政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/135327
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 109948/140897 (78%)
造访人次 : 46071283      在线人数 : 779
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/135327


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/135327


    题名: 區塊鏈金融創新應用:研究趨勢及專利建構關鍵因素之研究
    Innovative finance applications of blockchain technology: research trends and key factors for patent establishment
    作者: 苗華斌
    Miau, Scott
    贡献者: 洪為璽
    楊建民

    Hung, Wei-Hsi
    Yang, Jiann-Min

    苗華斌
    Scott Miau
    关键词: 區塊鏈
    研究趨勢
    資訊探勘
    書目計量學
    行動研究
    專利
    Blockchain
    Research trend
    Bibliometrics
    Data mining
    Action research
    Patent application
    日期: 2021
    上传时间: 2021-06-01 14:54:22 (UTC+8)
    摘要: 本論文展示了區塊鏈金融創新應用的研究趨勢與專利建構關鍵因素。區塊鏈是最近十年以來最新發展中的技術。此技術可以確保交易和資料安全性。此技術已經被用在許多金融和非金融的應用中。區塊鏈技術可以協助人們在許多不同的應用領域中以解決資料完整性、可驗證性、可用性、可稽核性、不可否認性與溯源性等需求。區塊鏈技術特別適合用在需要要求高資料與交易安全性的金融應用上。本論文透過書目計量學與資料探勘技術,以探討區塊鏈技術與其創新應用之研究趨勢。本論文同時提出區塊鏈金融的創新應用、同時展示了以SWOT (強弱危機分析)、PEST (環境掃描分析)進行分析之分析結果、行動研究的數次循環週期(Cycles)以及專利申請策略等。在本論文中透過行動研究與專家訪談,而辨識出15項管理和3項信任機制關鍵因素。
    This dissertation presents research trends on the key factors for patent applications related to blockchain technology in finance. Blockchain, a recently developed technology, can ensure transaction and data security and has been used for numerous financial and nonfinancial applications. Blockchain technology can help ensure the integrity, authenticity, availability, auditability, nonrepudiation, and traceability of various applications. Specifically, it is suitable for financial applications that require high levels of transaction and data security. This dissertation examines the research trends and innovative applications of blockchain technology through bibliometrics and data mining. In addition, this dissertation proposes innovative blockchain-based financial applications and patent application strategies and presents the results of a strengths, weaknesses, opportunities, and threats analysis; a political, economic, sociocultural, and technological analysis; and an action research cycle analysis. A total of 15 management and 3 trustedkey factors were identified from action research and expert interviews.
    參考文獻: Andoni, M., Robu, V., Flynn, D., Abram, S., Geach, D., Jenkins, D., McCallum, P., & Peacock, A. (2019). Blockchain technology in the energy sector: A systematic review of challenges and opportunities. Renewable and Sustainable Energy Reviews, 100, 143-174.
    Antony, S., Lin, Z., & Xu, B. (2006). Determinants of escrow service adoption in consumer-to-consumer online auction market: An experimental study. Decision Support Systems, 42(3), 1889-1900.
    Arner, D, Barberis, J., Buckley, R. (2015). The Evolution of Fintech: A New Post-Crisis Paradigm? University of Hong Kong Faculty of Law Research Paper No. 2015/047 UNSW Law Research Paper No. 2016-62, p3
    Back, A. (2002). Hashcash-a denial of service counter-measure. http://www.cypherspace.org/adam/hashcash/hashcash.pdf (Accessed on 16 March 2021)
    Bayer, D., Haber, S., and Stornetta, W. S. (1993). Improving the efficiency and reliability of digital time-stamping. Sequences II: Methods in Communication, Security and Computer Science: 329-334. doi: 10.1007/978-1-4613-9323-8_24
    Bhagat, S., Klasa, S., & Litov, L. P. (2016). The use of escrow contracts in acquisition agreements. Working Papers 13-19, University of Pennsylvania, Wharton School, Weiss Center. Available at SSRN: https://ssrn.com/abstract=2271394
    Billentis , B. K. (2019). E-Invoicing / Electronic Invoicing/E-Billing / Electronic Billing / Market Report, The e-invoicing journey 2019-2025, 4th edition, Sept. 2019, p.7, 25.
    Buterin, V. (2014). Ethereum: A Next-Generation Cryptocurrency and Decentralized Application Platform. Bitcoin Magazine. https://Bitcoinmagazine.com/articles/ethereum-next-generation-cryptocurrency decentralized-application-platform-1390528211 (Accessed on April 15 2017)
    California Department of Business Oversight (2004). "California Department of Corporations Online Escrow Fraud Questions & Answers" (PDF). California Department of Business Oversight, 2004. California Department of Corporations. Retrieved 14 July 2016. https://web.archive.org/web/20160921101945/http://www.dbo.ca.gov/Consumers/finance/pdf/qa.pdf
    "California Financial Code, Division 6 Escrow Agents, Chapter 1, Section 17003", 2001. California Legislative Information. Retrieved 14 July 2016. https://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?lawCode=FIN§ionNum=17003.
    Camphell, F. B. F. (1896). The Theory of the National and International Bibliography: with Special Reference to the Introduction of System in the Record of Modern Literature, Library Bureau, London, England.
    Casino,F., Dasaklis, T. K., Patsakis C. (2019). A systematic literature review of blockchain-based applications: Current status, classification and open issues, Telematics and Informatics, 36, 55-81.
    Center for Collaborative Action Research (2019). ACTION RESEARCH TUTORIALS, Center for Collaborative Action Research. Retrieved 10 Jan 2019. https://www.actionresearchtutorials.org/
    Chadegani, A. A., Salehi, H., Yunus, M. M. and Farhadi, H. (2013). A Comparison between Two Main Academic Literature Collections: Web of Science and Scopus Databases. Asian Social Science 9(5):18-26. https://www.researchgate.net/publication/236597304_A_Comparison_between_Two_Main_Academic_Literature_Collections_Web_of_Science_and_Scopus_Databases (Accessed on 16 March 2021)
    Chang, C.J., Kuo, H.C., Chen, C.Y., Chen, T.H., and Chung, P.Y. (2012). Ergonomic techniques for a mobile e-invoice system: Operational requirements of an information management system. Human Factors and Ergonomics in Manufacturing & Service Industries, 23 (6), 582-589.
    Chaum, D. (1982). Blind signatures for untraceable payments. Advances in Cryptology-CRYPTO, no. 82: 199-203. doi: 10.1007/978-1-4757-0602-4_18
    Chen, P.H., Feng, S.C., Chou, S.C. (2013). Designing Public Innovations in Public Sector: The Process and Challenges in Taiwanese E-government, AIS Electronic Library (AISeL), oai:aisel.aisnet.org:amcis2013-1470, P.5.
    Chen, S.-C., Wu, C.-C. and Miau, S. (2015), "Constructing an integrated e-invoice system: the Taiwan experience", Transforming Government: People, Process and Policy, Vol. 9 No. 3, pp. 370-383. https://doi.org/10.1108/TG-09-2014-0043
    Chishti, S. and Barberis, J. (2016). The Fintech Book: The Financial technology Handbook for Investors, John Wiley&Sons Ltd: West Sussex, UK. https://www.researchgate.net/publication/318790084_THE_FINTECH_BOOK_THE_FINANCIAL_TECHNOLOGY_HANDBOOK_FOR_INVESTORS_ENTREPRENEURS_AND_VISIONARIES, (Accessed on 16 March 2021), p.345.
    Dai, W. (1998). B-money. Retrieved 10 Jan 2019. http://weidai.com/bmoney.txt
    Denscombe, M. (2010). The Good Research Guide for Small Scale Research Projects (4th ed.). Buckingham: Open University Press, pp.6.
    Ekimova K. V., Nazarchuk N. P., Denisova I. P., & Gruzdneva E. N. (2019). The concept of special escrow accounts to improve mortgage housing loans in Russia. International Journal of Economics and Business Administration, 7 (sp. 2), 135-146.
    ElMamy, S. B., Mrabet, H., Gharbi, H., Jemai, A., & Trentesaux, D. (2020). A survey on the usage of blockchain technology for cyber-threats in the context of industry. Sustainability, 12(9179), 1-19.
    Enspyre (2019). How and why to use B2B E-Invoices in Taiwan, available online: https://www.enspyre.com/en/blog/how-why-use-b2b-e-invoices-in-taiwan/ (Accessed on 10 March 2021)
    Stringer, E.T. (2014). Action research (4th Edition), Thousand Oaks, California : SAGE. ISBN 9781452205083.
    European Commission (2014). “Directive on Payment Services (PSD)”. Retrieved 5 Nov 2014. https://web.archive.org/web/20141105011542/http://ec.europa.eu/internal_market/payments/framework/index_en.htm
    Feller, J., Gleasure, R. and Treacy, S. (2015). From the wisdom to the wealth of crowds: A metatriangulation of crowdfunding research. Available online at Research Gate. https://www.researchgate.net/publication/303923667_From_the_wisdom_to_the_wealth_of_crowds_A_metatriangulation_of_crowdfunding_research (Accessed on 16 March 2021)
    Fernandez-Vazquez, S., Rosillo, R., De La Fuente y, D., and Priore, P. (2019). Blockchain in FinTech: A mapping study, Sustainability, 11(6366), 1-24.
    "Fidelity National Financial, Inc. to Offer Internet Escrow Services Through Escrow.com". PR Newswire Association LLC, 2016. Retrieved 14 July 2016 – via The Free Library. http://www.thefreelibrary.com/Fidelity+National+Financial,+Inc.+to+Offer+Internet+Escrow+Services...-a056325638
    Frankenfield, J. (2021). What Is Bitcoin?, Investopedia, available online: https://www.investopedia.com/terms/b/bitcoin.asp (Accessed on 10 March 2021)
    Franklin, M. K. and Reiter, M. K. (1997). Fair Exchange with a Semi-Trusted Third Party. Prceedings of the 4th ACM conference on Computer and communication security. April 1997, p.1-5. http://users.ece.cmu.edu/~reiter/papers/1997/CCS1.pdf (Accessed on 16 March 2021)
    Gersten DM (2005). The quest for market exclusivity in biotechnology: Navigating the patent minefield. NeuroRx.2:572–8.
    Gomber, P., Kauffman, R. J., Parker, C., & Weber, B. W. (2018). On the fintech revolution: interpreting the forces of innovation, disruption, and transformation in financial services. Journal of Management Information Systems 35(1), 220-265.
    Green, D. (2020). What is PITI? Mortgage payments explained. The Mortgage Reports. Available at: https://themortgagereports.com/4315/mortgage-escrow-taxes-insurance-explained (accessed on 2021/03/10)
    Groves, T. & Abbasi, K. (2004). Screening research papers by reading abstracts, BMJ, 329(7464), 470-471.
    Gupta, H., Kumar, S., Roy, S. K., and Grud, R. S. (2010). Patent protection strategies, J Pharm Bioallied Sci. 2010 Jan-Mar; 2(1): 2–7. doi:10.4103/0975-7406.62694
    Haber, S., and Stornetta, W.S. (1991). How to time-stamp a digital document. Journal of Cryptology 3 (2): 99-111. doi:10.1007/BF00196791
    He, D., Leckow, R., Haksar,V., Griffoli T. M., Jenkinson, N., Kashima, M. , Khiaonarong, T., Rochon, C. and Tourpe, H. (2017). Fintech and financial services: initial consideration. International Monetary Fund. https://www.elibrary.imf.org/view/IMF006/24364-9781484303771/24364-9781484303771/24364-9781484303771_A001.xml?language=en (Accessed on 16 March 2021)
    Hochstein, H. (2015). Fintech (the Word, That Is) Evolves, AMERICAN BANKER , http://www.americanbanker.com/bankthink/fintech-the-word-that-is-evolves-1077098-1.html (Accessed on 16 March 2021)
    Internet Crime Complaint Center (IC3) (2019). “Internet Crime Schemes”. Retrieved 10 Jan 2019. https://www.ic3.gov/crimeschemes.aspx”
    Kaemmerer, M. E. (1976). Tax and insurance escrow accounts in mortgages--the attack presses on. Missouri Law Review, 41(1), 133-138.
    Kalantari, A., Kamsin, A., Kamaruddin, H. S., Ebrahim, N. A., Gani, A., Ebrahimi, A., & Shamshirband, S. (2017). A bibliometric approach to tracking big data research trends, Journal of Big Data, 4, 30.
    Kitchenham, B. and Charters, S. (2007). Guidelines for performing Systematic Literature Reviews in Software Engineering. EBSE 2007-001. Keele University and Durham University Joint Report https://www.elsevier.com/__data/promis_misc/525444systematicreviewsguide.pdf (Accessed on 16 March 2021)
    Lee, D. and Chuen, K. (2015). Emergence of Fintch and the Lasic Principles. EY Global Financial Services Institue, Winter 2015/Volume3-Issue3. https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=6071&context=lkcsb_research (Accessed on 16 March 2021), p4.
    Lee, H.Y. and Wang, N.J. (2013). The implementation of integrating e-Procurement, e-Contracting, and e-Invoice platforms for the B2B E-MarketPlace web-based system. International Journal of Engineering Research, 2 (4), 300-309.
    Lewin, K. (1946). Action research and minority problems, Journal of Social Issues, 2(4), 34-46. doi:10.1111/j.1540-4560.1946.tb02295.x
    Lotka, Alfred J. (1926). The frequency distribution of scientific productivity. Journal of the Washington Academy of Sciences. 16 (12): 317–324.
    Ma, Y. and Liu, D. (2017). Introduction to the special issue on Crowdfunding and FinTech. Financial Innovtion. Available online at Research Gate: https://www.researchgate.net/publication/316615316_Introduction_to_the_special_issue_on_Crowdfunding_and_FinTech (Accessed on 16 March 2021), p1
    Mackenzie M, Keating P and Cambrosio A. (1990). Patents and free scientific information in biotechnology: Making monoclonal antibodies proprietary. Sci Tech Hum Values.15:65–83.
    Massias, H., Avila, X. S., and Quisquater, J. J. (1999). “Design of a secure timestamping service with minimal trust requirement.” Paper presented at the 20th Symposium on Information Theory, Benelux.
    Merkle, R. C. (1980). "Protocols for public key cryptosystems." American Society of Mechanical Engineers Heat Transfer Division: 122-134. doi:10.1109/SP.1980.10006
    Miau, S., Wu, C. C., & Chen, S. C. (2014). Toward a smart government-an experience of E-invoice development in Taiwan.
    Miau, S., Yang, J.M. (2016). “A study of e-invoice based on Blockchain technology” Executive Master of Business Administration, National Chengchi University : 41-70
    Moritz, A. and Block, J. H. (2016). Crowdfunding: A Literature Review and Research Directions. Crowdfunding in Europe (p.25-53), Springer Science+business media. ISBN: 978-3-319-18016-8. https://www.researchgate.net/publication/317784875_Crowdfunding_A_Literature_Review_and_Research_Directions (Accessed on 16 March 2021)
    Nakamoto, S. (2008). “Bitcoin: A peer-to-peer electronic cash system.” Accessed April 15 2017. https://bitcoin.org/bitcoin.pdf
    Nicholls, P. T. (1986). Empirical validation of Lotka’s law. Information Processing & Management. Volume 22, Issue 5, p.417-419
    OECD (2014), The digital economy, new business models and key features, in Addressing the Tax Challenges of the Digital Economy, OECD Publishing, Paris. https://www.oecd-ilibrary.org/docserver/9789264218789-7-en.pdf?expires=1615861579&id=id&accname=guest&checksum=549558DE5FF959FB48B73BCF18C1A4A2 (Accessed on 16 March 2021), p70-73
    Pao, M. L. (1986). An empirical examination of Lotka`s Law. Journal of the American Society for Information science. Volume 3, Issue1 p.26-33.
    Partland, S. and Afriyie, A. (2013). How e-invoicing could revolutionise public sector procurement. Retrieved Feb 19, 2013, from: http://www.theguardian.com/public-leaders-network/2013/jan/14/einvoicing-public-sector-procurement-civilservice.
    Polanin, J., Pigott, T., Espelage, D., & Grotpeter, J. (2019). Best practice guidelines for abstract screening large‐evidence systematic reviews and meta‐analyses, Research Sythesis Methods, 10(3), 330-342.
    Reason, P. and Bradbury, H. (2001). “Handbook of action research: participative inquiry and practice”, London: SAGE. ISBN 978-0761966456.
    Rivette, K. G., Kline, D. (2000). Discovering new value in intellectual property. Harvard Business Review, 78(1): 2-12.
    Somaya, D. (2012). Patent Strategy and Management: An Integrative Review and Research Agenda. Journal of Management, 38 (4), 1084-1114.
    Sudhier, K. G. (2010). Application of Bradford’s Law of Scattering to the Physics Literature: AStudy of Doctoral Theses Citations at the Indian Institute of Science, Journal of Library and Information Technology, 30(2), 3-14.
    Sudhier, K. P. (2013). Lotka’s law and pattern of author productivity in the area of physics research. DESIDOC Journal of Library & Information Technology, 33(6). 457- 464.
    Swan, M. (2015). Blockchain: Blueprint for a new economy. O’reilly media, Inc. ISBN:978-1-4919-2049-7. P.152
    Taiwan MOF (2015). Improving the taxpayer’s experience with the tax authority efficiently and effectively working paper, In: 45TH SGATAR MEETING in Singapore TOPIC 2, p.5
    Timestaff, 2018. How Does an Escrow Account Work?. Accessed Jan 10 2019. http://money.com/money/collection-post/2792060/how-does-an-escrow-account-work/
    Tsai, C. H., and Kuan-Jung, P. E. N. G. (2017). The FinTech Revolution and Financial Regulation: The Case of Online Supply-Chain Financing. Asian Journal of Law and Society 4(1): 109-132. doi: 10.1017/als.2016.65
    UK, eSources, (2005). Using Escrow For Payments (Payments Series - Article 2) - eSources.co.uk. Accessed Jan 10 2019. http://articles.esources.co.uk/id/111/
    Wandoko, W., Abbas, B. S., Budiastuti, D., Kosala, R. (2016). Online trust building through third party trust transfer and third party protection. International Conference on Computing and Applied Informatics. 801(012060), 1-8.
    Wood, G. (2014). ETHEREUM: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper. Accessed April 15 2017. https://pdfs.semanticscholar.org/ac15/ea808ef3b17ad754f91d3a00fedc8f96b929.pdf
    Zavolokina L, Dolata M, Schwabe G (2016) FinTech - what’s in a name? In: Thirty Seventh International Conference on Information Systems. https://www.researchgate.net/publication/318268448_FinTech_-_What`s_in_a_Name (Accessed on 16 March 2021)
    Zhang, Y., & Wen. J. ( 2015). An IoT electric business model based on the protocol of bitcoin. In: 18th International Conference on Intelligence in Next Generation Networks, 184-91.
    Zhao, W. (2019). Blockchain technology: development and prospects. National Science Review, 6(2), 369-373.
    Zupic, I. & Cater, T. (2014). Bibliometric methods in management and organization. Organizational Research Methods, 18(3), 429-472.
    描述: 博士
    國立政治大學
    資訊管理學系
    102356512
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0102356512
    数据类型: thesis
    DOI: 10.6814/NCCU202100442
    显示于类别:[資訊管理學系] 學位論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    651201.pdf3322KbAdobe PDF248检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈