<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Blockchain Applications in Digital Marketing</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Buhas</string-name>
          <email>buhas.vv@knutd.edu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ihor Ponomarenko</string-name>
          <email>ponomarenko.iv@knutd.com.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Ramskyi</string-name>
          <email>a.ramskyi@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Fedorchenko</string-name>
          <email>a_fedorchenko@hotmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Roskladka</string-name>
          <email>a.roskladka@knute.edu.ua</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>13-B Marshal Tymoshenko str., Kyiv, 04212.</addr-line>
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kyiv National Economics University named after Vadym Hetman</institution>
          ,
          <addr-line>54/1 Prospect Peremogy, Kyiv, 03057</addr-line>
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Kyiv National University of Technologies and Design</institution>
          ,
          <addr-line>2 Nemyrovycha-Danchenka str., Kyiv, 01011</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>State University of Trade and Economics</institution>
          ,
          <addr-line>19 Kyoto str., Kyiv, 02156</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>77</fpage>
      <lpage>86</lpage>
      <abstract>
        <p>The modern world is characterized by the intensification of the development of innovative technologies and their active introduction into various types of economic activity. Digitalization processes involve the use of a large number of specialized pieces of equipment that are connected to the Internet and implement specific functions. In a constructed system, server technologies, which allow to accumulation of large volumes of various information (structured, semi-structured, and unstructured) and process it owing to the powerful computing capabilities of Network-attached storage, acquire paramount importance. Powerful equipment for the implementation of complex mathematical models using large volumes of information contributed to the active development and use of various machine learning algorithms. Thanks to the application of various machine learning approaches, it is possible, based on the available information, to identify hidden relationships and develop effective management solutions that will allow optimizing existing processes at the micro, macro, and meso levels. The increase in the amount of information leads to the need to ensure the security of both individual users and large confidential databases. At the current stage of development, blockchain technology is actively used to ensure information security and prevent the falsification of information in databases. This technology is a modern data management system that allows you to place information in blocks in a specific way, control changes in transactions with a large number of independent electronic devices that coordinate any manipulations with existing data in the system. The effectiveness of using blockchain technology in the cryptocurrency market has led to the popularization of this approach in other types of economic activity. Since digital marketing, which generates large volumes of valuable information, is an integral part of the modern economic system, blockchain technology is used by companies to ensure a high level of reliability in the existing data protection system. The use of blockchain in the digital marketing system allows a company to increase the level of trust of the target audience and gain competitive advantages over other market participants.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Blockchain</kwd>
        <kwd>big data</kwd>
        <kwd>communications</kwd>
        <kwd>digital marketing</kwd>
        <kwd>Internet</kwd>
        <kwd>optimization</kwd>
        <kwd>security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The active development of the cryptocurrency
market is determined by the significant level of
protection of highly liquid digital assets, which in
its turn is explained by the use of blockchain
technology. Due to the introduction of
information into sequentially placed blocks, a
network is created, which is characterized by the
transparency of tracking transactions carried out
in the created information system by all connected
computing devices [1, 2].</p>
      <p>Because of the presence of interconnection
between all participants of the information
system, the consistency of implemented
transactions is ensured. In case of unauthorized
data entry, it is not possible to affect all devices
connected to the system. The massive
involvement of technical devices in the system
and conducting a transaction through the system
of agreements from each participant allows for
ensuring a high level of reliability and protection
of existing data due to the use of blockchain
technology. The main element of the blockchain
is sequentially placed blocks with relevant
information about transactions. Blocks are placed
in the order of completed transactions, and
making changes to a specific chain involves
informing each of the system participants and
obtaining their consent to make changes. The
efficiency of the system is achieved owing to the
inclusion of a large number of decentralized
participants in the system, which ensures multiple
duplications of the existing chain with transactions
and, with joint permission, makes it possible to
make changes to the database. The placement of
participants in various locations makes it
impossible for fraudsters to simultaneously
influence them and obtain illegal benefits. The
reliability and transparency of blockchain have led
to an increase in the use of technology in such areas
as the energy sector, financial and banking spheres,
the leisure industry, retail trade, etc. [3–5].</p>
      <p>The processes of globalization and
digitalization contribute to the strengthening of
competition in various markets and lead to
evolutionary transformations in the construction
of company strategies. Qualitative
transformations of companies are manifested in
the creation of innovative models of interaction
with users and the formation of demand for
advanced products. The orientation of modern
consumers to the Internet requires companies to
intensify the use of modern digital marketing tools
to obtain the maximum possible economic results.
Thanks to the integration of relevant tools into the
company’s marketing strategy, it is possible to
achieve optimal results in terms of building
longterm relationships with the target audience based
on the principles of loyalty and mutual trust.
Today’s users, especially representatives of
Generation Z and Alpha, are focused on using
advanced digital products, so they prefer
companies with innovative solutions. The
integration of blockchain technology into the
company’s digital marketing strategy allows for
improving the competitive position on the market,
increasing the popularity of products thanks to the
integration of innovative solutions and a modern
data security system, which contributes to the
formation of the loyalty of the target audience in
the long term. The combination of relevant digital
marketing tools and blockchain technology allows
the company to achieve the optimal level of
conversion in specific space-time conditions. The
increase in the number of companies that actively
use blockchain in the formation of marketing
strategies in the digital environment indicates
qualitative transformations in the market and the
intensification of the evolution of marketing
approaches [6, 7].</p>
    </sec>
    <sec id="sec-2">
      <title>2. Research Purpose</title>
      <p>The complication of business processes in the
digital environment and the intensification of the
accumulation of large amounts of information
require the use of innovative approaches to ensure
effective processing and protection of
information. Accordingly, blockchain
technologies require further study to adapt to the
needs of various fields, including digital
marketing. The formation and implementation of
effective marketing strategies involve attracting
large amounts of monetary resources and focusing
on the effective use of funds through relevant
digital marketing channels. The process of
monitoring the effectiveness of the use of funds to
attract customers involves a comprehensive
analysis of statistical information received from
specialized companies for the distribution of
advertising content. However, there are risks
regarding the objectivity of the information
provided about the actual impressions of
advertising to the target audience. In today’s
Internet advertising market, fraud has become
widespread, which causes significant losses to
companies due to imitation of the behavior of real
users when viewing advertising content. The use
of fraud allows, thanks to the use of various
fictitious actions, to achieve the set of KPI values
regarding the effectiveness of the implementation
of the advertising campaign, although the real
indicators of the effectiveness of the advertising
are much lower. Among the technologies for
fraudulent acquisition of monetary resources
within the limits of the advertising budget,
attention should be paid to bots and click farms,
which cause significant losses to companies. It
should be noted that the described technologies
are used not only by fraudsters but also by official
participants of the advertising market on the
Internet (marketing companies, advertising
platforms, and aggregators) to fictitiously
overestimate the effectiveness of the provided
brand promotion services [8, 9].</p>
      <p>
        The implementation of blockchain technology
in the digital marketing system allows brands to
avoid fraudulent actions by attackers and
dishonest advertising companies thanks to the
construction of a transparent transaction tracking
system in the process of displaying informational
messages to real consumers. Identification of real
users and payment for the demonstration of
advertising content to the target audience allows
you to significantly increase the conversion rate
and optimize the advertising budget [
        <xref ref-type="bibr" rid="ref18 ref19 ref21 ref24 ref3 ref4 ref6 ref8 ref9">10, 11</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Models and Methods</title>
      <p>Unlike the Internet architecture, which
involves the existence of a large number of servers
with centralized databases, the blockchain
architecture is distributed, which allows each
participant to personally approve and update new
transactions entered into the system. Joint control
of the data system due to the need to confirm a
separate transaction by each participant allows to
ensure the security of the available information.
The effectiveness of blockchain technology is
based on the principles of consensus, as a large
number of independent participants in the network
decide on the confirmation of each transaction.</p>
      <p>Blockchain involves the creation of a list of
blocks, each of which contains transactions
arranged in chronological order. Existing lists are
stored in the form of ordinary databases or flat
files, which are supplemented by adding new
records by the executed and agreed transactions.</p>
      <p>The feature of blockchain operation involves
the use of the following data structures:
1. Pointers are variables that contain
comprehensive information about the location
of another variable in the database being used.
2. Linked lists are a sequence of blocks that
contain relationships between adjacent links in
the form of a specialized pointer with
specialized information.</p>
      <sec id="sec-3-1">
        <title>The key element of the blockchain is</title>
        <p>cryptography, which involves the transformation
of primary transaction data into encrypted objects.
At the current stage of development, distribution
has acquired two main approaches: algorithms
with an asymmetric key and hash functions. Each
of the approaches involves certain features
regarding the transformation of primary data into
encrypted elements [12].</p>
        <p>The feature of blockchain operation involves
the use of the following data structures:
• Pointers are variables that contain
comprehensive information about the location
of another variable in the database being used.
• Linked lists are a sequence of blocks that
contain relationships between adjacent links in
the form of a specialized pointer with
specialized information.</p>
      </sec>
      <sec id="sec-3-2">
        <title>The key element of the blockchain is</title>
        <p>cryptography, which involves the transformation
of primary transaction data into encrypted objects.
At the current stage of development, distribution
has acquired two main approaches: algorithms
with an asymmetric key and hash functions. Each
of the approaches involves certain features
regarding the transformation of primary data into
encrypted elements [12].</p>
        <p>Asymmetric key cryptography involves the
implementation of encryption by the use of
encryption and decryption keys, which are
generated automatically by the corresponding
algorithm. In scientific literature and practice,
cryptography with an asymmetric key is also
called a public key. The process of interaction
between communication partners in conditions of
high scalability involves the use of a private key
and a unique public key. During the interaction,
keys are exchanged: the secret key generated by
one party is encrypted using the recipient’s public
key. Thanks to its private key, the recipient can
easily decrypt the encoded information. At the
next stage, a full connection is made thanks to the
secret encryption key.</p>
        <p>A hash is a mathematical function that allows
you to transform existing data of any length into
data with a clearly defined number of characters.
Accordingly, a file of a certain size at any iteration
will receive a unique hash of the same size. The
main property of hashes is the one-sidedness of
the transformation, that is, the absence of the
possibility of their transformation into primary
data. To confirm the identity of the data, it is
necessary to compare the existing hash with
generated variants of hashes for a certain array of
information. Hash technology allows you to
ensure the security of the blockchain due to the
inability to identify the input data contained in a
specific hash. It should be noted that hashing
differs from encryption, as it does not involve
decrypting the received hash, which is an
unreadable final element [13].</p>
        <p>Thanks to the use of modern hashing
algorithms, the blockchain manages to achieve the
following advantages:
1. Avalanche effect. The use of specialized
algorithms makes it possible to obtain a
significantly transformed final result, provided
there are minor changes in the primary data.
2. Uniqueness. A unique output is generated
for each input.
3. Determinism. For a given input, using a
hash function will always generate an
unchanged output.
4. Speed. Thanks to the use of modern
highperformance algorithms, it is possible to
generate the final result very quickly.
5. Absence of reverse data transformation.
The specificity of the implementation of the
hashing algorithm does not allow the final
result to be transformed into primary data.
6. “The effect of avalanche.” Thanks to the
specified hash function, binding occurs
between consecutive blocks and ensures the
integrity of information in the middle of each
link. In case of unauthorized changes to the
information in a certain block, a discrepancy
will be identified and the blockchain will be
broken, which will lead to the invalidity of the
operation in the specified network.</p>
      </sec>
      <sec id="sec-3-3">
        <title>An important element of each block is the</title>
        <p>Merkle root, which is a simple mathematical
method of confirming each action that is
performed within the Merkle tree. Thanks to the
use of the Merkle root, the integrity and
immutability of each of the blocks sent between
participants in the peer-to-peer network are
ensured [14].</p>
        <p>The specificity of hashing involves the
implementation of the process from the nodes of
the lowest level, which are combined in the hash
of higher levels. The construction of a certain
number of levels using hashes leads to the creation
of an interconnected system ending at the top,
which is the root hash and is referred to in the
literature as the Merkle root. The Merkle root
includes complete information about each hash
that describes a particular transaction in the block
contained in the represented tree structure. Fig. 1
presents the features of Merkle root construction.</p>
        <p>In the next stage, we will consider the Merkle
tree, which is a mathematical structure of data by
the hashing of transactions available in a certain
block. By the method of decentralization, the
presented method allows you to quickly check the
accuracy of the available data. The effectiveness
of the Merkle tree implementation in the data
encryption process led to the integration of the
mentioned approach into the blockchain. In the
process of building a Merkle tree, a hierarchical
structure is used, which involves the step-by-step
merging of hash pairs. Fig. 2 shows the Merkle
tree structure.</p>
      </sec>
      <sec id="sec-3-4">
        <title>A Merkle tree consists of the following</title>
        <p>elements:
1. Data Nodes represent actual data.
2. Merkle leaves contain separate hashes,
with relevant information in the middle [17].
3. The Merkle branch contains several
Merkle leaves. A separate branch is
represented in the form of a certain hash of a
fixed size, which is generated based on the
merging of Merkle leaves hashes.
4. The Merkle root is placed at the top of the
structure and represents the final hash [18].</p>
      </sec>
      <sec id="sec-3-5">
        <title>The Merkle tree functioning algorithm</title>
        <p>includes the following actions:
• Due to the use of the specified approach,
the user gets the opportunity to identify the
presence of a specific transaction in the block.
In the process of checking the block for the
presence of specific transactions, a digital
imprint of operations is created.
• Merkle tree construction ends after
creating a root hash, which includes a large
number of hashed pairs of nodes.
• For each non-final hash, except for the
first one, there must be a previous node, and
the final node acts as a hash of transactional
data.
• Due to the use of appropriate hashing
algorithms, all transactions contained in a
specific block are transformed into a hash.
• The implementation of hash functions
leads to the creation of pre-hashed transactions
in a hierarchical system. Merkle root is the
final stage of the hashing process.</p>
        <p>The use of the Merkle tree allows you to
optimize the process of functioning of the
blockchain and ensures the integrity of the
completed transactions. The main advantages of
using a Merkle tree in the blockchain are:
1. Due to the application of the specified
approach, it is possible to check the accuracy
of the existing database.
2. The specificity of building a tree-shaped
data structure makes it possible to create small
elements that can be divided into data bits
during the network check process.
3. Thanks to the correct data format, the
process of checking the accuracy of
information is implemented within a short
period of time [19].</p>
        <p>In the process of researching the peculiarities
of the functioning of the blockchain, it is advisable
to consider the basic classification of the
distribution of technology according to the
principles of implementation. It is reasonable to
divide the existing blockchain implementation
algorithms into permissionless, permission, and a
group with the characteristics of both approaches
(Fig. 4). Permissionless blockchains enable all
users to freely join the blockchain network as
individual nodes based on the principle of
pseudoanonymity. Permissioned blockchains provide for
the distribution of identification data of each user
among network participants and the availability of
a system of access restrictions for certain nodes.</p>
        <p>All blockchain structures are divided into four
categories:
1. Public blockchain architecture. The
specified blockchain architecture provides the
possibility of free access to the system for
everyone who wants to join.
2. Private blockchain architecture. Only
invited users who have received authorization
according to a special invitation are allowed to
participate.
3. Consortium blockchain architecture. This
type of network is characterized by a higher
level of security and scalability compared to
public blockchain architecture.
4. Hybrid blockchain architecture. It is a
combination of public blockchain architecture
and private blockchain architecture, using the
advantages of each approach.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Third Level Heading</title>
      <p>In the context of the introduction of innovative
technologies, digital marketing, as a high-tech
type of economic activity, constantly attracts
advanced approaches to provide individual
companies with advantages in a highly
competitive market. The competitive environment
acts as a driver for the integration of innovative
approaches into the marketing strategies of
companies in the digital environment to establish
effective communications with the target
audience over a long-term period. Along with
such technologies as virtual and augmented
reality, machine learning, artificial intelligence,
and the Internet of Things, blockchain also
occupies a worthy place as a technology for the
evolutionary development of digital marketing.</p>
      <p>The implementation of blockchain technology
in digital marketing is made in the following
directions:</p>
      <p>1. Stimulating the viewing of advertising
messages. Modern users constantly view the
digital environment to meet their personal needs
(work, study, leisure, etc.). In the process of
visiting various resources on the Internet and
using specialized mobile applications, users are
constantly in contact with advertising messages,
which leads to the formation of a negative attitude
towards advertising content. Tiredness from the
oversaturation of advertising messages prompts
users to take a set of measures to minimize the
viewing of relevant informational content. As a
countermeasure, companies implement more
effective innovative approaches that are focused
on promoting brands and their products in the
digital environment. As part of the
implementation of modern marketing strategies
on the Internet, companies are beginning to
actively use blockchain technology. Evidence of
the effectiveness of the use of the mentioned
technology in the process of implementing
advertising campaigns is the increase in the
number of views of advertising content and the
level of conversion. The use of blockchain in
advertising campaigns involves the construction
of a system of incentives for users, which provides
for the receipt of certain material and non-material
benefits. The most common approach involves
providing the user with a digital currency or token
as a reward after viewing advertising content. The
accumulation effect is used, which involves a
small payment for viewing one advertising
message, but familiarization with advertising
content on an ongoing basis allows you to
accumulate a significant amount of digital funds.
Material stimulation in modern conditions acts as
an effective tool for encouraging users to view the
relevant thematic content of brands. Due to the
prospect of receiving a material reward in
exchange for a short period in the process of
viewing advertisements, the level of coverage of
potential users with advertising content increases.
Constant viewing of advertising messages allows
users to form a high level of loyalty to the
company and its products and also encourages
them to make relevant thematic purchases.
Communications in the digital environment based
on material incentives should be strengthened by
the formation in users of a feeling of a
personalized attitude of companies to each client
[22].</p>
      <p>2. Creation of a system with a high level of
personal data protection. Blockchain technology
provides for the implementation of highly
effective principles for ensuring anonymity.
Integration of the presented system into the
company’s marketing system makes it possible to
ensure the protection of the personal data of
consumers and prevent the theft of private
information by third parties. Realizing that the
company has a high-tech personal data protection
system, customers are more likely to interact with
the brand over a longer period. The formation of
trusting relations between the company and the
target audience contributes to the increase in the
level of provision of relevant information by users
in the process of making purchases. Modern
companies during the formation of databases
create a system of incentives to encourage users to
provide personal data. Incentives are expressed in
the form of cash payments, specialized bonus
programs, discounts, and valuable content for
users. Thanks to receiving relevant personal
information from users, companies get the
opportunity to create highly effective
recommendation systems based on machine
learning approaches, which allow them to identify
new customers based on relevant metrics and offer
relevant products and services. Along with this,
the user gets an idea of a personalized approach
from the respective company. Therefore, thanks to
blockchain technology, companies increase the
effectiveness of forming an offer of relevant
products, and clients are aware of the high level of
reliability of the preservation of provided personal
data [23].</p>
      <p>3. Building marketing campaigns according
to the principles of transparency and reliability.
In the conditions of globalization and the
intensification of the introduction of digital
technologies, there is a complication in the system
of logistics chains and relationships between all
participants in the market. The international
division of labor and the creation of goods and
services based on the principles of cooperation
leads to the complication of identifying the actual
origin of the country producing the products. For
multinational corporations, globalization and the
international division of labor do not cause
difficulties, provided that components from
different countries are accumulated for the
production of the finished product. However, the
existing system leads to large economic losses for
legal producers due to the existence of a global
market of counterfeit products that impersonate
branded products but are characterized by a low
level of quality and danger to end consumers.
Ordinary users face difficulties in identifying
counterfeit products that are sold on the Internet
by many trading companies. The integration of
blockchain technology by companies allows
consumers to easily track all stages of the creation
of a specific product and its placement for sale in
the appropriate place (a real retail establishment
or a resource on the Internet). The use of
blockchain technology in a brand’s marketing
campaign makes it possible to provide the target
audience with reliable and comprehensive
information about specific goods or services.
Users with a higher level of probability will
decide to purchase a specific product if they have
objective information [24].</p>
      <p>4. Cost optimization. In today’s digital
environment, there is a large number of
companies with identical characteristics of goods
and services, which requires the allocation of
large financial resources to build effective
marketing strategies. Improving marketing
strategies based on blockchain technology by
decentralization approaches allows the use of a
smart contract system and minimizes advertising
budgets. Technology makes it possible to get rid
of advertising intermediaries thanks to the
establishment of direct ties between companies
and specialists in the production of advertising
content and the implementation of effective
information campaigns. In this context,
intermediaries are seen as an inefficient link that
leads to excessive use of monetary resources
without the appropriate level of conversion
growth in the digital environment. So, in the
advertising market, blockchain acts as a
technology for optimizing costs for the production
and promotion of advertising content to the target
audience. At the previous stages of the
development of the global advertising market,
there was a system of relationships between
brands and publishers, specialized advertising
companies, and freelancers with the mandatory
participation of specialized intermediaries.
However, the introduction of blockchain
technology to the global advertising market led to
a radical transformation of relationships [25, 26].</p>
      <p>In the digital environment, influencers who
communicate with the target audience by certain
value orientations, generating relevant thematic
content in specialized media, play a significant
role. To increase the number of customers,
companies actively involve thematic opinion
leaders as part of their marketing strategies. Smart
contracts implemented within the framework of
blockchain technology enable companies to build
more effective business relationships with opinion
leaders who interact with a large number of
potential customers. Blockchain technology
makes it possible to identify fictitious accounts
and cases of attracting non-existent subscribers.
Thanks to an effective identification system, it is
possible to evaluate the effectiveness of each
influencer’s work with real users in the relevant
social media. Blockchain technology makes it
possible to build an effective and fair system of
remuneration for opinion leaders according to the
objective involvement of customers and
motivation to take targeted actions aimed at
increasing the level of conversion in the digital
environment. Continuously monitoring the
influencer’s performance with the target audience
allows for the optimization of the advertising
budget and helps to increase the level of user
loyalty to the company and its products. Certain
categories of opinion leaders use a significant
number of fictitious followers to increase their
value in the advertising market, which is reflected
in the effectiveness of attracting a real target
audience to advertised brands. Thanks to
blockchain technology, it is possible to identify
decent opinion leaders who are characterized by a
high level of effectiveness of interaction with real
consumers on the Internet.</p>
      <p>5. Implementation of a flexible partner
loyalty program. Awareness of the value of
longterm relationships with customers prompts
modern companies to introduce profile loyalty
programs within the framework of sold goods and
services, as well as taking into account the
socioeconomic, demographic, and psychological
characteristics of consumers. Digitalization
processes have led to the growth of specialized
applications that are used by modern consumers
on an ongoing basis. Based on the outlined trends,
the company uses specialized applications in the
framework of marketing campaigns that allow the
implementation of flexible loyalty programs,
focusing on the specifics of the behavior and
values of different categories of consumers.
According to their characteristics, the vast
majority of modern users install several
applications with interesting loyalty programs that
meet their current needs. A negative phenomenon
for brands is the availability and ease of
installation of applications with loyalty programs,
which leads to fictitious downloads of software
solutions. For example, in the USA, according to
profile studies, there are on average about 30
loyalty programs per household, but in fact, only
12 specialized applications are actively used. The
availability of such services as the App Store and
Google Play makes it possible to stimulate the
target audience to install loyalty applications from
relevant brands, but in many cases, there are
difficulties in identifying the levers of
encouragement to use these software products
regularly [27].</p>
      <p>Modern users have a positive attitude to
effective points accrual systems within the
framework of relevant loyalty programs, dynamic
discount systems, and other material incentives
are also in demand as a reward for a positive
attitude towards the brand. However, the
oversaturation of digital products and related
information in the conditions of modern dynamic
life leads to the loss of opportunities to use
accumulated points, which is explained by the
limited period of validity of bonuses within the
limits of a specific bonus program. The rapid
depreciation of earned bonuses negatively affects
customer loyalty to the company associated with
the respective bonus program. The inability to use
earned bonuses promptly significantly reduces
their value for consumers and leads to a decrease
in the target audience’s interest in the company’s
activities and its products. Accordingly, the image
of the company on the market is gradually
deteriorating.</p>
      <p>Improvement of loyalty programs thanks to
blockchain integration makes it possible to
increase the level of user satisfaction with the
company as a result of optimizing the functioning
of the bonus program. Ensuring the transparency
of the bonus accrual system based on the use of a
decentralized blockchain approach helps to
increase the loyalty of the target audience. The
presented technology makes it possible to create
complex systems of partnership relations between
companies for offsetting bonuses accumulated by
customers. The cooperation scheme incorporates
the involvement of companies with
complementary goods and services (for example
washing machines, specialized means for washing
clothes, accessories, etc.).</p>
      <p>The combination of blockchain technology
and specialized applications allows real-time
tracking of points accrued by a specific brand and
used by the specifics of the loyalty program.
Information about new promotions is provided in
the form of a notification signal to the client’s
smartphone, which contributes to ensuring the
user’s awareness of the appearance of useful
offers from the brand. Recommendation
algorithms integrated into applications offer
optimal options for applying points based on the
tastes of a particular user.</p>
      <p>6. Improvement of social networks based on
blockchain. For the vast majority of modern
consumers, social networks act as the main
channel of communication with other users on the
Internet. The use of various social media allows
us not only to enjoy communication and spend
leisure time in a virtual environment but also to
make purchases of necessary goods and services.
It is also necessary to pay attention to the
availability of specialized social networks that
attract the target audience according to social,
economic, demographic, psychological, and other
features. The formation of specialized
communities by a set of common features enables
companies to quickly find the target audience and
effectively interact with it [28]. Blockchain
technology is also being used to optimize digital
marketing strategies in social media. Modern
users show an increased interest in decentralized
social platforms based on blockchain, as the
presented web resources are characterized by a
higher level of implementation of innovative
solutions. Realizing potential opportunities for
interaction with the target audience, companies
begin to actively develop their marketing
strategies, accordingly adapting their presence in
social media to their own capabilities and market
needs.</p>
      <p>Blockchain technology makes it possible to
bring the level of protection of personal data and
the reliability of payment systems in social media
to a qualitatively new level of development.
Thanks to the integration of crypto-currencies into
social networks, the possibilities for paying for
goods and services promoted by companies
through the relevant profiles are significantly
expanded. The new level of security of key
processes leads to an increase in the popularity of
blockchain in social networks among modern
users, which opens new prospects for companies
for an intensive level of development, an increase
in the level of conversion, and the formation of a
loyal relationship of users in the long-term
perspective [29].</p>
      <p>The conducted research testifies to the
effectiveness and perspective of using blockchain
technology to improve the marketing strategies of
companies in the digital environment. The
intensification of the development of innovations
leads to the need to assess the directions of mutual
combinations of various technologies to achieve a
multiplicative effect. One of the directions of
modern science, leading to the optimization of
processes for all types of economic activity, is the
use of Data science approaches to process large
data sets. Based on the outlined situation, it is
advisable to focus further research on the study of
the features of the aggregation of blockchain
technology, machine learning, artificial
intelligence, and other highly effective
mathematical algorithms to optimize existing
processes. Multidisciplinary solutions will lead to
the appearance on the market of innovative digital
marketing tools, which will be characterized by a
higher level of personalized communications and
the dynamic adaptation of recommendation
systems to the needs of the consumer by changes
in the influence of various factors.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>Due to their effectiveness, blockchain
technologies have become significant in many
types of economic activity and continue to be
actively implemented by companies to optimize
key processes. The accumulation of large amounts
of valuable information requires the use of
effective database protection systems to prevent
fraudulent actions by third parties. Thanks to the
integration of blockchain technologies into digital
marketing, it is possible to achieve a new level of
company functioning and customer retention
under the conditions of forming a high level of
loyalty. On the one hand, companies get the
opportunity to ensure transparency of key
processes and interaction with the target audience
as part of the implementation of appropriate
marketing strategies in the digital environment.
Along with this, it is possible to create an effective
system of protection of users’ data, which allows
not only to attract new customers but also
encourages users to provide relevant information
in the process of interaction with a specific brand.
Thanks to the use of blockchain, companies get
the opportunity to bring the level of interaction
with the target audience, especially
representatives of generations Z and Alpha, to a
qualitatively new level and ensure an
economically justified level of conversion.</p>
    </sec>
    <sec id="sec-6">
      <title>6. References</title>
      <sec id="sec-6-1">
        <title>F. Kipchuk, et al., Assessing Approaches</title>
        <p>of IT Infrastructure Audit, in: IEEE 8th
International Conference on Problems of
Infocommunications, Science and</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Technology</surname>
          </string-name>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1109/picst54195.
          <year>2021</year>
          .9772181
          <string-name>
            <given-names>Z.</given-names>
            <surname>Brzhevska</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of the Process of Information Transfer from the Source-to-User in Terms of Information Impact, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3188</volume>
          (
          <year>2021</year>
          )
          <fpage>257</fpage>
          -
          <lpage>264</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>Renew. Sustain. Energy</given-names>
            <surname>Revs</surname>
          </string-name>
          .
          <volume>100</volume>
          (
          <year>2019</year>
          )
          <fpage>143</fpage>
          -
          <lpage>174</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>doi:10</source>
          .1016/J.RSER.
          <year>2018</year>
          .
          <volume>10</volume>
          .014
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Iakovou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <article-title>Blockchain in Global Supply Chains and Cross Border Trade: A Critical Synthesis of the StateOf-The-Art, Challenges and Opportunities</article-title>
          .
          <source>Int. J. Prod. Res</source>
          .
          <volume>58</volume>
          (
          <issue>7</issue>
          )
          <year>2020</year>
          2082-
          <fpage>2099</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <source>doi:10.1080/00207543</source>
          .
          <year>2019</year>
          .1651946
          <string-name>
            <given-names>M.</given-names>
            <surname>Casey</surname>
          </string-name>
          , et al.,
          <source>The Impact of Blockchain Technology on Finance: A Catalyst for Change, Int. Cent. Monetary Bank. Stud.</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          (
          <year>2022</year>
          )
          <fpage>274</fpage>
          -
          <lpage>298</lpage>
          . doi:
          <volume>10</volume>
          .4018/978-1-
          <fpage>7998</fpage>
          - 7545-1.ch012
          <string-name>
            <given-names>R.</given-names>
            <surname>Motoryn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Prykhodko</surname>
          </string-name>
          ,
          <article-title>Adaptation of International Recommendations on Informal Employment in Ukraine (problems of Measurement and Analysis)</article-title>
          ,
          <source>Stat. J. IAOS</source>
          ,
          <volume>36</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          )
          <fpage>549</fpage>
          -
          <lpage>557</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>doi:10</source>
          .3233/sji-190603
          <string-name>
            <given-names>I.</given-names>
            <surname>Memon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nair</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jakhiya</surname>
          </string-name>
          ,
          <article-title>How Ready the GEN-Z is to Adopt FinTech?</article-title>
          ,
          <source>2021 Int. Conf. Comput. Intell. Knowl.</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>Econ. (ICCIKE</given-names>
            <surname>).</surname>
          </string-name>
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          , (
          <year>2021</year>
          )
          <fpage>565</fpage>
          -
          <lpage>570</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <source>doi:10.1109/ICCIKE51210</source>
          .
          <year>2021</year>
          .9410747
          <string-name>
            <given-names>L.</given-names>
            <surname>Ganushchak-Efimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Shcherbak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Nifatova</surname>
          </string-name>
          ,
          <article-title>Assessing the Effects of Socially Responsible Strategic Partnerships on Building Brand Equity of Integrated Business Structures in Ukraine, Oecon</article-title>
          . Copernic.
          <volume>9</volume>
          (
          <issue>4</issue>
          ) (
          <year>2018</year>
          )
          <fpage>715</fpage>
          -
          <lpage>730</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <source>doi:10</source>
          .24136/OC.
          <year>2018</year>
          .035
          <string-name>
            <given-names>B.</given-names>
            <surname>Bebeshko</surname>
          </string-name>
          , et al.,
          <source>Application of Game Theory</source>
          ,
          <article-title>Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency</article-title>
          ,
          <source>Journal of Theoretical and Applied Information Technology</source>
          <volume>100</volume>
          (
          <issue>24</issue>
          ) (
          <year>2022</year>
          )
          <fpage>7390</fpage>
          -
          <lpage>7404</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Security Rating Metrics for Distributed Wireless Systems</article-title>
          ,
          <source>in: Workshop of the 8th International Conference on "Mathematics. Information Technologies.</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>Education": Modern Machine Learning Technologies and Data Science</source>
          , vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          .J.
          <string-name>
            <surname>Kh-Madhloom</surname>
          </string-name>
          ,
          <article-title>Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming, Wasit J</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>Comput. Maths. Sci. 1</source>
          (
          <issue>2</issue>
          ) 2022
          <fpage>21</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Punithavathi</surname>
          </string-name>
          , et al.
          <source>Crypto Hash Based Malware Detection in IoMT Framework</source>
          , Intell. Autom. Soft Comp.
          <volume>34</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          )
          <fpage>559</fpage>
          -
          <lpage>574</lpage>
          . doi:
          <volume>10</volume>
          .32604/iasc.
          <year>2022</year>
          .024715
          <string-name>
            <given-names>I.</given-names>
            <surname>Chenchev</surname>
          </string-name>
          , Blockchain Security and
          <string-name>
            <given-names>Calculation</given-names>
            <surname>Improvements</surname>
          </string-name>
          , Intell. Sustain.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Syst</surname>
          </string-name>
          .
          <source>Sel. Paps. of WorldS4</source>
          <year>2022</year>
          ,
          <volume>2</volume>
          (
          <year>2023</year>
          )
          <fpage>397</fpage>
          -
          <lpage>406</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <article-title>URL: https://medium.com/coinmonks/me rkle-trees-concepts-and-use-cases5da873702318.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <article-title>What is a Merkle Tree?</article-title>
          . URL: https://support.bitso.com/hc/enus/articles/11193286034452-What-is
          <article-title>-aMerkle-TreeBlockchain Merkle Trees</article-title>
          . URL: https://www.geeksforgeeks.
          <article-title>org/blockchai n-merkle-trees/ Merkle Tree in Blockchain: What Is It</article-title>
          and How Does It Work? URL: https://www.knowledgehut.com/blog/bloc kchain/
          <article-title>merkle-tree-in-blockchain Blockchain Architecture Basics: Components, Structure, Benefits &amp; Creation</article-title>
          . URL: https://mlsdev.com/blog/1 56-how
          <article-title>-to-build-your-own-blockchainarchitecture Types of Blockchain: Public, Private, or Something in Between</article-title>
          . URL: https://www.foley.com/en/insights/public ations/
          <year>2021</year>
          /08/types-of
          <article-title>-blockchainpublic-private-between J</article-title>
          .
          <string-name>
            <surname>Yun</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Strycharz</surname>
          </string-name>
          ,
          <article-title>Building the Future of Digital Advertising One Block at a Time: How Blockchain Technology Can Change Advertising Practice</article-title>
          and Research, J. Curr.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>Issues</given-names>
            <surname>Res</surname>
          </string-name>
          . Advert. (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>doi:10.1080/10641734</source>
          .
          <year>2022</year>
          .2090464
          <string-name>
            <given-names>V.</given-names>
            <surname>Wylde</surname>
          </string-name>
          , et al.
          <article-title>Cybersecurity, Data Privacy and Blockchain: A Review</article-title>
          .
          <source>SN Comput. Sci. 3</source>
          (
          <issue>2</issue>
          ) (
          <year>2022</year>
          )
          <fpage>127</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>doi:10</source>
          .1007/s42979-022-01020-4
          <string-name>
            <given-names>H.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kushwah</surname>
          </string-name>
          ,
          <article-title>Blockchain and the Future of Digital Marketing, Blockchain Technol</article-title>
          . Appls. for Digit.
          <source>Mark. IGI Global</source>
          ,
          <article-title>(</article-title>
          <year>2021</year>
          )
          <fpage>250</fpage>
          -
          <lpage>275</lpage>
          . doi:
          <volume>10</volume>
          .4018/978- 1-
          <fpage>7998</fpage>
          -8081-3.ch016
          <string-name>
            <given-names>M.</given-names>
            <surname>Petrecca</surname>
          </string-name>
          ,
          <source>Impact of Blockchain on Digital Advertising Ecosystem: A Study on Privacy Concerns on Disclosing Personal Data</source>
          , (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Iavich</surname>
          </string-name>
          , et al.,
          <source>Lattice based Merkle</source>
          ,
          <source>in: International Conference on Information Technologies</source>
          , vol.
          <volume>2470</volume>
          (
          <year>2019</year>
          )
          <fpage>13</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          Sci.
          <volume>10</volume>
          (
          <year>2020</year>
          )
          <fpage>978</fpage>
          -
          <lpage>3</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Zilius</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Spiliotopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Moorsel</surname>
          </string-name>
          ,
          <article-title>A Dataset of Coordinated CryptocurrencyRelated Social Media Campaigns</article-title>
          . arXiv, preprint, arXiv:
          <fpage>2301</fpage>
          .06601 (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>Transportation</given-names>
            <surname>Rev</surname>
          </string-name>
          .
          <volume>135</volume>
          (
          <issue>101860</issue>
          ) (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <source>doi:10</source>
          .1016/j.tre.
          <year>2020</year>
          .101860
          <string-name>
            <given-names>A.</given-names>
            <surname>Pfeiffer</surname>
          </string-name>
          , et al.
          <source>Blockchain Technologies and Social Media: A Snapshot</source>
          ,
          <source>ECSM 2020 8th European Conf. on Social Media.</source>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <given-names>Academic</given-names>
            <surname>Confs</surname>
          </string-name>
          . and
          <string-name>
            <surname>Publishing</surname>
            <given-names>Limited</given-names>
          </string-name>
          , (
          <year>2020</year>
          )
          <fpage>196</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>