<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>(How) Can Blockchain Contribute to the Management of Systemic Risks in Global Supply Networks?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gilbert Fridgen</string-name>
          <email>gilbert.fridgen@uni-bayreuth.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marc-Fabian Körner</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Johannes Sedlmeir</string-name>
          <email>johannes.sedlmeir@fit.fraunhofer.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Weibelzahl</string-name>
          <email>martin.weibelzahl@uni-bayreuth.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>FIM Research Center, University of Bayreuth</institution>
          ,
          <addr-line>Wittelsbacherring 10, Bayreuth</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Project Group Business &amp; Information Systems Engineering of the Fraunhofer FIT</institution>
          ,
          <addr-line>Wittelsbacherring 10, Bayreuth</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>89</fpage>
      <lpage>96</lpage>
      <abstract>
        <p>Even though globalization has led to larger, faster, and more efficient supply chains, at the same time the new worldwide interconnection has also resulted in major challenges with respect to hidden systemic risks. In particular, there is a lack of a holistic perspective on the entire supply network. This missing global view prohibits the anamnesis and management of underlying risks. Against this backdrop, in this paper we discuss the potential contributions of Blockchain technology to systemic risk management in global supply chains and networks. Given the increasing number of recent initiatives of businesses in the context of Blockchain, we argue that Blockchain technology can lower the hurdle for the use of secure multiparty computation. Ultimately, it may be possible to implement a corresponding monitoring mechanism for systemic risks without (i) the need of a central authority and (ii) revealing competition relevant, confidential information to other supply network participants.</p>
      </abstract>
      <kwd-group>
        <kwd>Systemic Risks</kwd>
        <kwd>Supply Networks</kwd>
        <kwd>Blockchain</kwd>
        <kwd>Secure Multiparty Computation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        With the steady progression of globalization, supply networks expand globally and
operate across borders. To address the growing global competition, companies are
continuously increasing efficiency and speed, resulting in reduced inventory levels and
just-in-time production [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In the past decades, digitalization has successfully
contributed to expanding and managing the resulting complexity of modern supply network
structures. However, while digitalization has helped to speed up business processes,
systemic risks have simultaneously increased, since failures may rapidly propagate
within fast-responding (supply) networks [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5">2–5</xref>
        ]. A prominent example for such
propagating effects are the floods in Thailand in 2011: After several tropical storms and
heavy rainfall, Thai manufacturers of hard disks were forced to shut down their
production temporarily [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]. In an ex-ante unexpected intensity, this finally affected the
global production of notebooks and digital video recorders via different intermediate
manufacturers [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In fact, an ex-post investigation revealed that the involved
manufacturers have had a significant market share at that time. As this example demonstrates,
an exogenous local event has led to a large global supply network disruption, where
rising prices for end customers heavily influenced markets all around the world.
Therefore, managing systemic risks is a major challenge in times of increased interconnection
and complexity of supply networks [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        As highlighted above, various suppliers and manufacturers that are worldwide
distributed and connected characterize today's supply networks. However, there is no
central institution that could take over the anamnesis, diagnosis, or therapy of underlying
systemic risks. Given this lack of a global perspective and control, not only researchers
but also customers and managers are well aware of the significant challenges posed by
cascading risks and failures [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13">10–13</xref>
        ]. Ultimately, the results of the described
developments may have highly negative consequences for end consumers, e.g., in form of rising
prices or decreasing welfare.
      </p>
      <p>
        On the other hand, Blockchain technology has caused a sensation with its first and
most popular application to date, the Bitcoin, for almost ten years [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The Blockchain
architecture unconditionally focusses on decentralization and hence for example
enables a currency system with equal parties, i.e., without any central institution or
intermediaries [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. Its key properties concerning forgery protection, transparency of
rules, neutrality, and the already mentioned decentralization make Blockchain
technology highly relevant for cross-organizational workflow management and particularly for
applications in logistics and supply networks.
      </p>
      <p>Against this background, it is conceivable that for the first time all relevant players
of a supply network can meet on a common system with a uniform way of
communication and a spirit of cooperation in competition (“coopetition”). In principle, such a
meeting would make it possible to collect all relevant data in order to identify systemic
risks with comparatively little effort. However, members of a supply network may still
hesitate to share their typically confidential data. Given this potential hesitation, this
paper discusses the opportunities of Blockchain technology for managing systemic
risks in global supply networks by using secure multiparty computation. Of course, the
latter technology has been known for quite some time, but practical applications in the
supply sector have not been observed, yet. In this paper, we argue that with the presence
of new Blockchain infrastructures, secure multiparty computation has the potential to
derive different risk-related metrics of a supply network. In particular, for computing
such metrics, inputs from various supply network participants can be used without any
company gaining additional information except the final result.</p>
      <p>This paper is organized as follows: We will first describe main Blockchain-related
developments in supply networks in Section 2. Based on these developments, Section
3 will subsequently discuss the opportunities of Blockchain to address the challenges
of systemic risks by being an economic enabler for secure multiparty computation.
Finally, the paper concludes with a summary in Section 4.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Distributed ledger technologies and the rise of Blockchainbased initiatives in supply networks</title>
      <p>
        Although Blockchain is the most commonly used term for the technology under
consideration in this paper, we will place Blockchain in the more general context of
“Distributed Ledger Technologies” (DLT). DLT is a collective term for distributed
databases within a peer-to-peer network that typically employs a combination of
cryptographic methods on the technical side and principles from game theory as economic
incentives in order to create consensus between the participants [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Consensus refers
to a commonly accepted definition of what the rules are, e.g., “append-only” or “no
double spending”. Such rules can then enforce immutability of data in the Blockchain,
facilitate digital money (cryptocurrencies), or joint execution of scripts – so-called
smart contracts – in a trusted way without the need for an intermediary [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ]. In
DLT-based architectures, usually the same data is stored on every single node, resulting
in complete transparency of the data in the ledger. In general, the concrete design of
distributed ledgers can take various forms depending on reading or writing permission
(permissioned vs. permissionless), efficiency, or the degree of centralization (public vs.
private).
      </p>
      <p>
        A special type of DLT is Blockchain technology. The latter employs a specific, linear
data structure of blocks that are linked by inserting the hash-value of the previous block
into each block. In fact, the first and most prominent representative of a distributed
ledger application, namely the Bitcoin network for the well-known cryptocurrency [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ],
is a Blockchain. However, the number of applications of DLT has increased rapidly in
the last years, as researchers and practitioners consider them to have a radical potential
not only for cryptocurrencies, but also for various other areas [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], e.g., the energy
sector [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] or general supply networks [
        <xref ref-type="bibr" rid="ref22 ref23 ref24">22–24</xref>
        ]. Since most of the applications so far
have the structure of a Blockchain, the latter is the more popular term, and hence we
will also mainly use the word “Blockchain” in this paper – even though most statements
are also true for DLT in general.
      </p>
      <p>
        The generic idea behind the use of Blockchain is the implementation of an IT
architecture that ensures manipulation security and transparency of rules without the need
of a trusted intermediary. In other words, Blockchain technology can facilitate so-called
“neutral platforms”. It could therefore also take on the role of a coordinating, trusted
central authority that currently does not exist in global supply networks [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>In this context, logistics and supply networks have long strived for improved
digitalization, automation, and coordination, which is only possible if the relevant players
agree to participate on some kind of common platform. However, participants may
hesitate to entrust competition-relevant information (e.g., data on their suppliers or
customers) not only to rivals, but also to a central institution – regardless of whether such
an institution is represented by a government or by a private company. In particular,
even if all participants in the network were to agree that a central authority would make
sense to coordinate and monitor the network, this authority would possess a central
market role and thus a considerable amount of market power. Finally, not only
economic, but also political considerations might suggest a refusal of such a potential
monopolist.</p>
      <p>
        Already today, a non-negligible number of consortia and initiatives – often either
consisting of or being supported by global players – aim at employing Blockchain to
pursue the latter goal have been formed. These initiatives try to tackle practical
problems in operation and management of modern supply networks with the help of
Blockchain-based solution approaches, e.g., problems related to missing data integration,
limited information about the manufacturing process, or the huge effort with respect to
necessary paperwork [
        <xref ref-type="bibr" rid="ref16 ref22">16, 22</xref>
        ]. Ultimately, with the described initiatives, the involved
companies aim at realizing positive effects on the efficiency of their supply networks,
on product quality, and on customer confidence [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. For example, IBM and Maersk
created the so-called “TradeLens” initiative in 2018 to implement a Blockchain
infrastructure within a global supply network. Furthermore, also Walmart implemented a
Blockchain-based supply network platform to trace its pork and mangos for tackling
food scandals [
        <xref ref-type="bibr" rid="ref25 ref26">25, 26</xref>
        ]. Given these well-known initiatives, further and more advanced
Blockchain-based neutral platforms and new ecosystems are expected to evolve in the
coming years.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Secure Multiparty Computation, its relation to Blockchain, and the corresponding potential for managing systemic risks</title>
      <p>As described in the previous section, companies usually keep their suppliers and
customers in the supply network secret and hesitate to give corresponding information
to their competitors. One of the main reasons is that information asymmetries in supply
networks are often an integral part of the business secret and therefore provide the
foundation for profitability of companies. In particular, companies may also not be willing
to give such information to a trusted central institution even if the resulting, aggregated
information on the general state of the network would be highly relevant for individual
decision making.</p>
      <p>
        Against this backdrop, secure multiparty computation (SMC), which has already
been a subject to research since the 1970s, provides the ability to perform computations
which use data inputs from different participants without distributing the inputs among
the participants or having to disclose any of them to a third party. The following
example, which is inspired by [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], illustrates the basic idea behind secure multiparty
computation by a simplified sketch of secure addition: Let us assume three involved
companies denoted by A, B, and C. The associated private numbers of the companies are a,
b, and c. In order to compute their sum by means of SMC, company A first generates a
random number r in a sufficiently large range and gives  +  to company B. In turn,
company B adds its own number  and passes the result to company C, which then adds
 and arrives at  +  +  + . This subtotal is subsequently forwarded to company A,
which is the only company which knows . Company A can then subtract  from the
last subtotal and gets the desired result a+b+c. Finally, A communicates this sum to
the other companies. Note that this protocol makes sure that no single company can
draw any conclusions about the others’ individual inputs. Consequently, none of the
three companies gets any additional information apart from the final sum a+b+c. Also,
no central authority is needed to perform the protocol. Figure 1 summarizes this simple
example for secure addition among the three companies.
      </p>
      <p>Even though the example is quite simple, it gives an illustrative way of describing
the main functioning of SMC. In its standard version, “curious-but-honest” participants
are assumed. More advanced problems often employ further mechanisms such as
permuting the roles of A, B, and C in order to detect potential misbehaviour by checking
whether the result is the same for each permutation. For even more enhanced security,
such as ruling out collusion among a subset of the participants or ensuring tap-proof
information exchange, cryptographic methods can be employed.</p>
      <p>
        Academic literature already suggests several metrics for measuring systemic risks in
supply networks: Among the most common examples is the “betweenness centrality”
[
        <xref ref-type="bibr" rid="ref28 ref29">28, 29</xref>
        ]. The latter metric is calculated as a weighted sum of market shares of a specific
good along shortest paths (with respect to suitable metrics) in a network. By using an
appropriate secure multiparty computation protocol, such metrics can be computed in
complex supply networks, too [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. However, it remains to be analyzed how much
information about the network can be reconstructed from the explained quantities such
as betweenness centrality. In particular, the extent to which the results of a SMC
protocol should be published needs to respect the degree of anonymity in the network or
the severity of a systemic risk.
      </p>
      <p>
        From a technical perspective, it is not necessary to have a Blockchain architecture
set up in order to perform SMC protocols. Rather, a network is required in which the
involved participants can meet and exchange data, ideally securely. Up to now, no such
system of relevance with the purpose of SMC has been formed in practice. The advent
of Blockchain-based platforms can significantly lower the barrier to establish and
utilize SMC applications in supply networks. First examples are already being tested on
Hyperledger Fabric, which is the Blockchain IT-architecture behind TradeLens [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. It
is therefore conceivable that the addressing of systemic risks in supply networks may
soon become a realistic scenario.
      </p>
      <p>To sum up, Blockchain may provide the basic infrastructure on which companies
can (pseudonymously) identify themselves and exchange data under a certain degree of
standardization. Given current Blockchain initiatives, there is a realistic chance of
establishing decentralized and far-reaching networks where SMC protocols can be
executed to compute critical risk metrics. Taking on the task of a trustworthy central
authority, the latter metrics may then be used to monitor the risks of global supply
systems. In this respect, Blockchain in combination with SMC may have the potential of
better managing and regulating entire supply networks without pillorying individual
companies.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>Being a catalyst for globalization, digitization allows to trade faster across borders
and to operate global supply networks more efficiently. With a growing global
interdependency and interconnection, there is an increasing threat of systemic risks at the same
time. Ultimately, such risks may result in failures that spread faster and more
extensively in modern supply networks than ever before.</p>
      <p>As we argue in this paper, distributed ledgers like Blockchains in combination with
secure multiparty computation may have the potential to tackle the challenges of
detecting and managing systemic risks in large supply networks. In particular, Blockchain
technology could take on the role of a central authority, which does currently not exist
in global supply networks, and grant access to data that is relevant for an anamnesis,
diagnosis, or therapy of systemic risks.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Manuj</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mentzer</surname>
            ,
            <given-names>J.T.</given-names>
          </string-name>
          :
          <article-title>Global Supply Chain Risk Management</article-title>
          .
          <source>Journal of Business Logistics</source>
          <volume>29</volume>
          ,
          <fpage>133</fpage>
          -
          <lpage>155</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Mertens</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barbian</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Die Wirtschaftsinformatik der Zukunft-auch eine</article-title>
          <source>Wissenschaft der Netze? HMD Praxis der Wirtschaftsinformatik</source>
          <volume>51</volume>
          ,
          <fpage>729</fpage>
          -
          <lpage>743</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Buhl</surname>
            ,
            <given-names>H.U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Penzel</surname>
          </string-name>
          , H.-G.:
          <article-title>The Chance and Risk of Global Interdependent Networks</article-title>
          .
          <source>Business &amp; Information Systems Engineering</source>
          <volume>2</volume>
          ,
          <fpage>333</fpage>
          -
          <lpage>336</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Fridgen</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stepanek</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolf</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Investigation of exogenous shocks in complex supply networks - a modular Petri Net approach</article-title>
          .
          <source>International Journal of Production Research</source>
          <volume>53</volume>
          ,
          <fpage>1387</fpage>
          -
          <lpage>1408</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Mertens</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barbian</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : Researching “Grand Challenges”.
          <source>Business &amp; Information Systems Engineering</source>
          <volume>57</volume>
          ,
          <fpage>391</fpage>
          -
          <lpage>403</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Haraguchi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lall</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Flood risks and impacts: A case study of Thailand's floods in 2011 and research questions for supply chain decision making</article-title>
          .
          <source>International Journal of Disaster Risk Reduction</source>
          <volume>14</volume>
          ,
          <fpage>256</fpage>
          -
          <lpage>272</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Abe</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Impact of the Great Thai Floods on the International Supply Chain</article-title>
          .
          <source>Malaysian Journal of Economic Studies</source>
          <volume>51</volume>
          ,
          <fpage>147</fpage>
          -
          <lpage>155</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Chongvilaivan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Thailand's 2011 flooding: Its impact on direct exports and global supply chains (</article-title>
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Helbing</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Globally networked risks and how to respond</article-title>
          .
          <source>Nature</source>
          <volume>497</volume>
          ,
          <issue>51</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Little</surname>
          </string-name>
          , R.G.:
          <article-title>Controlling cascading failure: Understanding the vulnerabilities of interconnected infrastructures</article-title>
          .
          <source>Journal of Urban Technology</source>
          <volume>9</volume>
          ,
          <fpage>109</fpage>
          -
          <lpage>123</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Watts</surname>
            ,
            <given-names>D.J.:</given-names>
          </string-name>
          <article-title>A simple model of global cascades on random networks</article-title>
          .
          <source>Proceedings of the National Academy of Sciences</source>
          <volume>99</volume>
          ,
          <fpage>5766</fpage>
          -
          <lpage>5771</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Lorenz</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Battiston</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schweitzer</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Systemic risk in a unifying framework for cascading processes on networks</article-title>
          .
          <source>The European Physical Journal B</source>
          <volume>71</volume>
          ,
          <issue>441</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Buldyrev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parshani</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Paul,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Stanley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.E.</given-names>
            ,
            <surname>Havlin</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.:</surname>
          </string-name>
          <article-title>Catastrophic cascade of failures in interdependent networks</article-title>
          .
          <source>Nature</source>
          <volume>464</volume>
          ,
          <issue>1025</issue>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Nakamoto</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Bitcoin: A peer-to-peer electronic cash system (</article-title>
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Schweizer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schlatt</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Urbach</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fridgen</surname>
          </string-name>
          , G.:
          <article-title>Unchaining Social Businesses - Blockchain as the Basic Technology of a Crowdlending Platform</article-title>
          .
          <source>ICIS 2017 Proceedings</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Fridgen</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radszuwill</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Urbach</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Utz</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Cross-Organizational Workflow Management Using Blockchain Technology - Towards Applicability</surname>
          </string-name>
          , Auditability, and
          <string-name>
            <surname>Automation</surname>
          </string-name>
          .
          <source>Hawaii International Conference on System Sciences 2018 (HICSS-51)</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Ferdinando M. Ametrano</surname>
          </string-name>
          : Bitcoin, Blockchain, and Distributed Ledgers:
          <article-title>Between Hype and Reality</article-title>
          .
          <source>SSRN</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Peter</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>A.: Blockchain-applications in banking &amp; payment transactions: Results of a survey</article-title>
          .
          <source>European financial systems 2017: Proceedings of the 14th International scientific conference</source>
          ,
          <volume>141</volume>
          -
          <fpage>149</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Davidson</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Filippi</surname>
          </string-name>
          , P. de, Potts, J.: Disrupting Governance:
          <article-title>The New Institutional Economics of Distributed Ledger Technology</article-title>
          .
          <source>SSRN</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Beck</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Müller-Bloch</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Blockchain as radical innovation: a framework for engaging with distributed ledgers as incumbent organization (</article-title>
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Mylrea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gourisetti</surname>
            ,
            <given-names>S.N.G.</given-names>
          </string-name>
          :
          <article-title>Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security</article-title>
          .
          <source>In: Proceedings 2017 Resilience Week (RWS)</source>
          .
          <source>Chase Center on the Riverfront/Wilmington</source>
          , DE, Wilmington, DE,
          <fpage>18</fpage>
          -22
          <source>September</source>
          <year>2017</year>
          , pp.
          <fpage>18</fpage>
          -
          <lpage>23</lpage>
          . IEEE, Piscataway, NJ (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Korpela</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hallikas</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dahlberg</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Digital Supply Chain Transformation toward Blockchain Integration</article-title>
          .
          <source>Hawaii International Conference on System Sciences 2017 (HICSS-50)</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Tian</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>An agri-food supply chain traceability system for China based on RFID &amp; blockchain technology</article-title>
          . In: Yang,
          <string-name>
            <surname>B</surname>
          </string-name>
          . (ed.)
          <source>2016 13th International Conference on Service Systems and Service Management (ICSSSM)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . IEEE, Piscataway, NJ (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Naerland</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Müller-Bloch</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beck</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Palmund</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Blockchain to Rule the Waves - Nascent Design Principles for Reducing Risk and Uncertainty in Decentralized Environments</article-title>
          .
          <source>ICIS 2017 Proceedings</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Kamath</surname>
          </string-name>
          , R.:
          <article-title>Food Traceability on Blockchain: Walmart's Pork and Mango Pilots with IBM</article-title>
          .
          <source>The JBBA 1</source>
          ,
          <issue>3712</issue>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Hackius</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petersen</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Blockchain in logistics and supply chain : trick or treat?</article-title>
          <source>Proceedings of the Hamburg International Conference of Logistics (HICL)</source>
          ,
          <volume>23</volume>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Schneier</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          : Applied Cryptography. Protocols, Algorithms and Source Code in C. John Wiley &amp; Sons Incorporated, New York (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Newman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <source>Networks: An Introduction</source>
          . Oxford University Press, Oxford (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Choi</surname>
          </string-name>
          , T.Y.,
          <string-name>
            <surname>Yan</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dooley</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Structural investigation of supply networks: A social network analysis approach</article-title>
          <source>Journal of Operations Management</source>
          ,
          <fpage>194</fpage>
          -
          <lpage>211</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Zare-Garizy</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fridgen</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wederhake</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-Case of Supply Chain Networks</article-title>
          .
          <source>Security and Communication Networks</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Benhamouda</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Halevi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Halevi</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation</article-title>
          .
          <source>2018 IEEE International Conference on Cloud Engineering (IC2E)</source>
          ,
          <fpage>357</fpage>
          -
          <lpage>363</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>