ISM Session8
ISM Session8
Managers (ISM)
▪ Session: 8
▪ Term: 3
▪ Batch: PGP 2022-24
▪ Facilitator: Dr. Ashish Viswanath
1
Blockchain
Managerial Overview of Tech Trends
2
Case
Coda Coffee and bext360 Supply Chain
3
https://youtu.be/-mxyh39UjjI
What are the Coda Coffee founder’s
objectives?
What do these guys care about the most?
Group 11
What are the objectives of Fair-Trade &
Farm2Cup certifications?
Group 5
Do you think these certification helped in
achieving the objectives of Coda coffee
founders fully?
Group 5
• Key limitation?
• Fairtrade certificate neither guarantees quality nor ethics
• Low transparency and quality
• Traceability
• Solutions?
• Greater transparency (into ethics & quality of sourcing)
• Blockchain?
How does Bext360’s SaaS solution ensure
transparency?
Properties:
• Independence: Do not require a physical transfer of value
• Security: Not possible to be double-spent or illegally created
• Privacy: Protect the privacy/anonymity of the user, untraceable
• Off-line: Payment Payee does not need to involve a bank
• Transferability: Directly from one user to another
13
Traditional Centralized Systems
14
15
How to move ‘value’ peer-to-peer
without any central intermediary?
16
How to move ‘money/value’ peer-to-peer
without any central intermediary?
Solution: ‘Bitcoin: A Peer-to-Peer Electronic Cash System’ Nakamoto (Oct 31, 2008)
• The solution replaced a centralized trusted third party with a network of users, allowing
for a truly decentralized peer-to-peer payment solution.
17
Mechanism
18
What is Blockchain?
Definition:
• “A blockchain application is a distributed peer-to-peer system for
validating, time stamping, and permanently storing transactions on a
distributed ledger that uses cryptography to authenticate digital asset
ownership and asset authenticity, and consensus algorithms to add
validated transactions to the ledger and to ensure the ongoing integrity
of the ledger’s complete history.” (Lacity, 2018)
21
Cryptography:
Definition: Communications in the presence of adversaries
22
1. Tamper proofing using Hash function
• Hash function is an algorithm that calculates
a relatively unique output (called a message
digest) for an input of nearly any size (e.g., a
file, text, or image)
23
Demo - Hash
https://andersbrownworth.com/blockchain/hash
24
2. Consent using Digital signature
26
27
Decentralized
Network
Consensus
Determining which user publishes the next block
Satoshi’s solution:
Security based on
1. Consensus Protocol (PoW)
2. Native Currency (Incentive)
28
Bitcoin
Transaction
29
Blocks
• Users submit candidate transactions to the block chain
network via software
• It must then wait in a queue until it is added to the block
chain by a publishing node
• The block data contains a list of validated and authentic
transactions which have been submitted to the
blockchain network.
• Validity and authenticity is ensured by checking that the
transaction is correctly formatted and that the providers
of digital assets in each transaction have each
cryptographically signed the transaction.
• The other verifying nodes will check the validity and
authenticity of all transactions in a published block and
will not accept a block if it contains invalid transactions.
30
Demo - Blocks
https://andersbrownworth.com/blockchain/block
31
Chaining the Blocks
• If a previously published block were changed, it would have a different hash.
• This in turn would cause all subsequent blocks to also have different hashes since they include the
hash of the previous block.
• This makes it possible to easily detect and reject altered blocks
Source: NIST
32
Nonce – for PoW (Proof of Work)
• Nonce is an arbitrary number
• Can be combined with data to produce different hash digests per nonce
hash (data + nonce) = digest
• Changing the nonce value provides a mechanism for obtaining different digest values while keeping
the same data.
• This technique is utilized in the proof of work consensus model
33
Mining
• The steady addition of a constant of amount of new coins is analogous to gold miners
expending resources to add gold to circulation. In our case, it is CPU time and electricity
that is expended
• The incentive can also be funded with transaction fees
34
https://youtu.be/FtR06bIDxkE
35
Proof of Stake – Consensus Protocol
• Based on the idea that the more stake a user has invested into the system, the more
likely they will want the system to succeed, and the less likely they will want to subvert it.
• In PoS, your chance of being picked to create the next block depends on the fraction of
coins in the system you own (or set aside for staking).
• If the validator tries to double sign the system, those coins are slashed
36
Principles of Blockchain
• Distributed Database
• Each party on a blockchain has access to the entire database and its complete history.
• Records can be verified directly by each party, without an intermediary.
• Peer-to-Peer Transmission
• Communication occurs directly between peers instead of through a central node (intermediary).
• Transparency with Pseudonymity
• Transaction are visible to everyone and users can choose to remain anonymous.
• Irreversibility of Records
• Various computational algorithms and approaches are deployed to ensure that the recording on
the database is permanent.
• Computational Logic
• Users can set up algorithms and rules that automatically trigger transactions between nodes.
38
Blockchain Continuum
Source: Murray, M. (2019). Tutorial: A Descriptive Introduction to the Blockchain. Communications of the Association for Information Systems, 45
40
https://youtu.be/AEfg8hJsYbA
https://youtu.be/CYJILzRKJmQ
Emerging Applications of
Blockchain
43
Smart Contracts
• Smart contracts are digital contracts that run on a Blockchain
Definition:
“A computerized transaction protocol that executes the terms of a contract. The general
objectives of smart contract design are to satisfy common contractual conditions (such as
payment terms, liens, confidentiality, and even enforcement), minimize exceptions both
malicious and accidental, and minimize the need for trusted intermediaries.”
- Nick Szabo (1994)
“A smart contract is a collection of code and data that is deployed using cryptographically
signed transactions on the blockchain network” - NIST
44
Smart Contracts
• Paper contracts separates agreement from the execution
45
46
47
48
49
50
51
A Digital Vending Machine
• A simple metaphor for a smart contract is a vending machine -
specific inputs guarantee predetermined outputs
• You select a product
• The vending machine tells the amount required to purchase the
product
• You insert the correct amount
• The vending machine verifies you have inserted the correct
amount
• The vending machine dispenses the product of choice
• The vending machine will only dispense your desired product after
all requirements are met
• Like how a vending machine removes the need for a vendor
employee, smart contracts can replace intermediaries in many
industries
52
Lifecycle of a smart contract
Source: Zheng, Z., Xie, S., Dai, H. N., Chen, W., Chen, X., Weng, J., & Imran, M. (2020). An overview on smart contracts: Challenges, advances and platforms. Future
Generation Computer Systems, 105, 475-491.
53
Smart contract – Use cases
• Automating insurance claims https://etherisc.com/
• Cross border payments, Escrow payments
• Loan processing
• Government – Land title registry
• Supply chain management
• Asset sharing (such as Uber and Airbnb)
• Identity management
• Bidding
• Lotteries, Gambling https://youtu.be/V7v0G1e6DHQ
54
Non-fungible tokens (NFT)
• A way to represent anything unique as an blockchain-based asset
• Solution to the copy/paste problem
• Tokenizing physical assets
Definition:
• An NFT is a unit of data, stored on a type of digital ledger called a blockchain, which can
be sold and traded. NFTs are tokens that we can use to represent ownership of unique
items. They let us tokenize things like art, collectibles, even real estate.
55
Non-fungible tokens (NFT)
56
Use Cases
What are NFTs used for?
• Digital content - Maximizing earnings for creators
• Gaming items - Ownership for in-game items, resell in NFT marketplace
• Physical items - Tokenization
• Investments and collateral - NFT-backed loans
Real world Examples
• A unique digital artwork
• A digital collectible
• Fashion items
• Certificates of authenticity – DEGREECERT
• Music royalties via NFTs
• Buy real world goods
57
How can Coda Coffee sell the value
of their partnership with Bext360 to
their wholesale and retail customers?
Group 3
58
Delivering Value
• Conscious consumerism
• Retail customers vs. Wholesale customers
• In 2015, Nielsen polled 30,000 consumers in 60 countries.
• Across the board, consumers were willing to pay extra for sustainability
• 66% were willing to pay more for sustainable goods
• 73% of millennials were willing to pay extra for sustainability
• Cupping score – could be used as a differentiator
59
What Blockchain can do?
• Creates an immutable, digital audit trail of transactions – cheaply verify integrity
• Help business and individuals agree on the true state of affairs within the market
without relying on a costly intermediary
• Ensures that at any point in time the digital record represents the true consensus
among the key stakeholders involved.
• It can replace the need for trust between players, or the need for a trusted third
party to maintain and verify record of transactions
Source: What Blockchain Can not Do. Harvard Business Review, 2019
What Blockchain can’t do?
• At the interface of offline world and it’s digital
representation, the usefulness of Blockchain still depends on
trusted intermediaries to effectively bridge the last mile
between a digital record and a physical individual, business,
device, or event.
62
Thank You
63
Secure Electronic Transaction
64
65
Consensus Comparison Matrix
66