Preview

How Blockchain Is Disrupting The Sharing Economy Model Case Study

Good Essays
Open Document
Open Document
753 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How Blockchain Is Disrupting The Sharing Economy Model Case Study
How Blockchain is Disrupting the Sharing Economy Model.
Among the world fastest growing companies today is Uber and Airbnb, two companies whose business model enable people to rent assets from each other. In the recent past, the sharing economy industry has seen explosive growth with a report by Juniper Research estimating that the revenues from the sector will reach 40.2 billion in 2022, up from $18.6 billion in 2017.

According to a similar report by Statista, the number of adult sharing economy users in the U.S will reach 86.5 million by 2021, up from 44.8 million in 2016. However, with the entrance of the blockchain technology in the industry, there is a high likelihood that the growth will be much faster. In general, the blockchain technology seeks to eliminate the inefficiencies that come with intermediaries by
…show more content…
The traditional centralized solutions such as Uber, Facebook, eBay, and Airbnb are prone to hackers, and almost all of them have had instances of major data breaches.
For instance, last year, Uber disclosed that hackers had accessed personal information of 57 million riders and drives from its platform in 2016 prompting the company to pay them $100,000 as ransom money. Airbnb, on the other hand, has also been faced with multiple instances of data breaches with the biggest attack making the platform disappear momentarily back in 2016. In a recent incident, hackers hijacked accounts of top rated users and used them to book stays in the homes of hosts that they would then burglarize.
In a blockchain driven solution, hackers would never be able to access users' accounts let alone manipulate them to give a false identity. So far, the blockchain technology provides the best answer to identity verification meaning that those using the blockchain-powered sharing economy platform are guaranteed of the identity of their

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The second article by Catharine Hamm circles around the fact that the sharing economy is so much more than just about money, in the same way as the first article. Catharine Hamm shares her peer-to-peer experience about when she was on a trip to Denver, where she found out that the sharing economy is about making connections, finding real people and getting insider information to experience a city more fully; “I met the nicest people, ate and slept well, found great office space, took a fun tour and learned a lot about my host city”(p.1, l.30-34). Furthermore, she claims that most of all the sharing economy is about trust, and that the trusting souls are a part of the sharing economy. She describes an experience with Beth Brandstatter through…

    • 215 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Crime Data Comparison will look at a specific crime in two selected metropolitan areas and identify the occurrences reported and address which area had more reported incidents, what the rate was for each area, whether the rates changes in each area over time and what factors might explain the differences in the rates.…

    • 696 Words
    • 3 Pages
    Good Essays
  • Good Essays

    That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    The new technology and apps make things simpler for the consumer but also make personal information less secure and more accessible to identity thieves. This is a concerning and a more common problem that we face wich impacts individuals in a very negative way.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Good Essays

    My experience with Accelerated Reader (AR) is not long, but I started doing ARs when I got to Leilehua in my freshman year. At first, it was difficult for me because I did not understand much English; therefore, when I took my first STAR test, I got a low reading level and I felt disappointed and dumb. The first time I took an AR I failed with a 60%, I was afraid that I would not meet my deadline and it would affect my grade. But somehow Leilehua’s AR system got me into reading culture. With the time I started to improve, getting a higher score, and reading level. Although it sometimes forces me to choose books I do not enjoy reading and puts pressure on me that it could affect my grade. However, AR system motivated me to read, but it is not preparing me for the future. AR should help students be prepared for the after high school life, but it is not completely doing its job. Leilehua should modify AR in order to prepare students to transition to the hallway of life and adulthood.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    As defined by Canzer, a consumer – to – consumer ( C2C) business model is one in which firms facilitate the exchange of data directly between its users over the internet. It does not use the peer - to – peer ( P2P) software which allows direct access to the individual’s computer files but instead provides a platform to load text, images, music / video files, etc for sharing among users. This platform for sharing and interaction has a commercial dimension with the aid of advertising. Social networking sites like Facebook draws the attention of millions of users which is a mine stone for advertisers targeting a particular market segment.…

    • 379 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Even though I do not always speak up when I know something is wrong, I have a strong code of personal ethics because I believe loyalty, honesty, and above all, respect for others will guide me to make me the proper ethical decisions throughout my life.…

    • 1322 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Security Issues

    • 291 Words
    • 2 Pages

    The article talks about the most unexpected of data breaches. Mostly in cyber crime, data-thieves, target large-scale networks as a means of hijacking important information about credit card numbers of customers or other bank details. However, in this situation, the on-campus clinic database of UC Berkeley (University of California) was breached. "Coughing up tons of data about parents, students and spouses" (Fox, 2009). The unexpected nature of this security breach may be overlooked, since it is "just" a schools clinical database. However such systems contain invaluable information to identity thieves. Information like credit card numbers addresses, etc, which could undermine the safety and security of the individual. This indicates a shift from the normal conventional attacks on financial institutions to poorly secured alternative databases, where cyber criminals can retrieve information about people. The article stipulates that in such a situation, the end users are no longer the weakest link in the security chain. In this sense, most of the blame cannot be put on the end users. "The distinction belongs to the corporations above the chain" (Fox, 2009). It is necessary as end users to keep our computers and all other relevant information safe. However, if companies who are in charge of such sensitive information employ an insecure and shoddy way of doing their job, then security will always be an issue. My verdict is, companies who house information, should know that all data is relevant to a client. So, important mechanisms and policies should be put in place to secure their data.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Adhesion formation is a common post-surgical problem affecting more than 50 percent of patients undergoing surgeries. Adhesion can cause serious issues such as bowel obstruction, infertility, and chronic abdominal pain. General/abdominal surgery, pelvic/gynecological surgery, and other surgical procedures are the major applications where adhesion barriers can be used.…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What will the market size be in 2018 and what will the growth rate be?…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Swot Analysis Of Uber

    • 1049 Words
    • 5 Pages

    Uber has partnered up with various hotel and restaurant search businesses. For example- In India, Uber has partnered up with Zomato where basically while searching for their preferred restaurant, from the app itself they can book a taxi and avail discounts…

    • 1049 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Case Study Uber

    • 2154 Words
    • 9 Pages

    If we analyze Uber since the beginning, it is interesting to note how the app progressed. When it was launched, it wasn’t actually competing directly with the taxis, especially because of the prices, that were higher than the ones from the cabs. With time, the increase of numbers of new drivers, the costs fell and it started really competing with the taxis, specially the categories UberPop – created and banned in France-, and UberX.…

    • 2154 Words
    • 9 Pages
    Good Essays
  • Better Essays

    info security

    • 2065 Words
    • 8 Pages

    Hacking is a failure of confidentiality. In 2013 LivingSocial stated that their system was hacked which was an unauthorized access. This affected more than fifty millions of their users. User name, email, password, date of birth everything were stolen. This was a failure of confidentiality.(Scmagazine.com,2014)…

    • 2065 Words
    • 8 Pages
    Better Essays