A Maturity Model for Understanding and Evaluating Digital Money

A Maturity Model for Understanding and Evaluating Digital Money

Thomas Tribunella, Heidi R. Tribunella
Copyright: © 2019 |Pages: 26
DOI: 10.4018/978-1-5225-7080-6.ch009
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

As the internet and e-commerce expands, individuals will seek ways to earn and spend currency in the digital economy. Furthermore, faith in the fiat money systems of some countries is eroding and investors are searching for alternative ways to invest and store their wealth. Digital currencies (DC) are filling the demand for an alternative to government-based currency. Currently there are over 1,500 DCs with a market capitalization of over 450 billion (in US dollars) that are traded in thousands of markets. This chapter reviews the literature and history of DCs. Then the authors explain the related risks and benefits. Next, they add to the literature by proposing a model for judging the maturity of a DC. The digital currency maturity model (DCMM) will help individuals and organizations evaluate the safety and reliability of DCs given the investor's risk tolerance. Finally, the authors summarize their findings and suggest future research.
Chapter Preview
Top

Introduction

The purpose of this chapter is to help the reader assess the maturity and stability of digital currency (DC). The authors will not attempt to explain all of the technical aspects of DC since that would require a voluminous manuscript and is far beyond the scope of this chapter. That being said, the authors must cover some technical topics to communicate the basic operation of a DC.

Digital Currency (also called digital money, crypto currency, electronic money, virtual currency, or electronic currency) is a type of currency that is available in digital form, not in physical form such as paper bills and coins. Digital money is similar to physical currencies and allows for peer-to-peer transactions, as well as electronic transactions. A digital crypto currency is a currency in which encryption techniques are used to secure the units of currency and verify the transfer and transactions of funds. Many crypto currencies operate independently from a centralized or governmental bank, such as the US Federal Reserve Bank. Bitcoin, Ethereum, Ripple, and Litecoin are specific types or brands of DC.

Digital currency is an Internet-based medium of exchange that is comparable to physical currencies. Similar to government-based money, these currencies can be used to purchase goods and services. However, they could be restricted to certain communities. For example, use could be restricted to inside an on-line game or social network (closed currency with no connection to the real economy). Digital currencies, such as bitcoin are known as decentralized digital currencies since there is no central point of control over the currency supply (Lee, Long, McRae, Steiner, & Handler, 2015).

E-Commerce relies almost exclusively on financial institutions, such as credit card companies, PayPal, and banks, serving as trusted third parties to process electronic payments and electronic funds transfers. While the system works well for most transactions, it suffers from the weaknesses of requiring a trusted third party. DC creates a peer-to-peer version of electronic cash that allows online payments to be sent directly from one party to another without going through a financial institution. In other words, DC allows individuals to transact over the Internet as though they were using cash in a face-to-face situation. Hence, the transactions are private and final (cannot be reversed) just like using cash.

In 2012, the European Central Bank has described digital currency (DC) as “a type of unregulated, digital money, which is issued and usually controlled by its developers, and used and accepted among the members of a specific virtual community” (European Central Bank, 2012). The US Treasury Department has defined DC as “a medium of exchange that operates like a currency in some environments, but does not have all the attributes of real currency.” This chapter covers open DC that flows in two directions. An example of one direction currency is a coupon; a DC that flows in two directions is like cash.

Because DC is transacted over the Internet, it is exposed to cyber risks from hackers and fraudsters. Cyber risk is the risk of financial loss due to a security or privacy failure of an information system. The damage to the reputation of an organization, security, currency, or investment from some sort of technology failure of its information systems can cause a precipitous loss of faith and value in the investment. Many DCs use cryptography to mitigate cyber risk. Public Key Cryptography is a security technology that uses asymmetric key algorithms, where a key used by one party to encrypt is not the same as the key used by the other party to decrypt. Therefore, the sender and receiver of the encrypted information have different keys—a public encryption key and a private decryption key. This type of security is very reliable.

Once again, the purpose of this chapter is to help the reader assess the maturity and stability of digital currency (DC). The authors support that objective by proposing a model for judging the maturity of a DC. The Digital Currency Maturity Model (DCMM) will help individuals and organizations evaluate the safety and reliability of DCs.

Key Terms in this Chapter

Bitcoin Wallet: Is a software program where bitcoin private keys are stored. There is a secret key for every bitcoin that is saved in the bitcoin wallet. Bitcoin wallets facilitate sending and receiving bitcoins and gives ownership of the bitcoin balance based on the key. Like cash, if the owner loses their wallet, they lose the bitcoins in the wallet, because they lose the secret key. Bitcoin wallets come in many forms, such as desktop, mobile, Web, and hardware.

Bitcoin: Is the first decentralized crypto currency. Accordingly, it allows for peer-to-peer transactions to take place between users without an intermediary, such as a bank or government. The transactions between bitcoin users are verified by a network of users who record batches of transactions in a public distributed ledger called a blockchain. This process is called mining and the users are paid in bitcoin for making their computers available for transaction processing. Bitcoin is based on a theory by an unknown person under the name Satoshi Nakamoto and was released as open-source software in 2009.

Encryption: Encryption algorithms are mathematical calculations used for cryptography. This technology uses cryptographic keys for both encryption of plaintext and decryption of cipher-text. The keys can be the identical (symmetric) or different (asymmetric). There may be a simple transformation to go from one key to the other.

Blockchain Technology: Is a continuously growing list of records kept in batches, called blocks. The blocks are linked and secured using asymmetric cryptography. Each block or batch of transactions contains a cryptographic hash of the previous block, a timestamp, and transaction data. By design, a blockchain is inherently resistant to modification of the data since the blocks are verified through a network of independent users who all maintain the blockchain system.

Volatility: Volatility is a statistical measure of the dispersion of returns for a given security, investment, or currency. Volatility is usually measured by using the standard deviation or variance of the same security, investment, or currency over time. Commonly, the higher the volatility, the riskier the investment.

Bitcoin Mining: Is the process by which transactions are verified and added to a public ledger known as the blockchain. As participants provide computing power to the bitcoin network, bitcoins are released to them. Anyone with access to the Internet and suitable hardware can download the bitcoin app and participate in mining.

Market: Capitalization: Is the market value of a stock, an investment, or currency. This figure is calculated by taking the unit price and multiplying it by the total number of units outstanding. A higher market capitalization indicates a larger store of wealth.

Cryptographic Algorithm (or Cipher): Is a mathematical function or formula used to transform or encrypt and decrypt information. A cryptographic algorithm works in combination with a key. The key is used to encrypt the plaintext by the sender, and then the receiver uses the key to decrypt the message at its destination.

Open Source System: Refers to a program, app, or software whose source code is made available for use or modification by users. Open source systems are developed as a public collaboration between the users and made freely available. When users modify and improve the code, they must make the modifications freely available to the other users.

Ponzi Scheme: Is a fraudulent investment scheme where the fraudster generates fake returns for the first investors through investments paid by new investors. High returns are promised by the fraudster to attract new investors. Rather than paying returns from legitimate business profits, the fraudster shifts money around. The system is destined to collapse, because the earnings, if any, are less than the payments to investors. The scheme is named after Charles Ponzi, who became notorious for using the technique in early 1920s.

Complete Chapter List

Search this Book:
Reset