Skip to main content
Top

2021 | OriginalPaper | Chapter

3. Incentives to Engage Blockchain and Ecosystem Actors

Authors : Mohan Tanniru, Jianyu Niu, Chen Feng, Claudio Gottschalg Duque, Chang Lu, Harish Krishnan

Published in: Building Decentralized Trust

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Incentives are stimuli that motivate or influence behaviour. This chapter considers how incentives may influence the adoption of emerging technologies such as blockchain, by focusing on the value or relative advantage of the technology, as well as blockchain system design and consensus mechanisms. The impact of incentives is considered in two distinct but connected ecosystems—that of the developer and administrator, and that of the enterprise user—with the conclusion that both aspects of incentives and both ecosystems need to be considered when designing successful and trusted blockchain ecosystems that are adopted by users. Changing behaviour and securing stakeholders’ trust requires incentives and business models that support resource sharing (including information sharing), and those incentives and models need to be adaptable to changes in each ecosystem, given their interrelation.
Although blockchain systems are technical in nature, they are also socio-informational systems. Incentive design in blockchain-based systems is still an understudied research area given its significance, but there are indications that system design must be adaptable and agile, addressing the needs and concerns of different customers and users. Making the system relevant to stakeholders in each ecosystem, and communicating that relevance, can act as a powerful incentive to successfully assimilate blockchain technology.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Bahack, L. (2013). Theoretical Bitcoin attacks with less than half of the computational power (draft). ArXiv Preprint. arXiv:1312.7013 Bahack, L. (2013). Theoretical Bitcoin attacks with less than half of the computational power (draft). ArXiv Preprint. arXiv:1312.7013
go back to reference Brandao, O. C., & Duque, C. G. (2011). Comunicação científica contemporânea e de vanguarda. In O. C. Brandao & C. G. Duque (Eds.), Ciência da Informação Estudos e Práticas (pp. 9–33). Brasília: Centro Editorial. Brandao, O. C., & Duque, C. G. (2011). Comunicação científica contemporânea e de vanguarda. In O. C. Brandao & C. G. Duque (Eds.), Ciência da Informação Estudos e Práticas (pp. 9–33). Brasília: Centro Editorial.
go back to reference Carlsten, M., Kalodner, H., Weinberg, S. M., & Narayanan, A. (2016). On the instability of Bitcoin without the block reward. In CCS’16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 154–167). New York: ACM. https://doi.org/10.1145/2976749.2978408. Carlsten, M., Kalodner, H., Weinberg, S. M., & Narayanan, A. (2016). On the instability of Bitcoin without the block reward. In CCS’16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 154–167). New York: ACM. https://​doi.​org/​10.​1145/​2976749.​2978408.​
go back to reference Deephouse, D. L., Bundy, J., Tost, L. P., & Suchman, M. C. (2017). Organizational legitimacy: Six key questions. In R. Greenwood, C. Oliver, T. Lawrence, & R. Meyer (Eds.), The SAGE handbook of organizational institutionalism (2nd ed., pp. 27–70). Thousand Oaks, CA: Sage. Deephouse, D. L., Bundy, J., Tost, L. P., & Suchman, M. C. (2017). Organizational legitimacy: Six key questions. In R. Greenwood, C. Oliver, T. Lawrence, & R. Meyer (Eds.), The SAGE handbook of organizational institutionalism (2nd ed., pp. 27–70). Thousand Oaks, CA: Sage.
go back to reference Eisenmann, T. R., Parker, G., & Van Alstyne, M. (2009). Opening platforms: How, when and why? In A. Gawer (Ed.), Platforms, markets and innovation (pp. 131–162). Cheltenham: Edward Elgar. Eisenmann, T. R., Parker, G., & Van Alstyne, M. (2009). Opening platforms: How, when and why? In A. Gawer (Ed.), Platforms, markets and innovation (pp. 131–162). Cheltenham: Edward Elgar.
go back to reference Garay, J. A., Kiayias, A., & Leonardos, N. (2015). The Bitcoin backbone protocol: Analysis and applications. In E. Oswald & M. Fischlin (Eds.), Advances in cryptology – EUROCRYPT 2015. Lecture notes in computer science (Vol. 9057, pp. 281–310). Berlin: Springer. https://doi.org/10.1007/978-3-662-46803-6_10. Garay, J. A., Kiayias, A., & Leonardos, N. (2015). The Bitcoin backbone protocol: Analysis and applications. In E. Oswald & M. Fischlin (Eds.), Advances in cryptology – EUROCRYPT 2015. Lecture notes in computer science (Vol. 9057, pp. 281–310). Berlin: Springer. https://​doi.​org/​10.​1007/​978-3-662-46803-6_​10.
go back to reference Garay, J. A., Kiayias, A., & Leonardos, N. (2017). The Bitcoin backbone protocol with chains of variable difficulty. In J. Katz & H. Shacham (Eds.), Advances in cryptology – CRYPTO 2017. Lecture notes in computer science (Vol. 10401, pp. 291–323). Cham: Springer International. https://doi.org/10.1007/978-3-319-63688-7_10. Garay, J. A., Kiayias, A., & Leonardos, N. (2017). The Bitcoin backbone protocol with chains of variable difficulty. In J. Katz & H. Shacham (Eds.), Advances in cryptology – CRYPTO 2017. Lecture notes in computer science (Vol. 10401, pp. 291–323). Cham: Springer International. https://​doi.​org/​10.​1007/​978-3-319-63688-7_​10.
go back to reference Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. (2016) On the security and performance of proof of work blockchains. In CCS’16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 3–16). Vienna: ACM. https://doi.org/10.1145/2976749.2978341. Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. (2016) On the security and performance of proof of work blockchains. In CCS’16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 3–16). Vienna: ACM. https://​doi.​org/​10.​1145/​2976749.​2978341.​
go back to reference Heilman, E. (2014). One weird trick to stop selfish miners: Fresh Bitcoins, a solution for the honest miner. In R. Böhme, M. Brenner, T. Moore, & M. Smith (Eds.), Financial cryptography and data security. FC 2014. Lecture notes in computer science (Vol. 8438, pp. 161–162). Berlin: Springer. Heilman, E. (2014). One weird trick to stop selfish miners: Fresh Bitcoins, a solution for the honest miner. In R. Böhme, M. Brenner, T. Moore, & M. Smith (Eds.), Financial cryptography and data security. FC 2014. Lecture notes in computer science (Vol. 8438, pp. 161–162). Berlin: Springer.
go back to reference Incentive. (2015). APA dictionary of psychology (2nd ed.). Washington, DC: American Psychological Association. Incentive. (2015). APA dictionary of psychology (2nd ed.). Washington, DC: American Psychological Association.
go back to reference Kress, G. R., & Van Leeuwen, T. (2001). Multimodal discourse: The modes and media of contemporary communication. London: Hodder Education. Kress, G. R., & Van Leeuwen, T. (2001). Multimodal discourse: The modes and media of contemporary communication. London: Hodder Education.
go back to reference Kwon, Y., Kim, D., Son, Y., Vasserman, E., & Kim, Y. (2017). Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on Bitcoin. In CCS’17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 195–209). New York: ACM. Kwon, Y., Kim, D., Son, Y., Vasserman, E., & Kim, Y. (2017). Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on Bitcoin. In CCS’17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 195–209). New York: ACM.
go back to reference Leblebici, H., Salancik, G. R., Copay, A., & King, T. (1991). Institutional change and the transformation of interorganizational fields: An organizational history of the U.S. radio broadcasting industry. Administrative Science Quarterly, 36(3), 333–363. Retrieved from https://www.jstor.org/stable/2393200 Leblebici, H., Salancik, G. R., Copay, A., & King, T. (1991). Institutional change and the transformation of interorganizational fields: An organizational history of the U.S. radio broadcasting industry. Administrative Science Quarterly, 36(3), 333–363. Retrieved from https://​www.​jstor.​org/​stable/​2393200
go back to reference Lusch, R. F., & Nambisan, S. (2015). Service innovation: A service-dominant logic perspective. MIS Quarterly, 39(1), 155–175.CrossRef Lusch, R. F., & Nambisan, S. (2015). Service innovation: A service-dominant logic perspective. MIS Quarterly, 39(1), 155–175.CrossRef
go back to reference Luu, L., Saha, R., Parameshwaran, I., Saxena, P., & Hobor, A. (2015). On power splitting games in distributed computation: The case of Bitcoin pooled mining. In Proceedings of the 2015 IEEE 28th Computer Security Foundations Symposium (pp. 397–411). Verona: IEE Computer Society. https://doi.org/10.1109/CSF.2015.34 Luu, L., Saha, R., Parameshwaran, I., Saxena, P., & Hobor, A. (2015). On power splitting games in distributed computation: The case of Bitcoin pooled mining. In Proceedings of the 2015 IEEE 28th Computer Security Foundations Symposium (pp. 397–411). Verona: IEE Computer Society. https://​doi.​org/​10.​1109/​CSF.​2015.​34
go back to reference Marion, R. (2008). Complexity theory for organizations and organizational leadership. In M. Uhl-Bien & R. Marion (Eds.), Complexity leadership (pp. 1–15). Charlotte, NC: Information Age. Marion, R. (2008). Complexity theory for organizations and organizational leadership. In M. Uhl-Bien & R. Marion (Eds.), Complexity leadership (pp. 1–15). Charlotte, NC: Information Age.
go back to reference Nayak, K., Kumar, S., Miller, A., & Shi, E. (2016). Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 305–320). Saarbrucken. Los Alamitos, CA: IEEE Computer Society. https://doi.org/10.1109/EuroSP.2016.32 Nayak, K., Kumar, S., Miller, A., & Shi, E. (2016). Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 305–320). Saarbrucken. Los Alamitos, CA: IEEE Computer Society. https://​doi.​org/​10.​1109/​EuroSP.​2016.​32
go back to reference Nielsen, J. (1999). Designing web usability: The practice of simplicity. Thousand Oaks, CA: New Riders. Nielsen, J. (1999). Designing web usability: The practice of simplicity. Thousand Oaks, CA: New Riders.
go back to reference Niu, J., & Feng, C. (2019). Selfish mining in Ethereum. ArXiv Preprint. arXiv:1901.04620 Niu, J., & Feng, C. (2019). Selfish mining in Ethereum. ArXiv Preprint. arXiv:1901.04620
go back to reference Orlandi, T. R. C., Duque, C. G., Mori, A., & Bernardo, C. G. (2018). A new model of information architecture associated with multimodality for training high performance professionals. Poster presented at the 81st Annual Meeting of the American Society for Information Science and Technology, Vancouver, 10–14 November 2018. Orlandi, T. R. C., Duque, C. G., Mori, A., & Bernardo, C. G. (2018). A new model of information architecture associated with multimodality for training high performance professionals. Poster presented at the 81st Annual Meeting of the American Society for Information Science and Technology, Vancouver, 10–14 November 2018.
go back to reference Pass, R., Seeman, L., & Shelat, A. (2017). Analysis of the blockchain protocol in asynchronous networks. In J. S. Coron & J. B. Nielsen (Eds.), Advances in cryptology – EUROCRYPT 2017. Lecture notes in computer science (Vol. 10211, pp. 643–673). Cham: Springer International. https://doi.org/10.1007/978-3-319-56614-6_22. Pass, R., Seeman, L., & Shelat, A. (2017). Analysis of the blockchain protocol in asynchronous networks. In J. S. Coron & J. B. Nielsen (Eds.), Advances in cryptology – EUROCRYPT 2017. Lecture notes in computer science (Vol. 10211, pp. 643–673). Cham: Springer International. https://​doi.​org/​10.​1007/​978-3-319-56614-6_​22.​
go back to reference Resmini, A., & Rosati, L. (2011). Pervasive information architecture: Designing cross-channel user experiences. Burlington: Elsevier Science. Resmini, A., & Rosati, L. (2011). Pervasive information architecture: Designing cross-channel user experiences. Burlington: Elsevier Science.
go back to reference Rosenfeld, M. (2011). Analysis of Bitcoin pooled mining reward systems. ArXiv Preprint. arXiv:1112.4980 Rosenfeld, M. (2011). Analysis of Bitcoin pooled mining reward systems. ArXiv Preprint. arXiv:1112.4980
go back to reference Saif, S. K., Nawaz, A., Jan, F. A., & Khan, M. I. (2012). Synthesizing the theories of job-satisfaction across the cultural/attitudinal dimensions. Interdisciplinary Journal of Contemporary Research in Business, 3(9), 1382–1396. Saif, S. K., Nawaz, A., Jan, F. A., & Khan, M. I. (2012). Synthesizing the theories of job-satisfaction across the cultural/attitudinal dimensions. Interdisciplinary Journal of Contemporary Research in Business, 3(9), 1382–1396.
go back to reference Sapirshtein, A., Sompolinsky, Y., & Zohar, A. (2017). Optimal selfish mining strategies in Bitcoin. In J. Grossklags & B. Preneel (Eds.), Financial cryptography and data security. FC 2016. Lecture notes in computer science (Vol. 9603, pp. 515–532). Berlin: Springer. Sapirshtein, A., Sompolinsky, Y., & Zohar, A. (2017). Optimal selfish mining strategies in Bitcoin. In J. Grossklags & B. Preneel (Eds.), Financial cryptography and data security. FC 2016. Lecture notes in computer science (Vol. 9603, pp. 515–532). Berlin: Springer.
go back to reference Scott, W. R. (2014). Institutions and organizations: Ideas, interests, and identities (4th ed.). Los Angeles: Sage. Scott, W. R. (2014). Institutions and organizations: Ideas, interests, and identities (4th ed.). Los Angeles: Sage.
go back to reference Sperber, D., & Wilson, D. (1985). Relevance: Communication and cognition. Oxford: Blackwell. Sperber, D., & Wilson, D. (1985). Relevance: Communication and cognition. Oxford: Blackwell.
go back to reference Tosh, D. K., Shetty, S., Liang, X., Kamhoua, C. A., Kwiat, K. A., & Njilla, L. (2017). Security implications of blockchain cloud with analysis of block withholding attack. In 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), Madrid (pp. 458–467). https://doi.org/10.1109/CCGRID.2017.111 Tosh, D. K., Shetty, S., Liang, X., Kamhoua, C. A., Kwiat, K. A., & Njilla, L. (2017). Security implications of blockchain cloud with analysis of block withholding attack. In 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), Madrid (pp. 458–467). https://​doi.​org/​10.​1109/​CCGRID.​2017.​111
go back to reference Vargo, S. L., & Lusch, R. F. (2006). Service-dominant logic: What it is, what it is not, what it might be. In S. L. Vargo & R. F. Lusch (Eds.), The service-dominant logic of marketing: Dialog, debate, and directions (pp. 43–55). Armonk, NY: M. E. Sharpe. Vargo, S. L., & Lusch, R. F. (2006). Service-dominant logic: What it is, what it is not, what it might be. In S. L. Vargo & R. F. Lusch (Eds.), The service-dominant logic of marketing: Dialog, debate, and directions (pp. 43–55). Armonk, NY: M. E. Sharpe.
go back to reference Wang, W., Hoang, D. T., Hu, P., Xiong, Z., Niyato, D., Wang, P, Wen, Y, & Kim, D. I. (2019). A survey on consensus mechanisms and mining management in blockchain networks. ArXiv Preprint, 1–33. arXiv:1805.02707 Wang, W., Hoang, D. T., Hu, P., Xiong, Z., Niyato, D., Wang, P, Wen, Y, & Kim, D. I. (2019). A survey on consensus mechanisms and mining management in blockchain networks. ArXiv Preprint, 1–33. arXiv:1805.02707
go back to reference Werbach, K. (2018). The blockchain and the new architecture of trust. Cambridge, MA: MIT.CrossRef Werbach, K. (2018). The blockchain and the new architecture of trust. Cambridge, MA: MIT.CrossRef
go back to reference Wieland, H., Vargo, S., Akaka, M. A., & Barbeau, B. (2018). A unifying perspective for the technological, business model, and market aspects of innovation. In R. F. Lusch & S. L. Vargo (Eds.), Sage handbook on service dominant logic (pp. 508–521). London: Sage.CrossRef Wieland, H., Vargo, S., Akaka, M. A., & Barbeau, B. (2018). A unifying perspective for the technological, business model, and market aspects of innovation. In R. F. Lusch & S. L. Vargo (Eds.), Sage handbook on service dominant logic (pp. 508–521). London: Sage.CrossRef
Metadata
Title
Incentives to Engage Blockchain and Ecosystem Actors
Authors
Mohan Tanniru
Jianyu Niu
Chen Feng
Claudio Gottschalg Duque
Chang Lu
Harish Krishnan
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-54414-0_3

Premium Partner