Abstract
The current research aims to extend the existing literature on the differentiation of Blockchain Technology (BCT) from Distributed Ledger Technology (DLT) and traditional database management systems (DBMS) on grounds of providing additional security to user applications. Through a qualitative hierarchy methodology, it identifies prominent factors contributing to the same. 31 working professionals across a range of industry types were subjected to a semi-structured interview and the interview transcripts were analysed through NVivo and Rstudio. The findings suggested that the use of BCT in various daily use applications will drastically enhance security over traditional DBMS on grounds of traceability, immutability, transparency, accountability and non-hackability of data. The implementation of BCT over DLT in applications pointed towards enhancement of security too, but considering the areas only when the technical novelty of BCT is needed over the already robust DLT. While some industries would benefit straightaway, some need to strategically set their requirements on grounds of application security and think mindfully before implementing BCT considering the enhanced technical novelty of the same for visibly reaping its benefits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ahsan, Z.B., Gupta, A., Kar, A.K.: The effect of countries’ independent regulation on cryptocurrency markets. J. Glob. Inf. Manag. (JGIM) 31(1), 1–32 (2023)
Asante, M., Epiphaniou, G., Maple, C., Al-Khateeb, H., Bottarelli, M., Ghafoor, K.Z.: Distributed ledger technologies in supply chain security management: a comprehensive survey. IEEE Trans. Eng. Manage. 70(2), 713–739 (2021)
Balapour, A., Nikkhah, H.R., Sabherwal, R.: Mobile application security: role of perceived privacy as the predictor of security perceptions. Int. J. Inf. Manag. 52, 102063 (2020)
Batta, A., Gandhi, M., Kar, A.K., Loganayagam, N., Ilavarasan, V.: Diffusion of blockchain in logistics and transportation industry: an analysis through the synthesis of academic and trade literature. J. Sci. Technol. Policy Manag. 12(3), 378–398 (2021)
Bodkhe, U., et al.: Blockchain for industry 4.0: a comprehensive review. IEEE Access 8, 79764–79800 (2020)
Braun, V., Clarke, V.: Thematic Analysis. American Psychological Association (2012)
Chuen, L.K.: Handbook of digital currency: Bitcoin, innovation, financial instruments, and big data (No. 147850). Academic (2015)
Grover, P., Kar, A.K., Janssen, M.: Diffusion of blockchain technology: insights from academic literature and social media analytics. J. Enterp. Inf. Manag. 32(5), 735–757 (2019)
Harris, M.A., Brookshire, R., Chin, A.G.: Identifying factors influencing consumers’ intent to install mobile applications. Int. J. Inf. Manag. 36(3), 441–450 (2016)
Hong, W., Thong, J.Y.: Internet privacy concerns: an integrated conceptualization and four empirical studies. Mis Q. 275–298 (2013)
Johnston, A.C., Warkentin, M.: Fear appeals and information security behaviors: an empirical study. MIS Q. 549–566 (2010)
Joo, M., Kim, S.H., Ghose, A., Wilbur, K.C.: Designing distributed ledger technologies, like blockchain, for advertising markets. Int. J. Res. Mark. 40(1), 12–21 (2023)
Kamble, S.S., Gunasekaran, A., Sharma, R.: Modeling the blockchain enabled traceability in agriculture supply chain. Int. J. Inf. Manag. 52, 101967 (2020)
Kar, A.K., Navin, L.: Diffusion of blockchain in insurance industry: an analysis through the review of academic and trade literature. Telematics Inform. 58, 101532 (2021)
Kar, A.K., Varsha, P.S.: Unravelling the techno-functional building blocks of Metaverse ecosystems–a review and research agenda. Int. J. Inf. Manag. Data Insights, 100176 (2023)
Keith, M.J., Babb, J.S., Lowry, P.B., Furner, C.P., Abdullat, A.: The role of mobile-computing self-efficacy in consumer information disclosure. Inf. Syst. J. 25(6), 637–667 (2015)
Khanuja, H.K., Adane, D.S.: Database security threats and challenges in database forensic: a survey. In: Proceedings of 2011 International Conference on Advancements in Information Technology (AIT 2011), pp. 170–175 (2011). http://www.ipcsit.com/vol20/33-ICAIT2011-A4072.pdf
Kim, D.J., Steinfield, C., Lai, Y.J.: Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decis. Support. Syst. 44(4), 1000–1015 (2008)
Malik, N., Tripathi, S.N., Kar, A.K., Gupta, S.: Impact of artificial intelligence on employees working in industry 4.0 led organizations. Int. J. Man-Power 43(2), 334–354 (2021)
Medeiros, I., Beatriz, M., Neves, N., Correia, M.: SEPTIC: detecting injection attacks and vulnerabilities inside the DBMS. IEEE Trans. Reliab. 68(3), 1168–1188 (2019)
Morkunas, V.J., Paschen, J., Boon, E.: How blockchain technologies impact your business model. Bus. Horiz. 62(3), 295–306 (2019)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus. Rev. (2008)
Pavlou, P.A., Liang, H., Xue, Y.: Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective. MIS Q. 105–136 (2007)
Posey, C., Roberts, T.L., Lowry, P.B., Hightower, R.T.: Bridging the divide: a qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders. Inf. Manag. 51(5), 551–567 (2014)
Prakash, R., Anoop, V.S., Asharaf, S.: Blockchain technology for cybersecurity: a text mining literature analysis. Int. J. Inf. Manag. Data Insights 2(2), 100112 (2022)
Shropshire, J.D., Warkentin, M., Johnston, A.C.: Impact of negative message framing on security adoption. J. Comput. Inf. Syst. 51(1), 41–51 (2010)
Wamba, S.F., Queiroz, M.M.: Blockchain in the operations and supply chain management: benefits, challenges and future research opportunities. Int. J. Inf. Manage. 52, 102064 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Mandal, S., Kar, A.K., Gupta, S. (2024). Blockchain-Based Application Security Versus Centralized and Distributed Data Management Systems – A Comparative Study. In: Sharma, S.K., Dwivedi, Y.K., Metri, B., Lal, B., Elbanna, A. (eds) Transfer, Diffusion and Adoption of Next-Generation Digital Technologies. TDIT 2023. IFIP Advances in Information and Communication Technology, vol 697. Springer, Cham. https://doi.org/10.1007/978-3-031-50188-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-031-50188-3_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50187-6
Online ISBN: 978-3-031-50188-3
eBook Packages: Computer ScienceComputer Science (R0)