Chat with us, powered by LiveChat What methodology are you planning to use? Quantitative Qualitative Applied ->What is the population you would like to address? Where will you select your sample from? - EssayAbode

What methodology are you planning to use? Quantitative Qualitative Applied –>What is the population you would like to address? Where will you select your sample from?

–>Proposed Topic:

–>What methodology are you planning to use?

Quantitative 

Qualitative 

Applied 

–>What is the population you would like to address? Where will you select your sample from? 

–>Theoretical Framework/Background 

What theories covered in the program are associated with your topic? 

–> Describe the connection of the topic to the program goals and courses. 

–>Proposed Topic:

Briefly discuss a proposed topic in your discipline. For the Proposed Topic, please present a succinct description of your dissertation research focus.

Be as specific as possible and cite the current scholarship that has noted the research focus as an area of needed inquiry.

–>What methodology are you planning to use?

Quantitative

Qualitative

Applied

–>What is the population you would like to address? Where will you select your sample from?

Quantitative studies should include a sample selected from a large population across multiple schools,

districts, or organizations. Describe the target population for your study. This involves the representative

population for the individuals you plan to recruit for the study. Include an approximate size of this target

population. This can typically be found using a resource such as the U.S. BLS. Then follow with a description

of the location of your recruitment site, meaning the specific organization, social media group, or site(s)

where you will recruit this target population as study participants. Note. For studies that involve no live

subjects, you will describe the location from where you will gather the archival raw data for your study.

–>Theoretical Framework/Background

What theories covered in the program are associated with your topic?

You likely reviewed many theories within your discipline across your doctoral coursework. Here, you will

choose theories (1, 2, or maybe 3) that will serve as the lens to view your research focus. Consult your

Professor/Chair for guidance, and then list the theory or theories that will comprise the theoretical lens

for the study. Follow with a description of how and why the theory or theories are best to use as the study’s theoretical foundation.

–> Describe the connection of the topic to the program goals and courses.

How is your topic connected to specific goals in your program(Information Technology)? Refer to the Graduate Catalog for your program's goals.

,

Blockchain technology security and privacy issues

Name

Institutional affiliation

Course

Instructor

Date

Blockchain technology security and privacy issues

Currently, there are hundreds of blockchain, each offering unique solutions to problems. These blockchain differ in design, function and security guarantees. Lin & Liao, (2017) stated there have been increasingly stakes in using blockchain technology across various applications to significant investments in the development of blockchain technology within different industries. It is expected that blockchain will bring about significant changes to many businesses and systems. Privacy has become an issue with the increased adoption of blockchain. Distributed trust hence privacy and security is the center of every blockchain technology (Lin & Liao, 2017; Nabben, 2021). The technology industry is generally regarded as a trustless environment riddled with numerous thefts and frauds. Blockchain privacy and security provide users with desirable features such as autonomy, immutability, decentralization and integrity. With these features, privacy and security can be guaranteed.

The rise in blockchain technology and advancements within the sector has caught the attention of various industry titans. Academics and industrialists are the main points of focus as they are the groups or populations likely to adopt blockchain technology in mass and will be affected by privacy issues on a mass scale. This paper will adopt a qualitative research study format borrowing information from previously done studies. Secondary data will be largely used in the analysis. A descriptive research design will be employed as it asks important questions related to who, what, when, where, and how. It will seek to explore and describe the privacy and security issues systematically within blockchain technology.

de Haro-Olmo, Varela-Vaca, & Álvarez-Bermejo, (2020) investigated the concept of blockchain technology from an anonymity and privacy perspective. The authors sought to answer various questions related to privacy; "How does blockchain use anonymity to guarantee privacy?" "What are the disadvantages of blockchain to adapt to the GDPR?" "How were the problems encountered addressed?" "Proposals for future research offered by the publications." These four research questions aim to evaluate the range and manner in which blockchain considers anonymity ad privacy. It sought to understand the techniques which can be implemented and understand any problems, if any and any future proposals which are currently unresolved and ought to be fixed.

The study did not utilize any human participants; instead, data was collected from secondary sources. The researchers collected data from search engines for scientific publications and bibliographic materials. The keyword for the search was blockchain, privacy and anonymity. The study restricted the data collected from 2016 until 2018. The study found different approaches which can be utilized to address the relationship between privacy ad identity anonymity, which is a crucial factor in blockchain technology. This was brought about by a variety of fields in blockchain applications. The results showed that of the several methods used to attain anonymity ad privacy, those that attain conditional anonymity do so mainly because of the centralized models, which call for the several entities to identify the participating elements and validate the transaction.

Reference

de Haro-Olmo, F. J., Varela-Vaca, Á. J., & Álvarez-Bermejo, J. A. (2020). Blockchain from the perspective of privacy and anonymisation: a systematic literature review. Sensors20(24), 7171.

Lin, I. C., & Liao, T. C. (2017). A survey of blockchain security issues and challenges. Int. J. Netw. Secur.19(5), 653-659.

Nabben, K. (2021). Blockchain Security as “People Security”: Applying Sociotechnical Security to Blockchain Technology. Frontiers in Computer Science, 62.

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing