Article Critique 6
docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
1974
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
2
Uploaded by MateRook1443
*Students should type directly into the chart below.
ARTICLE CRITIQUE
Parts of Article Critique
Student Responses
Your First and Last Name
Afsha Farnaz
Author(s) First and Last Name
Paul Taylor, Tooska Dargahi, Reza Parizi and Ali
Dehghantanha.
Article Title
A systematic literature review of blockchain
cyber security
Publication Date: Year
(within last 10 years)
2020
Journal Name
Digital Communications and Networks
Journal Volume
two
Journal Number
6
Journal Pages
(range, ex. 1-10)
147-156
Article Abstract: highlight and copy the exact
abstract from the article chosen and paste the
abstract here
Since the publication of Satoshi Nakamoto’s
white paper on Bitcoin in 2008, blockchain has
slowly become one of the most talked about
methods for securing data storage and transfer
through decentralized, trustless, peer-to-peer
systems. This research systematically identifies
peer-reviewed literature that seeks to utilize
blockchain for cyber security purposes and
presents a breakdown of the most adopted
blockchain security applications. Our findings
depict that the Internet of Things (IoT) lends itself
well to novel blockchain applications, as do
networks and machine visualization, public key
*Students should type directly into the chart below.
cryptography, web applications, certification
schemes and the secure storage of personally
identifiable information (PII). This timely
systematic review also sheds light on future
directions of research, education and practices in
the blockchain and cyber security space.
Takeaway: In a bulleted list, write complete
sentences about three things you have
learned from the article.
*The takeaway should be written in your
own words with
no
similarity.
One of the takeaways is that blockchain
technology
has become outstanding as an
ideal solution to blockchain’s security
challenges as it is tamper prove and
resistant.
The second takeways is that blockchain
itself is not immune to cyber attacks and
vulnerabiltiies. There is need for regular
assessment and monitoring.
The collaboration of blockchain with other
solutions such as Internet of Things (IoT)
and Artificial Intelligence (AT).
Reference
Taylor, P. J., Dargahi, T., Dehghantanha, A., Parizi, R. M., & Choo, K. K. R. (2020). A systematic
literature review of blockchain cyber security.
Digital Communications and
Networks
,
6
(2), 147-156.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help