Tutor Quora

ITC571 Emerging Technologies And Innovation

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

ITC571 Emerging Technologies And Innovation

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

ITC571 Emerging Technologies And Innovation

0 Download9 Pages / 2,130 Words

Course Code: ITC571
University: Charles Sturt University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Question:
Discuss about the ITC571 Emerging Technologies and Innovation. The concept of the cryptocurrency is that it is directly connected with the aspect of the electronic transaction which can be done between two users who interact with each other.
Answer:

Introduction 
In recent times there are many forms of technology which ae in the sector of the innovation. These innovations implementation are directly altering the view point of each of the organization (Sompolinsky, Lewenberg & Zohar, 2016). On the other hand, it can be stated that there are different types of competitive advantage that an organization can directly gain from the concept. The concept of the cryptocurrency is that it is directly connected with the aspect of the electronic transaction which can be done between two users who interact with each other.
The main focus point of the report is to indulge into different aspects which is linked to the concept of the cryptocurrency working of the technology can be directly be enhanced with the working of the concept. The main risk factors which can be included into the working and the mitigation plan which is related to the concept is directly stated in the report.
Research problem overview
The sector indulging into the research problem overview are stated below:

Price manipulation:the sectors which are important in the concept can be the extreme volatility which is excessive. The price which is related to the cryptocurrencies on the platform of exchange can be stated to rise and fall dramatically over a time span which is very short (Narayanan et al., 2016). It can hamper the overall involvement of the technology is related to the interaction of the users in the working of the technology.
Activity of the cybercriminals:The concept of the cryptocurrency can be stated to be one of the sector in which is attackers indulge their direct interest (Cooper et al., 2017) It can be stated that there are high number relating to the profile of the hackers of the cryptocurrency which directly heists in the sector of the resulted in the millions of dollars being directly stolen.
Lack of uniformity in price:The concept which is related to the commodity and assets can be stated to be an essential part. The main problem which is related to the concept can be seen in the sector of the price of the cryptocurrency which can vary considerable in the sector of the different platform which is related to the concept of the exchange.
Transaction delay:In the sector of the cryptocurrency market it can be stated that it is directly plagued with a litany of delay across almost most of the transactions. It can be stated here that from the aspect of the trading account there are different sequences which should be followed (Park et al., 2015). These aspects can be considered to be very much time consuming. The issue which is related to the aspect of the scalability is also identified in the sector of the implementation of the technology.

Application of technology
The domain of the cryptocurrency block chain technology is playing a dominating role in the technological implementation. In most of the cases it can be stated that the application of the technology is a single version relating to the truth made very much possible by a secure time and time stamped ledger which directly copes the factor which is related to multiple parties. The application or the implementation of the technology secures the data and the transactions which are linked to the previous on (Oh & Nguyen, 2018). This aspect is very much beneficial in the sector of the changing the older records without having the concern which is relate to the changing the ones which are subsequent.
About technology
The technology which is related to the concept of the Cryptocurrency is based on the concept of the block chain. The main application which is related to the technology may be considered in the field of the two entity to send different types of money related aspect over the network or platform which is very much secured without the aspect of revealing the identity of the person engaged in the sector of communicating. In the concept it can be stated that there is no need for the transaction to be verified from the end of the third party (Anderson, J. C. (2018). At the end of the inception it can be stated that the main aim of the technology was the sanction, enable and the concept of the cryptocurrency register transfer.
In main concern area which is related to the concept can be seen in the sector of the security and safety of the technology. One of the implementation which can be stated here is that both the parties who would be engaged in the concept of the fund transfer hold two keys to the vault which is related to the private and the public key (Kim et al., 2016). The vault can directly open if both of the parties agree on the use of the key after they see that they are authenticated users who can access the data.
Research issue and challenges
In the domain of the working of the cryptocurrency there are different issue and challenges which are majorly faced within the working of the concept. The important sector which should be focused is the spending which is related to double spending. It can be stated as a technique which is related to the fraudulent activity which can be related to the concept of the spending the same mount twice.
The network which is related to the concept of the cryptocurrency is based on the concept of the absolute consensus relating to all the participants relating to the legitimacy of the transaction and the balances. If the different nodes which are present in the network does not agree on the single balance the system would be directly resulting in the concept of the breakdown. On the other hand, it can be stated that there are many rules which are predefined and directly programmer into the network that directly prevent this concept from happening.
Related work
One of the aspect which can be related to the work mainly focus on the aspect of generation of a security mechanism which would be securing the data which would be saved in the concept. It can be stated here that since there is more than one node which is related to the running of the network one would have to gain direct access control mechanism relating to more than half of them.
Proposed solution to resolve the research issue
In the context of every transaction it ca be stated that there is always a file which consist of the recipient and senders public key which is known as the public key and the amount of coin which is transferred. It can be stated here that each of the transaction which is done in the context should be signed off by each of the senders with is with their public key (Fry & Cheah, 2016). This concept can be related to the concept of the basic cryptographic function. After the process is conducted the transaction is put over to the concept of the network but it needs to be confirmed before the actual implementation of the process.
In the network which is related to the cryptocurrency, only the miners can directly confirm the transaction by means of solving the cryptographic puzzle. They directly engage into the concept and make them very much legitimate and make them spread across the different network. after this sequence every node which is related to the network adds itself to the database (Li & Wang, 2017). It can be stated that once the transaction is directly confirmed it directly becomes irreversible and unforgeable and a miner reward plus the fees which is related to the transaction.
Experimental analysis
The main judgment relating to experimental analysis can be stated to be one of the factor which is related to the proper working of the concept (Wustrow & VanderSloot, 2016). The overall transaction in the process would be initiated and how it would be helping in the sector of the removing all the problem which is related to the concept. The main sector of implementation in the sector is the cryptography and the securing of the data which would be involved into the operation.
Conclusion
The report can be concluded on a note that there is different section of technologic implementation which can be done in the concept of the Cryptocurrency. As majorly discussed in the report it can be seen that it is one of the most important sector which should be given top most priority and majorly include division of security mechanism into the concept of the working. The sector of the Cryptocurrency can be considered as a technology which is at the section of research and it can be stated that in the future the technology would be playing a more dominating role.
Recommendation
Recommendation 1: In the system the security of the data which would be prevailing in the system should be secured so that the system should be secured from different activity relating to the intruders. There should be installation of firewall in the network access area so that there are no problem relating to data breaches which are seen within the working of the concept.
Recommendation 2: The users who would be interacting in the system or linked in the sector of the exchange of the fund should be legitimate users. The section of the authentication can be considered to be very much important in the sector of the working of the concept. Authentication can directly help in the sector of the security of the data which would be included into the system
Recommendation 3: The monitoring of the system should be done in a proper manner so that
any problem seen in the sector can be mitigated which would be maintaining the integrity of the
system. The schedule which is related to the monitoring can be stated to be very much important
in the sector of working of the technology.
Recommendation 4: Controlling of the system can be stated as one of the major reated to the implementation of the technology in the different domain it can be directly be related to the concept. Every use case which is related to the concept should be taken into consideration so that there is no security issue involved into the working of the technology. Controlling can be done in various types of implementation details so that it directly does not impact the overall working of the organization.
References
Abraham, I., Malkhi, D., Nayak, K., Ren, L., & Spiegelman, A. (2016). Solidus: An incentive-compatible cryptocurrency based on permissionless byzantine consensus. CoRR, abs/1612.02916.
Anderson, J. C. (2018). Cryptocurrency: Advanced Strategies and Techniques to Learn and Understand the World of Cryptocurrency.
Cocco, L., Concas, G., & Marchesi, M. (2017). Using an artificial financial market for studying a cryptocurrency market. Journal of Economic Interaction and Coordination, 12(2), 345-365.
Cooper, J., Morris, C., Marks, S., Daniel, R., Kiyoko, H., & Emerson, M. (2017). Blockchain and Cryptocurrency Mega Bundle-6 Manuscripts in 1 Book: This Box Set includes books on Blockchain, Investing in Bitcoin, Ethereum and other Cryptocurrencies, and much more!.
Delmolino, K., Arnett, M., Kosba, A., Miller, A., & Shi, E. (2016, February). Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In International Conference on Financial Cryptography and Data Security (pp. 79-94). Springer, Berlin, Heidelberg.
Fry, J., & Cheah, E. T. (2016). Negative bubbles and shocks in cryptocurrency markets. International Review of Financial Analysis, 47, 343-352.
Gandal, N., & Halaburda, H. (2014). Competition in the cryptocurrency market.
Gandal, N., & Halaburda, H. (2016). Can we predict the winner in a market with network effects? Competition in cryptocurrency market. Games, 7(3), 16.
Kim, Y. B., Kim, J. G., Kim, W., Im, J. H., Kim, T. H., Kang, S. J., & Kim, C. H. (2016). Predicting fluctuations in cryptocurrency transactions based on user comments and replies. PloS one, 11(8), e0161197.
Li, X., & Wang, C. A. (2017). The technology and economic determinants of cryptocurrency exchange rates: The case of Bitcoin. Decision Support Systems, 95, 49-60.
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press.
Oh, J. H., & Nguyen, K. (2018). The Growing Role of Cryptocurrency: What Does It Mean for Central Banks and Governments? 25(1), 33-55.
Park, S., Pietrzak, K., Alwen, J., Fuchsbauer, G., & Gazi, P. (2015). Spacecoin: A cryptocurrency based on proofs of space(Vol. 528). IACR Cryptology ePrint Archive 2015.
Partanen, C. (2018). The viability of cryptocurrency in relation to the response of financial institutions and governments.
Sompolinsky, Y., Lewenberg, Y., & Zohar, A. (2016). SPECTRE: A Fast and Scalable Cryptocurrency Protocol. IACR Cryptology ePrint Archive, 2016, 1159.
Thelwall, M. (2017). Can social news websites pay for content and curation? The SteemIt cryptocurrency model. Journal of Information Science, 0165551517748290.
Wustrow, E., & VanderSloot, B. (2016, August). DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work. In WOOT.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 9 pages

PAY 6 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2020). Emerging Technologies And Innovation. Retrieved from https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/research-issue-and-challenges.html.

“Emerging Technologies And Innovation.” My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/research-issue-and-challenges.html.

My Assignment Help (2020) Emerging Technologies And Innovation [Online]. Available from: https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/research-issue-and-challenges.html[Accessed 18 December 2021].

My Assignment Help. ‘Emerging Technologies And Innovation’ (My Assignment Help, 2020) accessed 18 December 2021.

My Assignment Help. Emerging Technologies And Innovation [Internet]. My Assignment Help. 2020 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/research-issue-and-challenges.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

Myassignmenthelp.com is devoted to raising students study skills. We provide ideal paper help for this purpose on 100+ subjects. In all the fields of research paper drafting we assist you. We help create research paper cover page, research paper outline, etc. Our doctoral specialists assist learners learn how to write a research paper from scratch and how to revise the literature.

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

11174 Introduction To Management

Free Samples 11174 Introduction To Management .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} 11174 Introduction

Read More »