influencing characteristics of crypto-currency adoption
TRANSCRIPT
INFLUENCING CHARACTERISTICS OF CRYPTO-CURRENCY ADOPTION
THESIS
Submitted in Partial Fulfillment of
the Requirements for
the Degree of
MASTER OF SCIENCE (Management of Technology)
at the
NEW YORK UNIVERSITY
POLYTECHNIC SCHOOL OF ENGINEERING
by!
Esia Yosupov!
May 2015
iii
ABSTRACT
INFLUENCING CHARACTERISTICS OF CRYPTO-CURRENCY ADOPTION
by
Esia Yosupov
Advisor: Prof. Nasir Memon, Ph.D.
Co-Advisor: Prof. Joseph Stanley Nadan, Ph.D.
Submitted in Partial Fulfillment of the Requirements for
the Degree of Master of Science (Management of Technology)
May 2015
!
Crypto-currencies (or digital currencies) have gained popularity in the recent few years,
considering its young existence of six years. Crypto-currencies are simply enabling means to
transact in the virtual space globally without the need of intermediaries and third parties. It is
built on the “Blockchain” technology, which provides an innovative means of transfer. This
paper investigates crypto-currencies, its underlying technology, and the motivation of its
development and adoption. It further takes the next step in evaluating consumer’s mindsets
around crypto-currencies utilizing the patented IdeaMap® and RDE methods to identify the
most influencing characteristics of crypto-currencies. Three distinct segments were
identified, where each segment is concerned with discrete elements involving cost, privacy,
and accessibility. It concludes that the creation of new services and applications will drive
widespread adoption of digital currencies.
iv
Table of Contents
1. Introduction ...................................................................................................................... 1
1.1 Background ...................................................................................................................... 2
1.2 Problem Statement ........................................................................................................... 3
1.3 Research Questions .......................................................................................................... 4
1.4 Proposed Hypothesis ........................................................................................................ 4
2. Literature Review ............................................................................................................ 5
2.1 Crypto-currencies ............................................................................................................. 5
2.1.1 Technical ................................................................................................................... 5
2.1.2 Acceptance and development ..................................................................................... 6
2.1.3 Regulations ................................................................................................................ 7
2.2 Market Research .............................................................................................................. 7
2.3 Mind Genomics .............................................................................................................. 11
3. Research Methodology .................................................................................................. 15
3.1 Experimental Design by Mind Genomics ...................................................................... 15
4. Understanding crypto-currencies ................................................................................. 22
4.1 What is a crypto-currency? ............................................................................................ 22
4.1.1 Types of crypto-currencies ...................................................................................... 22
4.1.2 The Current state of crypto-currencies ................................................................... 23
4.2 Technological Innovation: Blockchain .......................................................................... 25
4.2.1 The Distributed Ledger ............................................................................................ 25
4.2.2 Bitcoin Blockchain Mechanism ............................................................................... 27
4.2.3 Transactions on the Blockchain .............................................................................. 30
4.3 Advantages ..................................................................................................................... 34
4.3.1 Payment strategy ..................................................................................................... 34
4.3.2 Lower or Zero Costs ................................................................................................ 34
4.3.3 New Classes of Payment .......................................................................................... 35
4.3.4 Processing Times ..................................................................................................... 36
4.3.5 Cross Border ............................................................................................................ 36
v
4.3.6 Security .................................................................................................................... 36
4.3.7 Privacy ..................................................................................................................... 36
4.3.8 Transparency ........................................................................................................... 37
4.3.9 Accessibility ............................................................................................................. 37
4.4 Challenges ...................................................................................................................... 39
4.4.1 Regulations .............................................................................................................. 39
4.4.2 Crime risks ............................................................................................................... 42
4.4.3 Risk to Users ............................................................................................................ 43
4.5 The Blockchain: Beyond Payment System .................................................................... 44
4.5.1 Smart contracts ........................................................................................................ 46
4.5.2 Property Title ........................................................................................................... 47
5. Experimental Results ..................................................................................................... 49
5.1 Total Sample Preferred Element Order (TSPEO) .......................................................... 49
5.2 Profile Preferred Element Order (PPEO) ....................................................................... 52
5.3 Segments Preferred Element Order (SPEO) .................................................................. 55
5.4 Discussion ...................................................................................................................... 60
5.5 Contribution ................................................................................................................... 61
5.6 Result implications: Market opportunities ..................................................................... 63
6. Final Remarks ................................................................................................................ 66
6.1 Conclusion ..................................................................................................................... 66
6.2 Limitations ..................................................................................................................... 68
6.3 Further Research ............................................................................................................ 68
7. Bibliography ................................................................................................................... 69
8. Appendices ...................................................................................................................... 74
vi
Table of Figures
FIGURE 1 – BASIC APPROACH TO THE MIND GENOME .............................................................. 12
FIGURE 2 – HIGH-LEVEL STEPS OF THE EXPERIMENTAL DESIGN PROCESS ............................... 15
FIGURE 3 – THE “WELCOME” SCREEN OF THE TEST STIMULI .................................................... 18
FIGURE 4 – THREE ELEMENTS VIGNETTE, AND THE RATING SCALE ........................................ 20
FIGURE 5 –KEY METRICS BITCOIN ADOPTION OF 2015 COMPARED WITH YEAR 2014 .............. 24
FIGURE 6 – WORLD MAP OF THE DECENTRALIZED BITCOIN NETWORK ................................... 26
FIGURE 7 – A GENERAL WORKFLOW OF THE BITCOIN BLOCKCHAIN PROCESS ........................ 29
FIGURE 8 – A STEP-BY-STEP OF THE BITCOIN TRANSACTION PROCESS ................................... 33
FIGURE 9 - A COMPARISON BETWEEN TRADITIONAL PAYMENT TRANSACTION AND BITCOIN . 35
FIGURE 10 – CRYPTO-CURRENCIES ATM WORLD MAP ........................................................... 38
FIGURE 11 – NUMBER OF BITCOIN ATMS BY CONTINENTS ..................................................... 38
FIGURE 12 – MOST COMMON CRYPTO-CURRENCY MALWARE BY FAMILY .............................. 42
FIGURE 13 – KEY EVENTS INFLUENCING BITCOIN PRICE IN YEAR 2014 ................................... 43
FIGURE 14 – BITCOIN VS. EARLY INTERNET VC INVESTMENTS ($ MILLIONS) .......................... 45
FIGURE 15 – THE ECOSYSTEM OF CRYPTO-CURRENCIES .......................................................... 48
vii
List of Tables
TABLE 1 - TWENTY CHARACTERISTICS OF A DIGITAL CURRENCY ............................................ 17
TABLE 2 – THE LEADING FIVE CRYPTO-CURRENCIES .............................................................. 23
TABLE 3 – TSPEO: TOTAL SAMPLE PREFERRED ELEMENTS ORDER ....................................... 51
TABLE 4 – TSPEO: TOTAL SAMPLE PREFERRED ELEMENT ORDER: FIVE TOP AND THE BOTTOM
ELEMENTS. .............................................................................................................. 52
TABLE 5 – S2PEO: SEGMENT TWO PREFERRED ELEMENT ORDER ........................................... 56
TABLE 6 – S1PEO: SEGMENT ONE PREFERRED ELEMENT ORDER ............................................ 57
TABLE 7 – S2FEO: SEGMENT TWO PREFERRED ELEMENT ORDER ............................................ 58
TABLE 8 – S3PEO: SEGMENT THREE PREFERRED ELEMENT ORDER ........................................ 59
TABLE 9 – PREFERRED MESSAGING FOR CUSTOMERS .............................................................. 62!!
List of Appendices
APPENDIX A – PARTICIPATES PROFILE QUESTIONS ................................................................. 74
APPENDIX B – STUDY PARTICIPANT’S PROFILE INFORMATION S. .............................................. 75
APPENDIX C – EXPERIMENTAL STUDY ON DIGITAL CURRENCIES – DATA RESULTS ................ 77 !
1
1. Introduction
According to David Andolfatto, vice president and head of research at the Federal
Reserve Bank of St. Louis, “Bitcoin has provided the breakthrough innovation” (Andolfatto,
2014). The same viewpoint shared by Marc Andreessen co-founder of Netscape, co-author of
Mosaic and Bitcoin investor, as; “Bitcoin gives us, for the first time, a way for one Internet
user to transfer a unique piece of digital property to another Internet user, such that the
transfer is guaranteed to be safe and secure, everyone knows that the transfer has taken
place, and nobody can challenge the legitimacy of the transfer. The consequences of this
breakthrough are hard to overstate” (Andreesen, 2014). The motivation behind the
statements of David and Marc is the introduction of “a peer to peer electronic cash system …
based on cryptographic proof instead of trust.” (Satoshi, 2008).
The fundamental innovation in crypto-currencies is the subordinate technology (the
ledger) that empowers trust-less transactions without the need of an intermediary. For each
exchange system to exist there must be trust between two sides. Today, we can make online
transactions in light of the fact that we trust banks and organizations like PayPal.
Nonetheless, fraud issues and compromise of personal information on the web has been
initiated to reexamine existing models (Ali, Barrdear, Clews, & Southgate, 2014).
Exiting models are referred to the payment systems used in modern economies today,
which has not significantly changed from the early monetary system of the 16th century. The
development of technology, allowed ledgers to operate more efficiently (such as converting
paper notes to digital notes), however the structural, centralized payment system has
continued as and still holds the fundamentals from those roots (Ali, Barrdear, Clews, &
Southgate, 2014). While a great part of the emphasis on virtual currencies has been
coordinated at their ability to substitute or supplement fiat currencies, there is a developing
view that the real innovation is the decentralized ledger of transactions called the
“Blockchain”. Proponents of Blockchain technology believe that this system could have far-
reaching impacts on the wider industries and applications (Long, Lee, Steiner, Wood, &
Handler, 2015).
The protocol of Blockchain describes how to keep a public ledger of transactions
considering a protected and secure approach to exchange distinct bit of digital property
2
starting with one client then onto the next: everybody realizes that the exchange has occurred
and no one can challenge its legitimacy. The protocol is a major disruptive creation and can
possibly supplant any central handling power with a decentralized distributed
cryptographically secure equivalent, enhancing proficiency and versatility (Swan, 2015).
1.1 Background The idea of crypto-currencies or virtual currencies has been an alluring idea dating as
far back as the late 20th century. Groups were keen on accomplishing privacy and libertarian
goals by utilizing cryptography (Grinberg, 2011). David Chaum, in the 1980s, had acquired
various digital currency licenses identified with guaranteeing anonymity and privacy utilizing
cryptography, presented the first “untraceable payments” protocol in 1983. As he stated in
the paper “A new kind of cryptography, blind signatures … it allows realization of
untraceable payments systems which offer improved auditability and control compared to
current systems, while at the same time offering increased personal privacy” (Chaum, 1998).
All through the 1990s, numerous variations of the Chaum’s unique plan were
acquainted. For example, Digital Cash (DigiCash) attempted to bring electronic money
protocol into practice. In any case, DigiCash, that went bankrupt in 1998, as an after effect of
poor administration and unsuccessful deals. Essentially, clients ended up having no second
thoughts about entering credit card information online (Grigg, 1999).
In 1998, another protocol was proposed, a digital, circulated, unknown currency
called “b-money” that would permit “untraceable pseudonymous entities to cooperate with
each other more efficiently, by providing them with a medium of exchange and a method of
enforcing contracts…” (Wei, 1999). But practically speaking the protocol was impractical
and could not be executed (Grinberg, 2011).
Every new plan expected to remove the bank as an essential body in controlling
online purchases for cost, and privacy advantages. However, a few plans did not work, others
have fallen under design faults primarily because of lack of trust1 in transactions. Other
different reasons incorporated a mix of administrative inadequacy and questionable
lawfulness ( Hughes, Middlebrook, & Broox, 2007). Indeed, even today, there are virtual
1 Referred to the double spending problem in conducting online transactions. Banks or third parties play a role is verifying that the money is not spend previously.
3
currencies accessible on the Internet, for example, Pecuin, e-gold, Linden dollars and even
Facebook credits, however none of those virtual currencies are successful or gained mass
adoption (Grinberg, 2011).
As one can see Bitcoin is not the first private money, not the first digital currency,
and not the first currency in view of cryptography, but rather it has been the first to depend
on distributed, decentralized system to solve the double spending problem while at the same
time utilizing the lessons adapted by the past experiments. It was proposed by Nakamoto in
2008 and released as open source code the accompanying year (Satoshi, 2008).
1.2 Problem Statement Crypto-currencies have gained a lot of attention in the recent years. It introduces a
technology that is new and considerably disruptive, but there is a relatively limited research
done in the topic. The future of crypto-currencies is unclear nevertheless it is a fast changing,
still developing, environment. As we write this paper, there are still new developments and
changes affecting positively the crypto-currencies ecosystem.
Crypto-currencies has been existent for six years, however there is a growing public
concerns with what this technology entails, and how it can be used, and what are the
motivation for adopting and developing it.
4
1.3 Research Questions The discussion above leads towards the question of our research in this paper:
What are the features of crypto-currencies influencing its adoption?
In order to answer the key research question we defined sub research questions:
• Sub Research Question 1: What are crypto-currencies and its underline technology?
• Sub Research Question 2: What are the benefits and the risks associated with the
development and adoption of crypto-currencies?
1.4 Proposed Hypothesis Proposed hypothesis to examine are:
Hypothesis 1: Adoption of crypto-currencies involves the benefits of cost, privacy and
security.
Hypothesis 2: Lack of consumer protection is a barrier to mass adoption of crypto-currencies.
5
2. Literature Review
2.1 Crypto-currencies Given the fact that crypto-currencies has been in existence for about six years, there is
little scholastic research available on the subject. It is only in the recent years, the subject
attracted scholars and researchers to investigate this phenomenon. Because of its premature
age, there is limited data available to analyze crypto-currencies. Most exchanges platforms of
crypto-currencies and fiat money has been established just in year 2010. Scholastic sources
resulted for the most part in articles identified with technology, regulation, and social
implications of early use of Bitcoin and other related crypto-currencies.
The most relevant articles were chosen in view of the relevance of the material
identified with the exploration inquiries of this postulation. Literature on the subject of
crypto-currencies can be grouped under three subjects. The primary subject spins around the
technicality of crypto-currencies, which basically concentrates on portraying its innovative
viewpoints. The second subject incorporates economic literature of crypto-currencies focuses
on financial incentives and its role of money. Finally, the third subject incorporates
regulations and laws in development and acknowledgement of crypto-currencies.
2.1.1 Technical Dominant part of exploration in crypto-currencies spins around its technical details.
Numerous research papers mean to study the workings behind crypto-currencies. The basics
of crypto-currencies are the fundamentals of cryptography. (Babaioff, Oren , Zohar , &
Shahar, 2011) found that there is a fundamental issue with the miming process rewards in the
Bitcoin Protocol. They suggest an improved design for the Bitcoin protocol to eliminate the
problem. Researchers have additionally examined the security and privacy of crypto-
currencies exchanges. (Moore & Nicolas, 2013) research resulted with a high risk of
breaking security of crypto-currency exchange platforms. Another issue concerning its
technicality is in the pre-mining procedure where first miners may gain high rewards when a
new crypto-currency is released to the public.
6
(Ali, Barrdear, Clews, & Southgate, 2014) suggests that key innovation of digital
currencies is the Blockchain technology, which permits electronic payments to operate within
a completely de-centralized system, with no intermediaries such as banks.
2.1.2 Acceptance and development The acknowledgement of crypto-currencies was investigated by (Luther , 2013)
assumed that the low acknowledgement of crypto-currencies is due to the absence of a
massive economic dependability and government support. In his report, Luther looks for
explanations why crypto-currencies such as Bitcoin hasn’t acquired an intensive adoption,
reasoning in low network effects and high switching costs from conventional financial
systems to crypto-currency. He actually conveys that crypto-currencies, like Bitcoin, will not
probably to achieve wide acceptance without the “significant income connected
precariousness or government help” (Luther , 2013).
Interestingly, one can likewise hope to measure up the acknowledgement of digital
currency to prior comparable systems, and observe that it has really been extremely
successful. (Barber, Boyen, Shi, & Uz, 2012) argued this point of view and compared Bitcoin
with other e-money schemes. They discover numerous ways in which Bitcoin is by far
superior to past systems. The most significant factor is to incentivize users to join in the
Bitcoin network. Also, they argue that the design of Bitcoin is not impeccable and has
weaknesses and flaws. It concludes that if executed effectively, “the core design could
support a robust decentralized currency” (Barber, Boyen, Shi, & Uz, 2012).
Similarly (Maurer, Nelms, & Swartz, 2013) take a glance at the favorable
circumstances of Bitcoin from social semiotics angle, characterizing Bitcoin as “practical
materialism” and suggests that its anonymity, low exchange costs and decentralized design
replays raises debates.
Other papers surrounding the acceptance and development investigate whether digital
currencies can fulfill the properties of fiat money, and to what degree it can disrupt or
compliment current financial establishments (Lo & Wang, 2014). (Lazcano, 2013) came up
with yet another exciting viewpoint of economic growth and explains what sort of contour
banking market has considered numerous economic inventions that whatsoever keeps of the
economic world has later grasped. It's probable to label Bitcoin to be a product of contour
banking because it’s a program that operates beyond official economic system. Such style,
7
Bitcoin might probably portray such an innovation that legal financial system will welcome
in some form in future.
2.1.3 Regulations Because of criminal interest and money laundering linked with Bitcoin, it had pulled
in lot of negative media. Subsequently, administrative and legitimate bodies noting to
investigate the risks digital currencies may impose. A few nations have cautioned against the
utilization of crypto-currencies. Others have taken substantial administrative measures to
discourage end users.
Governments attempt to address consumers’ protection in using crypto-currencies.
They likewise revise current laws and regulations that may officially cover digital currencies
and caution against posing limiting laws on digital currencies that could restrict the new
technology before it has an opportunity to develop. What’s more, they give a few suggestions
about how to treat digital currencies going forward (Brito & Castillo, 2013).
(Lee , Long, McRae, & Handler, 2015) discusses Bitcoin noticing its growing value
and proposing a few factors behind its success. Furthermore Bitcoin is compared with other
e-trade currencies and gold-sponsored currencies. It recommends its decentralization and
ambiguity is in maturity of its development. One illustration of financial instability citing end
users to utilize a system without an official endorsement is the instance of Swiss Dinar in
Iraq (Grinberg, 2011). For this situation, seemingly noteworthy financial insecurity was the
cause behind consumers to utilize money that was formally surrendered and did not have any
natural value. Then again, it is significant to recollect that on account of Swiss Dinar, it was
the earlier system that individuals were willing to utilize, making such move to Bitcoin
unusual in the event of fiscal instability.
2.2 Market Research Marketing research is outlined as the systematic gathering and analysis of marketing-
related data to produce information that can be used in making decisions (Kotler & Keller,
2011). Research needs adhering to a scientific series of measures, which will generate
reliable and valid knowledge. Through analysis and model, the information is altered into
appropriate knowledge for the purpose of decision-making functions.
8
Considering crypto-currencies as not simply a traditional product, it is a product that
thought to be high tech. considering the Technology Adoption Life Cycle that classifies the
market and their reaction to an advanced product. Customers have an inclination to drop on
an axis of raising tenderness to risk. At first outlined by (Rogers, 2003), consumers belong to
one among five easy classifications: innovators, early adopters, early majority, late majority
or laggards. Geoffrey Moore, in his book Crossing the Chasm, proposes an alternate of the
initial Technology Adoption Lifecycle. He shows that for discontinuous or disruptive
inventions, there is a chasm or gap between the primary two groups: innovators and early
adopters to the early and the late majority. It is within the chasm that services and application
fail. As suggested by Moore, the technology adoption life cycle itself is nonlinear with
periods of slow growth followed by speedy growth (Moore G. A., Crossing the Chasm,
2006). Complicated systems should be studied holistically with specific attention to the
affiliation and adaptation between system parts (Moore G. A., Inside the Tornado, 2005).
How market research is completed nowadays on high tech?
Businesses have historically committed to massive analysis and development
departments to drive innovation and provide sustainable growth. That product, however, is
eroding thanks to variety of factors. What is rising is basically a lot of open product,
wherever corporations perceive that not whole all wonderful many concepts ought to are
available the firm on and not whole all wonderful many concepts developed among the
organization may well be properly sold-out internally (Chesbrough & Crowther, 2006).
The first decades of selling analysis dedicated to sorts of sampling, collecting data
and systematic techniques. Researchers additionally dedicated to approaches to live strategies
like for example concepts, perceptions, tastes, attitudes, personalities and lifestyles.
The time of the Seventies and Nineteen Eighties is sometimes called the golden era of market
research. Throughout this point research strategies turned a lot of scientific. Computing
power created getting and examining data quicker, easier, cheaper, and more accurate.
Businesses spent substantial resources into research to understand the market, the client, and
the deciding process. Analysis study results became the support or explanation for selecting
specific tactic methods and strategies (SagePub).
9
Through the late Nineteen Nineties and early 2000s a cultural shift in research started
at first to occur. Decision makers required considerably quite support for promoting
decisions. They wished promoting researchers to supply concepts in to what the data meant.
Just explaining potential areas, traits of customers, and the selection method was no
additional adequate. Decision makers required concepts in to why specific potentialities were
created by customers and the way the results of a research study will offer an improved data
of the best strategies and ways.
Now a days, starting to enter still another, newer phase of selling analysis the
informatory phase. Simply providing concepts could no additional be enough. Managers
need promoting researchers to be space of the choice, to supply feedback and approach into
promoting selections (SagePub).
Literature within the market research in crypto-currencies was reviewed. As was
observed, research was conducted applying normal surveys to grasp what individuals believe
crypto-currencies are. Numerous surveys directed by Central banks, consulting firms,
government and reputed specializing crypto-currencies news sites such as coindesk.com and
bitcointalk.com expected to uncover what the extensive population think about crypto-
currencies and its difficulties to adoption.
Juniper Research was the first effort to conduct market research by reviewing the
future of crypto-currencies, searching for market trends and competitive landscape. Juniper
Research was the primary business to analyze and to measure the activities and potentialities
within the fast-moving crypto-currency area (Juniper Research, 2015). It concluded positive
concepts for the following five years.
Banks have accomplished amount of surveys. The Canada’s Central bank has written
an operating paper that has discovered little proof that arbitrage prospects in crypto-currency
areas exist (Gandal & Halaburda, 2014). The Commonwealth of Massachusetts Section of
Banks conducted a consumer survey that assesses the buyer Attitudes on Bitcoin and
different electronic currencies (Commonwealth of Massachusetts Division of Banks, 2014).
Consulting corporations such as Accenture reviewed consumer selection can form the
continued way forward for funds, surveying North America payment clients (Accenture,
2014). PwC, client intelligence in press and entertainment, has explored Bitcoin risks, and
benefits in the media (PwC, 2014). Coin Center, a non-profit analysis and support category
10
has released data from a five-month survey uncovering how well the American people know
and understand Bitcoins (Coin Center, 2015). Lastly, the most recent survey concluded that
8% of business would accept Bitcoin in next twelve months (Perez, 2015).
To get a more in-depth understanding of the creation of crypto-currencies, this paper
examines the technology of crypto-currencies from the innovative product perspective. We
are attempting to help partners to comprehend adoption of crypto-currencies from product
point of view. We intend to analyze the particular attributes of crypto-currencies impacting
wide adoption. To the author’s knowledge, this approach hasn’t been taken before.
11
2.3 Mind Genomics Mind genomics is a market research methodology designed to systematically map end
users’ observations and inclinations. The approach is to identify a little subset of grouping
messages that takes into consideration by a significant and frugal category of new populace
into example based segments to accomplish better focusing on (Moskowitz H. , Gofman,
Beckley, & Ashman, 2006).
Basically, it is an inductive approach plans to better see how individuals respond to
diverse ideas. As individuals are inalienably quite different from one another, they sort out
and react to ordinary encounters, in an unexpected way. Mind genomics is frequently
depicted as “the experimental exploration of the everyday” on the grounds that it recognizes
what sort of messages interests consumers. Those messages then used to identify recently
gathered segments of mindsets. The “mindset” just speaks to set of thoughts, which portrays
the way individuals consider a specific service or product. “Genome” is utilized as a
metaphor; the Mind Genome is expressed as a set of thoughts that “move together”
(Moskowitz H. , Gofman, Beckley, & Ashman, 2006).
The exploration of Mind Genomics joins the science of genomics and the technology
of informatics. Its premise is determined in a formal and organized way utilizing four
standards: Stimulus–response (from experimental brain science), Conjoint investigation
(from customer examination and insights), Internet-based testing (from marketing
exploration), and various tests to identify examples of mind-sets (designed after genomics).
Practically speaking, the system for Mind Genomic can be utilized to build new,
innovation thoughts in business applications. Mind Genomics provides with actionable
results. In the book of “Selling Blue elephants”, the writers express a test of making new
services and items that regularly consumers cannot verbalize precisely what they need, aspire
to, or like. Hence, identifying and experimentally investigating the components that could
drive consumer’s enthusiasm utilizing systematically designed models and join highlights
into the best possible mixes. This methodology is known as the Rule Developing
Experimentation (RDE). The experimental configuration of Mind Genomics based, on RDE,
involved seven stages (Moskowitz & Gofman, 2007):
12
Step 1: Raw material, characterize the problem: thoroughly considering the problem
and identifying gatherings of highlights
Step 2: Design the experiment utilizing these elements
Step 3: Gather customer responses to the models
Step 4: Analyze individual results
Step 5: Optimization
Step 6: Uncover attitudinal segments
Step 7: Generate principles to make new items
The outcome is significant standards (bearings) for managed upper hand and having the
capacity to know the variable based on the math of consumers’ minds before they can even
comprehensible the need. The general fundamental approach to the Mind Genome is shown
in Figure 1 (Moskowitz H. , 2014)
Figure 1 - Basic approach to the Mind Genome
Groundwork)of)Mind)Genomics)
The premise of Mind Genomics is conjoint analysis, which is a key tool to
comprehend and organize characters in marketing. The science of Mind Genomics was
presented in 2005, however the thought of Mind Genomics began in a paper by (Moskowitz
H. , Gofman, Itty, Katz, Manchaiah, & Ma, 2001) fifteen years prior. Since then, it has been
13
broadly surveyed, with case histories, in a book expounded on ten years back (Moskowitz,
Porretta & Silcher, 2005). Its originator, Dr. Howard R. Moskowitz, is a surely understood
experimental clinician in the field of psychophysics and a designer of world-class market
research technology. Among many others, he had received the Sigma Xi’s 2010 Walston
Chubb Award for Innovation. His work generally distributed in the exploratory press (20
books and more than 300 logical articles), he is referred to worldwide as the main
mastermind and inventor of cutting edge research technology in the region of new product
and idea development (Walston Chubb Award, 2010).
The scholarly legacy of Mind Genomics gets from the spearheading work of analysts,
managing the outline of experiments (Moskowitz & Gofman, 2007), and from the use of this
work called conjoint analysis. Conjoint analysis, is the quantitative structure, can be
diminished to a straightforward engaging articulation, to be specific the utilization of
experimental configuration to comprehend responses to thoughts by measuring responses to
mixtures of thoughts. Conjoint analysis utilizes experimental configuration, combining little
parts, creating blends, gaining subjective responses to those mixes, and afterward finding
what segments drive the responses (Moskowitz & Gofman, 2007).
Based on conjoint analysis, the study of Mind Genomics intends to make a collection
of information about how individuals react to the parts of an unpredictable boost. Then, it
creates databases that include product portrayals or situational “vignettes”. At surface level,
the science evaluates what is essential. At a more profound level, the science makes a
collection of learning that uncovers how individuals consider diverse themes, functioning
from responses to complex vignettes descending to all the more fine-grained granularity
concerning how particular segments contribute.
Mind Genomics contrasts from other exploration systems. Standard surveys exhibit
the elements to the respondents autonomously, in a straight, incoherent style, one element at
once, and trains respondent to rate that one element. Then again, Mind Genomics
experimental design gives significantly more capable results by examining how gatherings of
viewpoints “move together”. It consolidates distinctive elements into what called “vignettes”
(which are straightforward explanations of thoughts), requesting that respondents respond to
a mix of vignettes. It creates ideas that can be than tried utilizing computer software
14
presentation of boosts and programmed investigation making it possible to reveal mind-set
segments quickly and effectively (Moskowitz H. , 2012).
The work of Mind Genomics is widely utilized as a part of diverse commercial
enterprises, for example, sustenance and technology and helps organizations worldwide to
optimize products, informing and illustrations plan. Its real customers (recorded on its site)
are Samsung, Coca-Cola. One demonstrated example of overcoming adversity utilizing this
methodology can be seen by the account of Hewlett-Packard (HP) that utilized the RDE
technique to test and optimize new ideas among focused on consumers. RDE studies yield
the advantage of extra buyer bits of knowledge and division opportunities (Moskowitz &
Gofman, 2007).
15
3. Research Methodology
3.1 Experimental Design by Mind Genomics The Experimental design by Mind Genomics was found to be a successful technique
in identifying functional use of information and bits of knowledge to make better products,
applications and services. The technics utilized in this analysis is to use the study of Mind
Genomics. Our aim is to assess the strongest perspectives (i.e., traits or qualities) that will
influence consumers (diverse partners) to utilize a digital currency. Figure 2 shows the
experimental design process.
Figure 2 - High-level steps of the Experimental Design Process
Experimental)Design)Steps)
The experimental investigation of the everyday is applied to the technology of digital
currencies. The destinations are to find the strongest characteristics of a digital currency, and
additionally the weakest traits of a digital currency and to identify 2 to 3 segments that are
like-minded.
)
)
16
Step)1)–)Design)Silos)and)Elements)))
The principal venture of Mind Genomics study starts with raw material. Silos are the
classifications of the product or its experience. Elements are statements that portray the silos.
The stimuli falls into four silos, every silo contains five elements. The silo portrays a general
thought though the elements are the particular instantiations of the general thought. Elements
were not picked randomly but instead created by a structured technique, first identifying
classes and then elements at which accredited to the classifications picked. The four silos
identified with the digital currency experience were distinguished as the following: 1)
Features of Digital Currency 2) Ease of Use 3) Cost 4) Security and Privacy. The elements
are communicated in straightforward definitive articulations mode. The revelatory
articulations are composed in non-specialized terms so any customer can comprehend it.
Table 1 shows each of the four silos and its five elements.
Design)size)considerations)
Preferably, the experiment is developed by 6X6 configuration; six silos with six
relating elements. Totaling in 36 elements, prompting 48 vignettes (or ideas). The length of
time of finishing the experiment of 6X6 configuration is more or less 15 - 20 minutes. The
ideal design for our purpose is a 4X5 configuration. Totaling in 20 elements, prompting 30
vignettes, lessens the length of time around 8 to 10 minutes. It is recommended that lower
term have higher likelihood of respondents to finish the experiment.
The primary step is thought to be the most difficult part on the grounds that it obliges
domain expertise. It is suggested that IdeaMap® designed to end up more progressed through
repeated experimentation (Moskowitz & Gofman, 2007). We had the capacity qualify our
element development by giving a profound investigation of crypto-currencies, and consulting
with specialists in the area of cryptographic. Also, the advantages of crypto-currencies that
we identified were converted to element.
17
Table 1 - Twenty characteristics of a Digital Currency
Silo A: Features of Digital Currency A1 It is a decentralized network…not controlled by an individual or a company A2 Your account balance can be printed on a paper A3 Once payment is made you can’t “undo” it … it is not reversible or disputable A4 It can be used globally A5 Instantly transfer money or make a payment worldwide Silo B: Ease of Use B1 Easy to use … via an application on a smart-device or a computer B2 A human “teller” may convert your digital money to (from) cash B3 Most local ATMs worldwide accept this digital currency B4 More than 30% businesses worldwide now accept this digital money B5 Use this digital currency to make micro payments...as small as a penny Silo C: Cost C1 It is 50% cheaper for business owners to process this digital currency than a credit card C2 There is a negligible fee to convert this currency to any other digital currency or cash C3 Creating a digital “wallet” is as easy as downloading an app…no need for a special device or knowledge C4 People without a bank account may use this digital currency C5 The number of coins produced are limited ... the value may increase in the future Silo D: Security and Privacy D1 No identity theft…it doesn’t expose your personal information D2 This digital currency has a very strong mathematical algorithm…it has never been broken D3 This digital currency is insured … just like a credit card D4 Unlike cash…this digital currency is resistant to counterfeiting D5 Proof of a transaction is verified without involving a third party
Step)2)–)Design)a)Rating)Question)
The rating question that was formed is: Rating Question: “How would you value this
digital currency?” The rating was picked on a scale purpose of 1 to 9, where 1 is being the
slightest worth and 9 is being justified regardless of a considerable measure. The rating
question will be rehashed all through the whole experiment. We performed pretests before to
guarantee that it suits the distinctive elements that may show up on the screen. It is critical to
note that, generally, specialists utilization rating question on a level of likeability. Mind
Genomics on the other hand, utilizes the value that offers a higher significance instead of just
whether something is preferred or not.
)
18
Step)3)–)Prepare)a)“welcome”)page))
The welcome page is the first screen the respondents visit. It presents the point and
the reason for the study. It tells the respondent what the rating questions is, and highlights the
way that vignettes are unique in relation to one another despite the fact that they may show
up the same. Finally, it informs on the estimated length of time regarding the stimuli test, and
headings to start the study. Figure 3 demonstrates the welcome page that every respondent
will see on the screen once the study starts.
Figure 3 - The “welcome” screen of the Test Stimuli
Step)4)–)Prepare)Profile)questions))
Step 4 includes profile questions that were agreed to serve the speculation and
understanding our subjects better and know their experience. Appendix 1 shows the seven
questions that were included in the study.
Step)5)–)Invitation)Email))
We recognized two target groups for our experiment and designed a focused
invitation for every gathering. The primary gathering is the essential clients of the well-
19
known site Bitgazetteer.com serving in the area of crypto-currencies. The site offers clients
complete worldwide postings of businesses and services that acknowledge crypto-currencies,
accessible crypto-currencies ATMs, and postings distributed by clients. The gathering of
clients is effectively communicating with crypto-currencies, it is possible that they are
entrepreneurs involved with digital currencies or clients who are intrigued spending their
digital currency money. The second gathering that was distinguished is the dynamic
individuals in the crypto-currencies field, for example, new start-ups. Both invitations were
composed in a manner that welcomes cooperation and recommends the results may be to
their greatest advantage.
Running)the)Experiment)
The information from steps 1 through 5 was submitted to IdeaMap® suite2. The
online study was displayed to the members in the accompanying request: welcome screen, 30
screens of permutated element mixes with one rating question asked, 7 profile questions, and
a thank you screen. Every screen is alluded to an idea, shows a mix of elements, or vignettes,
which are made by experimental configuration. Vignettes are involved 2–4 elements; every
silo contributes a most extreme of one element to a vignette. The 20 elements are measurably
autonomous of one another. Figure 4 demonstrates an illustration of a 3-element Vignette,
and the rating question scale beneath. The vignette joins three elements, every focused, one
over the other, with no endeavor to join the elements in fitting syntactic structure. Thusly,
respondents have no problem perusing the four elements, and relegating a rating.
In practice, this configuration is simple for the respondent in light of the fact that the
thoughts are separated and focused. The respondent doesn’t need to chase through a thickly
worded section so as to locate the essential information. This approach of focusing the
element and disposing of connectives is a standard approach in conjoint investigation.
2 www.ideamap.net
20
Figure 4 - Three Elements Vignette, and the Rating Scale
After the respondent chooses the rating, the vignette and the rating scale change to be
trailed by the following vignette. The software project controls the whole process. The
respondent need not click additional keys to present the rating, making the process easier. At
long last, the system “permutes” the experimental configuration, so that every respondent
winds up assessing an extraordinary arrangement of mixes. The fundamental experimental
outline stays in place, however the change guarantees that the genuine blends vary starting
with one respondent then onto the next.
Explaining)the)rating)process)
Each member’s ratings are changed over into a parallel response. Ratings of 1–6 are
changed over to the value “0,” and ratings 7–9 are changed over to the worth “100.” Ratings
of 0 alluded to “idea rejecters”, ratings of 100 allude to “idea acceptors”. Aggregate of 30
ideas are exhibited to every member, if a rating given to one idea is 7-9 it is considered
acceptor, if 1-6 rating is given for another idea it is viewed as a “rejecter”. That is,
acceptance/rejecter is unexpected in response to an individual idea, not to the whole item.
21
The information for every member are liable to relapse displaying, which is
impeccably legitimate for these sorts of results as every member assessed 37 ideas set up
particularly to be analyzed by relapse demonstrating. The experimental outline guarantees
that each of the 20 elements are factually autonomous of every other. The model is a basic
and straightforward in an added substance mathematical statement structure:
Where is the additive constant (the expected value of the rating when elements 1 to 20 are
all 0), and , and are elements 1, 2 and 20, respectively. Each participant generates
his own additive model for the study in which he or she participated.
Rating = k0 + k1 +...+ k20
k0
k1 k2 k20
22
4. Understanding crypto-currencies
4.1 What is a crypto-currency? A large segment of the crypto-currencies today relay on a decentralized digital
currency system, utilizes at a distributed information structure known as the Blockchain, a
log containing all transactions records (Bitcoin.org).
The structure of any current crypto-currency is drawn on a 3-layer technology stack:
Blockchain, Protocol, and Currency. The first layer is the hidden technology, the Blockchain.
It is the decentralized ledger recording transactions. It is a substantial database that is
imparted among all system hubs, overhauled by miners, checked by everybody and is not
controlled by anyone (Bitcoin.org).
The Blockchain technology gives an electronic public exchange record of honesty
without central power. The exchange record is a ledger of all transactions that have occurred
inside a set protocol, recorded in a refined, conveyed information structure. The information
structure is decentralized and imparted by all hubs, i.e. computers, inside the partaking
system or network of systems.
The center level of the stack is the Protocol. It is the product or the system that
handles the exchange of money over the Blockchain. At long last, on the highest point of the
stack is the Currency itself. Bitcoin was the initially made crypto-currency, which provides
all the three layers on the stack. Many new types of crypto-currencies were created, by
altering the convention (or the first code) of Bitcoin.
4.1.1 Types of crypto-currencies It is proposed that there are more than 555 sorts of crypto-currencies till date3. Every
currency is ordinarily a currency and a protocol using the Bitcoin Blockchain. The most well
known crypto-currencies concurring their market top are Bitcoin, Ripple, Dash, and
BitShares. Some may have its own Blockchain, for example, Litecoin and Ripple. It has a
different Blockchain significance it had its own decartelized ledger.
3 See http://coinmarketcap.com last visited May 4th, 2015
23
The distinctive sorts of crypto-currencies can further investigated by its protocol.
Table 2 blueprints differences in the convention of the main five crypto-currencies till date4.
All utilize the methodology of mining to secure the system and give a strategy to the issuance
of new currency. Most currencies typically have a maximum supply. There are substantial
contrasts in the more specialized side of the currency. One large difference is in the hashing
algorithm that is utilized. For example, Bitcoin utilizes SHA-256 yet a few currencies have
selected a Scrypt algorithm. Table 2 – The Leading Five Crypto-currencies
Coin Name Block Created (Year)
Algorithm Max Supply (million)
Block Time (min)
Block Reward (coins)
Bitcoin 2009 SHA-256 21 10.00 25
Litecoin 2011 scrypt 82 2.50 50
Ripple 2013 RPCA 99 0.05 N/A
Dash 2014 X11 22 2.50 2.84
BitShares 2014 SHA-512 2 5 2
4.1.2 The Current state of crypto-currencies To comprehend the present state of crypto-currencies, we decide to depict Bitcoin, as
by a wide margin it is the most prevalent crypto-currency. What truly makes crypto-
currencies, for example, Bitcoin so well known? We should take a look at the present metrics
adoption. The Crypto ecosystem is bargained of distinctive performers: infrastructure,
wallets, exchanges, payment services, mining, and financial services.
In the pre-winter of 2013, the first Bitcoin ATM was built and speculator support for
the virtual currency was enthusiastic to the point that for a brief period in late November,
Bitcoin exchanged at costs higher than gold. Notwithstanding concerns over cybersecurity,
Bitcoin is progressively acknowledged by online and brick and mortar retailers. In January
2014, Overstock.com turned into one of the first substantial US online retailers to
acknowledge Bitcoin, and in September 2014, it turned into the first to acknowledge Bitcoin
payments in all remote countries. By the late spring of 2014, Microsoft, Dish Network,
4 Source: http://www.coinwarz.com/cryptocurrency/coins, http://coinmarketcap.com/currencies/views/all, last accessed May 8th, 2015
24
Expedia and Dell all began accepting Bitcoin. An expected 63,000 retailers overall
acknowledged Bitcoin by the mid-year of 2014, and that number was anticipated to achieve
100,000 by the end of 2014 (CoinDesk, 2015).
Notwithstanding stores that directly acknowledge payment in Bitcoins, the virtual
currency can be utilized at different retailers, for example, Amazon, CVS, Target, Zappos,
Home Depot and Entire Foods, by acquiring gift cards through eGifter or Gyft. Further,
Xapo, which offers online Bitcoin wallets and underground Bitcoin vaults, recently
discharged the world’s first plastic upheld by Bitcoins. The rate of development in the
quantity of Bitcoin-accepting dealers kept on tapering off this quarter. Exchanges around the
lull of dealer adoption propose the crucial problem is not an absence of vendor enthusiasm
for Bitcoin, instead a deficiency of purchaser adoption.
Figure 5 highlights key metrics in Bitcoin adoption of the first quarter of 2015
compared to the year of 2014 (CoinDesk, 2015). There were about 1 million brand new
Bitcoin storage wallets created in Q1 of 2015, constitute with 14% growth quarter-over-
quarter. The aggregate amount of Blockchain storage wallets approved about three zillion
within February. The rate connected with wallets growth is virtually standard all around the
last calendar year, driving a number of become involved concerning the believability of the
figures and also troubles in what amount of storage wallets tend to be correctly utilized for
bona fide transactions. Income Work area will be forecasting 12 zillion complete Bitcoin
storage wallets through the finale connected with 2015.
Figure 5 –Key Metrics Bitcoin Adoption of 2015 compared with year 2014
25
4.2 Technological Innovation: Blockchain
4.2.1 The Distributed Ledger A vital issue for just about any electronic payment program is ways to assure that
how the money cannot be double spent. In physical world, the materialistic exchange activity
maintains the payer from spending the same money more than once.
A payment program that depends upon electronic records will need to have a
technique for counteracting double spending on the triggers that it’s easy to manage
electronic records. The strategy employed by current banking system, which developed as a
modern computerized record keeping system from earlier paper-based, is for special
consortium (ordinarily banks) to steadfastly maintaining the master ledgers to keep up every
customer’s transaction record electronically. Thusly, they maintain records noted in the
ledger of 1 central entity (commonly the central bank). Whoever is maintaining these ledgers
have the ability to stop any transaction if they think if is not legitimate. For customers in
order to use this system, they must trust that these consolidated electronic ledgers are safe,
reliable and maintained well.
The difficult task will be how to give and take money online without a trusted third
party, for instance, PayPal, making certain that exactly the same money being spent more
than once. A choice of strategy would be to actualize a totally decentralized payment
program, where copies of the ledger are imparted between all clients, and a technique is
established where customers recognize to amend to the ledger. Since everyone can check
always any planned change contrary to the ledger, this process evacuates the necessity for a
central agency and subsequently for clients to possess rely upon the uprightness of any single
entity.
Any electronic payment program will need to have a dependable process for saving
transactions that clients may possibly concur is precise. For a decentralized program like
Bitcoin that makes two difficulties. The key is contriving a secure and trustworthy process
for replacing a community ledger as there are heap copies spread all over the world. The
second is, without a central agency to maintain or co-ordinate resources, making the
important motivations for clients to contribute resources to confirming transactions. The key
ideas were initially delineated by (Satoshi, 2008).
26
Before the innovation of the Blockchain, it essentially was impractical to organize
singular exercises over the Internet without a centralized body guaranteeing that nobody has
tinkered with the information. A gathering of inconsequential people couldn’t affirm that an
occasion had happened without depending on a central agency to check that this specific
transaction was not deceitful or invalid. Indeed, numerous computer researchers did not
accept that distributed gathering of individuals could achieve accord without a typical
clearinghouse.
Satoshi’s answer was what has ended up known as the Blockchain: a ledger of all
transactions possessed and observed by everybody yet when it is all said and done controlled
by none. It is similar to a titan intuitive spreadsheet everybody has admittance to and
upgrades to affirm every digital credit is distinct. Blockchain technology makes it so that
something that beforehand obliged a centralized power can now be overseen through group.
A Blockchain is just an ordered database of transactions recorded by a system of computers
(Bitcoin Foundation WIKI). Figure 6 shows how robust is the supporting decentralized
network. There are 6441 full bitcoins global nodes running all over the world5.
Figure 6 – World Map of the Decentralized Bitcoin Network
5 Source: getaddr.bitnodes.io. As of April 2015. Last accessed May 9th, 2015
27
4.2.2 Bitcoin Blockchain Mechanism
To accomplish a protected and usable system, “Blockchain” depends on
cryptography. The Blockchain is basically a publicly visible ledger that records all
transactions on the system, with every client on the system holding a duplicate of the ledger.
At the point when another transaction is started by a user, it is assembled with different
transactions and these groupings—or ‘‘blocks’’ are intermittently added to the ledger. The
blocks are distributed to every client of the system, and the veracity of the block is affirmed
by the distributed figuring force of the clients joined. When an transaction is endorsed and
sent, it is irreversible on the grounds that just the approval of the sending party is expected to
start the decentralized methodology.
At its most essential, the Bitcoin programming makes an algorithm, or numerical
riddle, that is extremely hard to tackle. The riddle can be handled either by individual clients
acting alone or by “pools” of clients that gather as one to impart figuring force and to
reduction the danger of fizzled attempts. (Bitcoinmining.com). Those endeavoring to
illuminate the riddle by running the Bitcoin program on their computers, committed servers,
or specific equipment are known as Bitcoin “miners”. The Bitcoin programming uses the
Internet to connect every mining machine (computer) together in one huge distributed
system, implying that each machine is joined with the system without the utilization of any
central nexus, for example, and a server (Bitcoin.org).
In its most basic terms, the Bitcoin system utilizes the mining process to bring new
Bitcoins into flow, as well as to confirm each and every Bitcoin transaction that has ever
happened. Bitcoin consequently works freely of any controlling central power, on the
grounds that no outside operators or altruistic manager is expected to screen, track, and
guarantee the substantial use of Bitcoins. This blend of the Bitcoin creation system with the
Bitcoin confirmation component is typified in what is known as “blocks.” (Bitcoin
Foundation WIKI).
Each new transaction of X Bitcoins from Party A to Party B that has yet to be
checked is packaged together with different as-of yet unsubstantiated transactions and put
away into a document called a block. Every block that has ever been acknowledged by the
Bitcoin system frames a piece of a long, constant record known as the Blockchain; every
endorsed block shapes a connection in a chain that follows back sequentially to the first
28
“Genesis block” made by Nakamoto in January 2009. Because these blocks contain the
records of all confirmed, effective Bitcoin transactions, Bitcoins Blockchain adequately
unctions as a huge, endless public ledger that subtle elements both the time and the
gatherings of each effective Bitcoin transaction. All in all, this record does not contain or
require any information as to the genuine identities of Party A or Party B, who take cover
behind cryptographic locations that role as aka for the transaction and storage of Bitcoins.
Since it is impractical to focus the proprietor of a Bitcoin pseudonym/account without
extra information, Bitcoin is hence regularly alluded to as a “pseudo-anonymous” crypto-
currency. To develop the prior allegory, when miners are given new “veins” to mine each
round, every miner or pool is given an exclusive “block” that can possibly be the following
block added to the Blockchain. Every potential block that is passed out contains not just a
heap of Bitcoins transactions holding up to be checked, additionally an obscure number
produced from a cryptographic hash function, which is that block’s exclusive “hash.” The
hash number yield by the function can’t be returned or predicted. Every block likewise has a
second number value called the “nonce,” which is the piece of the block that is modified by
the mining process (Bitcoin foundation WIKI).
With the goal miners should check their allotted blocks and get their Bitcoin rewards,
they need to succeed in getting the nonce value beneath the hash value, in this way
understanding the “riddle” and creating proof-of-work, as such, mining happens as miners in
a pool take advantage whatever computer processing power as could reasonably be expected
to take “swings” at the nonce as fast as would be prudent in an incensed race to “strike gold”
by being the first mining group to get their block’s nonce value below their block’s hash
value (Ali, Barrdear, Clews, & Southgate, 2014). The first block to have its nonce reduced
below its hash value announce itself to rest of the system, which then uses the Bitcoin
program to affirm the success. Figure 7 illustrating general workflow of how the bitcoin
Blockchain works6.
When this happens, the confirmed block is added to the block chain, its effective
miners are remunerated with Bitcoins, others who had been chipping away at their own
blocks gets nothing, and another round starts as fresh blocks are issued, another block must
6 Provided by Marc at http://egmr.net/2014/12/marcos-musing-bitcoin/
29
be checked and added to the chain if all the transactions it contains are not officially recorded
in the past block.
Figure 7 – A General Workflow of the Bitcoin Blockchain Process
In the event that Party A makes a purchase from Party B utilizing X Bitcoins, Party A
could hypothetically instantly go furthermore launch an arrangement with Party C by
spending the same X Bitcoins. In any case, Party B and Party C can basically wait for the
confirmation procedure to complete before giving Party A the purchased products or
services. Once the transaction with Party B clears and is memorialized in the Blockchain
“ledger,” the block chain will dismiss any transaction with Party C using the same X
Bitcoins. Because the transaction with Party C does not clear, Party C does not give out his
merchandise or services, along these lines guaranteeing that Party A can’t spend the same
Bitcoin more than once. In principle, Party C could give Party A’s buy without waiting for
the verification process. Then again, Party C ordinarily won’t do as such, in light of the fact
that he realizes that there is a uncertainty that his exchange including X Bitcoins from Party
A will be terminates by the block chain if Party A has effectively gone through the Bitcoins
30
with Party B, implying that the system won’t perceive the payment of X Bitcoins from Party
A to Party C. Regardless of the possibility that Party C decides to acknowledge the exchange
without waiting for confirmation and gets defrauded therefore, the Bitcoin system is
unaffected—it still just considered the X Bitcoins being utilized as a part of a solitary
exchange (Party A to Party B) and as continually fitting in with one owner at once. Party C
basically misses out by having doled out something for nothing.
4.2.3 Transactions on the Blockchain The whole transaction procedure on Blockchain is hence depends on a system that
addresses and get over the double spending problem.
1 - Agreeing the transaction
A is a Bitcoin miner who has beforehand worked and verified set of transactions and
got 25 new Bitcoins as a prize. B is a furniture seller who sells furniture on line and
acknowledges Bitcoin. A would like to give 2 Bitcoins to B for some furniture and is ready to
pay 0.01 Bitcoins as an exchange fee7.
2 - Creating the transaction message
A makes a communication with three crucial factors: mentioning the previous
transaction by which A received the Bitcoins, the destination bitcoin addresses and the
amounts to pay. The communication may also have few other factors, such as, conditions if
any, digital signatures and any other elements that A may want to place on the payment.
The amount of Bitcoins on any address is gotten from the previous transactions,
which are publicly available on the Blockchain for examination. In the current example, there
is a record of 25 Bitcoins from A’s earlier mining activity which will become as an input for
new transaction8.
7 Bitcoin customers are under no conventional prerequisite to pay for exchange fees and if they decide to have the exchange fees then its up to their discretion. Whatever the case, Bitcoin miners have the ability to pick which transactions they exercise, thus more fee provided to them gives a far more notable encouraging power to accept A’s transaction. 8 Bitcoin transactions might have a number of inputs or outputs.
31
Inputs:
• 25 Bitcoins from A.
Output:
• 2 Bitcoins to B.
• 22.99 Bitcoins to A.
• 0.01 Bitcoins as an exchange fee to whatsoever miner effectively checks the transaction.
It is also feasible for A to put few restrictions on the payment, so as that B cannot move
forward and spend earnings until they are met9.
3 - Signing the transaction message
When the communication has been developed, A electronically signs it demonstrating
that A regulates the payer address. To produce a digital signature10, A encodes the data and
signs with corresponding private key. Then, the digital signature can be decoded with the
same public key, which A broadcasts to the system where the transaction could be verified.
4 - Broadcasting the transaction message
A broadcasts the signed communication to the system for verification. Bitcoin miners
are orchestrated in a P2P network11, an informal network of connections without any central
co-ordination. Though the bitcoin miners are not under any obligation to accomplish as a
result, the Bitcoin protocol pushes all communications to be delivered across the network,
offering the communication to all peers on the network. That shows that A’s transaction
could maybe not be transmitted to the entire system at once but rather randomly goes to an
arbitrary section of A’s peers first.
9 In normal situations, most payments do not force any restrictions but nonetheless more perplexing transactions may possibly collaborate numerous restrictions to be satisfied before any payments are released. This capacity enables the system to be extended to assistance more complex transactions. 10 Like regular signatures, electronic signatures provide evidence that a transaction is created by the individual who wishes to make a payment. The digital signature is a manifestation of public-key cryptography. The purpose of the public-key is to decode communications by having a “private” key. 11 The P2P network techniques are generally implied to effectively and acceptably share data between users.
32
5 - Transaction verification
Miners collect A’s new record and join it with the others in to new candidate blocks.
Chances are they contend to confirm them in ways that other miners may acknowledge.
Evidence of block transaction verification has two elements: validation and achieving
consensus.
Looking for a block of transactions, including appropriate digital signatures, will take
only a short time. Making consensus is purposely more difficult and involves every miner to
produce the ability of handling resources named as proof-of-work. Comparatively, proof-of-
work needs to be hard to accomplish, nonetheless an easy task to verify. That enables the
incentives of the system to be altered for transaction affirmation by making this simple to
recognize an inaccurate transaction.
The proof-of-work technique employed by Bitcoin Blockchain means that the time
taken for a miner to successfully verify a block of transactions is arbitrary. Anyway, as new
miners join the system, or existing miners invest to increase the computing power of the
machines, the time taken for a fruitful verification may possibly fall. In order to give time for
news of every successful verification to reach the entire system, the complication of the
proof-of-work is adjusted regularly and might be balanced, which means that the average
time between blocks maintains ten minutes constant for Bitcoin, hinting that payments are
not spontaneous.
6 - Success
C is a bitcoin miner and fruitful at verifying a block with A’s transaction inside it,
therefore C will receive reward of new Bitcoins, and also the transaction fees from A’s
transaction. C broadcasts the successful verification result and the remaining miners add the
block to the end of their copies of the block chain and get back to stage 5. Lastly, B receives
2 Bitcoins as a payment, and delivers the furniture to A12 (Satoshi, 2008).
12 Bitcoin Blockchain transactions which (i) offers miners new Bitcoins as a value and (ii) provides the miner any transaction costs made available from transactions within the block. The specific situation of new Bitcoins to every Bitcoin Blockchain deal is halved every 210,000 blocks, on an average of every four years at the rate of ten minutes per block. The existing allocation is 25 Bitcoins every block, which will have 12.5 Bitcoins every block in 2017.
33
Figure 8 illustrates a step-by-step simple example how a bitcoin transaction works13.
Figure 8 - A Step-by-Step of the Bitcoin Transaction Process
13 Provided by Joshua J. Romero, Brandon Palacio & Karlssonwilker Inc: https://bitcoinbazaar.wordpress.com/2013/05/12/how-bitcoin-works-by-joshua-j-romero-brandon-palacio-karlssonwilker-inc/
34
4.3 Advantages The motivation for the development and the adoption of digital currencies has been
partitioned into two areas. Primarily is to research the advantages of digital currencies as
exchange of money. Secondly, is to examine the potential advantages of the underline
technology of digital currencies: the Blockchain.
4.3.1 Payment strategy Potential advantage offered by digital currencies is a modernized way for payment to
existing methods (i.e. credit cards). . It facilitates cheaper and faster payments. Because of its
desterilized design, it can give a more efficient infrastructure for the exchange of money by
avoiding traditional mediators, to guarantee the procedure and confirm that transactions are
genuine.
4.3.2 Lower or Zero Costs
The cost advantage utilizing digital currencies is noticeable as a part of processing
payment transactions (the fees fluctuates relying upon which exchange is being utilized), and
exchanging money. A seller who accepts any type of digital currency enjoys lower
transaction costs when comparing with and traditional bank, normally on a level of 2-4
percent for every transaction. Some well-known exchanges, for example, Bitpay offers 0%
transaction fees, Coinbase offers to change over Bitcoins to USD for a 1% transaction feee in
addition to $0.15 ACH exchange charge. Expenses rely on upon volume, yet general charges
are lower in comparison to banks (TheBlogChain, 2015).
Another focal point is remitting money abroad. The quantities of transfers really
uncover its potential. Presently, remitting money abroad charges include 8% to 12% of the
total payment (utilizing customary wire services, for example, Western Union or
MoneyGram) and settlements can take a few days to complete (Zhen, 2013). Wire transfers
in the United States can run as much as $30 every exchange locally and $50 globally. As
indicated by a report by Goldman Sachs, the total remittance utilizing Bitcoins as a part of
2013 measured at $4 billion. The normal cost of remittance charged by Bitcoin wallet
application sources is of only 1.0 percent (Goldman Sachs, 2014).
35
4.3.3 New Classes of Payment
The use of digital currencies enables opportunities of new classes of payment that are
not economical with existing payments systems, for example, micropayment. Micropayment
is a small financial transaction, and there is no capacity to utilize a charge card online for
amounts less than $1. As of today it is not practical for businesses to monetize very low cost
goods and services and accept micropayments. Crypto-currencies tackle this sort of issue.
Case in point, the scheme of Bitcoin can be divided down by 8 decimal places (0.00000001)
and Ripple is divisible into 6 decimal places 0.000001. Also, other new innovative ideas
were proposed to enable micro transactions for tipping in eateries14 amd smaller scale
payrolls paying workers by the hour\day\week 15. Figure 9 describes the comparison between
traditional payment transaction and bitcoin in a greater detail.
Figure 9 - A Comparison between Traditional Payment Transaction and Bitcoin
14 See https://www.changetip.com 15 See https://www.bitwage.co
36
4.3.4 Processing Times
Current bank payment systems such as credit cards can take a few hours, if not days,
to move money between ledgers. Traditional payment services might just be accessible at
business hours, though transactions in digital currencies are open for business 24/7.
Transactions are instant and accessible throughout the day. This advantage is truly fulfilled
by using the Internet, which can be used on any device that has a connection to the network.
Transactions can be made using a smart device such a phone or tablet by simply installing an
application.
4.3.5 Cross Border Another opportunity, specifically for smaller organizations, is to reach worldwide
markets that are often foimposed upon to large costs and delays. Globalization has empowers
to doing business abroad. With crypto-currencies, organizations can reach worldwide
economies.
4.3.6 Security Some of the challenges in fiat currencies are currency counterfeiting, fraud detection.
Transactions made using digital currencies are protected against forged payments or double
spending due to the use of cryptographic algorithms that is a way of securely transferring
funds over the internet.
Another significant playing point is there is no single point of failure, as digital
currencies relay on distributed system, it would mitigate the danger of a single entity having
the capacity to control transactions, and the danger of a single point of failure that could
bring the entire system down.
4.3.7 Privacy Conventional payment systems depend on the privacy of transaction information to
maintain security. As exhibited already, at the time of a transaction, the only information
being uncovered is a bit address, a series of characters (public key). Transactions made using
digital currencies do not reveal personal information. Unlike traditional methods (such as
using checks) the protocol “pushes” rather than “pulls” payment. In other words, a payer
does not need to disclose any of their own personal information to the individual or
organization they wish to pay. This may present favorable circumstances to traders who deal
37
with client information and reduce compliance costs. Most recently, with substantial
increasing in data breaches and compromising of credit card transactions can result in the
release of valuable information that can be used to conduct future transactions (Wan &
Hoblitzell, 2014).
4.3.8 Transparency
A system that depends on a decentralized system, where all transactions are shown in
a public ledger or “Blockchain” gives a greater transparency. This is maintained by the whole
network of systems and is not controlled by any single entity. And also, the open-source
nature of digital currency protocols, gives continuous innovation and enhancements and
addresses technical issues over time.
4.3.9 Accessibility One of the greatest advantages of digital currencies is to reach to unbanked or under
banked in developing nations society. As per the British government, more than 2.5 billion
individuals worldwide don’t have entry to a financial establishment (HM Treasury, 2013).
The vast majority of these individuals are situated in developing nations where corruption is
the status quo is and a protected financial framework is nonexistent. The most outstanding
illustration is the prominence of M-Pesa in Kenya, an online banking system uses a cell
phone to transfer money by means of transferring air-time from one person to another.
According to 2013 data, M-Pesa processed 80 transactions a second and handles transactions
for 31% of the $33.62 billion GDP of Kenya (Mims, 2013).
38
Figure 10 – Crypto-currencies ATM World Map
Another range that falls under “accessibility” is the availability of crypto-currencies
ATMs around the world. Right now there are 386 operating ATMs worldwide altogether. See
figure 10 the world guide of accessible crypto-currency ATMs16. These ATMs offers crypto-
currencies changes to fiat money and vice versa. At present is only support coins such as
Bitcoin, Litecoin, Dogecoin, and Blackcoin. Figure 11 shows what number of Bitcoin ATMs
are introduced in every continent. North America has 50.26% of the ATMs while Euros has
31.84% (CoinATMRadar, 2015).
Figure 11 - Number of Bitcoin ATMs by Continents
16 Source: http://coinatmradar.com. Last Accessed April, 2015
39
4.4 Challenges
4.4.1 Regulations To date, most enforcement agencies and regulators have concentrated on the
utilization of digital currencies in financial transactions (Lee , Long, McRae, & Handler,
2015). However, the worldwide regulation in crypto-currencies is still unverifiable and
developing in many nations. While a few nations support the utilization and exchange of
Crypto, others display threatening environment limiting its utilization or banning it totally.
4.4.1.1 Within the United States
Law enforcements, legal regulators and tax authorities are trying to comprehend
crypto-currencies and how it will fit into the existing systems if by any means. Within the
United States diverse organizations, such as, SEC, IRS, FinCEN has communicated venture
forward toward virtual currencies (Brito & Castillo, 2013). There is still vague picture on
how governments handle crypto-currencies all inclusive, however a few nations and states
are pushing ahead with the crypto-currencies technology.
FinCEN, Financial Crimes Enforcement Network, a body part of the US Treasury has
characterized virtual currency as a “medium of trade that works like currency in a few
situations, however does not have all the properties of genuine currency, does not have
legitimate delicate status in any jurisdiction”. On March 2013, it distributed a direction
characterizing which business servers as MTBs (Money transmitting business). Those MTBs,
must authorize AML against money laundering and KYC (Know your customer) measure,
knowing the individuals they are working with.
The Internal Revenue Service (IRS) regards virtual currency as property, not
currency, for tax purposes. Both the SEC and the Department of Homeland Security (DHS)
has communicated concerns about criminal risk from unlawful utilization of particularly
Bitcoin and distributed different notices warning of the risks in activities connected to digital
currencies. Furthermore, all individuals owing virtual currencies were considered under the
same laws that applied to securities (Brito & Castillo, 2013).
As every state in the USA has its financial controllers and laws, each states treats
crypto-currencies differently. California and New York have been especially forceful in their
40
quest for Bitcoin-related associations, while others, such as New Mexico, South Carolina,
and Montana, don’t direct money-transmitting organizations.
In April 2014, Texas was one of the first states to blueprint an administrative strategy
for the virtual currency market and issued reminders that examine the administrative
treatment of virtual currencies under Texas law. Notwithstanding affirming that virtual
currencies won’t be viewed as legitimate delicate. Furthermore, the trading of virtual
currencies for sovereign currency won’t be considered currency trade under the Texas
Finance Code (Brito & Castillo, 2013).
On the other hand, On 28 June 2014, California, home to numerous virtual currency
start-up companies, turned into the first state to pass enactment authorizing the use of virtual
currencies in transactions guarantees that virtual currencies are lawful to use in the state of
California. At issue was procurement under the California Corporations Code, which gave
that no element, was allowed to “issue or put available for use, as money, anything besides
the legitimate money of the United States”. This procurement, illuminating that the
utilization of virtual currencies does not disregard the law when such currencies are utilized
for the buy of products or services or the transmission of payments (Brito & Castillo, 2013) .
The New York Department of Financial Services (NYDFS) has embraced a
standout amongst the most forceful positions with regards to virtual currencies, and it as of
late turned into the first state to propose an administrative system for virtual currencies.
As right on time as August 2013, New York utilized subpoenas to look for
information on consumer insurance, speculation procedures and hostile to money laundering
consistence from twenty two elements and speculators included in the virtual currency
industry. In the spring of 2014, the NYDFS asked for recommendations from firms to set up
‘regulated ‘exchanges for virtual currencies, with Lawsky expressing there is a ‘critical
requirement for stronger oversight counting hearty gauges for buyer security, digital security
and against money laundering compliance (Brito & Castillo, 2013)‘. Obviously, the proposed
NYDFS regulations incorporate a customized ‘Bit License’ for virtual currency firms
operating in New York, and additionally extra regulations for different sorts of virtual
currency firms past exchanges.
41
4.4.1.2 Outside of the United States
Administrative bodies outside of the United States are getting to be progressively
keen on Bitcoin and other virtual currencies. In a report distributed in January 2014, by he
Law Library of Congress analyzed regulations or statements made by the central banks and
government workplaces of forty outside wards and the European Union on Bitcoins. While
the report found that couple of nations has received laws or regulations representing virtual
currencies, there is extensive talk on the theme occurring around the globe (The Law Library
of Congress, 2014).
In different nations Bitcoin has additionally problems with approval. Authorities in
Norway stated that it doesn’t satisfy prerequisites of being a currency. In Finland Bitcoin is
not viewed as legitimate currency, in light of the fact that it is by definition in clash of law,
which states that payment instrument must have the guarantor in charge of its activities. Then
again, purchasing crypto-currencies is in Finland considered as buy of products.
The Central bank of UK discharged in light of 13 questions on 2014 to find what are
the challenges and advantages on digital currencies and to what extant government is
expected to cultivate innovation and to guarantee that financial and payments technology
works better and in light of a legitimate concern for the individuals that utilize them on a
daily basis. The Call of information was replied by extensive variety of individuals from the
public who has digital currencies inclusions, from engineers, organizations giving crypto to
banks, payments plans organizations, scholastics and other government division and offices
(HM Treasury, 2015).
Canada embraced a correction to its Proceeds of Crime and Terrorist Financing Act
that will regard virtual currencies as “money administration organizations” for the reasons of
the Canadian against money laundering law. As an outcome, organizations managing in
virtual currencies will be obliged to enroll with the Financial Transactions and Reports
Analysis Center of Canada, execute consistence projects, look after records, report suspicious
or terrorist-related property transactions and figure out whether any of the clients are
“politically uncovered persons”.
Iceland, Bolivia, Ecuador, Kyrgyzstan and Vietnam are the main nations that appear
to have some level of Bitcoin boycott set up while others, for example, Russia and Thailand
appeared to have prohibited digital currencies then backtracked (The Law Library of
42
Congress, 2014). Additionally, China, executed particular regulations characterized Bitcoin
as a “virtual product” and observed that it was not a currency, and subsequently ought not be
coursed and utilized as a part of the market as such. Further, banks and payment
establishments in China may not bargain in Bitcoins.
4.4.2 Crime risks
The degree of anonymity of crypto-currencies could be driver of criminal exercises
and present issues for law authorizations. Different have agencies expressed concerns about
crypto-currencies, specifically Bitcoin. The absence of regulation may encourage for criminal
directs, for example, drug trafficking, weapons and other unlawful products.
It was perceived that it may urge unlawful performers to preform exercises of money
laundering, terrorist financing, tax avoidance and authorizations avoidance. A noticeable case
was Silk Road, an underground site for purchasing and offering unlawful merchandise, for,
drugs and weapons. As of today, the global regulatory revolving crypto-currencies is still
uncertain.
4.4.2.1 Ransomware
Another well-known unlawful activity is Ransomware, which is a malware in which
gain access to a user’s computer and demand a ransom be paid in the form of crypto-
currencies before it can be released ( The Department of Justice, 2015).
Figure shows the most common crypto-currency malware by family (Dell SecureWorks,
2014). Figure 12 – Most Common crypto-currency Malware by Family
43
4.4.3 Risk to Users As noticed, the strategy of crypto-currencies is drawn from cryptographic which
offers a safe method for exchanging value between clients over the system. Nonetheless,
there are some security issues clients may have at different purposes of the crypto-currencies
ecosystem – acquiring, holding, and exchanging coins.
4.4.3.1 Price volatility
One of the evident risks to clients is the value change, specifically in Bitcoin. Bitcoin
has been ended up being exceptionally unstable. Since its presentation in 2009, the cost
expanded from couple of dollars to as high as $1200 in November 2013 and dropped to
below $200 early 2015. Crypto-currencies are not supported by any general power neither
pegged by another currency or commodity, consequently the cost of crypto-currencies may
increase or decrease. It is said by critics that value changes to positive and negative media,
thefts activities. A few recommends it may increment in worth because of its restricted
supply (CoinDesk, 2015).
Figure 13 - Key events Influencing Bitcoin Price in year 2014
The media assumes a part in expanding the instability of the market. A late study by
Kristoufek demonstrates that interestingly media consideration not just drives up the cost
when things are looking positive, additionally drives the cost down when a value air pocket is
44
blast. So this deviated connection incredibly develops the value changes of crypto-currencies
(Kristoufek, 2014). Figure 8 demonstrates key events in the year of 2014 influencing the
price of Bitcoin in USD.
4.4.3.2 Transferred risk to clients
Digital currencies that are stored in a digital wallet on a client’s computer ought to be
mindful of its risks. Like money, it can be lost or stolen if not kept appropriately and secured.
Basically, the risk is transferred from financial institutions directly to users. If losing digital
coins, as of today, is solely depends on the user’s responsibility. Targeted theft attacks on
user’s computers to stealing credentials and private keys by virus or trojan horse is a growing
concern.
4.4.3.3 Lack of control over transactions
In addition to storing a wallet on the computer, a use can create a wallet with an
exchange providers, who will keep user’s private keys. However, lack of control or
regulations over those intermediaries are still exposing users to risk. Clients trust
intermitiateris yet surprising emergencies of exchanges can leave clients with lost trusts. In
2013 One of the biggest trades for purchasing and offering crypto-currencies, Mt. Gox
(MTGOX.com), filled bankruptcy in the wake of encountering a security breach, it
compromised around 75,000 Bitcoins (Valued at more than 400 million dollars) leaving all
clients’ wallets empty.
4.5 The Blockchain: Beyond Payment System The advantages of the Blockchain are more than simply monetary; it stretches out
into areas of governmental issues, social, compassionate person. The underline technology of
crypto-currencies is described by the significance of the technology as an innovation
encouraging the fast, efficient, and secure exchange of responsibility for digital asset over the
Internet, giving a lasting record of what has occurred, and without the need for a third party
to oversee the process.
There are potential positive ramifications for development and the more extensive
economy: transactions efficiencies encourage competition, and an innovation disrupting
payments models (HM Treasury, 2015).
45
Blockchain as a spread period for economic and instinctive development, that could
improve the growth of, and number, spread applications. Blockchain 2.0 transactions feel
upon sources documents and transactions, notoriety and character government, qualified
development proprietorship, and knowledge storage. Some currently imagine Blockchain (or
Bitcoin) 3.0 sometimes as Blockchain engineering purposes previous currency and
agreements in to new areas, like, wellbeing, technology and culture or, planning considerably
more, as spread data government all over (Swan, 2015). Blockchain engineering and spread
purposes open the range of benefits and data that may be overseen and store on and from the
Blockchain.
There is a developing inerest among governments, financial foundations and MNCs
(multinational corporations) in the underline technology of crypto-currencies, the
“Blockchain” alluded as the distributed ledger. MNCs, for example, Samsung Electronics
Co., IBM International Business Machines Corp. what’s more, Intel are investigating to
utilization of Bitcoin technology to make new applications (Kharif, 2015), (Prisco, 2015).
Financial speculator’s interests in the underline technology are developing rapidly. In
2015, venture capitalists were added up to $349 million versus $916 million in the first
quarter of 2015. In comparison with the invention of the Internet in 1996 venture capitalist
investments were added to only $250 (CoinDesk, 2015).
Figure 14 - Bitcoin vs. Early Internet Venture Capitalists investment ($ millions)
46
Many argue that rise of of crypto-currencies is closely resembling that of the Internet.
The representation of Bitcoin is practically is analogous to the stack of the web. As the
underline Internet technology provides the infrastructure, services like Amazon and Netflix
could be expand on top of it. Similarly, Bitcoin can be viewed as the underline TCP/IP
transport layer of the Web enables new services (such as HTTPS, SMTP and FTP) to expand
on top on it (Swan, 2015).
4.5.1 Smart contracts The idea of smart contracts originated by Nick Szabo in the beginning of the World
Wide Web in 1997 who was a cryptographic master. In straightforward words, smart
contracts are computer programs that can consequently execute the terms of an agreement
(Szabo, 1997). At center, these robotized contracts work like other computer program’s if-
then statements. They simply happen to be doing it in a manner that communicates with real
world assets. At the point when a prearranged condition is met, the smart contract executes
the relating contractual provision. Szabo’s idea is now practical with the adoption and the
development of Bitcoin and the blockchain. Smart contract technology is can be build on top
of Bitcoin and other virtual currencies, what some have termed “Bitcoin 2.0” stages. Since
Bitcoin is itself is a computer system, smart contracts can identify with it simply like they
would some other bit of code where a computer system can now trigger payments (Cassano,
2014).
Additionally, the concept of smart contracts may include more prominent automation
of processes, overseeing and upholding contracts. This may be proposed to build
effectiveness and decrease the risk of human mistake. Partners portrayed digital currencies as
“programmable money”, or money with “in-built functionality”, empowering clients to
encode prerequisites into a payment direction so as to attain to self-ruling, self-executing
contracts. The technology could be utilized for more effective property exchanges, or for
credit repayments, where payment could consequently occur or be balanced once indicated
conditions are met (HM Treasury, 2015). Figure 15 illustrates the entire landscape of the of
crypto-currencies ecosystem17.
17 See https://jurnalculture.wordpress.com/2014/03/19/the-bitcoin-business-ecosystem/ Data updated as of August 12, 2013
47
4.5.2 Property Title
The key idea in property titles is to control ownership and access to an asset by
registering it as a digital resource on the Blockchain. The verification of ownership will be by
holding the private key. Fundamentally, it is the property whose ownership would be
controlled by means of the Blockchain. Diverse classes and examples of property may be
coordinated to the Blockchain, for example, financial transactions, public records, recording
and exchanging the responsibility for, shares, securities and other financial instruments
(Long, Lee, Steiner, Wood, & Handler, 2015).
The technology may be applied in settings where records require routinely
authentication or proof of identity. For example, the capacity of digitally “signing” and time-
stamping digital resources could be utilized to effectively and safely keep up records of
digital archives, for both private and public record keeping, for instance for travel permits,
driving licenses, criminal records, land registry and digital voting (Wan & Hoblitzell, 2014).
49
5. Experimental Results
Sample data was collected from 54 participants from various gender, ages, regional
areas, professional backgrounds, interest groups and education levels to evaluate the
strongest and the weakest attributes or aspects of a digital currency and how interest changes
across the diverse groups. To begin with, the accumulative sample data was gathered to find
the most influential and the least influential elements from the entire sample size. Second,
data was further examined to see how set of elements drive responses across different groups
(gathered by demographics\profile questions). Finally, data was sectioned into K-clusters to
find segments, which will manifest themselves as patterns of responses to particular concepts
(or set of ideas).
5.1 Total Sample Preferred Element Order (TSPEO) The accumulative data from the entire set of participants of the study is shown in
Table 3. The elements were sorted from highest interest values to lowest interest values. The
base size is the total participants of 54. The constant value is the additive constant for digital
currency of 70. The additive constant functions as a baseline indicator of the overall subject’s
interest in the topic of the study introduced with the title of digital currencies. This means
that without any elements being presented, approximately 70% of the participants would be
interested in the product of digital currencies (meaning it would rate the concept 7–9 on the
scale).
Table Four, shows the top and bottom five elements for the aggregated sample. The
top elements are judged by the highest overall interest values. There are some very strong
performing elements. The highest overall interest value was an element from Silo D, which
deals with the Security and Privacy of a Digital Currency. The strongest element is D2, “This
digital currency has a very strong mathematical algorithm ... it has never been broken”
which has an interest value of 14. The following highest element value was from the same
silo D1, “No identity theft ... it doesn’t expose your personal information”. Another strong
performing element is D5, “Proof of a transaction may be verified without involving a third
party”. Both D1 and D5 elements have interest values of 11. Values of 11+ would suggest a
very strong-performing idea (Moskowitz H. , Gofman, Beckley, & Ashman, 2006). From the
50
same silo there is another element D3, with interest value of 6 is: “digital currency is insured
… just like a credit card”. Value of is 6 considered favorable but not great ideas on the scale.
Results show that elements from security and privacy class have performed the best, which
infers that those are the most influencing aspects of digital currencies.
Negative values imply that when it is added to the concept, the interest goes down.
Interestingly, the bottom three elements with all negative interest values are originating from
silo A, which deals with Features of a Digital Currency. The bottom elements are “It can be
used globally”, and “Account balance can be printed on a paper” have interest values of -10
and -9 respectively. The absolute lowest interest value is -18 from the same category “Once
payment is made you can’t “undo” it ... it is not reversible or disputable”. The remaining two
least performing elements are originating from silo C, which manages the cost, “Creating a
digital “wallet” is as easy as downloading an app ... no need for a special device or
knowledge,” and “The number of coins produced are limited ... the value may increase in the
future” have interest values of -6 and -7 respectively. Results imply that these features of
digital currencies are the least influencing aspects.
51
Table 3 – TSPEO: Total Sample Preferred Elements Order for the Crypto-currency product
Total Sample
Base Size 54 Constant 70 D2 This digital currency has a very strong mathematical algorithm ... it has never been broken 14 D5 Proof of a transaction may be verified without involving a third party 11 D1 No identity theft ... it doesn’t expose your personal information 11 D4 Unlike cash ... this digital currency is resistant to counterfeiting 8 D3 This digital currency is insured ... just like a credit card 6 B5 Use this digital currency to make micro payments ... as small as a penny 2 B2 A human “teller” may convert your digital money to (from) cash 1 B4 More than 30% of businesses worldwide now accept this digital money 0 C4 People without a bank account may use this digital currency -2 C1 It is 50% cheaper for business owners to accept this digital currency than a credit card -2 B1 Easy to use ... via an application on a smart-device or a computer -2 B3 Most local ATMs worldwide accept this digital currency -3 A5 Instantly transfer money or make a payment worldwide -3 A1 It is a decentralized network ... not controlled by an individual or a company -4 C2 There is a negligible fee to convert this currency to any other digital currency or cash -5 C3 Creating a digital “wallet” is as easy as downloading an app ... no need for a special device
or knowledge -6
C5 The number of coins produced are limited ... the value may increase in the future -7 A2 Your account balance can be printed -9 A4 It can be used globally -10 A3 Once payment is made you can’t “undo” it ... it is not reversible or disputable -18
52
Table 4 – TSPEO: Total Sample Preferred Element Order of five top and the bottom elements.
5.2 Profile Preferred Element Order (PPEO) Profile information was gathered among all participants, this permitted us to assess
every particular group by background. Figures 14A-F shows the profile distribution of the
participants.
Male versus Female
Most of the members were male of 76% (41) of the sample size, and 24% (13) female
(Figure 14-A). Male is slightly more interested in digital currencies with an additive constant
value of 71, while female had additive constant value of 69. Division of male from female
members shows that both male and female are equally interested in digital currencies.
The top performing element for male was the silo of Security and Privacy “This
digital currency has a very strong mathematical algorithm … it has never been broken”
adjusted to the aggregate sample. The top element for female was an element from the same
classification.
Interestingly, the low performing element was different for distinctive gender. The
lowest performing element for female was in the Ease of Use silo B “Easy to use … via an
application on a smart-device or a computer” (-20) though the lowest performing element
for male was in the Features of Digital Currency, “Once payment is made you can’t “undo”
it … it is not reversible or disputable” (-18).
Total Sample
Base Size 54
Constant 70
D2 This digital currency has a very strong mathematical algorithm ... it has never been broken 14 D5 Proof of a transaction may be verified without involving a third party 11 D1 No identity theft ... it doesn’t expose your personal information 11 D4 Unlike cash ... this digital currency is resistant to counterfeiting 8 D3 This digital currency is insured ... just like a credit card 6
10 middle elements are not shown
C3 Creating a digital “wallet” is as easy as downloading an app ... no need for a special device or knowledge -6
C5 The number of coins produced are limited ... the value may increase in the future -7 A2 Your account balance can be printed -9 A4 It can be used globally -10 A3 Once payment is made you can’t “undo” it ... it is not reversible or disputable -18
53
Ages: 25-34 years versus 35-44 years versus 45-54 years
The age groups of the respondents are shifted. Most of the respondents were in the
age group of 25-34, which signified 43% (23) of the sample size. The second biggest group
of 24% (13) of members was between the ages of 35-44. Ages of 45-54 comprised of %17
(9) (Figure 14-C). Interestingly, age group of 35-44 years was the least inspired by digital
currencies. Its additive constant value is 55, while for all other age groups additive constant
value is 70 or more.
The same age group of 34-44 separates itself by favoring the element of “payment is
made you can’t “undo” it … it is not reversible or disputable” with high interest value of 16
whereas every other group it was the least performed element with negative values varied
between -6 through -23.
Vested parties: Business proprietors, Consumers, Financial Industry, Government,
Developers
The sample data was further filtered by group of interest. The majority of the
respondents of 56% (30) are classified as business owners and 50% (27) are consumers.
Financial industry group consisted of 22% (12) and government only 11% (6) of the entire
sample (Figure 14-E).
All the members from this group had one common lowest performing element, which
involves non-reversible payments. Most noteworthy interest values fluctuated over the
Privacy and Security silo. Group members from government accounted with high performing
interest value (17) for the element in Accessibility of ATMs while other groups, for example,
financial industry and develop[ers had interest values of -7 for the same element.
When assessing the element, which includes “Proof of a transaction may be verified
without involving a third party”, all groups altogether, entrepreneurs and consumers
including financial industry show positive high interest values and collectively supported the
idea of not having third party control during the transaction from point A to point B which is
the most significant advantage and key innovation of digital currencies as explained in
previous sections.
54
Specialized (STEM) versus Non-specialized (Non-STEM)
Most of the members of total sample have the background of STEM 59% (33) and
followed by business, finance, economics and others 33% (18) (Figure 14-F). Sample
indicates that members with STEM (Science, Technology, Engineering, and Mathematics)
background are more favorable towards the security and privacy aspects of digital currencies.
“This digital currency has a very strong mathematical algorithm … it has never been
broken” with an interest value of 21. Very interestingly, the same element favored low
negative values from non-technical background members such as Social, Behavioral
Sciences (0) Liberal arts (-2) and music (-21).
The most favored element amongst non-technical was “Creating a digital “wallet” is
as easy as downloading an app … no need for a special device or knowledge” scoring 19, 17
and 13 for Medial, Social\Behavioral and Music respectively. The same element performed
the lowest with STEM background members with a negative value of -13. It is suggested that
that human perception changes with distinctive backgrounds.
The similar opposite comparison can be noticed between STEM and
Business/Finance/Economics members. The second most favored element amongst STEM
was “Proof of a transaction may be verified without involving a third party” with interest
value of 17 whereas the same element performed low amongst Business/Finance/Economics
members with a value of zero.
Education level: high school versus beyond high school
Larger part of the respondents of 37% (20) of the sample data, were holding a
Master’s degree taking after by undergrad of 24% (13). Just 7% of the members are holding a
PhD (4) (Figure 14-F). It was noticed that all groups beyond high school education have
valued a higher privacy and security silo “This digital currency has a very strong
mathematical algorithm … it has never been broken” with interest values ranging between 20
and 24. Whereas the same element performed low amongst high school level with interest
value of -12. The most favored silo amongst high school was Features of Digital Currencies.
As per the data, there are no other major different beliefs or significant results between high
school and beyond high school.
55
Regional: North America vs. Asia vs. Europe
As crypto-currencies are a worldwide technology, which is not controlled or
represents by any central administrative or legitimate body, therefore, the data is further
isolated topographically fundamentally centered on North America, Asia and Europe. Legal,
political and cultural situations may impact individuals’ recognitions and subsequently
regions expect differences of opinions. Dominant part of the respondents of 65% (35) of the
sample data lives in North America, followed by 15% (8) who dwells in Europe, and 11% (6)
in Asia (Figure 14-D).
The element “Proof of a transaction may be verified without involving a third party”
was favored most amongst participants who lives in Asia and North America were figured to
15 and 17, while the same element was the least favored element in Europe, with an interest
value of -21. Another interesting finding is the element; “People without a bank account may
use this digital currency” was the most favored with an interest value 16 in Europe, while the
same element was valued contrarily in Asia (-1) and North America (-8).
5.3 Segments Preferred Element Order (SPEO) Finding groups of people with comparative mindsets is the substance of Mind
Genomics; People who react in similar ways to set of thoughts and ideas. Those are our
“mind genomes”. The aggregate data set was segmented with K-cluster analysis. The
segments represent a portion of respondents that have comparative patterns of response
toward the product elements, typically identifying the part of the population who offer ideas
of the representative highlights of a Digital Currency. The data was divided into a two-
segment solution (Table 6), and into a separate a three-segment solution (Table 7).
Cluster)1)solution:)2)segments))
The primary investigation brought about two segments comprised of 39 subjects in
segment 1 and 15 subjects in segment 2. Table 6 demonstrates the constants, interest values,
and top and bottom elements compared to the total sample.
56
Table 5 – S2PEO: Segment two Preferred Element Order
Total Sample
Segment 1 of 2
Segment 2 of 2
Base Size 54 39 15 Constant 70.4 71.6 67.2
D2 This digital currency has a very strong mathematical algorithm … it has never been broken 14.1 21.7 -5.7
D1 No identity theft … it doesn’t expose your personal information 11 20.2 -12.9
D5 Proof of a transaction may be verified without involving a third party 10.5 15.5 -2.4
D4 Unlike cash … this digital currency is resistant to counterfeiting 7.7 11.2 -1.3 D3 This digital currency is insured … just like a credit card 5.9 12.5 -11.2 B2 A human “teller” may convert your digital money to (from) cash 1 3.3 -4.8
C1 It is 50% cheaper for business owners to accept this digital currency than a credit card -1.5 -6.2 10.5
A5 Instantly transfer money or make a payment worldwide -3.3 -10.7 15.8 B3 Most local ATMs worldwide accept this digital currency -3.4 1.4 -15.9
A1 It is a decentralized network … not controlled by an individual or a company -4.1 -10.9 13.6
C3 Creating a digital “wallet” is as easy as downloading an app … no need for a special device or knowledge -5.6 -9.4 4.4
C5 The number of coins produced are limited … the value may increase in the future -6.8 -10.1 1.7
A2 Your account balance can be printed -9.3 -16.8 10.3 A4 It can be used globally -10.3 -18.1 10
A3 Once payment is made you can’t “undo” it … it is not reversible or disputable -18.4 -28.6 8.2
Segment 1: Most performed elements “No identity theft … it doesn’t expose your personal
information” and “This digital currency has a very strong mathematical algorithm … it has
never been broken” with high interest values of 20 and 22, respectively. Least preformed
elements were “It can be used globally” and “Once payment is made you can’t “undo” it …
it is not reversible or disputable” with interest values of -29 and -18, respectively.
Least performed elements include worldwide use and non-reversible payments. Non-
reversible characteristic is a significant character of digital currencies. While this could be
useful for merchants who can free themselves of chargeback fraud, yet this is one of the
major drawbacks for purchasers. The purchaser has to trust that they are going to get what
they paid for. However, there is no guarantee and no real way for purchaser to recover the
money if that winds up not being the situation.
57
In light of the most and least performing elements this segment was given the title of
the Protection\Privacy minded, individuals who values financial privacy and insurance
online. Table 6 – S1PEO: Segment one Preferred Element Order
Total Sample
Segment 1 of 2
Base Size 54 39
Constant 70.4 71.6
D2 This digital currency has a very strong mathematical algorithm … it has never been broken 14.1 21.7
D1 No identity theft … it doesn’t expose your personal information 11 20.2
D5 Proof of a transaction may be verified without involving a third party 10.5 15.5
D4 Unlike cash … this digital currency is resistant to counterfeiting 7.7 11.2
D3 This digital currency is insured … just like a credit card 5.9 12.5
A5 Instantly transfer money or make a payment worldwide -3.3 -10.7
A1 It is a decentralized network … not controlled by an individual or a company -4.1 -10.9
C3 Creating a digital “wallet” is as easy as downloading an app … no need for a special device or knowledge -5.6 -9.4
C5 The number of coins produced are limited … the value may increase in the future -6.8 -10.1
A2 Your account balance can be printed -9.3 -16.8
A4 It can be used globally -10.3 -18.1
A3 Once payment is made you can’t “undo” it … it is not reversible or disputable -18.4 -28.6
Segment 2: High performing elements exhibited high interests in fast and efficient method of
payment. Top elements were “Instantly transfer money or make a payment worldwide” and
“It is a decentralized network … not controlled by an individual or a company” with
premium values of 16 and 14 respectively. Taking a look at other positive values higher than
11 uncovers the high enthusiasm for cost points of interest; Individuals who look for an easy
and quick worldwide means. Accordingly, segment 2 was titled as the cost effectiveness
minded segment. As can be seen, unlike to section 1, segment 2 is less intrigued by privacy
or security; high elements for segment 1 were given low interest values in segment 2. For
instance, non-reversible payments the value in segment 2 is 10. It is clearly demonstrated that
segment 1 and 2 does not have common shared elements.
58
Table 7 – S2FEO: Segment two preferred element order
Total Sample
Segment 2 of 2
Base Size 54 15
Constant 70.4 67.2
A5 Instantly transfer money or make a payment worldwide -3.3 15.8
A1 It is a decentralized network … not controlled by an individual or a company -4.1 13.6
C1 It is 50% cheaper for business owners to accept this digital currency than a credit card -1.5 10.5
A2 Your account balance can be printed -9.3 10.3
A4 It can be used globally -10.3 10
A3 Once payment is made you can’t “undo” it … it is not reversible or disputable -18.4 8.2
C3 Creating a digital “wallet” is as easy as downloading an app … no need for a special device or knowledge -5.6 4.4
C5 The number of coins produced are limited … the value may increase in the future -6.8 1.7
D4 Unlike cash … this digital currency is resistant to counterfeiting 7.7 -1.3
D5 Proof of a transaction may be verified without involving a third party 10.5 -2.4
B2 A human “teller” may convert your digital money to (from) cash 1 -4.8
D2 This digital currency has a very strong mathematical algorithm … it has never been broken 14.1 -5.7
D3 This digital currency is insured … just like a credit card 5.9 -11.2
D1 No identity theft … it doesn’t expose your personal information 11 -12.9
B3 Most local ATMs worldwide accept this digital currency -3.4 -15.9
Cluster)2)L)solution:)3)segments)
The data was segmented further into three K-clusters (Table 6) to examine for even
stronger segmentation. Segment 1 consists of 29 subjects, segment 2 consists of 15 subjects,
and segment 3 consists of 10 subjects. Table 8 shows the constants, interest values, and top
and bottom elements compared to the total sample.
Segment 1 display similar characteristic to the previous segment of privacy\protection
mined. Segment 2 further complements to the cost\efficient minded segment. The top
performing elements consisted of Features of Digital Currency silo “It is 50% cheaper for
business owners to accept this digital currency than a credit card” with an interest value of
11.
Interestingly, the last segment provides us insight to a new segment that is interested
in easy and convenient way of using and accessing the product. Top elements were “Use this
digital currency to make micro payments … as small as a penny” with the highest interest
59
value of 34 followed by, “Most local ATMs worldwide accept this digital currency” with an
interest value of 28. “More than 30% of businesses worldwide now accept this digital
money” had interest value of 20. Noticing that this segment is less interested in investments,
where the element “The number of coins produced are limited … the value may increase in
the future” had an interest value of -19.
Therefore, a third segment was given the title of user-friendly “easy and convenient
access” segment, people who seek for easy and convenient way to make transactions. Table 8 – S3PEO: Segment 3 preferred element order
Total Sample
Segment 1 of 3
Segment 2 of 3
Segment 3 of 3
Base Size 54 29 15 10
Constant 70.4 67.9 67.2 82.2
D1 No identity theft … it doesn’t expose your personal information 11 26.8 -12.9 1.2
D2 This digital currency has a very strong mathematical algorithm … it has never been broken 14.1 26 -5.7 9
D5 Proof of a transaction may be verified without involving a third party 10.5 21.3 -2.4 -1.2
C4 People without a bank account may use this digital currency -2.5 -2.5 7.1 -16.8
C2 There is a negligible fee to convert this currency to any other digital currency or cash -5.1 -3.6 7.6 -28.7
C3 Creating a digital “wallet” is as easy as downloading an app … no need for a special device or knowledge -5.6 -5 4.4 -22.2
B2 A human “teller” may convert your digital money to (from) cash 1 -5.2 -4.8 27.9
C1 It is 50% cheaper for business owners to accept this digital currency than a credit card -1.5 -5.8 10.5 -7.4
B5 Use this digital currency to make micro payments … as small as a penny 2.4 -6 -2.8 34.4
B4 More than 30% of businesses worldwide now accept this digital money -0.3 -6.7 -1.6 20.1
C5 The number of coins produced are limited … the value may increase in the future -6.8 -7.1 1.7 -18.9
B3 Most local ATMs worldwide accept this digital currency -3.4 -8 -15.9 28.4
B1 Easy to use … via an application on a smart-device or a computer -1.7 -8.3 -4.7 22.3
A5 Instantly transfer money or make a payment worldwide -3.3 -14.5 15.8 0.4
A1 It is a decentralized network … not controlled by an individual or a company -4.1 -14.6 13.6 -0.2
A4 It can be used globally -10.3 -24.7 10 1
A3 Once payment is made you can’t “undo” it … it is not reversible or disputable -18.4 -30.9 8.2 -22.1
60
5.4 Discussion There are obviously drivers of enthusiasm for digital currencies. The study attempted
to utilize the science of Mind Genomics to give observational data to better comprehend the
consumers’ impression of digital currencies. Using the IdeaMap® tool, three fundamental
consumer segments have now been identified in connection to the most compelling attributes
of digital currencies that drive individual’s interest.
The primary segment of the aggregated consumers inspected is most intrigued by
particular aspects concerning with consumer protection and financial privacy in connection
to digital currencies. This segment values and trusts mechanisms that guarantee their
personal information is not traded off. Besides, by believing the system, consequently it
looks for a level of protection.
Another consumer segment is most intrigued by digital currency angles connected
with efficiency and cost benefits. Segment two concentrates on what the consumer
encounters and refinements demonstrate that the efficiency and cost advantage goals are all
imperative to digital currency segment two consumers.
Lastly, the third segment is most inspired by digital currency perspectives connected
with simple to use and accessible. Those will be more keened to realize that digital currencies
are recognized in every business, paying little attention to the amount that can be utilized and
that it can be acquired through different means.
The K-cluster analysis segmented subjects in view of the subject’s data created from
the experiment itself and accommodated extremely fascinating and to a degree special
conclusions. It is clear that, the security perspectives, every way the data are analyzed,
contrasts in consumer intrigues may be discovered and consensuses can be distinguished. For
an all-inclusive statement case, a “Once payment is made you can’t “undo” it … it is not
reversible or disputable” results in negative interest values for the greater part of groups,
subgroups, or segments and therefore is considered to be the least influential attribute of a
digital currency.
61
5.5 Contribution In this study we found that there are three distinct segments, those segments contain
related sets of ideas that emerged from the pattern of utilities for different participants.
Influencing attributes of digital currencies for each segment differ majorly.
Key discoveries of the study:
• There are no real contrasts between educations level then again, specialized
individuals favor parts of security while non-specialized lean toward aspects of
usability.
• Consumer protection is the most valued attribute among all groups and subgroups.
• The integrity of the digital currency system is the most influential attribute among all
groups and subgroups.
• There is a different perception about digital currencies in counties in Asia and North
America than Europe.
The approach was taken is imperative for propelling the investigation of consumer
examination, particularly in the business world, where development could be possible
utilizing information about the customer mind-set.
Singular consumers will value one of these perspectives more than others.
Understanding what the consumer values the most (e.g., security) and conveying this
information to the right customer may bring about the lifted interest, an expanded ease of use
and an expanded saw experience for the consumer.
In order to further assist with the creation of new services and applications in the
domain of crypto-currencies, we further identified three main consumer segments in relation
to the most influential aspects of digital currencies that drive individual segment interests.
The three segments are the following:
Segment 1: Financial Privacy\Protection – consumers who are most interested in
consumer protection and financial privacy in the virtual space. This segment values and trusts
mechanisms that ensure their personal information is not compromised. Furthermore, by
trusting the system, in return it seeks for a degree of protection.
Segment 2: Efficient\Cost – consumers who are most interested in digital currency
aspects associated with efficient and cost beneficial, focusing on the consumer experiences.
62
Segment 3: Convenient and accessibility – consumers who is most interested in
digital currency aspects associated with easy, convenient and accessible. Those will be more
keened to know that digital currencies are accepted in every business regardless of the
amount that can be used or that it can be obtained through various traditional means (such as
ATMs, tellers).
Those results are unique and are backed by empirical data that can be used as a base
to increase adoption and support the development of crypto-currencies. Table 10 displays the
most valued and least valued elements per each segment. Those can be used as messaging
targeting a specific group. For example, preferred messaging aiming to target Segment 1,
which was identified as the “financial privacy protection”, should include only the top
positive interest values (shown in table 9 – positive interest values), whereas the lowest
negative values indicated very low interest in those types of features or attributes and
messaging that should be avoided.
Table 9 – Preferred Messaging for Customers
Segment 1: Financial Privacy Protection Things to say
No identity theft … it doesn’t expose your personal information This digital currency has a very strong mathematical algorithm … it has never been broken Proof of a transaction may be verified without involving a third party This digital currency is insured … just like a credit card
Things to avoid It is a decentralized network … not controlled by an individual or a company Your account balance can be printed It can be used globally Once payment is made you can’t “undo” it … it is not reversible or disputable Segment 2: Cost Effectiveness
Things to say Instantly transfer money or make a payment worldwide It is a decentralized network … not controlled by an individual or a company It is 50% cheaper for business owners to accept this digital currency than a credit card Your account balance can be printed
Things to avoid This digital currency has a very strong mathematical algorithm … it has never been broken This digital currency is insured … just like a credit card No identity theft … it doesn’t expose your personal information Most local ATMs worldwide accept this digital currency
63
Segment 3: Accessibility and Ease of Use Things to say
Use this digital currency to make micro payments … as small as a penny Most local ATMs worldwide accept this digital currency A human “teller” may convert your digital money to (from) cash Easy to use … via an application on a smart-device or a computer
Things to avoid The number of coins produced are limited … the value may increase in the future Once payment is made you can’t “undo” it … it is not reversible or disputable Creating a digital “wallet” is as easy as downloading an app … no need for a special device or knowledge There is a negligible fee to convert this currency to any other digital currency or cash
5.6 Result implications: Market opportunities As can be seen the security of trusts is a standout amongst the most valued properties,
across all segments. Till date, the market has possessed the capacity to address a percentage
of the risks to purchasers. Those new innovative innovation solutions may incorporate multi-
signature strategies, escrow services and cold storage utilized by firms (Davenport, 2015).
Most wallet systems being used today depend on one public and one private key to
permit the release of funds. A more secure method for putting away crypto-currencies and
alleviating the risk of losing finances by losing the private key or burglary bringing about
stolen trusts may include a multi-signature arrangement. Multi-signature procedure requires a
few private keys to sign before stores can be sent and accordingly no single individual or
private key can approve the exchange of trusts, making it more troublesome for somebody to
take units of digital currency from that address. There are a few start-up companies’
organizations that execute those creative systems. For instance, one of the first organizations
to deploy a multi-signature Bitcoin wallet answer for shoppers is BitGo. BitGo current plan
utilizes three keys: one held by the client, one for BitGo and one put away in logged off
reinforcement. No less than two of the three keys are expected to get to the wallet (BitGo).
The prompt playing point of utilizing multi signature technology is to totally
eliminate single point of failure by guaranteeing that the keys are produced and is kept away
on totally separate devices. Case in point, one key may be created on the client’s tablet, while
the other is produced on the cellphone, making it important to have both gadgets in order to
execute. Malware, which taints the tablet, cannot take steal funds, due to the fact that it
doesn’t have the other kept on the telephone.
64
Segment 1 in which includes trust elements is the capacity to secure shoppers. The
presentation of an escrow administration permits more secure payments between people,
utilizing a neutral entity that holds the units of digital currency until the purchaser confirms
the receipt of the transactions. Once confirmed, the holding entity can then discharge the
units to the proposed beneficiary on power of the purchaser. Case in point: Alice needs to
send Bitcoin to Bob, whom she may not assume that Bob conveys the stock he has
guaranteed. Bob needs to guarantee he is paid for his stock. They both trust Trent to mediate
a question yet don’t wish to trust him with the stores. They make a 2-of-3 multi-sig address
with one key each from Alice, Bob and Trent. In the event that the transaction goes easily,
Alice and Bob can mutually discharge the trusts without Trent’s inclusion. On the off chance
that there is a question, Trent can mediate, and can move the stores in conjunction with either
Alice or Bob. Over the span of the transaction, the Bitcoin is adequately in a sort of limbo,
since nobody individual can move the stores all alone. This alludes to trades and firms
holding private keys.
Segment 3 that include usability or accessibility to digital currencies attributes.
Concurring the our data, furthermore data that we discovered numerous buyers guarantee that
the utilization of this technology is excessively entangled for the individuals who are
threatened by the technology or simply think digital wallets are a disturbance, there is
presently an option: paper wallets (Barajas, 2014). Having entry to a physical unmistakable
bit of paper is the first venture to treating crypto-currency the same as “fiat” money.
BitAccess, of the best known ATM producer, offers a digital wallet that will be made as a bit
of paper. Bitcoin ATM industry is the main player pulling out all the stops to make
transactions without owning a digital wallet possible. Their own exclusive transaction
equipment, permits any individual who does not possess a digital wallet can in any case
utilize a BitAccess ATM to purchase, offer or send Bitcoin. Utilizing BTM Bitcoin Teller
Machine (BTM) (Barajas, 2014). At the time of composing this paper, to make a paper wallet
was moderately awkward. Evolved numerous steps and tedious for the standard client. BTM
truly improves the methodology of printing money and facilitate the procedure.
In conclusion, a critical highlight is consumer’s security systems, which is considered
to one of the principle deterrent to standard adoption. Bitrated.com is an online trust stage
bails customer to discover all the more about the vendor that they are purchasing from. It is
65
similar to a “notoriety administration system”. Bitrated rates each client in view of their past
transactions which at last one can choose whether it is a dependable substance to manage or
not. Moreover, it utilizes the multi signature system to permit settling question and converse
transactions. (Hirshman, 2015).
66
6. Final Remarks
6.1 Conclusion Crypto-currencies are not new phenomena, but its implementation is a new concept
that caught up rapidly in the recent years. It has attracted a lot of attention from various
entities worldwide, from entrepreneurs to law enforcements to the mass media. Witnessing
the development and adoption of such a great advancement was the primary driver for
conducing a study in crypto-currencies.
Crypto-currencies bring apparent advantages of enabling a global, fast, efficient and
cheaper means of transaction without the need of a trusted middle party to ensure the
integrity of the process. Initially, crypto-currencies has attracted innovators and early
adopters however, gradually major key players have entered the circle supporting the
development and adoption of crypto-currencies ranging from multinational corporations to
retailers and financials leaders.
Nonetheless, the underline technology of crypto-currencies, the Blockchain,
represents a key innovation with potential positive implication for growth to the wider
economy involving transactions efficiencies, increase competition, and an innovation
disrupting existing payments models.
The development and the adoption of digital currencies have been explored in both
benefits of digital currencies as transfer of money domain as well as disadvantages and the
potential benefits of the key innovation of the Blockchain.
Advantages that were identified as benefits of digital currencies as transfer of money
were fast and lower cost for transacting, bringing new classes of payments (i.e. conducting
micropayments online) and reaching to the global economy with no limitations (cross
Border). A core system at which is decentralized and not controlled by an individual but by
fundamentals of the science of cryptographic. A system that ensures financial privacy and is
accessible to a large population who do not have access to traditional means (i.e. banks) or is
limited to the freedom of money. Lastly, the open source technology ensures transparency
and encourages endless opportunities for future development.
67
As every new technology uncovers, there are also challenges and risks that are
associated with crypto-currencies. The identified challenges include the lack of legal support
or regulation around the subject of cryptocurrencies. The lack of understanding whether this
technology – dealing with money – can be treated as fiat money and therefore ruled alike by
the legal systems. The perceived anonymity had attracted illicit actors to conduct illegal
activities linking to the crypto-currencies technology. This leads us to the risk associated with
the individual user who is exposed to being a target to cyber criminals stealing their funds
without a possibility of getting it back. The lack of protection to users is the primary
disadvantage that is believed to be the barrier between the early adaptors to mainstream.
Those identified risks and benefits imply that there can be many influencing aspects
of using and\or developing the technology of crypto-currencies. Armed with those thoughts
in mind, this study attempts for the first time evaluate the influencing attributes of crypto-
currencies on a product level. This knowledge and insights can be than used to identify
practical applications to create better products and services in order to support the
development and adoption of crypto-currencies.
Using the powerful-patented market research IdealMap® tool by the science of Mind
Genomics “the science of the everyday experience”, to better understand the consumers’
perception of digital currencies. Our target audience was identified as individuals of different
backgrounds and experiences who is familiar with the technology of cryptocurrencies and
had experienced it in some way.
The strongest attributes of digital currency that drive interest to users is the system of
crypto-currencies at which doesn’t need a third party to conduct transactions. It is secure,
system that will not break. Unlike fiat currencies, it is resistant to counterfeiting.
Additionally, a strong attribute is a system that ensures not only the security of the method
but also values consumer protection involving in protecting one’s funds and providing
representation in case of an abused trust.
68
6.2 Limitations The results of the study were developed utilizing a structured approach of the science
of Mind Genomics to identifying consumer’s perceptions of digital currencies and are limited
to the “idealets” or elements that were designed at the starting venture of the procedure. The
elements were designed taking into account the creator’s learning, knowledge, and
comprehension of the crypto-currencies technology. The three segments that were
distinguished have been created taking into account the sample size, in this way a probability
for future examination is to test the model with distinctive idealets and a bigger sample size.
6.3 Further Research As adoption is indispensable process in the development of digital currencies, it will
be worth to re-run the experimental study to a bigger group and adjusting the configuration to
6X6 model. It will be further more valuable to extent this research to explore the challenges
and motivation of the development of the underline technology of the Blockchain that was
presented, in particular the legal implications aspects.
69
7. Bibliography
The Department of Justice. (2015, March 30). Criminal Compliant. Retrieved April 39, 2015, from http://www.justice.gov/sites/default/files/opa/press-releases/attachments/2015/03/30/criminal_complaint_force.pdf Accenture. (2014). 2014 North America Consumer Payments Survey. Retrieved Jan 13, 2015, from Accenture: http://www.accenture.com/SiteCollectionDocuments/accenture-2014-north-america-consumer-payments-survey.pdf Ali, R., Barrdear, J., Clews, R., & Southgate, J. (2014). Innovations in payment technologies and the emergence of digital currencies. Bank Of England Quarterly Bulletin [serial online] , 54 (3), 262-275. Andolfatto, D. (2014). The possibilities and the pitfalls of virtul currencies - part 2 an Overview on bitcoin. (R. a. Louis, Producer) Retrieved April 29, 2015, from https://www.stlouisfed.org/dialogue-with-the-fed/the-possibilities-and-the-pitfalls-of-virtual-currencies/videos/part-2-an-overview-of-bitcoin Andreesen, M. (2014). Why Bitcoin Matters. Retrieved 2015, from http://dealbook.nytimes.com/2014/01/21/why-bitcoin-matters/?_r=0 Babaioff, M., Oren , S., Zohar , A., & Shahar, D. (2011, December). On Bitcoin and Red Balloons. ACM SIGecom Exchanges , 10 (3), pp. 5-9. Barajas, I. (2014, Aug 14). Paper Wallets Aim To Make Bitcoin More Accessible To The Masses. Retrieved May 6, 2015, from http://blog.newegg.com/paper-wallets-point-Bitcoin-available-masses Barber, S., Boyen, X., Shi, E., & Uz, E. (2012). Bitter to Better — How to Make Bitcoin a Better Currency. Financial Cryptography and Data Security , 7397, 399-414. Bitcoin Foundation WIKI. (n.d.). Blockchain. Retrieved March 1, 2015, from https://en.Bitcoin.it/wiki/Block_chain Bitcoin Foundation WIKI. (n.d.). Blocks. Retrieved Jan 8, 2015, from https://en.bitcoin.it/wiki/Blocks Bitcoin foundation WIKI. (n.d.). Nonce. Retrieved Jan 8, 2015, from https://en.Bitcoin.it/wiki/Nonce Bitcoin.org. (n.d.). Frequently Asked Questions. Retrieved Jan 8, 2015, from https://bitcoin.org/en/faq
70
Bitcoinmining.com. (n.d.). Getting Started. Retrieved Jan 7, 2015, from http://www.bitcoinmining.com/getting-started/ BitGo. (n.d.). Securing the World’s Bitcoin. Retrieved May 6, 2015, from https://www.bitgo.com Brito, J., & Castillo, A. (2013). BITCOIN A Primer for Policymakers. Retrieved April 14, 2015, from http://mercatus.org/sites/default/files/Brito_BitcoinPrimer.pdf Cassano, J. (2014, Sep 17). What Are Smart Contracts? Cryptocurrency's Killer App. Retrieved April 29, 2015, from http://www.fastcolabs.com/3035723/app-economy/smart-contracts-could-be-cryptocurrencys-killer-app Chaum, D. (1998). Blind signatures for untraceable payments. Advances in Cryptology Proceedings of Crypto (1983) , 82 (3), 199–203. Chesbrough, H., & Crowther, A. K. (2006). Beyond high tech: early adopters of open innovation in other industries. R&D Management , 36 (3), 229-236. Coin Center. (2015, Jan 27). Bitcoin Public Sentiment Survey. Retrieved March 23, 2015, from http://coincenter.org/survey/ CoinATMRadar. (2015). Bitcoin ATM Map – Find Bitcoin ATM, Online Rates. Retrieved May 9, 2015, from http://coinatmradar.com CoinDesk. (2015, April 10). State of Bitcoin Q1 2015: Record Investment Buoys Ecosystem. Retrieved April 14, 2015, from CoinDesk: http://www.coindesk.com/state-of-bitcoin-q1-2015-record-investment-buoys-ecosystem/ Commonwealth of Massachusetts Division of Banks. (2014). 014 Consumer Survey: Consumer Attitudes on Bitcoin and Other Virtual Currencies. Retrieved Jan 13, 2015, from http://www.csbs.org/regulatory/ep/Documents/Final%20Report-VirtualCurrencySurvey2014.pdf Davenport, B. (2015, Jan 1). What is Multi-Sig, and What Can It Do? A Backgrounder for Policymakers. Retrieved April 14, 2015, from Coin Center: https://coincenter.org/2015/01/multi-sig Dell SecureWorks. (2014, Feb 26). Cryptocurrency-Stealing Malware Landscape. Retrieved May 9, 2015, from http://www.secureworks.com/cyber-threat-intelligence/threats/cryptocurrency-stealing-malware-landscape/ Gandal, N., & Halaburda, H. (2014, Sep). Competition in the Cryptocurrency Market. Bank of Canada Working Paper 2014-33 . Goldman Sachs. (2014). All About Bitcoin. Global Macro Research (21).
71
Grigg, I. (1999, Feb 10). How Digital Cash Blew Everything. Retrieved from CRYPTOME: http://cryptome.org/jya/digicrash.html Grinberg, R. (2011). Bitcoin: An Innovative Alternative Digital Currency. Hastings Science & Technology Law Journal , 4 (1), 160-208. Hirshman, N. (2015, Feb 15). The Next Level of Bitcoin Consumer Protection Revealed: Bitrated Introduces an Online Reputation Management and Payment System for Bitcoin Users. Retrieved from PRNewswire: http://www.prnewswire.com/news-releases/the-next-level-of-bitcoin-consumer-protection-revealed-bitrated-introduces-an-online-reputation-management-and-payment-system-for-bitcoin-users-292390651.html HM Treasury. (2015, March). Digital currencies: response to the call for information. Retrieved april 14, 2015, from UK goverment: www.gov.uk/government/publications HM Treasury. (2013, March 22). Economic growth in developing countries, 2. (D. f. Development, Producer) Retrieved April 14, 2015, from https://www.gov.uk/government/policies/helping-developing-countries-economies-to-grow Juniper Research. (2015, April 2). The Future of Cryptocurrency: Market Trends & Competitive Landscape 2015-2019. Retrieved March 23, 2015, from http://www.juniperresearch.com Kharif, O. (2015, April 10). Samsung Plans to Take Bitcoin Technology Beyond Virtual Currency. Retrieved April 29, 2010, from Bloomberg Business: http://www.bloomberg.com/news/articles/2015-04-10/samsung-plans-to-take-bitcoin-technology-beyond-virtual-currency Kotler , P., & Keller, K. L. (2011). Marketing Management 14 edition . Prentice Hall. Kristoufek, L. (2014). What are the main drivers of the Bitcoin price? Evidence from wavelet coherence analysis. 1. Lazcano, I. C. (2013). he Historical Role of the European Shadow Banking System in the Development and Evolution of Our Monetary Institutions. Working Paper, London, UK: City Political Economy Research Centrer, Department of International Politics, City University London. Lee , J., Long, A., McRae, M., & Handler, S. (2015). Bitcoin Basics: a Primer on Virtual Currencies. Business Law International , 16 (1), 21-48. Lo, S., & Wang, C. (2014, September 4). Bitcoin as Money? Retrieved April 14, 2014, from http://www.bostonfed.org/economic/current-policy-perspectives/2014/cpp1404.pdf Long, A., Lee, A. J., Steiner, J., Wood, V., & Handler, G. S. (2015). Blockchain Technology and Legal Implications of ‘Crypto 2.0’. BNA’s Banking Report. Bloomberg BNA.
72
Luther , W. J. (2013, July 17). Cryptocurrencies, Network Effects, and Switching Costs. Kenyon College, George Manson University . (M. C. 13-17, Ed.) Maurer, B., Nelms, T., & Swartz, L. (2013). When perhaps the Real Problem is itself, The Practical Materiality of Bitcoin. Social Semiotics , 23 (2), 261-277 . Mims, C. (2013, Feb 13). 31% of Kenya’s GDP is spent through mobile phones. Retrieved May 1, 2015 Moore, G. A. (2006). Crossing the Chasm. HarperBusiness. Moore, G. A. (2005). Inside the Tornado. HarperBusiness. Moore, T., & Nicolas, C. (2013). Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk. Financial Cryptography and Data Security Lecture Notes in Computer Science , 7859, pp. 25-33. Moskowitz , H. R., & Gofman, A. (2007). Selling blue elephants. Pearson Prentice Hall. Moskowitz, H. (2014). Big Mind + Big Data: Empathy and Experiment build Mind Genomics. Retrieved from http://home.etf.rs/~vm/os/vlsi/predavanja/IEEE.TransactionsMorocco.v2%20(2).pdf Moskowitz, H. (2012). ‘Mind genomics’: The experimental, inductive science of the ordinary, and its application to aspects of food and feeding. Physiology & Behavior , 107, 606-613. Moskowitz, H., Gofman, A., Beckley, J., & Ashman, H. (2006). Founding a new science: Mind genomics. Journal of Sensory Studies , 21 (3), 266-307. Moskowitz, H., Gofman, A., Itty, B., Katz, R., Manchaiah, M., & Ma, Z. (2001). Rapid, inexpensive, actionable concept generation and optimization – the use and promise of self authoring conjoint measurement for the foodservice industry. Foodservice Technology , 1, 149-168. Perez, Y. B. (2015, Feb 11). Survey: 8% of US Retailers Plan to Accept Bitcoin in the Next Year. Retrieved March 23, 2014, from Coindesk: http://www.coindesk.com/survey-8-us-retailers-plan-accept-bitcoin-next-year/ Prisco, G. (2015, March 19). Intel Joins the Blockchain Technology Race, Forms Special Research Group. Retrieved April 29, 2015, from Bitcoin Magazine: https://bitcoinmagazine.com/19646/intel-joins-blockchain-technology-race-forms-special-research-group/
73
PwC. (2014, Feb 7). Digital Disruptor How Bitcoin is Driving Digital Innovation in Entertainment, Media and Communications (EMC). Retrieved Jan 12, 2015, from DIGITAL Disruptor. Rogers, M. E. (2003). Diffusion of innovations. New York: Free Press. SagePub. (n.d.). Chapter 1 - The Role of Marketing Research. Retrieved May 9, 2015, from SagePub: http://www.sagepub.com/upm-data/53627_ch1,2.pdf Satoshi, N. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. www.bitcoin.org . Swan, M. (2015). Blockchain: Blueprint for a New Economy. Sebastopol CA: O'Reilly Media. Szabo, N. (1997). The Idea of Smart Contracts. Retrieved April 29, 2015, from http://szabo.best.vwh.net/smart_contracts_idea.html The Law Library of Congress. (2014). Regulation of Bitcoin in Selected Jurisdictions. Global Legal Research Center. Report for Congress . TheBlogChain. (2015). Useful Bitcoin Resources. Retrieved April 29, 2015, from TheBlogChain: http://theblogchain.com/useful-bitcoin-resources/ Walston Chubb Award. (2010). Moskowitz to Receive 2010 Walston Chubb Award. American Scientist 98 , 4 (358). Wan, T., & Hoblitzell, M. (2014). Bitcoin Fact. Fiction. Future. Retrieved from Press, Deloitte University. Wei, D. (1999). bmoney. Retrieved from http://www.weidai.com/bmoney.txt Zhen, S. (2013, April 28). Compare the Cost of Bank Wire Transfer Fees. Retrieved May 1, 2015, from Bank Tracker: http://www.mybanktracker.com/news/2013/04/18/wire-transfer-fees-2013/
74
8. Appendices
Appendix A - Participates Profile Questions
What is your gender? • Female • Male
Choose your Age group? • 18-24 years • 25-34 years • 35-44 years • 45-54 years • 55-64 years • 65-74 years • 75 years or more
What is your marital status? • Single • Married • Other
What is your educational professional background? • STEM (Science, Technology, Engineering, and Mathematics) • Liberal Arts • Social/Behavioral Sciences • Business/Finance/Economics • Philosophy • Medical • Music • Other
Highest level of education completed? • High School • Associate degree • Undergraduate Degree • Graduate Degree • Professional degree • PhD
Which of the following best describes your interest group? • Business owners • Consumers • College students • Financial Industry • Government • Developers
Please specify your current region: • Africa • Asia • Europe • Middle East • North America • Oceania • South America
75
Appendix B - a graphical representation of a digital currency study subject’s profile information. Shown are gender, age, martial status, region, education level, interest group. The y axis is the number of total participants.
0!
5!
10!
15!
20!
25!
30!
Single! married! other!
B:#Marital##status#
Male!67%!
Female!33%!
A:#Gender#
0!
5!
10!
15!
20!
25!
18:24! 25:34!! 35:44!! 45:54!! 55:64!! 75!older!!
C:#Age#
0!5!10!15!20!25!30!35!
D:#Region#
76
0! 5! 10! 15! 20! 25!
Graduate!Degree!
Undergraduate!Degree!
High!School!
Professional!degree!
Associate!degree!
PhD!
F:#Education#Level#
0! 5! 10! 15! 20! 25! 30! 35!
Business!owners!
Consumers!
Financial!Industry!
Developers!
Other!
College!students!
Government!
E:#Interest#Groups#
0! 5! 10! 15! 20! 25! 30! 35!
STEM!
Business/Finance/Economics!
Other!
Liberal!Arts!
Social/Behavioral!Sciences!
Philosophy!
Medical!
Music!
G:#Educational/professional#background#
77
Appendix C – Experimental Study on Digital Currencies – Data Results
A1
A2
A3
A4
A5
B1
B2
B3
B4
B5
C1
C2
C3
C4
C5
D1
D2
D3
D4
D5
It is a decentralized network …
not controlled by an individual or a company
Your account balance can be printed
Once paym
ent is made you can’t “undo” it …
it is not reversible or disputable
It can be used globally
Instantly transfer money or m
ake a payment w
orldwide
Easy to use … via an application on a sm
art-device or a computer
A hum
an “teller” may convert your digital m
oney to (from) cash
Most local A
TMs w
orldwide accept this digital currency
More than 30%
of businesses worldw
ide now accept this digital m
oney
Use this digital currency to m
ake micro paym
ents … as sm
all as a penny
It is 50% cheaper for business ow
ners to accept this digital currency than a credit card
There is a negligible fee to convert this currency to any other digital currency or cash
Creating a digital “wallet” is as easy as dow
nloading an app … no need for a special device or know
ledge
People without a bank account m
ay use this digital currency
The number of coins produced are lim
ited … the value m
ay increase in the future
No identity theft …
it doesn’t expose your personal information
This digital currency has a very strong mathem
atical algorithm …
it has never been broken
This digital currency is insured … just like a credit card
Unlike cash …
this digital currency is resistant to counterfeiting
Proof of a transaction may be verified w
ithout involving a third party
Base Size
Constant
-4.1
-9.3
-18.4
-10.3
-3.3
-1.7
1
-3.4
-0.3
2.4
-1.5
-5.1
-5.6
-2.5
-6.8
11
14.1
5.9
7.7
10.5
54
70.4
Total Sample
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1
100
Q1_A
frica
-27.7
-27.1
-15.8
-14.2
-6
-3.1
0.1
-8.7
-4.8
-7.9
-16.8
-19.9
-10.7
-0.3
-22.9
4.8
20.1
7.2
-6.7
14.7
6
93.2
Q1_A
sia
4.5
5.8
-10
-14.2
13.5
-4.5
-20.1
-8.6
-8.3
0.2
15.1
9.3
-3.9
15.8
8.5
-19.2
-6.9
-20.1
-3.1
-20.9
8
83.7
Q1_Europe
78
26.3
-33.2
19.4
-60.2
-7.5
-100.6
-9.8
-20.2
-74.8
-44.2
-8.5
5.4
23.6
70.6
-7.6
28.8
-45.9
-23.9
21.2
41
1
53.3
Q1_M
iddle east
-2.6
-8.6
-22.3
-7.5
-5.7
1.7
9.3
-0.4
6.1
7.3
-2.3
-8
-6.9
-7.9
-8.2
17.6
19
11.5
11.3
17.1
35
64.8
Q1_N
orth Am
erica
-17.7
-22.6
-16.6
-21.8
-12.5
-16.3
-29.6
-18.4
-16.4
-15.9
2.3
0.1
6.5
-3.2
8.2
18.2
18.9
19.3
16.1
0.8
2
65.1
Q1_O
ceania
10.7
-5.1
-22.5
9
-19.9
40.5
-39.9
5.5
-27.4
-3.8
-17.5
43.7
-0.5
-44
-21.7
40.4
36.9
20.2
33.2
6.9
1
19.2
Q1_South A
merica
-0.6
-8.8
-19
-8.1
-5.2
-20.2
-4.5
-15.7
-13
-1.1
6.8
-2.4
10.1
12
-7.9
16.1
10.6
6.6
18.2
16.8
13
69
Q2_Fem
ale
-5.2
-9.4
-18.2
-11
-2.7
4.2
2.8
0.4
3.7
3.5
-4.2
-6
-10.5
-7.1
-6.5
9.4
15.2
5.7
4.4
8.6
41
70.8
Q2_M
ale
8.8
-5.5
-39.3
-39.1
-10.8
-22.1
-12.6
3.4
-24.9
-4.2
19.5
7.7
-8
3.6
15.1
20.4
-2.6
16.1
34.3
12.7
5
88
Q3_18-24 years
-13.4
-23
-28.5
-16
-10.4
-2.9
0.3
-5.6
-2.4
6.2
-5
-11.3
-4.1
-7.8
-13.8
13.8
17.1
5.2
7.7
10.1
23
77.7
Q3_25-34 years
7.9
15.7
4.2
13.1
20.6
1
2.6
-5.3
11.3
0.8
2.7
-1.3
-3.9
4.4
-1.1
-0.6
14.3
1.3
4
7.3
13
54.8
Q3_35-44 years
79
-4.2
-10.9
-11.3
-9
-9.2
1.8
1.6
-2.9
-0.8
-1
-3.1
1.5
-13.9
0.7
-9.3
9.5
13.3
2.1
-1.9
9.8
9
69.6
Q3_45-54 years
-7
-16.7
-31.2
-26.9
-24.1
19.7
21.6
7.3
7.3
1.8
-24
-17.5
3.6
-11.4
-9.8
32
24.6
27.3
11.7
29.9
3
78.1
Q3_55-64 years
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Q3_65-74 years
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0
Q3_75 years or m
ore
-9
-14
-28.3
-19.6
-6
-0.7
2
-4.6
-1.5
4.1
-6.4
-9.5
-13.4
-11
-13
16.3
22.1
11.2
12.8
16.9
32
73.4
Q4_STEM
(Science, Technology, Engineering, and Mathem
atics)
-5.8
-11.3
-17.7
-1
-9.3
3.1
2
-8.5
7.8
1.6
-3.2
-7.3
-1.7
7.8
-6.5
-4.9
-1.9
0.8
-0.4
7.7
5
66.1
Q4_Liberal A
rts
80
-1.7
-22.3
12.4
-21.8
-11
-45.5
-3.1
-29.8
-35.5
-24.4
2.5
9
17.7
16.5
-3.1
6.9
0.1
-13.1
-7.6
20.5
4
55.6
Q4_Social/Behavioral Sciences
-1.7
-7
-15.4
-2.4
-0.3
2.5
-6.6
8.8
4.1
-0.5
3.2
-1.2
0.1
-3.6
-6.7
6 10
2.9
-1
0.4
18
70.1
Q4_Business/Finance/Econom
ics 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 3 66.7
Q4_Philosophy
-24.3
-23.9
5.3
-8.8
-21.9
-22.2
0.9
-30.4
-23
-13.6
10.5
-1.9
19
5.8
-1.1
-4.5
8.9
-11.3
-26.4
-1.8
3 60.8
Q4_M
edical
5.6
1.8
-28
-15.4
1.6
-3.5
-15
9.1
-14.7
-7.7
18.7
-6.2
12.9
4 6.6
-18.9
-21.3
-11.8
-12.8
-25.3
2 65
Q4_M
usic
10.2
8.5
5.4
11
10.8
7.9
-0.5
4.3
10.7
3.2
5.4
11
4.9
7.7
11.7
9.5
4.7
1.7
6 -1.2
9 51.5
Q4_other
-5.4
-18.3
-28.7
-17.3
-7.4
-6.3
-2.9
-0.5
-3.5
4.5
-3.1
-7
-7.8
-8.5
-8.9
19.6
13.4
9.7
17.7
12
24
77.2
Q5_Single
-3.2
-3
-11.6
-5.2
0.6
2.7
7 -3.4
4.3
1.3
2 -1.1
-0.9
3.9
-3.1
8 17
4 -1.3
9.4
26
62.5
Q5_M
arried
-2.3
4.4
-0.4
-1.3
-4.1
-2.6
-13.9
-21.4
-11.3
-3.9
-15
-20.2
-22.7
-7.8
-18
-20.8
-0.8
-4.8
6.8
9.6
4 81
Q5_O
ther
81
-12.3
2.6
-11.7
-12.8
-1.9
-2.5
-16
-1.9
-10.7
-1.5
3.5
-19.3
-8.9
-2.5
-9
-20.9
-12.1
-17.1
-10.7
-20.2
7 105.3
Q6_H
igh School
-7.1
-10.4
0.3
-1.2
-8.8
-3.4
-25.1
-4.8
6.2
-3.4
8.3
16
6.5
13.2
7.6
13.5
7.4
0.6
4.2
-10.2
4 92.6
Q6_A
ssociate degree
-3.3
-24.1
-26.5
-18.9
-14.6
-9.1
16.5
-7.9
-1.6
4.8
-2.4
-6.5
-11.5
-7.7
-10
23.2
17.4
18.6
13.5
29.5
13
61.6
Q6_U
ndergraduate Degree
-7.2
-5.7
-24
-9.7
-2
0.7
4.8
-6.6
3.1
1.5
-4.7
-8.9
0.8
-1.4
-10.1
15.1
20.5
10.5
15.2
19.5
20
65.4
Q6_G
raduate Degree
3.3
-11
-8.8
-11.3
8.4
-4.2
-13.3
-2.9
-12.3
-1
-4.2
8.6
-17.9
-4.6
-6.9
12.8
23.9
3.5
7.8
-0.1
6 62.8
Q6_Professional degree 15.2
4 -8.5
11.4
11.8
17.6
9.5
24.7
16.1
16
2.1
1.4
-5.5
-3.1
9.6
1.4
9 -9
-12.4
-5.4
4 51.5
Q6_PhD
0.8
-6.8
-16.9
-9.9
-8.8
-0.4
3.9
2.2
1.1
5.7
5.6
-0.2
-3.1
1.8
-3.5
10
12.8
6.3
5.5
11.5
30
64.6
Q7_Business ow
ners
82
-5
-8.8
-14.8
-9.2
-3.5
-5.1
-3.2
-8.9
-4.3
-3.2
-6.2
-9.7
-3.8
-8.4
-14.7
9.1
16.8
6 7.8
16.1
27
76.1
Q7_Consum
ers
1.8
-15.4
-28.5
-6.9
-5.1
-8.5
10.1
6.5
-0.5
17
-0.9
-11.2
-12.2
-7
-20.6
28.9
13.7
13.1
14.6
21.1
12
55
Q7_College students
3.5
-4.3
-21.4
-14.3
-4.9
-7.3
7.5
-6.4
4 -1.3
-1
-2.9
-10.3
-4.9
0.1
15.5
15
15.6
8.2
16.1
14
65.3
Q7_Financial Industry
-13.7
-27.1
-46.4
-40.8
-21.1
9.7
-7.7
17.2
7.6
7.3
-10.6
-11.2
-12.8
-13.6
6.2
8.9
-6.1
17.7
16.7
10.1
6 67.2
Q7_G
overnment
-15.9
-23.1
-13.8
-24.4
-12.8
3.3
-11.3
-7.1
-4.6
-4.3
-14.3
-5.6
-13.3
-9.9
-7.6
8.3
10.7
7.9
6.3
5.1
13
86.2
Q7_D
evelopers
-13.2
-15.1
-19.7
-15.7
-4
15
0.1
7 11.3
7.2
-0.1
8.9
-0.4
9.7
10.2
15.7
11.9
6 12.4
9.2
13
50.1
Q7_O
ther:
-10.9
-16.8
-28.6
-18.1
-10.7
-0.5
3.3
1.4
0.2
4.3
-6.2
-10
-9.4
-6.2
-10.1
20.2
21.7
12.5
11.2
15.5
39
71.6
Segment 1 of 2
13.6
10.3
8.2
10
15.8
-4.7
-4.8
-15.9
-1.6
-2.8
10.5
7.6
4.4
7.1
1.7
-12.9
-5.7
-11.2
-1.3
-2.4
15
67.2
Segment 2 of 2
83
-14.6
-21.3
-30.9
-24.7
-14.5
-8.3
-5.2
-8
-6.7
-6
-5.8
-3.6
-5
-2.5
-7.1
26.8
26
19.4
17.5
21.3
29
67.9
Segment 1 of 3
13.6
10.3
8.2
10
15.8
-4.7
-4.8
-15.9
-1.6
-2.8
10.5
7.6
4.4
7.1
1.7
-12.9
-5.7
-11.2
-1.3
-2.4
15
67.2
Segment 2 of 3
-0.2
-3.7
-22.1
1 0.4
22.3
27.9
28.4
20.1
34.4
-7.4
-28.7
-22.2
-16.8
-18.9
1.2
9 -7.8
-6.9
-1.2
10
82.2
Segment 3 of 3