Switch to: References

Add citations

You must login to add citations.
  1. Engineering the trust machine. Aligning the concept of trust in the context of blockchain applications.Eva Pöll - 2024 - Ethics and Information Technology 26 (2):1-16.
    Complex technology has become an essential aspect of everyday life. We rely on technology as part of basic infrastructure and repeatedly for tasks throughout the day. Yet, in many cases the relation surpasses mere reliance and evolves to trust in technology. A new, disruptive technology is blockchain. It claims to introduce trustless relationships among its users, aiming to eliminate the need for trust altogether—even being described as “the trust machine”. This paper presents a proposal to adjust the concept of trust (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Blockchain Ethics.Peter G. Kirchschlaeger - 2023 - Philosophies 9 (1):2.
    There is no question about the innovation force and the economic potential of blockchain technology. As the basis for new currencies, financial services, and smart contracts, blockchain technology can be seen as the fifth disruptive computing paradigm, after mainframes, personal computers, the Internet, and mobile devices. However, there are questions about its ethical implications, which have the potential to also impact the economic success of blockchain technology. This article aims to provide ethical guidance on blockchain technology. In order to reach (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Bitcoin protocol as a system of power.Efpraxia D. Zamani - 2022 - Ethics and Information Technology 24 (1):1-14.
    In this study, I use the Critical Realism perspective of power to explain how the Bitcoin protocol operates as a system of power. I trace the ideological underpinnings of the protocol in the Cypherpunk movement to consider how notions of power shaped the protocol. The protocol by design encompasses structures, namely Proof of Work and Trustlessness that reproduce asymmetrical constraints on the entities that comprise it. These constraining structures generate constraining mechanisms, those of cost effectiveness and deanonymisation, which further restrict (...)
    Download  
     
    Export citation  
     
    Bookmark