand hardware “mined” this block. Finally, the explorer notes the block
reward, the amount of new Bitcoin the miner received for mining the block (in this instance, 12.5 Bitcoin).
Blockchain rules state that every block must be uniquely identified. The unique identifier, known as the
block header hash, is software generated by nodes on the network through a process of aggregating
block header metadata and hashing it twice. The block itself does not retain the identifier. Instead, nodes
on the network dynamically compute the block header hash for the previous block when network nodes
validate block transactions or when a mining node forms a new block and uses it as the value of the
previous block identifier in the new block’s block header. The genesis block, the first block in a chain,
needs to hard code the value of the previous block hash (usually zero). The linkage created makes it
possible to work backwards and reach the genesis block from any given block in the chain as Figure 3
shows. This linkage also makes it difficult to change data contained in a block. A change in data in one
block means that nodes on the blockchain must regenerate the block header hash of all subsequent
blocks in the ledger they maintain in order to retain a valid blockchain.
A block typically contains multiple transactions that average in the thousands. Further, every block must
have at least one transaction, the coinbase transaction. The coinbase transaction has no inputs and its
output pays the block’s creator. The payment, which comprises transaction fees, rewards the work the
creator did to validate transactions. In Bitcoin, the awarded fee comprises the aggregate value of the
difference between the input and output values of every transaction in the block. Bitcoin has no fee
attribute; the technology simply tallies fees when a new block is formed. In tokenized blockchains, such as
cryptocurrencies, the reward may also include new coins (also the process by which new Bitcoins enter
circulation).
Unlike other record-keeping systems, a blockchain does not retain account balances. The blockchain
transaction process requires that all inputs be spent in their entirety. Further, the transaction process
checks to insure inputs have not been previously spent. Figure 5 depicts the flow of inputs to outputs from
three transactions using coins from a fictitious generic cryptocurrency. The coinbase transaction awards
20 coins to AddressA for creating the new block. AddressA wants to spend 15 of those coins. The second
transaction depicts how AddressA might do so. AddressA sends 15 coins to a different address (i.e.,
AddressB) and then sends the leftover coins back to itself. In the third transaction, AddressA spends four
of its five coins (i.e., sends two coins each to two different addresses). Bitcoin uses the remaining coin as
a transaction fee. AddressA has now spent all five coins associated with it. The third transaction also
demonstrates that inputs in a transaction may come from multiple addresses. AddressZ does not appear
in this block. To determine the number of coins held by AddressZ, the transaction process searches
previous blocks until it finds the last time AddressZ was used as an output address. In this case, this
occurred in the seventh transaction in the second block (a previous block not shown in this diagram).
AddressZ spends all 15 coins by sending coins to two different addresses.
Bob can now create his transaction. If Bob’s computer is a node on the network that runs the Bitcoin-core
software, he can write the code needed to execute a raw-transaction (Baczuk, 2018). If Bob lacks
programming skills, he will use a digital wallet. Various types of wallets exist, but most include the ability to
create and store addresses (private/public key values), create and broadcast transactions, and report
balances. Bitcoin (2019a) describes wallets in detail. Bob uses a wallet to create and store his
private/public key pairs and to generate transactions. The input address that this transaction uses will be
an address that Bob's wallet has already stored. The wallet software will generate and use a new
private/public key pair and corresponding Bitcoin address as the output address to receive Bob's change.
Alice’s address will receive 100,000 satoshis and Bob's new address will receive 45,000 satoshis. To
maintain his privacy, Bob did not return the 45,000 satoshis to the input address that this transaction used.
Nakamoto (2008) recommended creating a new key pair for every transaction to make it difficult to link
addresses to a common owner (p. 6). The block creator will collect the remaining 5,000 satoshis, the
difference between the input (150,000 satoshis) and output (145,000 satoshis). This amount will be the
output amount contained in the coinbase transaction generated when a new block is formed. Bob will
spend his transaction in its entirety when the new block containing his transaction joins the chain.
the open source Bitcoin-core software (https://bitcoin.org/en/download). P2P networks have no central
authority and no hierarchy; all nodes have equal status and can freely communicate with one another. In
the blockchain, this network typography provides two protection points: 1) no single node can take control
of the network and 2) no single point of failure exists. Multiple nodes store exact copies of the full
blockchain.
4.2 Cryptography
Blockchain heavily uses cryptography, which includes public key cryptography, digital signatures, and
cryptographic hash functions. Public key or asymmetric cryptography uses an encryption scheme that
creates two mathematically related keys, a public key and a private key. Most blockchains use the Elliptic
Curve Digital Signature Algorithm (ECDSA), a U.S. Government standard (National Institute of Standards
and Technology, 2013). Johnson, Menezes, and Vanstone (2001) describe ECDSA in detail. A private key
generates a public key, but the reverse lacks computational feasibility. As I note in Section 3, a blockchain
transaction uses public keys or a derivation of them as input and output addresses. The Bitcoin blockchain
uses a Bitcoin address derived from a hash of the public key.
Public keys and private keys take on special meaning in cryptocurrencies. Bitcoin provides a good
example. We can think of Bitcoins as digital money with no physical counterpart. Owning a Bitcoin is
exclusively affiliated with a private key; whoever knows the private key can spend the Bitcoin. Bitcoin
owners need to protect their keys. If owners forget or lose their private key, they lose their Bitcoin forever.
Indeed, in a well-known example, a Bitcoin owner accidentally threw away a hard drive that contained the
private keys to more than 7,500 Bitcoins (Young, 2018). Bitcoin users also have responsibility over
sharing their correct public Bitcoin addresses. Users lose Bitcoins that they send to a non-existent
address forever, and they cannot reverse Bitcoins that they send to the wrong address. With Bitcoin,
users cannot find the recipient of misdirected Bitcoin as addresses on the blockchain do not include any
personally identifiable information. Consequently, Bitcoin users have come up with creative ways to
manage their addresses, although most use some form of a digital wallet.
Blockchains also use digital signatures. Digital signatures use a private key to sign and verify a
transaction using an associated public key. In Bitcoin, for example, a node that generates a transaction
broadcasts a digital signature along with transaction data and a public key to the network. Nodes in the
network use the public key to verify the signature and validate that the holder of the private key owns the
Bitcoin. Nodes also use the public key to trace back through transactions to ensure that no one has
previously spent the Bitcoin. Figure 7 identifies the steps in the blockchain that employ public-key
cryptography. Nodes use public-key cryptography to create key pairs and sign and verify transactions to
insure that only verified transactions are added to a block.
Blockchain frequently uses hashing. A hash refers to a one-way function that reduces data to a fixed
alphanumeric string. The same input always hashes to the same value. The National Institute of
Standards and Technology (2015) has published the most commonly used hash function (i.e., SHA-256).
Anders Brownworth, while teaching at MIT, created an interactive website to demonstrate how hashing
works and how blockchain technology applies it (https://anders.com/blockchain/hash.html). Figure 8
demonstrates the hash of the string “Hello World”.
Following how Merkle trees apply hashing (Merkle, 1987), blockchains use it to generate unique identifiers
for transactions. The node that forms a new block constructs a Merkle tree root by hashing paired data
until a single hash remains. In the blockchain, the process includes hashing, pairing, and rehashing every
transaction (see Figure 9). The Merkle root is the hash of all hashes of all transactions in a block. As I
note in Section 3, the block header retains the Merkle root.
Blockchains use hashing in this way due to their immutability. As Figure 10 graphically depicts, one
cannot easily cheat a blockchain because one cannot easily change any data in a block. Specifically, a
change in data in one transaction changes the hash value of that transaction, which leads to cascading
changes in the Merkle root and the value of the block header hash. This eliminates the link with the next
block and breaks the chain. To reestablish the link, one would have to rehash the current block header’s
value and recalculate the attribute for the previous block identifier’s value for each consecutive block in
the chain. The user who creates the modified block headers must have enough control over the network
to ensure nodes on the network accept the modified blocks before a mining node adds additional blocks to
the chain. Consequently, users would have little chance to achieve success; other nodes in the blockchain
will almost certainly reject such changes.
broadcasts the block to the network. Other nodes in the network verify block transactions and validate the
nonce’s legitimacy. Consensus arises when those nodes append the new block to the chain and when
mining nodes use the newly accepted block’s block header hash as the value of the identifier of the
previous block hash in the header of the block they are now working to create. At this point, the network
also confirms a transaction. A transaction is reconfirmed each time a mining node adds a subsequent
block to the blockchain. Figure 11 displays the image of how a blockchain works with annotation specific
to the Bitcoin mining process that Nakamoto (2008) outlined.
As an aside, the Bitcoin currency has interesting blockchain rules. As I mention in Section 4.3.1, through
PoW, Bitcoins enter circulation when they are awarded to the mining node that creates a new validated
block. At genesis, Nakamoto set this award to 50 Bitcoins for each new block. Bitcoin, however, has a
fixed supply. Nakamoto intentionally stipulated as much since a fixed monetary supply does not
experience inflation. Consequently, the number of Bitcoins awarded is reduced over time; the number
halves every 210,000 blocks (about every four years). The award of new Bitcoins ceases when the
number of Bitcoin reaches 21 million, which will occur in approximately 2140. From this time forward, the
reward for mining will revert to only transaction fees.
Scenario: Bitcoin blockchain workflow: this scenario describes the Bitcoin workflow from transaction
creation to transaction finality based on block confirmation. Bob needs to pay Alice 100,000 satoshis; Bob
has 150,000 satoshis and chooses a transaction fee of 5,000 satoshis.
Bob uses his digital wallet to generate a transaction to transfer 100,000 satoshis to Alice and broadcast it
to the network. Nodes on the network retrieve the transaction and add it to a “mempool”, a queue of
pending transactions. Miners set parameters—such as preferred transaction size and fee amount—for
prioritizing transactions. When selected from the mempool, mining nodes validate or reject Bob's
transaction. The validation process assures the transaction meets blockchain protocol rules, which
includes verifying the digital signature, that the total input value exceeds than the total output value, and
that no one has previously spent the input addresses. Bitcoin nodes maintain an address database with
unspent transaction outputs (UTXO) that they update as they confirm transactions. Only addresses in the
UTXO are considered unspent.
A mining node validates Bob’s transaction and adds it to the forming block. The mining node works to win
the block by finding the nonce. The first node to find the nonce adds the coinbase transaction and block
header metadata to the new block and broadcasts the new block to the network. Other nodes on the
network retrieve the block, verify the transactions, and validate the nonce. If a node accepts the block, it
appends it to the blockchain and publishes it to the network. At this point, the network has confirmed the
block containing Bob's transaction. However, users should wait for at least six confirmations (Comben,
2018) to make certain nodes on the network have not reversed a transaction (“Irreversible Transactions”,
2018). Thus, Bob and Alice should wait until other nodes add five more blocks to the chain (i.e., six
confirmations) before they consider their transaction final. Multiple confirmations ensure that network
nodes did not append the block to an unintended fork in the chain and also avert double-spend, the risk
that users spend a Bitcoin more than once. Each block added to the chain reconfirms the validity of the
transactions contained in previous blocks.
Forks occur for other reasons as well (Asolo, 2018). A soft fork happens when developers make agreed-
on software updates to the blockchain core software. In the lag time before all nodes implement the new
rules, two sets of blocks might emerge: blocks that adhere to the old rules and blocks that adhere to the
new. This temporary situation resolves when all nodes complete the software upgrade. Hard forks, on the
other hand, arise intentionally. Hard forks occur when disagreement among software developers results in
two separate versions of the blockchain core software and various nodes on the network opt to implement
the different versions. At this point, the chain splits in two with one fork following the old rules and the
other following the new rules. Each fork continues as its own independent chain, but both retain a
common history up to the split. The cryptocurrencies Bitcoin Cash and Bitcoin Gold exemplify hard forks
to the Bitcoin blockchain.
6 Blockchain Challenges
We have learned much about blockchain possibilities and challenges since Nakamoto operationalized the
Bitcoin blockchain in 2009, lessons that bound and inform how the technology will evolve. Table 3 lists
themes related to the Bitcoin blockchain that have frequently appeared in the trade press and news media
and strategies to address them. While this analysis focuses on Bitcoin, issues examined apply to other
blockchains as well. Ultimately, we need to address these issues to more deeply diffuse blockchain
technologies.
Table 3. Lessons Learned from the Bitcoin Blockchain
Theme Issue
Blockchain technology is complex and requires deep technical knowledge to understand. On
the other hand, we can and must simplify how one interacts with it as a prerequisite to
widespread adoption. The ability to interact with a blockchain (i.e., buy, sell, and spend
Bitcoin) needs to be accessible to all types of users regardless of their technical prowess.
Usability
Resolution strategies: a blockchain ecosystem must include applications that simplify the
user experience similar to how graphical browsers abstract HTTP’s complexities for Web
users. For example, digital wallets provide a user interface for cryptocurrency blockchains,
and many have begun work to improve wallet design’s user interface and user experience.
The Bitcoin blockchain has grown to more than 205GB in size (Blockchain, 2019). As the
size of a blockchain increases, it becomes more expensive for nodes to participate in the
network. Decentralization and, subsequently, the blockchain’s integrity depends on volunteer
Scalability: Size of the nodes to validate transactions and create blocks.
blockchain
Resolution strategies: one approach to addressing blockchain size includes creating partial
or light weight nodes; another approach proposes splitting the chain into multiple subchains
or peer-level side-chains.
Bitcoin blockchain protocols restrict block size to one megabyte and set the average time to
mine a block to 10 minutes, which limits transaction throughput to an average of 4.6
transactions per second and transaction confirmation to 10 minutes (one hour to attain the
recommended six confirmations). Visa, the well-known global payment company, reports
Scalability: Block size, transaction throughput as 1700 transactions per second and transaction confirmation in
transaction throughput seconds (Li, 2019). The blockchain transaction bottleneck prevents Bitcoin from becoming
and block confirmation competitive as an alternative online-payment method.
time
Resolution strategies: solutions to this complex issue, such as increasing the block size or
decreasing block creation time, have yielded limited success. Other proposals include off-
chain channels, sharding techniques, and adding a transaction processing layer to the
blockchain (Kasireddy, 2017).
To encourage participation in the blockchain, Bitcoin instituted an award incentive (i.e., new
Bitcoins and transaction fees) to nodes who first “mine” a block. Nakamoto designed mining
to consume many resources so that the cost to defraud the system would exceed the cost to
earn the reward. As Bitcoin's price increases, interest in mining soars. Increased mining
activity has consequences: an unsustainable growth in energy consumption (Digiconomist,
Mining 2019), which results in increasing costs and ultimately reduces interest in mining.
Miners find transactions with higher fees more attractive. At the height of the Bitcoin frenzy
when users made many transactions, fees rose quickly. Stories abound of transaction fees
that exceeded transaction value. The volatility in transaction fees impacts whether people
adopt Bitcoin as a viable digital payment option.
Resolution strategies: people find vulnerabilities and flaws in any technology no matter
how secure (Orcutt, 2018b). Suggestions to reduce vulnerability in the blockchain include
implementing controls by switching to PoS consensus mechanisms or permissioned
blockchains.
Bitcoin is an open source software project (Bitcoin, 2019b). The user community
recommends software revisions, a group of volunteer software developers manage software
developments, and implementation occurs through acceptance from stakeholders (Light,
2016). Disagreement that results in different versions of the software split the chain (i.e.,
hard fork) into separate chains that operate independently. For Bitcoin, such splits create
Governance competing cryptocurrencies.
Blockchain technologies support cryptocurrencies, yet many use the terms interchangeably.
As such, many people project volatility in a cryptocurrency’s currency to volatility in the
technology. However, acceptance of cryptocurrencies as stable and viable alternatives to fiat
currencies represents the primary issue with cryptocurrencies, not the technology (Adkisson,
2018). That is, interest in blockchain technology may rise and fall with the hype surrounding
Sustainable Interest
individual cryptocurrencies.
Service that provides a secure way for devices to register and validate themselves on a network
Internet of things
in order to maintain integrity in device-to-device communication
Money Platform that supports cryptocurrency
Non-profit System that allows donors to see how recipients spend their contributions
Real estate System that connects buyers and sellers with real estate agents who accept lower commissions
System that tokenizes loyalty reward programs, which makes it easy for consumers to swap
Retail
earned points
Social engagement Matchmaking service that rewards “matchmakers” for connecting people in various venues
System that tracks food from the farm to the table, which allows consumers to see exactly
Supply chain
where their food comes from
Voting System that allows voters to verify their votes were recorded
As with any technology, one should not use blockchain technology in every situation due to its complexity
and need for resources. Blockchain researchers have proposed several models that prescribe ways to
assess whether blockchain technology would help suit a particular situation. The FITS model evaluates
suitability on four factors: propensity for fraudulent transactions, intermediary use, throughput
requirements, and data stability (McCullagh, 2017). The blockchain better fits business environments with
a high fraud risk and where third-party intermediaries provide low value. Throughput constitutes another
major consideration since blockchain technology cannot easily attain a high throughput rate. Finally,
blockchain best suits stable data or data that stays the same over time, such as property ownership. The
FITS model represents a first step in determining blockchain viability.
The World Economic Forum has produced perhaps the most comprehensive blockchain-adoption
assessment framework (Mulligan, Scott, Warren, & Rangaswami, 2018). Specifically, the framework asks
11 questions as a decision tree (see Figure 14). Like the FITS model, the framework evaluates areas such
as trust, intermediaries, throughput, and data stability. The assessment purports that a blockchain best
suits assets that one can represent in a digital format and whose form does not change. For example, a
blockchain works well for tracking wheat’s movement between buyers and sellers but not for tracking
wheat’s transition to flour or flour’s transition to bread (Mulligan et al., 2018). The World Economic Forum
ascribes a blockchain’s business value to its creating a trusted solution for managing contractual
relationships and value transfers. In summation, blockchain offers a viable solution in situations where
trust poses an issue, intermediaries participate in the process, and parties need a permanent record.
Figure 14. World Economic Forum's Blockchain Assessment Flowchart (Mulligan et al., 2018)
8 Blockchain Adoption
Researchers have studied innovation diffusion for decades. In particular, to describe technology adoption,
they have widely used the theoretical framework that Rogers (2003) developed. Rogers proposed that the
diffusion process occurs over time and follows an S-curve pattern. The adoption rate begins with a period
of slow gradual growth followed by a period of dramatic rapid growth that eventually stabilizes and finally
declines. Rogers classified adopters into four groups: innovators, early adopters, early majority, late
majority, and laggards. Innovators, the first to experiment with a technology, take risks and willingly accept
uncertainty about the future. Innovators tend to possess a high technical skill. Early adopters recognize a
technology’s potential and assume a leadership role in advocating for its acceptance. The early majority,
risk-averse individuals who opt for adoption as an innovation attracts more followers, want to be among
the first rather than the last group of adopters. The late majority also refers to risk-averse individuals, but,
while they remain skeptical, they feel pressure to adopt. Laggards want evidence that an innovation works
before deciding to adopt. Using this scale, according to Stratopoulos and Wang (2018), blockchain
diffusion appears to reside with early adopters, which the high number of news articles, firm disclosures,
book titles, and business publications reporting blockchain initiatives and pilot projects evidences. Gartner
has concurred in noting that much activity has occurred because CEOs want to garner recognition as
innovation leaders (Kandaswamy & Furlonger, 2018). Figure 15 depicts the innovation diffusion S-curve
and blockchain adoption’s potential current state.
Figure 15. Diffusion of Innovation S-Curve Estimating Blockchain Adoption (Adapted from Rogers, 2003)
Widespread blockchain adoption will take years, though experimentation has begun in earnest and
developers have created thousands of blockchain projects. Deloitte has reported on a study in which the
company found that the open source GitHub repository received 86,000 project submissions between
2009 and mid-2017 (Trujillo, Fronthart, & Srinivas, 2017). However, the company also noted that, by the
end of the study, only eight percent of the projects remained active—not an unusual pattern. Gartner has
described the current period as one of irrational exuberance where enthusiasm drives interest, but
adoption remains light (Kandaswamy & Furlonger, 2018). We saw a similar situation with TCP/IP and the
Internet. TCP/IP revolutionized data transmission and made the Internet possible. However, we realized
the Internet’s transformative power only after 30 years of trial applications to novel use cases (Iansiti &
Lakhani, 2017). Gartner has predicted a similar trajectory for blockchain technology (Trujillo et al., 2017).
Iansiti and Lakhani (2017) have proposed a framework for tracking blockchain adoption that relies on how
novelty and complexity affect how a foundational technology and its associated use cases evolve. The
more novel a technology, the more effort one needs to understand its application and usefulness.
Consequently, new technologies typically focus on a single-purposed application. As others begin to see
value in the technology, they envision new uses, and the technology’s impact grows. However, at the
same time, the complexity required to coordinate the growing diversity of players in the technology
ecosystem increases. The need to resolve that complexity gives rise to novel transformative applications
that can change “the very nature of economic, social, and political systems” (Iansiti & Lakhani, 2017, p.
10). The blockchain no longer exclusively supports Bitcoin; rather, a highly diverse and complex
blockchain ecosystem has emerged. Sustainable transformative applications may be far away (p. 10), but
blockchain will impact most businesses. The only question that remains concerns when the impact will
manifest (Iansiti & Lakhani, 2017, p. 11).
9 Conclusion
Conceived as a transparent, self-governing, democratized digital currency to support electronic
transaction processing (Nakamoto, 2008), the blockchain represents disruptive technological innovation.
The Bitcoin blockchain addresses problems that electronic money schemes encounter via a decentralized
trust system that adopts peer-to-peer networking, cryptography, and distributed consensus. Blockchain
retains an immutable and traceable distributed and identical transaction record, which enables new forms
of value transfer that do not require an intermediary or central authority (Kandaswamy & Furlonger, 2018).
Subsequent efforts that generalized blockchain technology to support value transfer for all types of assets
sparked many people’s imagination, and some have proclaimed it a technological breakthrough that
promises to revolutionize business and redefine economies (Iansiti & Lakhani, 2017).
The hype is real, but blockchain is not a panacea. Blockchain entered the technology realm as a
cryptocurrency platform, which propelled it into the mainstream. However, some have expressed concern
that overpromotion of this untested, underdeveloped platform could undermine its long-term potential
(Mulligan et al., 2018). Addressing myriad issues that plague asset transfers over the Internet, blockchain
has its challenges, most notably scalability, latency, and integration. Sustainability will depend on how we
resolve these challenges, yet it will take time, effort, resources, commitment, and perseverance before we
successful deploy blockchain technology.
Any conclusion made about blockchain would be incomplete without reference to Bitcoin. The Bitcoin
craze increased the public’s awareness of the technology, which led to an expanded Bitcoin ecosystem,
other blockchains, and additional forms of decentralized ledgers. The Bitcoin cryptocurrency has had a
wild run, and its future remains uncertain. Blockchain, however, has catalyzed a quest to discover and
realize its potential as a transformative technology.
References
Adkisson, J. (2018). Why bitcoin is so volatile. Forbes. Retrieved from
https://www.forbes.com/sites/jayadkisson/2018/02/09/why-bitcoin-is-so-volatile/#698be53a39fb
Asolo, B. (2018). Blockchain soft fork & hard fork explained. Mycryptopedia. Retrieved from
https://www.mycryptopedia.com/hard-fork-soft-fork-explained/
Au, S., & Power, T. (2018). Tokenomics: The crypto shift of blockchains, ICOs, and tokens. Birmingham,
UK: Packt Publishing.
Baczuk, J. (2018). How to create a raw bitcoin transaction — step by step. Medium. Retrieved from
https://medium.com/coinmonks/how-to-create-a-raw-bitcoin-transaction-step-by-step-239b888e87f2
Bitcoin. (2019a). Bitcoin developer guide: Wallets. Retrieved from https://bitcoin.org/en/developer-
guide#wallets
Bitcoin. (2019b). More free software projects. Retrieved from https://bitcoin.org/en/development#more
Blockchain. (2019). Blockchain size. Retrieved from https://www.blockchain.com/charts/blocks-
size?timespan=all
Boaventura, A. (2018). Where and how can blockchain be a better option than the traditional centralized
systems? A straightforward answer for a very common question. Medium. Retrieved from
https://medium.com/oracledevs/where-and-how-blockchain-can-be-a-better-option-than-the-
traditional-centralized-system-model-edb0e3e1c9ee
Chase, B., & MacBrough, E. (2018). Analysis of the XRP ledger consensus protocol. Retrieved from
https://arxiv.org/pdf/1802.07242.pdf
Comben, C. (2018). What are blockchain confirmations and why do they matter? Coin Central. Retrieved
from https://coincentral.com/blockchain-confirmations/
DeVires, A. (2018). Bitcoin’s growing energy problem. Joule, 2(5), 801-805.
Digiconomist. (2019). Bitcoin energy consumption index. Retrieved from https://digiconomist.net/bitcoin-
energy-consumption
Feuer, A. (2013). The bitcoin ideology. The New York Times. Retrieved from
https://www.nytimes.com/2013/12/15/sunday-review/the-bitcoin-ideology.html
Fischer M. J. (1983). The consensus problem in unreliable distributed systems (a brief survey). In M.
Karpinski (Ed), Foundations of computation theory (LNCS vol. 158, pp. 127-140). Berlin, Germany:
Springer-Verlag.
Fischer, M. J., Lynch, N. A., & Paterson, M. S. (1985). Impossibility of distributed consensus with one
faulty process. Journal of the Association for Computing Machinery, 32(2), 374-382.
Genesis block. (2017). In Bitcoin.com wiki. Retrieved from https://wiki.bitcoin.com/w/Genesis_block
Herlihy, M. (2019). Blockchains from a distributed computing perspective. Communications of the ACM,
62(2), 78-85.
Iansiti, M., & Lakhani, K. R. (2017). The truth about blockchain. Harvard Business Review, 95(1), 118-127.
Irreversible transactions. (2018). In Bitcoin wiki. Retrieved from
https://en.bitcoin.it/wiki/Irreversible_Transactions#Attack_vectors
Jayachandran, P. (2017). The difference between public and private blockchain. IBM. Retrieved from
https://www.ibm.com/blogs/blockchain/2017/05/the-difference-between-public-and-private-
blockchain/
Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA).
International Journal of Information Security, 1(1), 36-63.
Kandaswamy, R., & Furlonger, D. (2018). Blockchain-based transformation: A Gartner trend insight report.
Gartner. Retrieved from https://www.gartner.com/doc/3869696?refval=&pcp=mpe#a-1126710717
Kasireddy, P. (2017). Blockchains don’t scale. Not today, least. But there’s hope. Retrieved from
https://hackernoon.com/blockchains-dont-scale-not-today-at-least-but-there-s-hope-2cb43946551a
Kaushal, M., & Tyle, S. (2015). The blockchain: What it is and why it matters. Brookings. Retrieved from
https://www.brookings.edu/blog/techtank/2015/01/13/the-blockchain-what-it-is-and-why-it-matters/
Lamport, L., Shostak, R., & Pease, M. (1982). The Byzantine generals problem. ACM Transactions on
Programming Languages and Systems, 4(3), 382-401.
Li, K. (2019). The blockchain scalability problem & the race for visa-like transaction speed. Hackernoon.
Retrieved from https://hackernoon.com/the-blockchain-scalability-problem-the-race-for-visa-like-
transaction-speed-5cce48f9d44
Light, J. (2016). The key-decision makers in bitcoin. Lightcoin. Retrieved from
https://lightco.in/2016/05/10/bitcoin-decision-makers/
Lombrozo, E., Lau, J., & Wuille, P. (2015). Segregated witness (consensus layer). Github. Retrieved from
https://github.com/CodeShark/bips/blob/segwit/bip-codeshark-jl2012-segwit.mediawiki
Marr, B. (2018). 30+ real example of blockchain technology in practice. Forbes. Retrieved from
https://www.forbes.com/sites/bernardmarr/2018/05/14/30-real-examples-of-blockchain-technology-
in-practice/#ee4dd78740de
McCullagh, A. (2017). Blockchain technology is not a commercial panacea to every problem. LinkedIn.
Retrieved from https://www.linkedin.com/pulse/blockchain-technology-commercial-panacea-every-
dr-phd-dr-adrian/
Meola, A. (2017). The growing list of applications and use cases of blockchain technology in business &
life. Business Insider. Retrieved from https://www.businessinsider.com/blockchain-technology-
applications-use-cases-2017-9
Merkle, R. C. (1987). A digital signature based on a conventional encryption function. In Proceedings of
the Conference on the Theory and Application of Cryptographic Techniques (pp. 369-378).
Mulligan, C., Scott, J. Z. Warren, S., & Rangaswami, J. P. (2018). Blockchain beyond the hype: A practical
framework for business leaders. World Economic Forum. Retrieved from
https://www.weforum.org/whitepapers/blockchain-beyond-the-hype
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Retrieved from
https://nakamotoinstitute.org/static/docs/bitcoin.pdf
Narayanan, A. (2013). What happened to the crypto dream? Part 1. IEEE Security & Privacy, 11(2), 75-
76.
Narayanan, A. (2015). “Private blockchain” is just a confusing name for a shared database. Freedom to
Tinker. Retrieved from https://freedom-to-tinker.com/2015/09/18/private-blockchain-is-just-a-
confusing-name-for-a-shared-database/
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency
technologies: A comprehensive introduction. Princeton, NJ: Princeton University Press.
National Institute of Standards and Technology (2015). Secure hash standard (SHS) (FIPS-PUB 180-4).
Retrieved from https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf
National Institute of Standards and Technology. (2013). Digital signature standard (FIBS-PUB 186-4).
Retrieved from https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
Orcutt, M. (2018a). States that are passing laws to govern “smart contracts” have no idea what they’re
doing. MIT Review. Retrieved from https://www.technologyreview.com/s/610718/states-that-are-
passing-laws-to-govern-smart-contracts-have-no-idea-what-theyre-doing/
Orcutt, M. (2018b). How secure is the blockchain really? MIT Review. Retrieved from
https://www.technologyreview.com/s/610836/how-secure-is-blockchain-really/
Poon, J., & Dryja, T. (2016). The Bitcoin lightning network: Scalable off-chain instant payments. Retrieved
from https://lightning.network/lightning-network-summary.pdf
Rogers, E. M. (2003). Diffusion of innovations. New York, NY: Free Press.
Rosic, A. (2017). Proof of work vs proof of stake: Basic mining guide. Blockgeeks. Retrieved from
https://blockgeeks.com/guides/proof-of-work-vs-proof-of-stake/
Satoshi Nakamoto Institute. (2008). Emails. Retrieved from https://satoshi.nakamotoinstitute.org/emails/)
Shirer, M., & Goepfert, J. (2018). New IDC spending guide sees worldwide blockchain spending growing
to $9.7 billion in 2021. International Data Corporation. Retrieved from
https://www.idc.com/getdoc.jsp?containerId=prUS43526618
Smith, A. (2017). Your business linking to the blockchain. Huffington Post. Retrieved from
https://www.huffingtonpost.com/entry/your-business-linking-to-the-
blockchain_us_5a33e0c3e4b02bd1c8c60609
Sonderegger, D. (2018). Blockchain: Can smart contracts replace lawyers? Retrieved from
https://abovethelaw.com/2018/02/blockchain-can-smart-contracts-replace-lawyers/
Stratopoulos, T. C. & Wang, V. (2018). Blockchain technology adoption. SSRN. Retrieved from
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3188470
TechTarget. (2017). Distributed ledger technology: Definition. Retrieved from
https://searchcio.techtarget.com/definition/distributed-ledger
The Linux Foundation. (2018). About Hyperledger. Retrieved from https://www.hyperledger.org/about
Thompson, C. (2017). Private blockchain or database? How to determine the difference. The Blockchain
Review. Retrieved from https://medium.com/blockchain-review/private-blockchain-or-database-
whats-the-difference-523e7d42edc
Trujillo, J., Fronthart, S., & Srinivas, V. (2017). Evolution of blockchain technology: Insights from the
GitHub platform. Deloitte. Retrieved from
https://www2.deloitte.com/insights/us/en/industry/financial-services/evolution-of-blockchain-github-
platform.html
Trump, B. D., Wells, E., Trump, J., & Linkov, I. (2018). Cryptocurrency: Governance for what was meant to
be ungovernable. Environment Systems and Decisions, 38(3), 426-430.
Vasa. (2018). ConsensusPedia: An encyclopedia of 30 consensus algorithms. Hackernoon. Retrieved
from https://hackernoon.com/consensuspedia-an-encyclopedia-of-29-consensus-algorithms-
e9c4b4b7d08f
Young, J. (2018). How a cryptocurrency investor lost $60 million in bitcoin and never got it back. CCN.
Retrieved from https://www.ccn.com/how-a-cryptocurrency-investor-lost-60-million-in-bitcoin-and-
never-got-it-back/
Copyright © 2019 by the Association for Information Systems. Permission to make digital or hard copies of
all or part of this work for personal or classroom use is granted without fee provided that copies are not
made or distributed for profit or commercial advantage and that copies bear this notice and full citation on
the first page. Copyright for components of this work owned by others than the Association for Information
Systems must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on
servers, or to redistribute to lists requires prior specific permission and/or fee. Request permission to
publish from: AIS Administrative Office, P.O. Box 2712 Atlanta, GA, 30301-2712 Attn: Reprints or via e-
mail from publications@aisnet.org.