Blockchain Technology as an Enabler of Service Systems: A Structured Literature Review

Conference paper
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 279)

Abstract

Blockchain technology is expected to revolutionize the way transactions are performed, thereby affecting a vast variety of potential areas of application. While expectations are high, real world impact and benefit are still unclear. To be able to assess its impact, the first structured literature review of peer-reviewed articles is conducted. As blockchain technology is centered around a peer-to-peer network, enabling collaboration between different parties, the service system is chosen as unit analysis to examine its potential contribution. We have identified a set of characteristics that enable trust and decentralization, facilitating the formation and coordination of a service system.

Keywords

Blockchain technology Service system Technology impact 

References

  1. 1.
    Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)Google Scholar
  2. 2.
    Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc., Sebastopol (2015)Google Scholar
  3. 3.
    Tapscott, D., Tapscott, A.: Blockchain Revolution. Penguine Random House, New York (2016)Google Scholar
  4. 4.
    Ølnes, S.: Beyond bitcoin enabling smart government using blockchain technology. In: Scholl, H.J., et al. (eds.) EGOVIS 2016. LNCS, vol. 9820, pp. 253–264. Springer, Cham (2016). doi:10.1007/978-3-319-44421-5_20 CrossRefGoogle Scholar
  5. 5.
    Nachiappan, Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V.: BlockChain technology: beyond bitcoin. Applied Innovation Review, pp. 6–19 (2016). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Final-version-Int.pdf. (Accessed 10 Oct 2016)
  6. 6.
    Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2 (1997). http://pear.accc.uic.edu/ojs/index.php/fm/article/view/548/469. (Accessed 10 Oct 2016)
  7. 7.
    Gartner: Hype Cycle for Emerging Technologies. http://www.gartner.com/newsroom/id/3412017. Accessed 21 Nov 2016
  8. 8.
    Greenspan, G.: Avoiding the pointless blockchain project. http://www.multichain.com/blog/2015/11/avoiding-pointless-blockchain-project/. Accessed 13 Nov 2016
  9. 9.
    Böhme, R., Christin, N., Edelman, B., Moore, T.: Bitcoin: economics, technology, and governance. J. Econ. Perspect. 29, 213–238 (2015)CrossRefGoogle Scholar
  10. 10.
    Warburg, B.: How the blockchain will radically transform the economy. https://www.ted.com/talks/bettina_warburg_how_the_blockchain_will_radically_transform_the_economy/transcript?language=en. Accessed 21 Nov 2016
  11. 11.
    Maglio, P.P., Vargo, S.L., Caswell, N., Spohrer, J., Vargo, S.L., Caswell, N., Maglio, P.P.: The service system is the basic abstraction of service science. Inf. Syst. E-bus. Manag. 7, 395–406 (2009)CrossRefGoogle Scholar
  12. 12.
    Zhao, J.L., Fan, S., Yan, J.: Overview of business innovations and research opportunities in blockchain and introduction to the special issue. Financ. Innov. 2, 28 (2016)Google Scholar
  13. 13.
    Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: writing a literature review. MIS Q. 26, xiii–xxiii (2002)Google Scholar
  14. 14.
    Lewenberg, Y., Sompolinsky, Y., Zohar, A.: Inclusive block chain protocols. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 528–547. Springer, Heidelberg (2015). doi:10.1007/978-3-662-47854-7_33 CrossRefGoogle Scholar
  15. 15.
    Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281–310. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46803-6_10 Google Scholar
  16. 16.
    Wang, H., Chen, K., Xu, D.: A maturity model for blockchain adoption. Financ. Innov. 2, 12 (2016)Google Scholar
  17. 17.
    Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutorials 18, 2084–2123 (2016)CrossRefGoogle Scholar
  18. 18.
    Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy, pp. 839–858 (2016)Google Scholar
  19. 19.
    Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy, pp. 104–121 (2015)Google Scholar
  20. 20.
    Beck, R., Stenum Czepluch, J., Lollike, N., Malone, S.: Blockchain - the gateway to trust-free cryptographic transactions. In: Twenty-Fourth European Conference on Information Systems (ECIS), pp. 1–14 (2016)Google Scholar
  21. 21.
    Kraft, D.: Difficulty control for blockchain-based consensus systems. Peer-to-Peer Netw. Appl. 9, 397–413 (2016)CrossRefGoogle Scholar
  22. 22.
    McCorry, P., Möser, M., Shahandasti, S.F., Hao, F.: Towards bitcoin payment networks. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 57–76. Springer, Cham (2016). doi:10.1007/978-3-319-40253-6_4 CrossRefGoogle Scholar
  23. 23.
    Cucurull, J., Puiggalí, J.: Distributed immutabilization of secure logs. In: Barthe, G., Markatos, E., Samarati, P. (eds.) STM 2016. LNCS, vol. 9871, pp. 122–137. Springer, Cham (2016). doi:10.1007/978-3-319-46598-2_9 CrossRefGoogle Scholar
  24. 24.
    Gerstl, David S.: Leveraging bitcoin blockchain technology to modernize security perfection under the uniform commercial code. In: Maglyas, A., Lamprecht, A.-L. (eds.) Software Business. LNBIP, vol. 240, pp. 109–123. Springer, Cham (2016). doi:10.1007/978-3-319-40515-5_8 Google Scholar
  25. 25.
    Sharples, M., Domingue, J.: The blockchain and kudos: a distributed system for educational record, reputation and reward. In: Verbert, K., Sharples, M., Klobučar, T. (eds.) Adaptive and Adaptable Learning: 11th European Conference on Technology Enhanced Learning, EC-TEL 2016, pp. 490–496. Springer International Publishing, Cham (2016)CrossRefGoogle Scholar
  26. 26.
    Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: using blockchain to protect personal data. In: Proceedings of 2015 IEEE Security and Privacy Workshop, SPW 2015, pp. 180–184 (2015)Google Scholar
  27. 27.
    Idelberger, F., Governatori, G., Riveret, R., Sartor, G.: Evaluation of logic-based smart contracts for blockchain systems. In: Alferes, J.J.J., Bertossi, L., Governatori, G., Fodor, P., Roman, D. (eds.) RuleML 2016. LNCS, vol. 9718, pp. 167–183. Springer, Cham (2016). doi:10.1007/978-3-319-42019-6_11 CrossRefGoogle Scholar
  28. 28.
    Wright, A., De Filippi, P.: Decentralized blockchain technology and the rise of lex cryptographia. SSRN Scholarly Paper ID 2580664. Social Science Research Network, Rochester, NY (2015). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2580664. (Accessed 10 Oct 2016)
  29. 29.
    Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better - how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) Financial Cryptography and Data Security: 16th International Conference, FC 2012, pp. 399–414. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  30. 30.
    Cai, Y., Zhu, D.: Fraud detections for online businesses: a perspective from blockchain technology. Financ. Innov. 2, 20 (2016)Google Scholar
  31. 31.
    Delmolino, K., Arnett, M., Kosba, A., Miller, A., Shi, E.: Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 79–94. Springer, Heidelberg (2016). doi:10.1007/978-3-662-53357-4_6 CrossRefGoogle Scholar
  32. 32.
    Eyal, I., Gencer, A.E., Sirer, E.G., van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: Proceeding of 13th USENIX Symposium Networked Systems Design and Implementation (NSDI 2016), pp. 45–59 (2016)Google Scholar
  33. 33.
    Garman, C., Green, M., Miers, I.: Decentralized anonymous credentials. In: Network and Distributed System Security (NDSS) Symposium 2014, pp. 23–26 (2014)Google Scholar
  34. 34.
    Guo, Y., Liang, C.: Blockchain application and outlook in the banking industry. Financ. Innov. 2, 24 (2016)Google Scholar
  35. 35.
    Heilman, E., Baldimtsi, F., Goldberg, S.: Blindly signed contracts: anonymous on-blockchain and off-blockchain bitcoin transactions. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 43–60. Springer, Heidelberg (2016). doi:10.1007/978-3-662-53357-4_4 CrossRefGoogle Scholar
  36. 36.
    Herrera-Joancomartí, J., Pérez-Solà, C.: Privacy in bitcoin transactions: new challenges from blockchain scalability solutions. In: Torra, V., Narukawa, Y., Navarro-Arribas, G., Yañez, C. (eds.) MDAI 2016. LNCS (LNAI), vol. 9880, pp. 26–44. Springer, Cham (2016). doi:10.1007/978-3-319-45656-0_3 CrossRefGoogle Scholar
  37. 37.
    Hull, R., Batra, V.S., Chen, Y.-M., Deutsch, A., Heath III, F.F.T., Vianu, V.: Towards a shared ledger business collaboration language based on data-aware processes. In: Sheng, Q.Z., Stroulia, E., Tata, S., Bhiri, S. (eds.) ICSOC 2016. LNCS, vol. 9936, pp. 18–36. Springer, Cham (2016). doi:10.1007/978-3-319-46295-0_2 CrossRefGoogle Scholar
  38. 38.
    McCorry, P., Shahandashti, S.F., Clarke, D., Hao, F.: Authenticated key exchange over bitcoin. In: Chen, L., Matsuo, S. (eds.) SSR 2015. LNCS, vol. 9497, pp. 3–20. Springer, Cham (2015). doi:10.1007/978-3-319-27152-1_1 CrossRefGoogle Scholar
  39. 39.
    Sun, J., Yan, J., Zhang, K.Z.K.: Blockchain-based sharing services: what blockchain technology can contribute to smart cities. Financ. Innov. 2, 26 (2016)Google Scholar
  40. 40.
    Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev, A., Mendling, J.: Untrusted business process monitoring and execution using blockchain. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 329–347. Springer, Cham (2016). doi:10.1007/978-3-319-45348-4_19 CrossRefGoogle Scholar
  41. 41.
    Wilson, D., Ateniese, G.: From pretty good to great: enhancing PGP using bitcoin and the blockchain. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds.) SSR 2015. LNCS, vol. 9497, pp. 368–375. Springer, Cham (2015). doi:10.1007/978-3-319-25645-0_25 Google Scholar
  42. 42.
    Xu, J.J.: Are blockchains immune to all malicious attacks? Financ. Innov. 2, 25 (2016)Google Scholar
  43. 43.
    Chesbrough, H., Spohrer, J.: A research manifesto for services science. Commun. ACM 49, 33–40 (2006)CrossRefGoogle Scholar
  44. 44.
    Vargo, S.L., Lusch, R.F.: Evolving to a new dominant logic. J. Mark. 68, 1–17 (2004)CrossRefGoogle Scholar
  45. 45.
    Sampson, S.E., Froehle, C.M.: Foundations and implications of a proposed unified services theory. Prod. Oper. Manag. 15, 329–343 (2006)CrossRefGoogle Scholar
  46. 46.
    Backlund, A.: The definition of system. Kybernetes 29, 444–451 (2000)CrossRefMATHGoogle Scholar
  47. 47.
    Spohrer, J., Maglio, P.P., Bailey, J., Gruhl, D.: Steps toward a science of service systems. Comput. (Long. Beach. Calif.) 40, 71–77 (2007)Google Scholar
  48. 48.
    Spohrer, J., Kwan, S.K.: Service Science, Management, Engineering, and Design (SSMED). Int. J. Inf. Syst. Serv. Sect. 1, 1–31 (2009)CrossRefGoogle Scholar
  49. 49.
    Greenspan, G.: Four Genuine Blockchain Use Cases. http://www.coindesk.com/four-genuine-blockchain-use-cases/. Accessed 13 Nov 2016
  50. 50.
    Bray, R.L., Mendelson, H.: Information transmission and the bullwhip effect: an empirical investigation. Manag. Sci. 58, 860–875 (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Karlsruhe Institute of TechnologyKarlsruheGermany

Personalised recommendations