THE MAIN FEATURES OF BLOCKCHAIN TECHNOLOGIES CLASSIFICATION
This article discusses the main features of the classifications of blockchain technologies. Ten years after the first blockchain appeared, this technology is still largely experimental. It is difficult to predict the future of the blockchain industry and the technology itself with confidence, but its certain outlines are already emerging. The purpose of the study is to consider the classification of blockchain technologies and analyze the problems that arise when using these technologies. When writing the article, the authors used methods of collecting and studying individual facts, generalization, scientific abstraction, cognition of laws, as well as the methods of objectivity, concreteness, and pluralism. It has been proved that the legal regulation of blockchain technologies should be carried out through the development of uniform world standards and that prohibitions and restrictions on certain types of activities should be systematized and regulated at the international level. The study has concluded that three types of blockchain are used: public blockchains with open access (public blockchains), private blockchains with open access (consortium blockchains), and private blockchains with closed access (fully private blockchains). Following this typology, the authors have highlighted the main features of each blockchain category.
Kirillova, E.A., Pavlyuk, A.V., Zulfugarzade, T., andMikhailova, I.A.2018. Bitcoin, lifecoin, namecoin: the legal nature of virtual currency. Journal of Advanced Research in Law and Economics, 9, 119.
Omar, A., Mustafa, A. and Clutterbuck, Yo. D. 2020. The state of play of blockchain technology in the financial services sector: A systematic literature review. International Journal of Information Management,54, 102199.
Nishani, E. V., Skjellum, A. and Medury, S. 2020. Blockchain architecture: A design that helps CPA firms leverage the technology. International Journal of Accounting Information Systems,38, 100466.
Warkentin, M. and Orgeron, C. 2020. Using the security triad to assess blockchain technology in public sector applications. International Journal of Information Management, 52, 102090.
Kouhizadeh, M.,Saberi, S.and Sarkis, J. 2021. Blockchain technology and the sustainable supply chain: Theoretically exploring adoption barriers. International Journal of Production Economics, 231, 107831.
Ahluwalia, S., Mahto, R. V. and Guerrero, M. 2020. Blockchain technology and startup financing: A transaction cost economics perspective. Technological Forecasting and Social Change, 151, 119854.
Schinckus, Ch. 2020. The good, the bad and the ugly: An overview of the sustainability of blockchain technology. Energy Research & Social Science, 69, 101614.
Morkunas, V. J., Paschen, J. and Boon, E. 2019. How blockchain technologies impact your business model. Business Horizons, Elsevier, 62(3), 295-306.
Drljevic, N., Arias-Aranda, D. and Stantchev, V. 2019. Perspectives on risks and standards that affect the requirements engineering of blockchain technology. Computer Standards & Interfaces, 69, 103409.
Janssen, M.,Weerakkody, V.,Ismagilova, E., Sivarajah, U.and Irani, Z. 2020. A framework for analysing blockchain technology adoption: Integrating institutional, market and technical factors. International Journal of Information Management, 50, 302-309.
Hassan, M. U., Rehmani, M. H. and Chen,J. 2020. Differential privacy in blockchain technology: A futuristic approach. Journal of Parallel and Distributed Computing, 145, 50-74.
Tatar, U., Gokce,Ya. and Nussbaum, B. 2020. Law versus technology: Blockchain, GDPR, and tough tradeoffs. Computer Law & Security Review,38, 105454.
Kirillova, E.A., Blinkov, O.E., Ogneva, N.I., Vrazhnov, A.S. andSergeeva, N.V. 2020. Artificial intelligence as a new category of civil law. Journal of Advanced Research in Law and Economics, 11(1), 91-98.
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.