Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
User Attitudes around Key Management, and their Impact on Blockchain Technology Adoption
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
2019 (English)Independent thesis Advanced level (degree of Master (Two Years)), 80 credits / 120 HE creditsStudent thesis
Abstract [en]

The following study examines the background of users’ decisions about their behavior concerning online identity, specifically looking at the acceptance or rejection of self-sovereign identity solutions and the technologies that support them: blockchain and asymmetric encryption. A qualitative analysis is presented of typical user narratives concerning online behavior, while exploring the cultural values underlying users’ decisions about accepting or rejecting new, potentially emancipatory technologies. The results include inventories of values and beliefs that played a key part in informing the respondents’ behaviors, and presents four distilled narratives of reasoning about online identity in the form of the archetypes of the ​Pragmatist, the Self-doubter, the ​Cyber-conscious and the ​Futurist user, each representing a specific set of values, beliefs and their interplay resulting in specific intentions and behaviors, along with design guidelines for innovative blockchain technologies based on the user expectations in these narratives. The research concludes with relating the findings to existing theory, and proposing a number of quantitatively testable hypotheses for the refinement of technology acceptance research in the specific domain of online security and identity.

Place, publisher, year, edition, pages
2019. , p. 60
Keywords [en]
blockchain, encryption, identity, online identity, sovereignty, self-sovereign, technology acceptance, tam, technology acceptance model, qualitative, user attitudes
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:ltu:diva-77065OAI: oai:DiVA.org:ltu-77065DiVA, id: diva2:1375898
Subject / course
Student thesis, at least 30 credits
Educational program
Information Security, master's level (120 credits)
Supervisors
Examiners
Available from: 2019-12-12 Created: 2019-12-06 Last updated: 2019-12-12Bibliographically approved

Open Access in DiVA

fulltext(1541 kB)42 downloads
File information
File name FULLTEXT01.pdfFile size 1541 kBChecksum SHA-512
ca1893db32e1f19dcccbb2afbab10de5ef9070928b75309e6aa686f8020caa8934c6e0cf05953ab61cbce7499fa2bd9490599cff8c3cd2a3d6c881c01a51b182
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Jozsef, Daniel
By organisation
Department of Computer Science, Electrical and Space Engineering
Other Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 42 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 24 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf