Cryptocurrencies and Blockchain. Relevance and risks for companies in the age of digitization

Bachelor Thesis, 2018

58 Pages, Grade: 1,7



List of figures

List of tables

List of abbreviations

1 Introduction
1.1 Problem description
1.2 Course of investigation

2 Basics and theoretical foundations
2.1 Fundamentals of Blockchain
2.1.1 Transactions and its particularities in terms of blockchain
2.1.2 How blockchain works
2.2 Blockchain applications
2.2.1 Basic blockchain applications
2.2.2 Practical relevance of blockchain

3 Impacts of blockchain to the banking industry

4 Implications with reference to corporate finance
4.1 General terminology of corporate finance
4.2 Blockchain-based financing as addition to traditional sources
4.2.1 Bank loans as a sample of debt financing
4.2.2 Initial Public Offering as a sample of equity financing
4.2.3 Peer-to-Peer-Lending as a counterpart to bank loans
4.2.4 Initial Coin Offering as a counterpart to an Initial Public Offering
4.3 Risks of dealing with cryptocurrencies

5 Critical review and deduction

6 Conclusion and outlook


List of figures

Figure 1: Types of networks

Figure 2: Process of cryptography

Figure 3: Symmetric cryptography

Figure 4: Asymmetric cryptography

Figure 5: How the blockchain works

Figure 6: Smart contracts in terms of blockchain

Figure 7: Smart contracts in the insurance business

Figure 8: Vision of Everledger

Figure 9: Invoicing via blockchain

Figure 10: Overview of financial sources

Figure 11: P2P lending process based on Ethereum

List of tables

Table 1: Comparison of traditional banking business, Fintech 1.0 and Fintech 2.0

List of abbreviations

Abbildung in dieser Leseprobe nicht enthalten

1 Introduction

The progress of change in society through digitization, globalization and the rapid de- velopment of technology prompts new and innovative opportunities for companies across the world. Over the past few years, nearly everything is based on smart devices that are able to communicate among themselves. As a result, new technologies have arisen, been published and are able to be used by people around the world. One of the recently-released and most popular topics is blockchain. This term earned its attention through its innovative and unpresented form of technology and has motivated several parties to learn more about this issue, examine it more closely and develop it further. Particularly the range of potential applicability makes it interesting for companies to analyse possibilities for implementation with respect to their own business.

In addition, blockchain is related to another term that has arisen along with this technol- ogy, namely cryptocurrency. Especially Bitcoin is the forefather in the world of digital currencies. Over the past few years, Bitcoin has skyrocketed in popularity and value since its founding in 2009.1 Consequently, this digital currency has gained the attention of many people who are trying to predict the commercial development and future per- formance in the world’s economy. There are many pros and cons and some powerful businessmen have published their own opinions based upon the respective commercial interests. For example, Jamie Dimon – CEO of JP Morgan Chase – stated that Bitcoin is a fraud and that it will have no future due to its intangibility and its emergence out of nothing. It is understandable that the CEO of one of the largest financial institutes clas- sify cryptocurrencies as a counterparty to the banking business.2 By contrast, John McAfee challenged the statement of Jamie Dimon and compared the costs of Bitcoin mining with printing money. He said: “I'm a Bitcoin miner. We create Bitcoins. It costs over $1,000 per coin to create a Bitcoin. What does it cost to create a U.S. dollar? Which one is the fraud? Because it costs whatever the paper costs, but it costs me and other miners over $1,000 per coin. It's called proof of work.”3

1.1 Problem description

Taking a step back, the ubiquitous digitization can be stated as the baseline for compa- nies to research potential implementable innovations to digitalize their processes. In this context, the term Industry 4.0 often appears. It implies a complex technical revolution that has led to an entire redesign of the industrial value chains. Ultimately, this involves a paradigm shift, namely the combination of virtual and real production chains in the form of a cyber physical system or the "Internet of Things".4 “Digital firms leverage technologies such as mobile, social and cloud to make better decisions, automate pro- cesses, deepen their connection with customers, employees and intermediaries, and pur- sue profitable innovation, all at a rapid development pace. Furthermore, the most suc- cessful digital firms across all industries are distinguished by the degree to which digital is integrated at all levels and functions of the enterprise. Digital informs everything from strategy and organizational structure to day-to-day operations and workplace cul- ture.”5 For this reason, this thesis analyses blockchain and describes opportunities in relation to companies’ processes.

Besides the already-mentioned blockchain technology, the central question in this study is based in the field of cryptocurrencies. Essentially, currencies are the specific financial unit of a state, e.g. Dollar for the US or Yen for Japan.6 Given that cryptocurrencies are based on a decentralized peer-to-peer network (P2P), it can be measured as an interna- tional currency without a representing country.7 Especially for companies, it might be interesting to use digital currencies in the context of corporate finance.

As a result, the object of investigation in this study is the following question:

“Is it possible to use cryptocurrencies as a financial instrument in the context of corporate finance?”

1.2 Course of investigation

Quantitative and Qualitative research

Research methods can be distinguished into two main terms, namely quantitative and qualitative research.8 The main objectives of qualitative and quantitative research are essentially data reduction to select the significant data out of a large amount of data. In addition, both methods imply research questions that ultimately have to be answered.9 Nevertheless, both research methods differ from each other in several aspects. Quantita- tive research is an explanation of phenomena that are analyzed by using numbers and statistically-based methods. As a result, quantitative methods are empirical investiga- tions of phenomena that can be observed.10

Qualitative research tends to be concerned with words rather than numbers. Bryman and Bell name the researcher as the “main instrument of data collection” who decides what he/she will focus on within the research.11 Qualitative research has no theory or para- digm that is distinctly its own and it is used in many separate disciplines, rather than belonging to a single discipline.12 Moreover, it is a combination of multiple qualitative research methods; for example, participant observation, interviewing, focus groups, conversation analysis, texts and documents.13

In this thesis, a qualitative research approach is chosen, which allows a holistic view of the object of investigation and enables a general understanding of relevance and risks concerning blockchain and cryptocurrencies.

Essentially, there are two major approaches to analyzing qualitative data. On the one hand, there is the strategy of reducing large sets of data or the complexity in the data. The most common methodological step is to code the data. On the other hand, there is the most prominent way called content analysis. This strategy aims rather at expanding the material by producing one or more interpretations.14 To answer the research ques- tion in this study, content analysis is utilized.

Deductive and inductive approach

In general, there are two fundamental approaches for the generation of scientific state- ments, namely deduction and induction.

Deductive theory is the most common view of the relation between theory and research. The researcher must skillfully deduce a hypothesis and translate it into operational terms. Hence, there is a need to specify how data can be collected in relation to the con- cepts that make up the hypothesis. By contrast, an inductive approach includes state- ments regarding experiments or observations that are referred to general hypothesis and theories. The researcher infers the implications of his/her findings for the theory that prompted the whole exercise. The findings are fed back into the stock of theory and the research findings are associated with a certain domain of enquiry.15

The methodological approach adopted in this study is the deductive approach. This the- sis aims to investigate a hypothesis with reference to qualitative research. Moreover, the relevant literature is based upon secondary data, which has been initially produced by others for other research questions and not for the topic named in this thesis.16

The first part of this study deals with the terms blockchain and cryptocurrencies and it enables a basic understanding of how these technologies are working and what are the core benefits or even disadvantages with references to the world’s economy. In addi- tion, current projects in the field of blockchain will be introduced and recent develop- ments of possible forms of implementation in company’s processes will be more closely illuminated. The second part refers to corporate finance, whereby the fundamental char- acteristics and circumstances will be illuminated. Furthermore, Bitcoin will be investi- gated to declare the major differences and similarities in the context of corporate fi- nance.

Subsequently, the core findings and results are valuated, whose explanation forms the baseline for answering the research question. Finally, the outlook for future develop- ments in this technological area forms the conclusion of this study.

2 Basics and theoretical foundations

In this chapter, the meaning of blockchain is explained based on technological charac- teristics and the current state of the art. Possibilities of implementations for companies are emphasized and practical examples of successful applied processes based on this new technology show the advantage of future attention in this area. Additionally, the uniqueness of cryptocurrencies is explained and will be compared to usual currencies.

2.1 Fundamentals of Blockchain

Essentially, this section explains the technical concepts that make up blockchain and examples of business-relevant applications, as well as bridging the gap between a tech- nical and practical explanation.

The blockchain first emerged – largely unheralded – in 2009. Indeed, attention was di- rected towards the application based on the existence of which blockchain technology was made possible. The focal application and the first to run on this technology was the cryptocurrency Bitcoin.17 However, this study switches the focus and will introduce the technology of blockchain first.

Simply put, a blockchain is a ledger of transactions of digital assets: of who owns what, who transacts what, of what is transacted and when.18 From a more technical perspec- tive, “a blockchain is a distributed, transactional database. Globally distributed nodes are linked by a peer-to-peer (P2P) communication network with its own layer of proto- col messages for node communication and peer discovery.”19 P2P networks can be ex- plained as a network with equal parties (peers) that are connected without any central- ized intermediaries or regulatory entities.20 P2P networks can be stated as a special type of distributed systems. They comprise individual computers (called nodes) that make their computational resources (e.g. processing power, storage capacity, data or network band-width) directly available to all other parties of the network without having any central point of coordination.21 In other words, it is a distributed database that runs on millions and millions of computers as a giant and global spreadsheet.

Distinction between different types of networks

In order to make the uniqueness of the technology of blockchain more tangible, it is necessary to understand the differences between centralized, decentralized and distrib- uted networks.

In a centralized network (Fig. 1a), all resources of the computing system, information and variables are stored on a central computer hardware (server). Computers (nodes) need to be connected to the central computer to access these computing resources whenever they need it. The control of the nodes is carried out centrally from the central computer. Therefore, it is guaranteed that every application runs on every single node in the same way.22 “Although this model gives a little bit more control in terms of admin- istration, it has been criticized as not being transparent, stringent and unexclusive. Moreover, centralized servers are high risk data breach targets as attackers not only ex- pect to get all the information they need by hacking into a single node, but it is also time and cost effective from an attacker’s perspective. It is simply less time to breach a sin- gle node than it is to write exploit for more than one node.”23

In comparison to centralized computing systems, decentralized or distributed computing systems exploit a set of autonomous computers. Computers in the network have to co- ordinate the required tasks autonomously due to the absence of a central node. Conse- quently, every node in a decentralized computing system must be able to make its own decisions. They can be based on their own information, interactions with or information from other nodes.24 “The major difference between distributed (Fig. 1c) and decentral- ized (Fig. 1b) computing is in the manner of task distribution. The tasks are split up between nodes in a distributed network and all nodes are up-to-date with the current state of all other nodes. However, in decentralized computing, the resources are split up between nodes and each node queries for a resource and finds respective node on which needed resource exist.”25 A suitable example in the area of decentralized systems is the telephone network or the already-described P2P networks. Based upon the connection of two or more partic pants, there is no central computer necessary to share the infor- mation between the participants.26

Figure 1: Types of networks

Abbildung in dieser Leseprobe nicht enthalten

Source: Morabito, V., Business innovation through blockchain, 2017, p. 63.

Overall, centralized, decentralized and distributed networks are all networking frame- works that work effectively in various business or industrial sectors. The distributed structure of the blockchain network enables an independent exchange of information between nodes where one node does not depend on other nodes for information re- quired. All nodes only have to ensure that they are up to date by synchronizing with all other participants. Resources and computing power are not shared but are independently distributed across all nodes.27 Given that participants in the distributed network are equal concerning their rights and roles in the system, they can identify each other by their IP address and users reference each other via their public key.28 However, it should be noted that there is a difference between nodes and users.

2.1.1 Transactions and its particularities in terms of blockchain

In order to explain the particularities of transactions, first and foremost the following facts can be seen as already derivate. First, the blockchain can be stated as a distributed P2P system made of the computational resources contributed by its users. Second, the P2P system uses the internet as a network for connecting the individual nodes.29

As already described in the previous section, blockchain is the ledger of transactions and forms the baseline of the authentication and verification technology for transac- tions.30 Transactions are linked with the terms private key and public key, which can be associated with the users. Therefore, a distinction between users and nodes is necessary. “A node is a physical/virtual machine that communicates via TCP/IP and UDP with other nodes. [Simply put, a computer.] In contrast, a user is only represented by a public key address and could theoretically login from any other node. This is possible as each of the nodes maintains a database of all historical, valid transactions that have been sent between the nodes of the network.”31

Private key vs. public key

Blockchain uses cryptography as a base technology for uniquely identifying users with- in the blockchain and protecting their property. It is the ultimate goal to ensure that only the lawful owner can access to his/her property.32

The idea is to treat the accounts of users like mailboxes. In the context of transactions, whenever a member of the network decides to send funds, they would follow a proce- dure similar to signing a check, except here the signing is done by using public and pri- vate keys. A public key can be compared with an email address.33 “This concept has been used for a very long time and we still use a similar concept when we send an e- mail to an e-mail address, when we send a message in the latest chat app, or when we transfer money to a bank account. In all these cases, the security concept is based on a separation of two kinds of information: first, publicly known information that serves as an address to a trapdoor-like box; and second, private information that serves as the key for opening the box and accessing the things it contains.”34 A user would share the pub- lic key with others to send or receive emails or money in the context of transactions. To sign the transaction, the private key is necessary. It can be compared with the password to an email account and the digital signature is similar to signing a check when the user is making a transfer.35

Given that blockchain is a P2P system and it provides an open decentralized database of any transaction involving value, such as money, goods, property, work or even votes, it is not desirable for everyone to access the property assigned to the accounts managed by the blockchain. Thus, the challenge is to protect the property assigned to the account without restricting the open architecture of the system. At this point, the term cryptog- raphy gains relevance.36

Terminology of cryptography

In order to enable a general understanding of the uniqueness of transactions processed within the distributed system, it is necessary to explain the different terms of cryptog- raphy from a more technical perspective.

Essentially, cryptography has a long history of protecting secrets and messages that can be traced back thousands of years. Modern cryptography has come a long way from its origins, although the principle is similar: it is about encrypting the original message by replacing letters and numbers so that the original message cannot be read unless the targeted person has the code or method to decrypt it.37

Simply put, the digital equivalent to close a lock is encryption, whereas the digital equivalent to open a lock is decryption. In terms of blockchain, encrypted data is called cypher text. It is an extensive, incomprehensive pile of letters and figures to everyone who does not know how to decrypt this combination. In comparison to encrypted cy- pher text, decrypted cypher text contains the original data that has been encrypted.38

Figure 2: Process of cryptography

Abbildung in dieser Leseprobe nicht enthalten

Source: Drescher, D., Blockchain basics, 2017, p. 95.

There are two different types of cryptography, namely symmetric and asymmetric cryp- tography.

The symmetric approach can be practically explained as a safe with a strong lock, where the message is stored inside. The sender and the receiver must have the same key to put the message in the safe and open the safe to read the message.39 “Hence, everyone who was able to encrypt data with such a key, was automatically able to decrypt cypher text created with that key as well.”40

Figure 3: Symmetric cryptography

Abbildung in dieser Leseprobe nicht enthalten

Source: Drescher, D., Blockchain basics, 2017, p. 95.

As a result, many keys must be generated and distributed via secure channels. Neverthe- less, there is no protection against cheating among individuals.41 Consequently, the idea of asymmetric cryptography already emerged in the 1970s to solve the key exchange and trust problem.42

In order to solve the illustrated problems of the symmetric approach, asymmetric cryp- tography uses two complementary keys. Together, they build the pair of corresponding keys.43 The idea was to replace the single shared secret key with a pair of mathematical- ly-related keys. This refers to the already-mentioned public key, which can be shared without any safety issues, and the private key, which must be kept secret.44 The core characteristic of this approach is that it is not necessary for the key of the sender to en- crypt the message. The key indicator for decrypting the message is that the receiver is in possession of the corresponding private key to generate the original message that has been sent. It can be stated that the whole key has two parts: a public part and a private part.45 Essentially, it does not matter whether the private key has been used to encrypt the message or the public key; rather, it is possible through the previously-described approach or vice versa. However, it is necessary that both parties (sender and receiver) have access to one of the keys; otherwise, an isolated key can only be used for encryp- tion or decryption.46 In a figurative sense, the problem of trustworthiness is solved given that any message (or transaction) is uniquely identifiable.47 These facts are illustrated after the following figure, which initially describes the mentioned facts under consider- ing of the public key in black color and the private key in white color.

Figure 4: Asymmetric cryptography

Abbildung in dieser Leseprobe nicht enthalten

Source: Drescher, D., Blockchain basics, 2017, p. 97.

The figure above demonstrates that there are two approaches used within the blockchain technology. Asymmetric cryptography is applied in the public-to-private approach and consequently “by using the keys in this way, the information flows from the public key, where it is encrypted, to the private key, where it is decrypted. This usage of the two complementary keys is similar to a mailbox, where everyone can put letters in but only the owner can open it. It is the straightforward usage of asymmetric cryptography be- cause it fits our intuition about privacy and publicity in the same way as our address and our mailbox is public but its content is private.”48 In addition, asymmetric cryptography is also applied in the private-to-public approach. By using this method, the private key is used for encrypting the message and the public key is necessary to decrypt the mes- sage. It is comparable to a public news board, where everyone who has a copy of the corresponding public key can read the message, but only the owner of the private key can create the message. Consequently, the cypher text created with the private key serves as proof that the owner encrypted the message.49

For this reason, asymmetric cryptography aims to achieve two goals in the context of blockchain. First, identifying user accounts to maintain the mapping between owner and property by using the public key of users involved in transactions as the account num- ber.50 Second, authorizing transactions. In case of a digital currency, the authorization can be seen as the authorization of transfer of ownership.51 “Blockchain transactions are similar to what one finds in a standard double-entry ledger. Every transaction contains at least one input or debit request and at least one output which credit requests are. Transaction operations move digital currencies or values of digital currencies from one input to output or form sender to receiver.”52 When one party authorizes a change of ownership on digital currencies, the transaction output receives this message and as- signs the second party (receiver) to the digital currency. This is possible due to the pri- vate-to-public approach by digitally signing the transaction with the private key to prove the ownership of the particular currency.53 Transactions can be propagated as inputs of another transaction and thereby a transaction chain or a chain of ownership.54

2.1.2 How blockchain works

Based upon the previous chapter – which described the fundamentals of transactions – this section refers to the working process of blockchain as a whole. Essentially, block- chain was created as the main technology behind Bitcoin for authentication and verifi- cation.55 Given that blockchain enables trustless transactions that need no intermediary agent to verify the exchange, the distributed (P2P) computer network with all of its nodes builds the first part of the fundamental construct for the working process.56 This theoretical background has been described in section 2.1.1. In addition, the particularity of transactions described in chapter 2.1.2 builds an advanced part to process transac- tions in terms of authorizing transactions and identifying users within this decentralized system. These characteristics can be measured as one of three core attributes of block- chain, namely so-called decentralization.57

Blockchain owes its name due to the fact that every time a transaction is validated, it is added to a block that contains other recent transactions. It is added to the ledger com- prising other older blocks when the block reaches a certain size.58 This is based on the validation system proof-of-work (PoW), which represents a complement to the block- chain and generates competition among network members to validate transactions. “It improves its security by requiring network nodes to solve computationally-intensive mathematical problems before they can validate a particular block of transactions. A new block is added to the blockchain only after the network has reached consensus about the validity of all the transactions contained into that block.”59 In order to solve these mathematical problems, nodes are rewarded for generating the correct hash puz- zle, which is unique for every block. Hash puzzles can be described as a complex math- ematical problem that has to be solved. They build an integral element to the blockchain data structure, which makes it immutable.60 The immutability is given by the fact that blocks are linked to another with a time stamp. This is done for security purposes, given that if a network member wants to manipulate the address from one transaction to their address then not only would they need to change the time details of the described trans- action but also every other transaction within the previous block.


1 Cf. Sixt, E., Bitcoins und andere dezentrale Transaktionssysteme, 2017, p. 5.

2 Cf., Access: 29.10.2017.

3, Access: 29.10.2017.

4 Cf. Koehler, O., Skorna, A., Insurance 4.0, 2016, p. 9.

5 Catlin, T. et al., The Making of a Digital Insurer, 2015, p. 3.

6 Cf. Wildmann, L., Makroökonomie, Geld und Währung, 2015, p. 202.

7 Cf. Sixt, E., Bitcoins und andere dezentrale Transaktionssysteme, 2017, p. 5.

8 Cf. Silvermann, D., Doing qualitative research, 2001, p. 1 et seq.

9 Cf. Hardy, M., Bryman, A., Handbook of Data Analysis, 2009, p. 4 et seq.

10 Cf. Murray Thomas, R., Blending quantitative and qualitative research methods, 2003, p. 3.

11 Cf. Bryman, A., Bell, E., Business research methods, 2011, p. 408.

12 Cf. Denzin, N. K., Licoln, Y. S., Qualitative Research, 2017, p. 12.

13 Cf. Flick, U., Qualitative Data Analysing, 2014, p. 11 et seq.

14 Cf. Flick, U., Qualitative Data Analysing, 2014, p. 11.

15 Cf. Bryman, A., Bell, E., Business research methods, 2011, p. 29.

16 Cf. Harris, H., Content analysis of secondary data, 2001, p. 192.

17 Cf. Kewell, B. et al., Blockchain for good?, 2017, p. 431.

18 Cf. Kewell, B. et al., Blockchain for good?, 2017, ibid.

19 Glaser, F., Pervasive decentralisation of digital infrastructures, 2017, p. 1545.

20 Cf. Mahlmann, P., Schindelbauer, C., Peer-to-Peer-Netzwerke, 2007, p. 7.

21 Cf. Drescher, D., Blockchain Basics, 2017, p. 23.

22 Cf. Moldovyan, A. et al., Intranet, intranet and virtual private networks, 2003, p. 9.

23 Morabito, V., Business innovation through blockchain, 2017, p. 62.

24 Cf. Lewis, P. R. et al., Self-aware computing systems, 2016, p. 106.

25 Morabito, V., Business innovation through blockchain, 2017, p. 64.

26 Cf. Lewis, P. R. et al., Self-aware computing systems, 2016, p. 106.

27 Cf. Morabito, V., Business innovation through blockchain, 2017, p. 64.

28 Cf. Glaser, F., Pervasive decentralisation of digital infrastructures, 2017, p. 1545.

29 Cf. Drescher, D., Blockchain basics, 2017, p. 58.

30 Cf. Morabito, V., Business innovation through blockchain, 2017, p. 22.

31 Glaser, F., Pervasive decentralisation of digital infrastructures, 2017, p. 1545.

32 Cf. Drescher, D., Blockchain basics, 2017, p. 94.

33 Cf. Bheemaiah, K., The blockchain alternative, 2017, p. 56.

34 Drescher, D., Blockchain basics, 2017, p. 94.

35 Cf. Bheemaiah, K., The blockchain alternative, 2017, p. 56.

36 Cf. Morabito, V., Business innovation through blockchain, 2017, p. 21.

37 Cf. Fleming, S., Introduction to blockchain technology, 2017, p. 9.

38 Cf. Drescher, D., Blockchain basics, 2017, p. 95.

39 Cf. Paar, C., Pelzl, J., Understanding cryptography, 2009, p. 150.

40 Drescher, D., Blockchain basics, 2017, p. 96.

41 Cf. Paar, C., Pelzl, J., Understanding cryptography, 2009, p. 151.

42 Cf. Thorsteinson, P., Ganesh, G., NET Security and cryptography, 2004, p. 102.

43 Cf. Drescher, D., Blockchain basics, 2017, p. 97.

44 Cf. Thorsteinson, P., Ganesh, G., NET Security and cryptography, 2004, p. 102.

45 Cf. Paar, C., Pelzl, J., Understanding cryptography, 2009, p. 152.

46 Cf. Drescher, D., Blockchain basics, 2017, p. 97 et seq.

47 Cf. Lemieux, V. L., Is blockchain technology the answer?, 2016, p. 119.

48 Drescher, D., Blockchain basics, 2017, p. 99.

49 Cf. Brooks, R. R., Disruptive security technologies, 2004, p. 42.

50 Cf. Drescher, D., Blockchain basics, 2017, p. 100.

51 Cf. Schlatt, V. et al., Blockchain: Grundlagen, Anwendung und Potentiale, 2016, p. 11.

52 Morabito, V., Business innovation through blockchain, 2017, p. 68.

53 Cf. Schlatt, V. et al., Blockchain: Grundlagen, Anwendung und Potentiale, 2016, p. 10 et seq.

54 Cf. Morabito, V., Business innovation through blockchain, 2017, p. 68.

55 Cf. Sixt, E., Bitcoins und andere dezentrale Transaktionssysteme, 2017, p. 39.

56 Cf. Morabito, V., Business innovation through blockchain, 2017, p. 23.

57 Cf. Morabito, V., Business innovation through blockchain, 2017, ibid.

58 Cf. Bheemaiah, K., The blockchain alternative, 2017, p. 56 et seq.

59 Pazaitis, A. et al., Blockchain and value systems in the economy, 2017, p. 109.

60 Cf. Drescher, D., Blockchain basics, 2017, p. 156 et seq.

Excerpt out of 58 pages


Cryptocurrencies and Blockchain. Relevance and risks for companies in the age of digitization
University of Applied Sciences Essen
Catalog Number
ISBN (eBook)
ISBN (Book)
File size
930 KB
Blockchain, Cryptocurrency, Kryptowährung, lending, ico, consensus, crypto, cryptography, ethlend, finance, ipo, loans, peer-to-peer, distributed network, bitcoin, ethereum, smart contract, insurance, banking business, supply chain finance, fintech, dao, business processes, How blockchain works, supply chain management, corporate finance, financial instrument, blockchain applications, What is blockchain, blockchain technology, price bitcoin, buy bitcoin, smc, bank loan blockchain, blochain lending, disruptive technology, Btc
Quote paper
Willi Leibner (Author), 2018, Cryptocurrencies and Blockchain. Relevance and risks for companies in the age of digitization, Munich, GRIN Verlag,


  • No comments yet.
Read the ebook
Title: Cryptocurrencies and Blockchain. Relevance and risks for companies in the age of digitization

Upload papers

Your term paper / thesis:

- Publication as eBook and book
- High royalties for the sales
- Completely free - with ISBN
- It only takes five minutes
- Every paper finds readers

Publish now - it's free