Trust beyond computation alone: Human aspects of trust in blockchain technologies

被引:17
作者
Craggs, Barnaby [1 ]
Rashid, Awais [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol, Avon, England
来源
2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN SOCIETY (ICSE-SEIS 2019) | 2019年
基金
英国工程与自然科学研究理事会;
关键词
Blockchain; Trust; Bitcoin; Guidelines; BITCOIN;
D O I
10.1109/ICSE-SEIS.2019.00011
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Blockchains - with their inherent properties of transaction transparency, distributed consensus, immutability and cryptographic verifiability - are increasingly seen as a means to underpin innovative products and services in a range of sectors from finance through to energy and healthcare. Discussions, too often, make assertions that the trustless nature of blockchain technologies enables and actively promotes their suitability-there being no need to trust third parties or centralised control. Yet humans need to be able to trust systems, and others with whom the system enables transactions. In this paper, we highlight that understanding this need for trust is critical for the development of blockchain-based systems. Through an online study with 125 users of the most wellknown of blockchain based systems - the cryptocurrency Bitcoin - we uncover that human and institutional aspects of trust are pervasive. Our analysis highlights that, when designing future blockchain-based technologies, we ought to not only consider computational trust but also the wider eco-system, how trust plays a part in users engaging/disengaging with such eco-systems and where design choices impact upon trust. From this, we distill a set of guidelines for software engineers developing blockchain-based systems for societal applications.
引用
收藏
页码:21 / 30
页数:10
相关论文
共 54 条
[1]   Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams [J].
Aitzhan, Nurzhan Zhumabekuly ;
Svetinovic, Davor .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) :840-852
[2]  
[Anonymous], 2016, NETW DISTR SYST SEC
[3]  
Antonopoulos A., 2014, Bitcoin security model: trust by computation - O'Reilly Radar
[4]   Hijacking Bitcoin: Routing Attacks on Cryptocurrencies [J].
Apostolaki, Maria ;
Zohar, Aviv ;
Vanbever, Laurent .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :375-392
[5]   On the Role of Value Sensitive Concerns in Software Engineering Practice [J].
Barn, Balbir ;
Barn, Ravinder ;
Raimondi, Franco .
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, 2015, :497-500
[6]  
Bastiaan M., 2015, Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin
[7]  
Bitfinex, 2016, SEC BREACH UPD 3
[8]  
Bitfinex, 2016, ANN
[9]   Bitcoin: Economics, Technology, and Governance [J].
Boehme, Rainer ;
Christin, Nicolas ;
Edelman, Benjamin ;
Moore, Tyler .
JOURNAL OF ECONOMIC PERSPECTIVES, 2015, 29 (02) :213-238
[10]  
Bohr J, 2014, ANN CONF PRIV SECUR, P94, DOI 10.1109/PST.2014.6890928