Submitted:
13 February 2025
Posted:
13 February 2025
Read the latest preprint version here
Abstract
Keywords:
1. Introduction
1.1. Discussion of Challenges and Limitations in the Study
- Technical Integration: The integration with existing university structures and IT systems and architecture has to be totally unproblematic. This entails the need for the software to be compatible with the previous software and data formats which are usually not fully compatible with the newer formats needing a migration plan that will minimize current workflow interferences [25]. There is the need to balance integration strategies by considering the technical complexities of currently in-place systems and the interoperability of the systems to enable the change [26].
- Scalability and Performance: This is so because the number of users and projects increases, and that affects the scalability of the blockchain network [27]. It could be challenged by a high number of transactions to achieve the efficiency of the system. This is why it is necessary to discuss the need to enhance the scalability of solutions, for example, through sharding or off-chain computation [28].
- User Adoption: The technical nature of blockchain systems and the understanding of how these systems work and how to implement this learning is an issue in the adoption of blockchain systems by the faculty and students [29]. Support, especially in the form of friendly user interfaces and effective training will be critical to implementation.
1.1. Study Objectives and Motivation Behind Them
- RQ1: What is the distribution of papers across different years, focusing on Final Project, Degree, Copyright, Software, Digital Content, and University Internal Protection?
- RQ2: How are the chosen papers related to the proposed keywords concerning these topics?
- RQ3: Which of the papers explore Blockchain-based tokens and Cross-Chain (Smart Contract) as a review related to the academic setting?
- RQ4: Which papers explore non-fungible tokens, Copyright, integrity, and software within academic and university contexts?
- RQ5: In the current landscape of Unique Assets of Digital Content, what constitutes the primary challenges that universities face regarding their internal protection processes?
- RQ6: What global standards are employed to safeguard the integrity and assets of digital content and media, especially in the context of educational institutions?
- RQ7: What types of NFTs are used to generate digital assets for content software and applications, and what methods and techniques are currently being utilized?
1.1. Contributions
- Synthesis of Existing Knowledge: To achieve this, we will perform a systematic review of the literature to provide a synthesis of the research studies in the field. Making this synthesis will give a clear connection on how both blockchain and NFTs can be applied to protect academic content. Further, we will describe the technical aspects and some of the ethical issues of their application in an academic context [30, 31, 32].
- Recommendations for Future Applications: From the identification of the project, recommendations on the future trend for the use of blockchain and NFTs in issues of intellectual property will be developed. This investigation will go outside the ivory tower’s research confines as a means of providing valuable information for other aspects of intellectual property management strategies [33, 34].
- Identification of Emerging Trends: The study will reveal contemporary and fresh ideas of utilizing blockchain and NFTs to address the issue of copyright and intellectual property rights. This will help in the ongoing debate of emerging technologies in the field of intellectual property [35, 36].
- Practical Validation and Case Studies: We will look at examples of the adoption of blockchain and NFT in academic institutions, including current use cases and pilots. This analysis would reveal the experiences of practical difficulties or achievements in the implementation of these technologies in the context of this study [37, 38].
2. Materials and Methods
2.1. PRISMA
- Conducting a comprehensive and exhaustive review of the literature.
- Reducing bias in study selection.
- Increasing the transparency and reproducibility of the review.
- Facilitating the synthesis of available evidence.
- a.
- Define the research question: What are the best practices for software project management in the post-production phase?
- b.
- Identify relevant studies: Articles will be searched for in the following databases: IEEE Xplore, ACM Digital Library, ScienceDirect, and Scopus. The search terms will be: "Authenticity", "Blockchain", "Copyright", "Data protection", "Degree Works", "Digital certificates", "Digital Rights Management", "Intellectual Property", "Non-Fungible Tokens (NFTs)", "Source code", "Technological innovation".
- Published in a Q1 or Q2 journal
- Published in the last 10 years (2014-2024)
- Written in English or Spanish
- Relevant to the research question
- Authors
- Year of publication
- Study title
- Abstract
- Methodology
- Results
- Conclusions
- Structured Literature Review: While this project involves system development, a PRISMA-inspired approach to the literature review would ensure a comprehensive and unbiased exploration of existing research. This includes using well-defined search terms in relevant databases, clear inclusion and exclusion criteria for studies, and a thorough analysis focused on security, intellectual property protection mechanisms, and educational applications of blockchain.
- Transparent Process: Documenting the literature search strategy, system design choices, and evaluation methods aligns with PRISMA's emphasis on transparency. This allows others to understand the research process, assess its rigor, and potentially replicate the work.
- Focus on Evidence: PRISMA helps researchers move beyond subjective opinions and design a project that aims to generate concrete evidence. This can include data from security tests, insights from usability studies, and thematic analysis of feedback related to the system's impact on academic integrity.
- Addressing Bias: Even in a single-institution project, biases can creep in when designing or choosing technological components. A PRISMA mindset encourages the researcher to actively consider potential biases in the literature they're reviewing, the architecture they propose, and their evaluation criteria.
- Credibility and Trustworthiness: A well-documented, evidence-based, and bias-aware approach strengthens the research findings. This is crucial when recommending potentially disruptive technology to a university's stakeholders.
- Synthesis and Insights: PRISMA encourages researchers to move beyond just summarizing existing studies. It guides them toward identifying patterns, gaps, and areas ripe for innovation, making this project more likely to yield novel and useful solutions.
- Foundation for Future Research: A solid research foundation lays the groundwork for further exploration. The structured literature review can inform future meta-analyses, while findings of this project might inspire replication studies at other universities.
2.3. Incorporation and Exclusion Parameters
- Direct Relevance to Education: Studies explicitly investigating blockchain and NFT applications for intellectual property protection within academic settings are prioritized. This focus on the educational context ensures the review captures research directly applicable to the project's specific challenge.
- Technical Depth: Papers detailing technical implementations, architectural choices, NFT designs, and security mechanisms relevant to similar use cases are actively sought. These provide insight into the feasibility and potential design considerations for the proposed source code protection system.
- Usability and Adoption Analysis: Studies addressing the usability of blockchain-based systems for students and faculty, as well as potential integration challenges within university workflows, are considered vital. Practical insights into adoption barriers and facilitators contribute to the design of a solution tailored to the specific needs of the academic environment.
- Empirical Data and Case Studies: Papers presenting quantitative or qualitative evidence from pilot projects or implementations of similar systems are highly valued. Such data enables an assessment of the technology's potential impact on deterring plagiarism and safeguarding intellectual property.
- Outdated Technologies: Studies primarily focused on superseded blockchain platforms or earlier NFT standards are excluded to maintain focus on cutting-edge and actively maintained technologies.
- Cryptocurrency Emphasis: Papers with a central emphasis on cryptocurrency applications are excluded, even while acknowledging their reliance on blockchain. This refinement concentrates research on the application of blockchain specifically for intellectual property protection.
- Focus on Relevant Educational Applications: While some studies may offer valuable insights, those focusing on the application of blockchain in areas unrelated to intellectual property and higher education such as healthcare or supply chain management are excluded unless they directly contribute transferable knowledge to the educational domain.
- Non-Academic Focus: Priority is placed on studies conducted within academic institutions or contexts. Papers primarily exploring commercial applications are excluded to ensure the review reflects the specific challenges and regulations of the university setting.
- Lack of Empirical Basis: Purely conceptual or speculative discussions without data-driven analysis are excluded. The review favors studies grounded in concrete system designs, experimental results, or reasoned arguments.
3. Results
3.1. Results Based on the Proposed Research Questions
- RQ1: What is the distribution of papers across different years?
- RQ2: How are the chosen papers related to the proposed keywords?
| Work | Integrity | Copyright | Software | Digital content / Asset | Non-Fungible Token |
|---|---|---|---|---|---|
| [1-3, 23-25, 27, 29, 33, 76, 102, 104, 110, 117-122] | X | X | |||
| [10-12, 26, 28, 30-32, 39, 42, 44, 71-72, 83, 89, 91, 97, 99-101, 105-106, 108-109] | X | X | X | ||
| [13, 34, 36, 38, 40-41, 43, 45, 47, 88, 93, 107] | X | X | |||
| [16, 35, 49, 52, 56, 59, 65-70, 123, 126-132] | X | X | X | ||
| [19-21, 37, 46, 50-51, 75, 82, 90] | X | X | X | ||
| [53-54, 57-58, 61-62, 125, 133-139] | X | X | X | ||
| [48, 54, 64] | X | X | X | X | |
| [60, 63, 92, 124, 140-143] | X | X | X | X | |
| [73-74, 86, 103, 111-116] | X | X | X | ||
| [77-82, 84, 87, 94-96, 98] | X | X | X | X |

- The green cluster is basically compiled of topics like network security, privacy, encryption, and authentication, which are the cornerstone for the secure implementation of blockchain in business as well as security solutions.
- The red circle encompasses ideas such as digital assets, smart contracts, Ethereum, and non-fungible token, which highlight the use of the blockchain technology in the digital economy and decentralization.
- The blue cluster concerns three IoT and blockchain associated subjects: the internet of things, consensus algorithms and access control, which points to a link between blockchain, and the digital environment required to automate devices.
- The purple cluster refers to aspects such as open-source software and open systems which deals with aspects on collaboration and openness especially in the development of blockchain.
- RQ3: Which papers explore non-fungible tokens, Copyright, integrity, software and multichain?
| Reference | Title | Main Keywords | Contribution |
|---|---|---|---|
| [24] | A survey on blockchain technology and its security | Blockchain, Consensus algorithm, Risk, Blockchain security. | This article provides an in-depth review of blockchain technology, including its history, consensus algorithms, cryptographic details (public key cryptography, zero-knowledge proofs, and hash functions), and a comprehensive list of blockchain applications. In addition, it focuses on blockchain security, assessing security risks, analyzing real attacks and failures, and summarizing recent security measures. Finally, it presents the challenges and research trends to achieve more scalable and secure blockchain systems for massive deployments. |
| [29] | Blockchain Technology for Tracing Drug with a Multichain Platform: Simulation Method | Blockchain technology, Multichain, Simulation method, Tracing Drug | This study implements simulations with blockchain technology to track medicines, involving the pharmaceutical industry, wholesalers, health services and consumers. The main contribution is to improve traceability in the supply chain through a Decentralized Autonomous Organization (DAO) that organizes data and transactions in blockchain. The simulation demonstrates key features of blockchain such as transparency, immutability and peer-to-peer transactions, strengthening control over drug distribution. |
| [31] | A Private Blockchain Implementation Using Multichain Open-Source Platform | Blockchain, digital transformation, food tracking and tracing, Multichain, private blockchain |
In this article, the authors discussed the application of private blockchain using the Multichain open-source software that can be applied in agri-food products like food tracking and tracing, product life cycle and anti-counterfeit. He points out that digital evolution enabled by disruptive technologies including IoT, augmented reality, artificial intelligence & blockchain affects all spheres of human activity. Ever since blockchain was designed for cryptocurrencies, it has become a disruptor or an enabler of innovation in different sectors. |
| [46] | A Study on Technology to Counter Copyright Infringement According to NFT Transaction Types | NFT, Non-Fungible Token, Minting, Ethereum, Copyright, Infringement, Blockchain | This article addresses transactions of intrinsically valuable assets in the digital world using Blockchain-based NFTs (Non-Fungible Tokens) used in games, literature, art and music. As various NFT exchanges emerge, copyright infringement issues also arise. The article classifies the types of copyright infringement that can occur in NFT exchanges and proposes countermeasures. Ten types of NFT exchanges are examined, and it is hoped that the proposed countermeasures will help revitalize the NFT market by providing solutions to these problems. |
| [47] | Voting blockchain for High Security NFT | NFT, voting blockchain, escrow account |
This paper proposes a secure blockchain architecture for NFTs that confirms transaction ownership and implements a secure payment method. NFTs, stored in a blockchain-based digital ledger, represent items such as photos, videos, audio and other intellectual properties, certifying their uniqueness. The proposed architecture uses a transaction confirmation node called J Node to prevent errors in token transfer via an escrow account. |
| [55] | Connect2NFT: A Web-Based, Blockchain Enabled NFT Application with the Aim of Reducing Fraud and Ensuring Authenticated Social, Non-Human Verified Digital Identity | Non-fungible tokens, Digital identity, Verifiable credentials, Blockchain technology, Smart contract; | This white paper addresses two key problems of NFTs: data storage security and breaches and fraud. It proposes a theoretical solution for storing digital assets underlying NFTs in a decentralized manner and presents “Connect2NFT”, an application that connects Twitter accounts with NFTs to verify owner authenticity. A performance analysis and comparison with similar applications is performed, contributing to improving security and authenticity in the NFT space. |
| [60] | UML MODEL OF THE PROPERTY RIGHT DISTRIBUTION MODULE USING NFT FRACTIONALIZATION BASED ON BLOCKCHAIN TECHNOLOGY | Blockchain, elliptical cryptography, unique token, Fractionalization, property right | In this paper, authors outlined UML diagrams for property rights distribution module through the fractal decomposition of NFTs, that are based on blockchain and conform to the ERC-1155 standard. The blockchain which is used in most illustrious in the executing of operations in Bitcoin helps in maintaining data and security and without having a third party who is believed to be trustworthy. Implements of this module creates the possibility of obtaining specific ownership fractions in decentralized application by means of Ethereum cryptographic protocols. The objective is when creating a new NFT, a functionality should enable the fractalization and the sale of fractions to other people when guaranteeing security and meeting functionality requirements. |
| [64] | The Research of AHP-Based Credit Rating System on a Blockchain Application | Blockchain, non-fungible-token, analytic hierarchy process, credit rating, internet of things | The paper proposes a method to measure the credit rating of users in a blockchain traceability system, addressing the lack of efficient technologies to ensure the authenticity of data before it is stored in the blockchain. It analyzes trading processes and models in NFT markets and uses the analytic hierarchy process (AHP) to establish a credit rating system based on an evaluation matrix and efficiency coefficient. Experimental results show that this credit evaluation system can help judge the reputation of users and decide whether to restrict transactions of users with abnormal behaviors. |
| [74] | Decentralized Global Copyright System Based on Consortium Blockchain With Proof of Authority | Decentralized copyright, international copyright, cross-border copyright, copyright protection, consortium blockchain, proof of authority |
The paper discusses an understanding of a novel copyright framework in the global protection and international IP management using a consortium blockchain. By doing so, it enables copyright to be registered and traded internationally without the need of a universal cloud, with the use of proof-of-authority consensus mechanism. Member countries also authenticate and settle transactions on the block chain while a tokenized payment is employed for the copyright fees. Based on some of the ideas above, a prototype was created and tested; there were some ideas that were provided to help manage international copyrights. |
| [79] | Usage of Deep Learning and Blockchain in Compilation and Copyright Protection of Digital | Copyright protection, Blockchain, Deep learning, Data models, Music, Generative adversarial networks, Mathematical model |
Deep learning models as applied to music composition and music copyright protection using blockchain technology is the innovation described by the paper. A deep convolutional generative adversarial network (DCGAN) has been utilized to synthesize monophonic melodies in addition to a multi-instrumental arrangement model called MICA. Besides, a new scheme known as Improved Byzantine Fault Tolerance (IPBFT) has been put forward to safeguard copyrights of digital music. The performance analysis reveals that the DCGANs and MICA models are more accurate and perform better as compared to other models and IPBFT based system is more efficient and has high throughput of 3469 transactions per second, it has 0% of error rate. |
| [82] | Research on digital copyright blockchain technology | Block-chain, Digital copyright, Algorithm, Technology |
The article investigates how blockchain technology, based on P2P networks and cryptography, can solve problems in the digital copyright industry: the confirmation, authorization and maintenance of rights. Using blockchain's self-monitoring, traceability and decentralization features, as well as the Map function, the study improves the data transmission rate in a multi-channel model and significantly reduces the probability of digital copyright infringement. |
| [83] | Assuring automotive data and software integrity employing distributed hash tables and blockchain: A Preprint | Blockchain, distributed hash tables, embedded systems, automotive networks | The paper proposes a software and data provenance mechanism for the automotive industry that ensures the integrity and reliability of vehicular software. Since automotive software is complex and security-critical, and updates can introduce risks, the proposed approach uses distributed hash tables (DHTs) and a public blockchain to ensure high security, scalability, and efficiency, thus protecting users, service providers, and original equipment manufacturers (OEMs) against software compromises and errors. |
| [85] | ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation | Software protection, privacy distributed objects, services software, cryptographic controls, authentication, data encryption | In the article the author provides a solution to an issue of software piracy and how to protect the copyrights through implementation of what could be termed as decentralized software license validation system using blockchain technology and cryptocurrencies. The proposed method forms an environment where the privileges and rights of participants are observed; this has enhanced software protection since the 1970s when the issue of license validation as the major solution to combat piracy came up. |
| [88] | The Study on Blockchain Based Library Management and its Characterization | Blockchain; Distributed ledger; Blockchain-based Library management; Ethereum, bitcoin, Peer-to-peer network |
The paper presents a blockchain-based library management system to overcome problems in auditing and inventory of books, journals and periodicals, despite automation with RFID. Blockchain technology provides transparent and immutable records, which improves auditing and inventory control in advanced libraries. The implementation of a library management system using smart contracts written in Solidity in Remix IDE is demonstrated. The article includes the smart contract source code and screenshots of the blockchain-based book management system. |
| [92] | NFT Become a Copyright Solution | Smart contract system, non-fungible token, copyright | The problems that are invited by the article are how through NFT, the creators of arts can easily be enabled to register and sell the arts through an implemented smart contract which will mean that the ownership of the artwork can change hands with evidence of a verified digital certificate. Looking at how one posts on NFTs and other marketplace galleries offline galleries. As for the advantages and disadvantages of applying NFT for copyright protection, the former are listed as follows the legal genuineness of applying NFT to the protection of copyrights Given the fact that NFT is still relatively young, unheard-of technology. |
| [99] | User-controlled privacy-preserving user profile data sharing based on blockchain | Blockchain, Multichain, Decentralization, Privacy, Data Sharing |
The article presents a decentralized data sharing architecture using the MultiChain blockchain, applied to the travel industry and adaptable to other domains such as education, health and sports. The solution enables companies in the travel industry, such as travel agencies, hotels and shopping malls, to share user profile data in a secure and controlled manner. A hotel booking service is used as an example, where users decide what data to share, ensuring privacy and control. The data is converted into an open format and shared across the blockchain for easy integration with other nodes. The paper evaluates the performance of the model by measuring latency and memory consumption in three test scenarios, showing fast responses in all cases. |
| [100] | Enhancing Security Feature in Financial Transactions using Multichain Based Blockchain Technology | Fin-Tech, Blockchain, Distributed Ledger Technologies (DLT), Cryptography, Equity Market, Integrity |
The article develops a complex of reforms in financial transactions based on the decentralized application of the blockchain model, demonstrating the possibility of increasing the reliability of financial transactions in such spheres as Fin-Tech, Medicare, hospitality, manufacturing, and others. Applied to financial services, blockchain or the distributed ledger technologies (DLT) ensure the integrity of record through cryptography to eliminate vices like money laundering. Major characteristics of those blockchains, including PoW and PoS, and their effects on the stock exchange, wealth management, payments and remittances, commerce and insurance are highlighted in the article. |
| [104] | Design and Implementation of Blockchain Hierarchical Supervision Model for Wheat | Wheat products, traceability, authority-control, hierarchical supervision, blockchain, multi-chain | To cover the shortcomings of centralized monitoring and privacy leakage in agricultural traceability system, this paper proposes a hierarchical monitoring model of wheat supply chain based on blockchain and Hyperledger Fabric. The model guarantees the availability and clarity of the data and strict control of private data, with their protection through encryption and possibility of access control in terms of shares. The results indicate high security levels while the average latency times are 6. 67 ms for public data and up to 37. 78 ms for private data monitoring, where protection of privacy and data monitoring in real time is possible. |
| [108] | Tracking Industrial Assets Using Blockchain Technology | Blockchain, Asset traceability, Data security, Immutability | The article describes the possibilities of deploying blockchain in an organization’s supply chain and of sharing assets without formal permissions. The developed software application takes advantage of blockchain technology allowing it to provide more secure storage and immutable records for the asset transfers that can either be public or private depending on the setting of the application. Data cannot be altered after entry and the push for accuracy means it will not require any manual check. |
| [110] | A MultiChain-Based Homework Submission System | Blockchain, smart contracts, MultiChain, submission systems |
The article covers a real-life case of redesigning a homework submission system based on the blockchain approach. Nonetheless, it was not a perfect match for blockchain, it helped us to have some fun and discover some compelling features of this technology that can be used in a hard and familiar problem. It expanded the knowledge base about what blockchain could potentially solve for, and what issues it could avoid. |
- RQ4: Which of the papers explores Blockchain-based tokens and Cross-Chain (Smart Contract) as a review related?
| Reference | Title | Contribution |
|---|---|---|
| [34] | Toward Building Smart Contract-Based Higher Education Systems Using Zero-Knowledge Ethereum Virtual Machine | To redesign the higher education system, the article has a solution of solving the issue and the cost of certifying, by implementing blockchain. It analyses the prerequisites for decentered education highlighting the necessity of applying a blockchain scale solution which is ZKP integrated with Ethereum virtual machine. The improved system for managing educational documents, which has been described in this paper, fulfills the proposed requirements and regulations including GDPR and uses smart contracts and the modular blockchain structure to provide a more secure solution compared to the existing ones. |
| [36] | A conceptual framework for blockchain smart contract adoption to manage real estate deals in smart cities | The article presents a conceptual framework for the adoption of blockchain-based smart contracts in the smart city real estate sector. Through a literature review, it identifies ten key aspects and details the use of the Ethereum Virtual Machine (EVM) to develop these contracts. The study provides a design for owners and users, and a procedure to manage smart contracts, improving the user experience and benefiting owners and real estate agents, aligning the sector with Industry 4.0. |
| [41] | Blockchain Smart Contract Virtual Machine Optimization Technology for Domain Name Systems | In this paper, centralization within the existing current domain name system DNS is discussed, and blockchain is suggested to be a solution. Adjacent environments also showcase that the core of Ethereum, the Ethereum Virtual Machine (EVM), is tailored to support a smart contract-based Domain Name System to enhance domain name governance and finality, as well as accelerating the transactions. The EVM also contains new data structures together with new opcodes to make the transaction processing flow easier. The evaluation proves that there is a two-order-of-magnitude enhancement in the blockchain based domain name resolution system as presented in the research above. |
| [44] | An Analysis of Blockchain and NFT Technologies and their Drawbacks | This article will show how blockchain technology, which is characterized by its impenetrable security measures and decentralized nature, stands to disrupt numerous industries with emphasis on the financial and banking industry. It also refers to the new trend involving NFTs, digital tokens associated with unique works of art like paintings, music or indeed tweets. The paper explores the negative impacts of the blockchain and NFT across different sectors; IoT, banking, music, agriculture food and supplies, and healthcare. |
| [51] | NFT: blockchain-based non-fungible token and applications | The article presents the concepts, characteristics and development processes of blockchain-based NFTs (non-fungible tokens), highlighting their use in collectibles, crypto-artworks and games. Its core elements and typical fields of application are discussed, as well as issues and risks related to property rights, value, technology and oversight. Related literature is also reviewed and research topics on value assessment, transaction modes and pricing of NFTs are proposed. Finally, the trend of digitization driven by NFTs is examined. |
| [53] | The prospects for the development of blockchain technology in the NFT format | The article discusses blockchain technology and the relatively new phenomenon of NFTs (non-fungible tokens). It analyzes the growth prospects and current shortcomings of the concept. It examines the NFT phenomenon from a technological point of view, as it is not yet well described in scientific publications. Based on the market analysis, the authors suggest further development of the blockchain, strengthening its security and conducting additional research in this area. |
| [62] | The Application of Blockchain and Cryptocurrency in Meta-universe and NFT | What the metaverse does is to combine aspects of the physical world with those of virtual reality to allow functions like trading and entertainment through avatars. We describe the increase in NFTs (non-fungible tokens), which are most used in video games and art and explore how these assets could be used to address real-life issues due to their specific features. Blockchain and tokenization are at the base of the metaverse and the NFTs, and they have several use cases such as Model Chain in the medical field or verifiable transactions in the commercial world. The research highlights experiences that explain how blockchain is used in NFTs and its drawbacks; it encourages further research on its implementation and link with the metaverse. |
| [63] | T-PASS: A Blockchain-based NFT Enabled Property Management and Exchange System | The article discusses the rise of tokenization of assets such as stocks, funds, debt and intellectual property due to the growth of decentralized finance (DeFi). Blockchain technology allows physical or digital assets to be converted into NFTs (non-fungible tokens) and traded in cryptocurrencies, using a distributed ledger technology (DLT) system for immutable, traceable and secure transactions. Although NFTs are mainly used in digital art, collectibles, and gaming, this article proposes their application in real estate management. It examines the requirements for an NFTs-enabled property management and exchange system and presents a detailed model for its implementation, providing key components and guidelines for its use in property management problems. |
| [76] | An approach to Open-Source Software License Management using Blockchain-based Smart- | This article describes the trends in utilizing open-source software and challenges of compliance with the corresponding licenses, namely GPL, MIT, Apache, Mozilla, and BSD. As to the source code, the license conformity can be easily checked; it has roots in legal, ethical and security scopes. To optimize open-source software licenses hence reducing on violation, a blockchain is used to implement the licenses. The solution includes the use of four modules: Interplanetary File System (IPFS), smart contracts, MetaMask as a transaction manager and a permission blockchain to meet the licensing requirements. |
| [94] | Digital assets rights management through smart legal contracts and smart contracts | The attempt made in the article is to proffer a novel IPR management framework in the smart contracts based blockchain system. Work done in a frame of the MediaVerse project funded by the European Commission outlines an extension of smart legal contracts that are aligned with the blockchain smart contracts and include their management of cloning, notarial aspects, rights transfer and revenues distribution. This is the reason why the concept is aimed at enhancing the management and monetization of Digital Rights with an intent of promoting the rights of content creators. |
- RQ5: In the current landscape about Unique Asset of Digital content, what constitutes the primary challenges that Universities internal protection process?
| Reference | Title | Challenges |
|---|---|---|
| [38] | Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future Directions | In the merging of blockchain with IoT some challenges are pointed out. Some of the main issues include data protection and privacy because when dealing with personal information, its use across different devices presents a challenge in its protection from third party intervention. Besides, there is a set of limitations of the blockchain technology, some of which are the poor throughputs and size of the block that define the capacity of the system. The challenges of multichain, which arise when one must manage more than one blockchain involve issues to do with integration of the different blockchains involved. It also has issues of social control and regulation because decentralization is always an issue about the ability to govern and regulate. Last but not the least, the future of integration of blockchain with IoT for long turn and its space security aspects along with privacy and efficiency are still mysteries to understand. |
| [48] | A Decentralized Framework for Patents and Intellectual Property as NFT in Blockchain Networks | Decentralized Storage and Authentication Requirements: Our paper highlights the urgency of elaborating efficient solutions for decentralized storage and NFT-authenticated patents. Decentralized Verification: However, the invention can require the improvement of effective communication to create the opportunities for decentralized verification of the patent authenticity and its owner. Blockchain Implementation Issues: NFTs with blockchain approaches, so there is possible to guarantee the relative stability of patents’ management. Real World Application Challenges: That is why it is necessary to apply for NFT and consider it more in the context of its business application for patenting, financing, biotechnology, ticketing, etc. Future Direction and Open Issues: Outlining the current issues that remain open and the development that is yet to be accomplished on the prospects of deploying NFTs with patents and the legal, compatibility and expansibility concerns that exist. |
| [72] | A survey on blockchain-enabled smart grids: Advances, applications and challenges | In the article provided, the technological growth of blockchain in smart grids has been investigated through multiple factors where it shifted from centralized to decentralized one. It discusses block chain in gird, billing and metering while outlining projects and use case in energy sector. It also outlines existing security threats in smart grids, Ethereum Virtual Machine environment, and smart contracts. It predicts the pros and cons of various protocols and analyzes their suitability in specific use cases, which can serve as a reference for the further study on the construction of secure blockchain foundation in smart utility grids. |
| [80] | Application of Blockchain Technology in Intellectual Property Protection | This paper also examines how blockchain technology can be effective in providing mechanisms such as digital copyright protection by decentralizing the technology, making it invulnerable, creating time stamps and records and ensuring that these records are traceable. Nevertheless, numerous advantages are provided using blockchain technology for the registration and confirmation of digital copyright, monitoring of transactions, and preservation of evidence Among them, there are several challenges and difficulties arising from the implementation of blockchain technology, here they are. In this study, the authors put forward blockchain-based system construction for digital copyright protection to try and record the copyright process, detect data infringement, and offer accurate electronic evidence along with cost reduction to enhance the efficiency of judicial resort. |
| [81] | Blockchain-based multimedia content protection: Review and open challenges | The article highlights several problems in applying blockchain technology to protect multimedia content. First, it shows the lack of a comprehensive and systematic manner of categorizing on identifying applications of blockchain in copyright protection. In addition, it notes that there are very few successful systems to this end which suggests a clear deficiency in the literature. It means that there is no development and it’s because there is no integration between technicality and applicational knowledge. There are also technical barriers in the implementation of such systems and more investigations need to be carried out with a view to surmounting these barriers in the development of an efficient multimedia copy right protection system based on blockchain. |
| [84] | Copyright in the blockchain era: Promises and challenges | The article addresses legal challenges related to the use of blockchain in copyright protection. Key issues include: deciding whether to store content on or off blockchain, and adjusting the legal status of online intermediaries; finding a balance between the immutable nature of blockchain and the need to adjust records due to the flexible nature of copyright; ensuring trust in blockchain records, given that they cannot validate facts originating off-chain; and legalizing cryptocurrency transactions, as well as the status and legal consequences of smart contracts. In addition, the economics of blockchain-based copyright management systems must be considered to ensure they have necessary network effects. |
| [102] | Improved Private Data Protection Scheme for Blockchain Smart Contracts | It is important to address four significant issues regarding data protection and privacy in edge computing and blockchain explained in the article below. The issues include: the limitations of blockchain in tackling security problems for edge computing; the idea of using a multi-chain (master-slave) system combined with an edge computing framework to enhance data security; how the proposed signature authentication scheme based on ECC can be amalgamated with blockchain encryption processing; in applying appropriate control with user privileges for a subset of the basic system; and the difficulty of low system overhead on improving algorithm performance and increasing transaction rates simultaneously. |
| [105] | Blockchain Technology applied to Education | The paper details give several difficulties in deploying private blockchain infrastructure to store academic certificates. The main concerns are as follows: certificate forgery and validation through hashing; selection of the private blockchain solution (Multichain) that has less cost in comparison with public blockchains with storage charges; and the need to create secure and transparent data storage though low cost and easy to support infrastructure. |
| [126] | Rancang Bangun Aplikasi Perpustakaan Digital Berbasis Mobile Menggunakan Framework Flutter | The purpose of this paper is to outline the implementation of a mobile digital library system which enables a user to upload books, borrow books, read them, and return them using the mobile interface without having to go to the university of Sam Ratulangi library. Digital content protection methodologies including watermarking and locking to prevent selection and copying are employed in the system to fight against piracy and plagiarism. It becomes crucial to understand and follow the application of these techniques because it makes sure of the safeguard and preservation of digital assets to evade corruption of the content when stored electronically that is very vital for management of digital resources in a digital library. |
| [128] | Revolution postponed? Tracing the development and limitations of open content filmmaking | Some of the issues which can be considered as critical for the internal protection of unique digital assets in Universities are: Firstly, it is still necessary to rethink the existing legal frameworks to provide the application of open models such as CC licenses. Moreover, there are major challenges in relation to maintaining viable business models through which the producers of open content, as is the case with filmmakers, can monetize their work. Fourthly and lastly, it is evident that failure to develop coherent and comprehensive policies and regulation with respect to production, financing, and marketing will cause a chain of fragmentation of the Open Content Filmmaking (OCF) movement, which is a hindrance to the progress of this movement. |
| [130] | System of professional-digital competencies of a teacher ofahigher pedagogical educational institution | In the context of protecting unique digital assets in universities, the article identifies several key challenges related to the preparation of future teachers in institutions of higher pedagogical education. These include the need to develop professional digital competencies that are isomorphic to teaching functions, forming a holistic system of competencies. Three fundamental functions stand out: heuristic-digital, management-digital and self-development-digital, in addition to general competencies such as digital security. The complexity lies in integrating these competencies into a coherent system that addresses the digitization of education, protects personal data, respects copyright and ensures digital security, which is crucial in the digitized educational environment. |
| [132] | On the inheritance of national music culture in colleges and universities and the reform and innovation of music education in colleges and universities under block-chain technology | Regarding the issue of the copyright protection of special learning resources in universities, this article discusses a few aspects of copyright issues on production and distribution of digital resources including folk music. Since there is an increase in digital copyright infringement, there is a necessity for a blockchain based digital protection enforcement model. Some of the limitations are identifying the right architecture for safeguarding of copyrights, realizing its applicability in real-life scenarios and identification of any weaknesses in the model. Moreover, reform and innovation in music education at the university level also raises the question of integration of this technology as the solutions for battling against piracy as essential for a digital learning process are as well. |
| [134] | Digital Competencies in the Journalism Curriculum: Case Analysis of a Central American University | Finally, based on the identified goals in the formation of the curriculum of the Bachelor’s degree in social communication at the Universidad Centroamericana José Simón Cañas in El Salvador, this case analysis underlines some of the difficulties in the process of forming digital competencies. Regarding the main difficulties stated, they refer to the failure in deep understanding of digital skills, the scarcity of the environments allowing the development of critical skills towards the use of technologies, and the complete absence of the content on copyright, collective intelligence, and Internet security. These elements are essential to provide guidance and prevention on identity and personal data on the web and social networks and to learn about abuse and technology addictions. Revealed necessities to revise and reinforce the curriculum offering the protection of assets at the educational level. |
| [136] | Perceptions of Librarians on the Usefulness of DRM Technology in Protecting against Copyright Violation | From the study several issues emerge concerning the protection of content in libraries using the digital rights management (DRM) systems. This paper examined that librarians understand that although DRM systems acting positive roles in combating against the infringement of copyright laws, they possess several disadvantages. One problem is that such systems do not allow the limited use of information, such as sharing articles and other electronic resources with colleagues and forcing users to work with the material in a fragmental manner. At the same time, it was noted that some e-books and e-journals could be downloaded freely by the unauthorized users while they have DRM technology installed. Based on these arguments, there is a strong necessity for adequate government policies, regulating issues of copyright and fair use of information, taking into consideration the features of DRM technologies that contribute to the life of digital libraries, their advantages and drawbacks. |
| [138] | Analysis of foreign experience in the regulatory framework of distributed ledgers and ico (Initial coin offering) within innovative economy | The article reveals the problematics of regulating and protecting rights in the sphere of ICO (Initial Coin Offering) by considering the state and legal factors. Some of the main risks include employing the existing legislation to protect intellectual property rights; prevent legalization and illicit origin money laundering; and protecting personal data without adaptations for ICOs. This may reduce the efficiency of the acts of regulation in an innovative and technological space like the ICOs. The findings indicate the necessity of the development of more concrete rules to handle these problems, which may be useful for universities, professors, and students as far as the digital economy and regulation of advanced technologies are concerned. |
| [140] | Information and Communication Technologies As a Tool of Strategy for Ensuring the Higher Education Adaptability To the Digital Economy Challenges | We can define the following difficulties with the digital economy context and the digitization of universities: Today the processes of education, research, international cooperation, marketing, finance and economics in higher education institutions need their digitization. Among them IT threats include protection of personal data and security issues, which are critical in the growing process of digitization of education systems. The article provides emphasis on the dependence on the effective before the demands of the digital economy for the direction of a strategy to provide higher education and positive synergistic effects from using information and communication technologies in universities and measures for the implementation of this strategy. |
- RQ6: What global standards are used to safeguard the integrity and assets of digital content and media?
| Reference | Title | Description |
|---|---|---|
| [66] | Survey on blockchain-based non-fungible tokens: History, technologies, standards, and open challenges | Non fungible tokens (NFTs) therefore have numerous factors that hinder their growth these include usability challenges that affects their usage by the user and interoperability issues that affects its ability to interoperate with other platforms as well as standards which restricts its functionality. Although they are relatively new and have increased in popularity recently, NFT technology is not yet fully developed in its development. Some examples of such standards have been ERC-721 and ERC-1155 which have been the basic framework, but new standards that build upon NFTs have been developed. Also, the markets which are associated with NFTs have begun to experience some sort of speculative bubble regarding the prices of certain tokens, and the technology itself is still immature compared to other technologies because it is relatively new. |
| [69] | Privacy Laws, Genomic Data and Non-Fungible Tokens | The article examines the legal requirements of the California Consumer Protection Act (CCPA) and the General Data Protection Regulation (GDPR), as well as the intersections between privacy laws, genomic data and smart contracts such as fungible and non-fungible tokens (NFTs). These laws impose restrictions on the storage, access, processing and transfer of personal data, which presents challenges for lawyers, data processors and companies offering blockchain-based solutions, especially in relation to high-risk genomic data. The technical features of NFTs, distributed storage and wallets enable tracking and management of genomic datasets, offering data donors a way to establish digital ownership and control under privacy laws through smart contracts with “programmable privacy.” The design of blockchain-based value propositions must include privacy by design capabilities in the smart contract coding language. The article explores how data engineers can integrate legal requirements into smart contracts, exemplifying the approach with the Genobank.io platform, which preserves the privacy of genomic data. |
| [111] | A Secure Data Sharing Platform Using Blockchain and Interplanetary File System | This paper presents a blockchain-based secure data sharing platform using Interplanetary File System (IPFS) to overcome trust, transparency, security and immutability issues in traditional trusted third-party dependent (TTP) platforms. In the proposed system, data is stored in IPFS and divided into secret parts, with access roles managed through smart contracts written in Solidity. Users are authenticated with RSA signatures and must pay for digital content, after which they can leave reviews that are validated to eliminate forgeries. The use of Ethereum blockchain, decentralized storage, encryption and an incentive mechanism ensures transparency, security, access control, owner authenticity and data quality. The proposed scheme was tested on an Ethereum test network, showing that the use of the Shamir Secret Sharing Scheme (SSS) results in lower computational times compared to 128-bit and 256-bit Advanced Encryption Standard (AES). |
| [112] | When the NFT Hype Settles, What Is Left beyond Profile Pictures? A Critical Review on the Impact of Blockchain Technologies in the Art Market | This article explores the challenges and misunderstandings in the art market related to non-fungible token (NFT) technology and blockchain, through the perspective of an art technology entrepreneur. Despite initial enthusiasm and significant projects in Asia, NFT transactions have reached an all-time low, and there is little empirical research on blockchain use in the art market. The article discusses current NFT and blockchain use cases in comparison to the traditional art market, with a particular focus on the ongoing work of the Art ID Standard consortium, which encompasses decentralized identity and blockchain use cases. Perspectives are offered on the implications of these challenges for artists, collectors, and the art ecosystem at large. |
| [114] | A Design of Digital Rights Management Mechanism Based on Blockchain Technology | This paper discusses the development of a DRM system based on blockchain to overcome the drawbacks of centralization and opacity inherent in a traditional DRM system. It also makes transactions and license information to be described on the blockchain to enhance data transparency & security. Similarly, smart contracts make issuance of licenses automatic, and reliable transactions without the need for centralized servers. The proposed system also has the advantage of easing the flexibility of charging various prices to reflect the varied rules regarding the use of the content. The main contribution reported in the paper is the specification of a blockchain-based licensing scheme that can integrate with existing DRM standards and thus can be easily adopted by the industry. |
| [115] | Bridging skill gaps and creating future ready accounting and finance graduates: An exploratory study | This research helps to fill the gap between digital competencies in accounting and finance training because of the growing use of automation and technologies like blockchain. As proven by massive funding in the FinTech space and high job automation of accounting roles, graduates must develop digital competencies. The study employs a three-step method that involves overlay of digital topics to the course, assessment of existing practices and tools on digital learning, and interviews with subject matter specialists for confirmation of the necessity of digital inclusions to the course. The findings reveal that merely five per cent of all the required applications are explicitly taught while specialists agree with the increase in the use of digital content and the importance of digital integration in learning. Hence the study finds out that though digital inclusion is relevant many instructors are unaware of the latest technological development hence the need for change in the field of accounting and Finance education. |
| [118] | Systematic Assessment of the Interoperability Requirements and Challenges of Secure Blockchain-Based Electronic Health Records | This article provides a systematic review of EHRs interoperability and uses blockchain solutions, where 18 blockchain based solutions to EHR interoperability challenges are highlighted. There are, however, challenges that come with these solutions in the aspect of reliability, privacy, integrity, sharing and standards. It showed that such a review is conducted under six phases, which are acquaintanceship with research questions, article selection or data mining and progress tracking using Google Scholar, Web of Science, and IEEE. Out of those 18 articles, the requirements of interoperable blockchain-based EHRs, related standards, and the solutions to enhance interoperability are discussed. The areas include the best practice for interoperability of blockchain standards, implementations, applications and issues related to the adoption of blockchain in EHR management are touched on in the study. |
| [120] | Development of Blockchain-Based Health Information Exchange Platform Using HL7 FHIR Standards: Usability Test | The paper also discusses the blockchain mobile platform called HealthPocket to exchange health information of proven genuineness through a dynamic consent mechanism aligned to HL7 FHIR. These, often used in healthcare standards all over the world, enable clinical data exchange with reliability and accuracy. Blockchain coupled with the dynamic consent system means that any health information exchanged cannot be changed hence it addresses security and protection of personal information. The platform helps different medical institutions to work together and share data between different institutions and around the world because all the data filled in the template is compatible. |
| [122] | Blockchain, Self-Sovereign Identity and Digital Credentials: Promise Versus Praxis in Education | The article explores the capabilities of blockchain technology as a public good in the education sector, especially in the context of self-sovereign digital identity. While blockchain has been identified as an opportunity to drive needed changes in educational processes, use cases have been limited due to disconnects on fundamental issues such as governance, self-sovereignty, interoperability, choice of blockchain platforms, and trust in standards and infrastructure integrity. In particular, the article focuses on the challenges and viable solutions in the digital credential sector in Europe, highlighting the importance of interoperability and integrity of digital identity and content, considering them essential for the effective implementation of blockchain in education. |
| [123] | Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks | This paper suggests the integration of HSM with block chain technology particularly with public key cryptography algorithm/ standards. HSMs also offer physical protection, which can be called ‘root of trust’; it adds a new layer of security to the system design, which can provide more reliable authenticity, authorization and integrity solutions. This paper focuses on the effectiveness and applicability of carrying out a proof of concept with this proposal Al time performance analysis shows that integrating the HSM with the Blockchain can go a long way to enhance the security of the industrial IoT systems. The major contribution concerning global standards is the PKCS standards for security when integrating HSM into Blockchain, which is an overall security requirement when using decentralized environments for content and assets protection. |
- RQ7: What types of NFTs are used to generate digital assets for content software and applications, and what methods and techniques are currently being utilized?
| Reference | Title | Content |
|---|---|---|
| [125] | NFT as a proof of Digital Ownership-reward system integrated to a Secure Distributed Computing Blockchain Framework | The paper suggests the organizational infrastructure in the blockchain context with the “Hyperledger Fabric” technology on which companies can securely transmit and share the information. One of the ways is embracing digital asset technology where it encodes data in Non-Fungible Tokens (NFTs) to reduce the possibility of forging information. It uses smart contracts and adopts the IPFS decentralized storage system in which all the components interface via a WEB application. The solution is feasible, manageable and applicable to the development of new systems and processes in digital asset management. |
| [127] | Royalty-Friendly Digital Asset Exchanges on Blockchains | The study addresses the automatic distribution of royalty payments associated with digital assets, especially Non-Fungible Tokens (NFTs). It proposes a marketplace-independent trading framework for royalty management, called RM-TLSC (Royalty Management Token-Level Smart Contract), which creates synergies between the token and smart contract paradigms, ensuring royalty management throughout the asset lifecycle. An open-source software implementation for the Ethereum blockchain is provided, and the generality of the approach is verified with proof-of-concept for the Tezos blockchain. Effectiveness is demonstrated with a case study related to the ISO 21000-23 media smart contract standard. |
| [129] | On the Scrutinization of the NFT Valuation Factors | The paper investigates the concept of software relative to Non-Fungible Tokens (NFTs) with more emphasis on inception and selling of NFTs based on the underpinning digital or tangible assets. What it specifically does is that it outlines a method for evaluating the value of an NFT and how best to anticipate its success. Though, it points out that community and scarcity are dominating the valuation of an NFT and again dwell more on the relationship between factors and NFTs’ prices. It also provides the possible future research prospects within this field. |
| [131] | Blockchain and NFT: a novel approach to support BIM and Architectural Design | The research focuses on the benefits of blockchain technology in the use of Building Information Modeling (BIM) system adopted in structural designing and construction project management. It explains how, and why, Non-Fungible Tokens (NFTs) could be used to manage the provenance and ownership of relatively bespoke and precise digital goods – such as BIM models – represented by digital files. These NFTs help to solve questions related to copyright, as well as manage author’s and owner’s rights for numerous large projects; they also help with file certification. The findings of the study also show that incorporation of BIM with blockchain can enhance security and raise efficiency in the administration of digital assets in architectural, engineering and construction projects through effective protection of copyright and sharing of information. |
| [133] | Forecasting NFT Prices on Web3 Blockchain Using Machine Learning to Provide SAAS NFT Collectors | The study investigates Non-Fungible Tokens (NFTs), describing them as unique digital assets that may include art, video game goods and entertainment collectibles. These NFTs are distinguished by their exclusivity and authenticity, backed by digital certificates. The paper introduces a Software as a Service (SAAS) based system that uses Web3 blockchain technology to facilitate the management, security and trading of these digital assets. This system enables unrestricted access and detailed analysis of NFTs. In addition, the study applies adaptive enhanced convolutional neural networks (AICNN) and a tree seed chaotic atom search optimization (TSC-ASO) algorithm to predict the prices of NFTs, demonstrating that this methodology is effective in generating accurate predictions about the future value of these assets. |
| [135] | Is non-fungible token pricing driven by cryptocurrencies? | The study analyzes Non-Fungible Tokens (NFTs) as the first application of blockchain technology to reach public prominence. NFTs are exchangeable rights to digital assets (images, music, videos, virtual creations) whose ownership is recorded in smart contracts on the blockchain. It is investigated whether the price of NFTs is related to that of cryptocurrencies. Through a spillover index, a limited volatility transmission between cryptocurrencies and NFTs is observed, while a wavelet coherence analysis shows a co-movement between the two markets. This suggests that the pricing behaviors of cryptocurrencies could help us to understand the pricing patterns of NFTs. However, the low volatility transmission indicates that NFTs could be considered an asset class with low correlation with respect to cryptocurrencies. |
| [137] | NFT luxury brand marketing in the metaverse: Leveraging blockchain-certified NFTs to drive consumer behavior | The paper explores the way Industry 4. It also means that 0 technology can increase the value of digital assets in the metaverse of luxury brands in the virtual marketplace to retain their brand image and target new customers. In this way, luxury brands can guarantee the process of marketing and shelter consumers’ digital properties with the help of blockchain-based NFTs’ ability to check assets’ originality. The study examines the consumer attitudes towards luxury NFTs in the metaverse and found out that the psychological evaluation aspects are the reason influencing the purchase of such products. Thus, the study expands the horizons of game theory and prospect theory while presenting arguments based on the psychological perception of the risks that result in failures/successes in purchasing (or not purchasing) luxury fashion NFT in global virtual markets. |
| [139] | Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications and Opportunities | The work intends to examine the current and upcoming opportunities of the Non-Fungible Tokens (NFTs) market with special emphasis on price factors and application. It looks at the status of the NFT markets and the investors’ attitude and expectations towards these products. It offers an overview of, and a comparative analysis of, the financial and econometric models used in literature, about their predictive capabilities, when it comes to valuing NFTs. This paper presents a conceptual model for the analysis of the formation of NFT prices and aims to reveal the value creation drivers behind these assets to explain investors’ behavior in the blockchain environment. |
| [141] | Patents and intellectual property assets as non-fungible tokens; key technologies and challenges | The paper investigates the role of NFTs in intellectual property, which is still a relatively uncharted terrain when it comes to NFTs as opposed to digital art, video games and collectibles. However, with the rapid development of tokenization and DeFi, through the token-like and non-tangible characteristics, NFTs have a chance to enhance the transparency and marketability of the intangible asset like patent. As part of the research, they proposed a conceptual framework of patents as NFTs and elaborated on the filing specifications for intellectual property assets as NFTs. Furthermore, it identifies the new issues as well as future considerations towards NFT-based patents that contain the foundation and the direction to companies for employing this technology in problems such as patenting, financing, and biotechnology. |
| [142] | A Review of Non-fungible Tokens Applications in the Real-world and Metaverse | The research delves into the rise in popularity of Non-Fungible Tokens (NFT) which were first introduced in 2017 utilizing blockchain technology and are now being increasingly utilized in both commercial and scholarly investigations. The paper examines the existing uses of NFT and delves into their possibilities within the Metaverse. A blockchain technology that facilitates interactions with digital personas in a virtual realm. It elaborates on how NFT can enhance identity management and rights to ownership of assets within the Metaverse while also suggesting potential future applications, in research and industry. |
| [143] | Non-Fungible Tokens (NFT): New Emerging Digital Asset | The article delves into the expanding realm of Non-Fungible Tokens (NFT) which has seen growth in recent years. The concept originated from Ethereum. Allows for the creation of tokens with distinctive digital attributes tied to factors like age rarity and liquidity. As of May 2021, NFT sales have surpassed $34 million in value, capturing global interest for their lucrative investment potential. However, the NFT landscape is still nascent with technological advancements and a need for comprehensive assessments. This document offers a look at NFT ecosystems covering new approaches and potential risks and rewards as well as technical elements like protocols and standards that are important features to consider in this space of digital assets. It also includes an evaluation of safety measures and explores design concepts along with the opportunities and hurdles involved in the NFT ecosystem. Marking it as a pioneering analysis, in this field. |
4. Discussion
4.1. Integration of Hardware Security Modules (HSM) and Blockchain
4.2. Blockchain-Based Digital Rights Management (DRM)
4.3. Information-Sharing Platforms in the Scientific Community
4.4. Use of Non-Fungible Tokens (NFTs) in the Art Market.
4.5. Education and Digital Competencies.
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- K. Chiba and H. Ito, “Sublinear Computation Paradigm: Constant-Time Algorithms and Sublinear Progressive Algorithms,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 105, no. 3, 2022. [CrossRef]
- M. Saimon, Z. Lavicza, and T. (Noah) Dana-Picard, “Enhancing the 4Cs among college students of a communication skills course in Tanzania through a project-based learning model,” Education and Information Technologies, vol. 28, no. 6, 2023. [CrossRef]
- S. Han, S. Nikou, and W. Yilma Ayele, “Digital proctoring in higher education: a systematic literature review,” International Journal of Educational Management, vol. 38, no. 1. 2024. [CrossRef]
- MIT, "MIT Libraries: Copyright and Licensing," MIT, 2023. [Online]. Available: https://libraries.mit.edu/copyright/. [Accessed: 14-Aug-2024].
- Stanford University, "Software Intellectual Property," Stanford, 2022. [Online]. Available: https://stanford.edu/software-ip/. [Accessed: 14-Aug-2024].
- Harvard University, "Research Data Security," Harvard, 2023. [Online]. Available: https://harvard.edu/research-security/. [Accessed: 14-Aug-2024].
- T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 3rd ed. Cambridge, MA: MIT Press, 2009.
- MIT, "Source Code Definition," MIT, 2023. [Online]. Available: https://mit.edu/source-code-definition/. [Accessed: 14-Aug-2024].
- European Union, "Directive 2009/24/EC on the legal protection of computer programs," Official Journal of the European Union, 2009.
- K. Lee and H. Park, "Copyright and Intellectual Property Law in East Asia," Journal of East Asian Studies, vol. 15, no. 2, pp. 123-135, 2021.
- Dirección Nacional de Derechos de Autor, "Guía sobre derechos de autor en Colombia," DNDA, 2023. [Online]. Available: https://derechosdeautor.gov.co/guia-derechos-autor/. [Accessed: 14-Aug-2024].
- R. Stallman, "Open Source Licensing: Ensuring Freedom in Digital Work," Journal of Software Freedom, vol. 7, no. 3, pp. 85-97, 2021.
- N. I. Kshetri, "Digital Assets: Definition and Protection Strategies," Journal of Digital Economy, vol. 14, no. 1, pp. 25-35, 2023.
- S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf. [Accessed: 14-Aug-2024].
- M. Crosby, P. Pattanayak, S. Verma, and V. Kalyanaraman, "Blockchain Technology: Beyond Bitcoin," Applied Innovation Review, vol. 2, pp. 6-19, 2016.
- Tapscott and D. Tapscott, Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies Is Changing the World, New York, NY: Penguin Random House, 2018.
- K. Mougayar, The Business Blockchain: Promise, Practice, and the Application of the Next Internet Technology, Hoboken, NJ: John Wiley & Sons, 2016.
- J. A. Garay and A. Kiayias, "The Blockchain Model of Cryptography and Security," Advances in Cryptology – CRYPTO 2015, vol. 9216, pp. 116-140, 2015.
- R. A. Hackett, "The Future of Digital Assets: Blockchain and Beyond," Harvard Business Review, vol. 94, no. 5, pp. 45-53, 2022.
- D. O'Reilly, "NFTs and Intellectual Property," Journal of Blockchain Research, vol. 9, no. 3, pp. 97-108, 2022.
- Alizadeh, "Tokenizing Intellectual Property: The Case for NFTs in Academia," Journal of Digital Asset Management, vol. 18, no. 2, pp. 67-79, 2023.
- Buterin, "Multichain and Interoperability: Future Directions," Ethereum Foundation, 2023. [Online]. Available: https://ethereum.org/multichain-interoperability/. [Accessed: 14-Aug-2024].
- H. Han, R. K. Shiwakoti, R. Jarvis, C. Mordi, and D. Botchie, “Accounting and auditing with blockchain technology and artificial Intelligence: A literature review,” International Journal of Accounting Information Systems, vol. 48, p. 100598, Mar. 2023. [CrossRef]
- H. Guo and X. Yu, “A survey on blockchain technology and its security,” Blockchain: Research and Applications, vol. 3, no. 2, p. 100067, Jun. 2022. [CrossRef]
- R. Zhang, R. Xue, and L. Liu, “Security and Privacy on Blockchain,” ACM Computing Surveys, vol. 52, no. 3, pp. 1–34, May 2020. [CrossRef]
- P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K.-K. R. Choo, “A systematic literature review of blockchain cyber security,” Digital Communications and Networks, vol. 6, no. 2, pp. 147–156, May 2020. [CrossRef]
- E. Fernando, M. Meyliana, H. L. H. S. Warnars, and E. Abdurachman, “Blockchain Technology for Tracing Drug with a Multichain Platform: Simulation Method,” Advances in Science, Technology and Engineering Systems Journal, vol. 6, no. 1, pp. 765–769, Feb. 2021. [CrossRef]
- J. Chang, J. Ni, J. Xiao, X. Dai, and H. Jin, “SynergyChain: A Multichain-Based Data-Sharing Framework With Hierarchical Access Control,” IEEE Internet of Things Journal, vol. 9, no. 16, pp. 14767–14778, Aug. 2022. [CrossRef]
- Mishra, “Linux Security using Blockchain,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 3, pp. 3776–3782, Jun. 2020. [CrossRef]
- S. Ismail, H. Reza, H. K. Zadeh, and F. Vasefi, “A Blockchain-based IoT Security Solution Using Multichain,” in 2023 IEEE 13th Annual Computing and Communication Workshop and Conference, CCWC 2023, 2023. [CrossRef]
- Ismailisufi, T. Popovic, N. Gligoric, S. Radonjic, and S. Sandi, “A Private Blockchain Implementation Using Multichain Open Source Platform,” in 2020 24th International Conference on Information Technology, IT 2020, 2020. [CrossRef]
- R. A. Koussema and H. Haga, “Highly Secure Residents Life Event Management System Based on Blockchain by Hyperledger Fabric,” Journal of Computer and Communications, vol. 09, no. 09, 2021. [CrossRef]
- Z. Chen, W. Ding, Y. Xu, M. Tian, and H. Zhong, “Fair auctioning and trading framework for cloud virtual machines based on blockchain,” Computer Communications, vol. 171, pp. 89–98, Apr. 2021. [CrossRef]
- D. L. Fekete and A. Kiss, “Toward Building Smart Contract-Based Higher Education Systems Using Zero-Knowledge Ethereum Virtual Machine,” Electronics (Switzerland), vol. 12, no. 3, 2023. [CrossRef]
- M. Zichichi, G. D’Angelo, S. Ferretti, and M. Marzolla, “Accountable Clouds Through Blockchain,” IEEE Access, vol. 11, pp. 48358–48374, 2023. [CrossRef]
- F. Ullah and F. Al-Turjman, “A conceptual framework for blockchain smart contract adoption to manage real estate deals in smart cities,” Neural Computing and Applications, vol. 35, no. 7, pp. 5033–5054, Mar. 2023. [CrossRef]
- N. Kumar, V. Goel, R. Ranjan, M. Altuwairiqi, H. Alyami, and S. A. Asakipaam, “A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City,” Security and Communication Networks, vol. 2023, pp. 1–13, Apr. 2023. [CrossRef]
- S. Karagwal, S. Tanwar, S. Badotra, A. Rana, and V. Jain, “Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future Directions,” in EAI/Springer Innovations in Communication and Computing, 2023, pp. 15–34. [CrossRef]
- J. Panduro-Ramirez, M. Lourens, A. Gehlot, D. P. Singh, Y. Singh, and D. J. Salunke, “Blockchain Approach for Implementing Access Control In IOT,” in 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), IEEE, Jan. 2023, pp. 596–599. [CrossRef]
- H. Xu, W. Liu, and X. Liu, “Blockchain-Based Trust Auction for Dynamic Virtual Machine Provisioning and Allocation in Clouds,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–10, Jun. 2021. [CrossRef]
- S. Wang et al., “Blockchain Smart Contract Virtual Machine Optimization Technology for Domain Name Systems,” in 2021 IEEE International Conference on Industrial Application of Artificial Intelligence (IAAI), IEEE, Dec. 2021, pp. 445–451. [CrossRef]
- S. Basu, S. Karmakar, and D. Bera, “Blockchain based secured virtual machine image monitor,” in ICISSP 2021 - Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021.
- Mishra, S. Karmakar, A. Dutta, A. Bose, and M. Mohapatro, “Design and Deployment of IoT enabled Blockchain based resilient Supply-chain Management System using Ethereum,” International Journal of Computing and Digital Systems, vol. 12, no. 4, pp. 1029–1050, Oct. 2022. [CrossRef]
- V. Tanwar and K. R. Ramkumar, “An Analysis of Blockchain and NFT Technologies and their Drawbacks,” in 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), IEEE, May 2023, pp. 1251–1259. [CrossRef]
- L. Wu, W. Lu, Z. Peng, and C. Webster, “A blockchain non-fungible token-enabled ‘passport’ for construction waste material cross-jurisdictional trading,” Automation in Construction, vol. 149, p. 104783, May 2023. [CrossRef]
- C. G. Kim, “A Study on Technology to Counter Copyright Infringement According to NFT Transaction Types,” Journal of the Semiconductor & Display Technology, vol. 20, no. 4, 2021.
- H. Takahashi and U. Lakhani, “Voting blockchain for High Security NFT,” in 2021 IEEE 10th Global Conference on Consumer Electronics, GCCE 2021, 2021. [CrossRef]
- M. Bamakan, N. Nezhadsistani, O. Bodaghi, and Q. Qu, “A Decentralized Framework for Patents and Intellectual Property as NFT in Blockchain Networks,” Computational Mathematics and Theoretical Computer Science, 2021.
- L. Ante, “Non-fungible token (NFT) markets on the Ethereum blockchain: Temporal development, cointegration and interrelations,” SSRN Electronic Journal, 2021. [CrossRef]
- Q. Rui, L. Juanjuan, W. Xiao, Z. Jing, Y. Yong, and W. Fei-Yue, “NFT: blockchain-based non-fungible token and applications,” Chinese Journal of Intelligent Science and Technology, vol. 3, no. 2, 2021.
- R. Qin, J. Li, X. Wang, J. Zhu, Y. Yuan, and F. Y. Wang, “NFT: blockchain-based non-fungible token and applications,” Chinese Journal of Intelligent Science and Technology, vol. 3, no. 2, 2021. [CrossRef]
- L. Ante, “The non-fungible token (NFT) market and its relationship with Bitcoin and Ethereum,” SSRN Electronic Journal, 2021. [CrossRef]
- D. R. Zagidullin and N. S. Pulyavina, “The prospects for the development of blockchain technology in the NFT format,” Lizing (Leasing), no. 1, pp. 40–44, May 2021. [CrossRef]
- K. Mentzer, J. Price, E. Powers, and N. Lavrenchuk, “EXAMINING THE HYPE BEHIND THE BLOCKCHAIN NFT MARKET,” Issues In Information Systems, vol. 23, no. 4, 2022. [CrossRef]
- J. Bellagarda and A. M. Abu-Mahfouz, “Connect2NFT: A Web-Based, Blockchain Enabled NFT Application with the Aim of Reducing Fraud and Ensuring Authenticated Social, Non-Human Verified Digital Identity,” Mathematics, vol. 10, no. 21, p. 3934, Oct. 2022. [CrossRef]
- M. Rasolroveicy and M. Fokaefs, “Performance and Cost Evaluation of Public Blockchain: An NFT Marketplace Case Study,” in 2022 4th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), IEEE, Sep. 2022, pp. 79–86. [CrossRef]
- L. Sun, X. F. Li, H. Zhao, B. Yu, T. Zhou, and X. R. Li, “NFT-based method for assetization of physical assets on blockchain,” Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), vol. 56, no. 10, 2022. [CrossRef]
- Journal, “Non-Fungible Tokens (NFT). The Analysis of Risk and Return,” INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT, vol. 06, no. 06, Jun. 2022. [CrossRef]
- K. B. Wilson, A. Karg, and H. Ghaderi, “Prospecting non-fungible tokens in the digital economy: Stakeholders and ecosystem, risk and opportunity,” Business Horizons, vol. 65, no. 5, pp. 657–670, Sep. 2022. [CrossRef]
- Y. Rudytsia and N. Bogdanova, “UML MODEL OF THE PROPERTY RIGHT DISTRIBUTION MODULE USING NFT FRACTIONALIZATION BASED ON BLOCKCHAIN TECHNOLOGY,” International Science Journal of Engineering & Agriculture, vol. 1, no. 3, pp. 98–109, Aug. 2022. [CrossRef]
- K. H. Gia et al., “Delivery Management System based on Blockchain, Smart Contracts and NFT: A Case Study in Vietnam,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 1, 2023. [CrossRef]
- P. Li, “The Application of Blockchain and Cryptocurrency in Meta-universe and NFT,” BCP Business & Management, vol. 44, pp. 55–61, Apr. 2023. [CrossRef]
- M. K. Hari, A. Agrawal, R. Bhatia, A. Bhatia, and K. Tiwari, “T-PASS: A Blockchain-based NFT Enabled Property Management and Exchange System,” in 2023 International Conference on Information Networking (ICOIN), IEEE, Jan. 2023, pp. 140–145. [CrossRef]
- C. Chen, H. Huang, B. Zhao, D. Shu, and Y. Wang, “The Research of AHP-Based Credit Rating System on a Blockchain Application,” Electronics (Switzerland), vol. 12, no. 4, 2023. [CrossRef]
- H. Taherdoost, “Non-Fungible Tokens (NFT): A Systematic Review,” Information (Switzerland), vol. 14, no. 1. 2023. [CrossRef]
- K. Ko, T. Jeong, J. Woo, and J. W. Hong, “Survey on blockchain-based non-fungible tokens: History, technologies, standards, and open challenges,” International Journal of Network Management, vol. 34, no. 1, Jan. 2024. [CrossRef]
- Manzoor, M. Samarin, D. Mason, and M. Ylianttila, “Scavenger hunt: Utilization of blockchain and iot for a location-based game,” IEEE Access, vol. 8, 2020. [CrossRef]
- S. Hong, Y. Noh, J. Hwang, and C. Park, “Fabasset: Unique digital asset management system for hyperledger fabric,” in Proceedings - International Conference on Distributed Computing Systems, 2020. [CrossRef]
- D. Uribe, G. Waters, and G. Io, “Privacy Laws, Genomic Data and Non-Fungible Tokens,” The Journal of The British Blockchain Association, vol. 3, no. 2, 2020.
- J. Arcenegui, R. Arjona, and I. Baturone, “Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12418 LNCS, 2020, pp. 24–40. [CrossRef]
- Alkadi, N. Moustafa, B. Turnbull, and K. K. R. Choo, “A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks,” IEEE Internet of Things Journal, vol. 8, no. 12, 2021. [CrossRef]
- Liu, X. Zhang, K. K. Chai, J. Loo, and Y. Chen, “A survey on blockchain-enabled smart grids: Advances, applications and challenges,” IET Smart Cities, vol. 3, no. 2, pp. 56–78, Jun. 2021. [CrossRef]
- N. Jing, Q. Liu, and V. Sugumaran, “A blockchain-based code copyright management system,” Information Processing & Management, vol. 58, no. 3, p. 102518, May 2021. [CrossRef]
- Md. M. Islam and H. P. In, “Decentralized Global Copyright System Based on Consortium Blockchain With Proof of Authority,” IEEE Access, vol. 11, pp. 43101–43115, 2023. [CrossRef]
- X. Wen, “Application of blockchain technology in copyright protection of digital music information,” International Journal of Grid and Utility Computing, vol. 14, no. 2/3, p. 136, 2023. [CrossRef]
- Kumar, A. Gupta, L. M. Sanagavarapu, and Y. R. Reddy, “An approach to open-source software license management using blockchain-based smart-contracts,” in ACM International Conference Proceeding Series, 2022. [CrossRef]
- W. Liang, D. Zhang, X. Lei, M. Tang, K. C. Li, and A. Y. Zomaya, “Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection,” IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 3, 2021. [CrossRef]
- X. Chen, A. Yang, J. Weng, Y. Tong, C. Huang, and T. Li, “A Blockchain-Based Copyright Protection Scheme With Proactive Defense,” IEEE Transactions on Services Computing, vol. 16, no. 4, 2023. [CrossRef]
- Z. Cai, “Usage of deep learning and blockchain in compilation and copyright protection of digital music,” IEEE Access, vol. 8, 2020. [CrossRef]
- L. Luo, “Application of Blockchain Technology in Intellectual Property Protection,” Mathematical Problems in Engineering, vol. 2022, 2022. [CrossRef]
- Qureshi and D. M. Jiménez, “Blockchain-based multimedia content protection: Review and open challenges,” Applied Sciences (Switzerland), vol. 11, no. 1. 2021. [CrossRef]
- J. Guo, H. Zhou, L. Yang, and X. Chen, “Research on digital copyright blockchain technology,” in Proceedings - 2020 3rd International Conference on Smart BlockChain, SmartBlock 2020, 2020. [CrossRef]
- G. Falco and J. E. Siegel, “Assuring automotive data and software integrity employing distributed hash tables and blockchain: A Preprint,” arXiv. 2020.
- Savelyev, “Copyright in the blockchain era: Promises and challenges,” Computer Law and Security Review, vol. 34, no. 3, 2018. [CrossRef]
- Litchfield and J. Herbert, “Resolv: Applying cryptocurrency blockchain methods to enable global cross-platform software license validation,” Cryptography, vol. 2, no. 2, 2018. [CrossRef]
- J. Herbert and A. Litchfield, “A novel method for Decentralised Peer-to-Peer software license validation using cryptocurrency blockchain technology,” in Conferences in Research and Practice in Information Technology Series, 2015.
- W. Yang, P. He, Z. Yang, X. Yi, and C. Chen, “Digital Copyright Depository System Enhanced by Blockchain,” in Proceedings - 2020 International Conference on Culture-Oriented Science and Technology, ICCST 2020, 2020. [CrossRef]
- Manish Verma, “The Study on Blockchain Based Library Management and its Characterization,” International Journal of Trend in Scientific Research and Development, vol. 5, no. 3, 2021.
- Kaushik and M. Malik, “Securing the transfer and controlling the piracy of digital files using Blockchain,” in Proceedings - 2022 5th International Conference on Computational Intelligence and Communication Technologies, CCICT 2022, 2022. [CrossRef]
- G. Lee, “Legal Issues Related to Blockchain Technology—Examples from Korea,” in Perspectives in Law, Business and Innovation, 2020. [CrossRef]
- T. Igarashi, T. Kazuhiko, Y. Kobayashi, H. Kuno, and E. Diehl, “Photrace: A Blockchain-Based Traceability System for Photographs on the Internet,” in Proceedings - 2021 IEEE International Conference on Blockchain, Blockchain 2021, 2021. [CrossRef]
- D. P. A. D. Rafli, “NFT Become a Copyright Solution,” Journal of Digital Law and Policy, vol. 1, no. 2, 2022. [CrossRef]
- Chen, Y. Li, Z. Wu, M. Xu, R. Wang, and Z. Zheng, “Towards Reliable Utilization of AIGC: Blockchain-Empowered Ownership Verification Mechanism,” IEEE Open Journal of the Computer Society, vol. 4, 2023. [CrossRef]
- E. Ferro et al., “Digital assets rights management through smart legal contracts and smart contracts,” Blockchain: Research and Applications, vol. 4, no. 3, 2023. [CrossRef]
- Z. Ma, W. Huang, and H. Gao, “Secure DRM scheme based on blockchain with high credibility,” Chinese Journal of Electronics, vol. 27, no. 5, 2018. [CrossRef]
- Z. Song, Z. Yu, W. Shang, and Y. X. Li, “A Digital Copyright Protection Method Based on Blockchain,” in Communications in Computer and Information Science, 2021. [CrossRef]
- S. Y. A. Zaidi et al., “An attribute-based access control for IoT using blockchain and smart contracts,” Sustainability (Switzerland), vol. 13, no. 19, 2021. [CrossRef]
- P. Patil, M. Sangeetha, and V. Bhaskar, “Blockchain for IoT Access Control, Security and Privacy: A Review,” Wireless Personal Communications, vol. 117, no. 3. 2021. [CrossRef]
- K. Shrestha, R. Deters, and J. Vassileva, “User-controlled privacy-preserving user profile data sharing based on blockchain,” arXiv. 2019.
- Raj, A. Kumar, V. Sharma, S. Rani, and A. K. Shanu, “Enhancing Security Feature in Financial Transactions using Multichain Based Blockchain Technology,” in 4th International Conference on Intelligent Engineering and Management, ICIEM 2023, 2023. [CrossRef]
- R. Amirta, M. S. Deepika, and R. G. Franklin, “Decentralized access control with anonymous authentication of data stored using blockchain,” Research Journal of Engineering and Technology, vol. 11, no. 1, 2020. [CrossRef]
- S. Hu, “Improved Private Data Protection Scheme for Blockchain Smart Contracts,” International Journal of Distributed Sensor Networks, vol. 2023, 2023. [CrossRef]
- Y. Yi, “Application of Blockchain Technology Based on Privacy Data Protection in RMB Internationalization Path,” Mobile Information Systems, vol. 2022, 2022. [CrossRef]
- X. Li, Q. Luo, X. Yang, N. Luo, D. Xu, and C. Sun, “Design and Implementation of Blockchain Hierarchical Supervision Model for Wheat Supply Chain,” Nongye Jixie Xuebao/Transactions of the Chinese Society for Agricultural Machinery, vol. 54, no. 3, 2023. [CrossRef]
- N. Prata, H. X. de Araújo, and C. Santos, “Blockchain Technology applied to Education,” International Journal of Advanced Engineering Research and Science, vol. 6, no. 7, 2019. [CrossRef]
- Sawant, N. Prabhu, and S. Nagpure, “Securing IoT Using MultiChain,” SSRN Electronic Journal, 2019. [CrossRef]
- Meyliana et al., “Blockchain technology for vehicle maintenance registration,” in Proceedings of 2021 International Conference on Information Management and Technology, ICIMTech 2021, 2021. [CrossRef]
- N. B. L. V. Prasad, M. N. A. Pramodh, R. V. S. Lalitha, K. Kavitha, and K. Saritha, “Tracking Industrial Assets Using Blockchain Technology,” in Lecture Notes in Electrical Engineering, 2022. [CrossRef]
- Riabi, H. K. ben Ayed, B. Zaghdoudi, and L. George, “Blockchain based OAuth for IoT,” in 2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks, PEMWN 2021, 2021. [CrossRef]
- S. Barbosa, R. Butler, and C. Pettey, “A MultiChain-Based Homework Submission System,” in Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017, 2018. [CrossRef]
- M. Naz et al., “A Secure Data Sharing Platform Using Blockchain and Interplanetary File System,” Sustainability (Switzerland), vol. 11, no. 24, 2019. [CrossRef]
- Chun, “When the NFT Hype Settles, What Is Left beyond Profile Pictures? A Critical Review on the Impact of Blockchain Technologies in the Art Market,” Arts, vol. 12, no. 5, 2023. [CrossRef]
- Núñez-Gómez and V. Garcia-Font, “HyperNet: A conditional k-anonymous and censorship resistant decentralized hypermedia architecture,” Expert Systems with Applications, vol. 208, 2022. [CrossRef]
- Z. Zhang and L. Zhao, “A design of digital rights management mechanism based on blockchain technology,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018. [CrossRef]
- S. Muthaiyah, K. Phang, and S. Sembakutti, “Bridging skill gaps and creating future ready accounting and finance graduates: An exploratory study,” F1000Research, vol. 10, 2021. [CrossRef]
- S. Riaz, A. Mushtaq, and H. Ibrar, “Content Generation in Web 3.0 and Blockchain-Based Decentralized Social Networks: A Theoretical Adoption Framework,” in IEEE Region 10 Annual International Conference, Proceedings/TENCON, 2022. [CrossRef]
- K. Kimura, M. Imamura, and K. Omote, “Cross-Referencing Scheme to Ensure NFT and Platform Linkage Unaffected by Forking,” in 2023 IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2023, 2023. [CrossRef]
- A. Reegu et al., “Systematic Assessment of the Interoperability Requirements and Challenges of Secure Blockchain-Based Electronic Health Records,” Security and Communication Networks, vol. 2022, 2022. [CrossRef]
- S. K. Lo, M. Staples, and X. Xu, “Modelling schemes for multi-party blockchain-based systems to support integrity analysis,” Blockchain: Research and Applications, vol. 2, no. 2, 2021. [CrossRef]
- Y. S. Bae et al., “Development of Blockchain-Based Health Information Exchange Platform Using HL7 FHIR Standards: Usability Test,” IEEE Access, vol. 10, 2022. [CrossRef]
- A. Reegu et al., “Blockchain-Based Framework for Interoperable Electronic Health Records for an Improved Healthcare System,” Sustainability (Switzerland), vol. 15, no. 8, 2023. [CrossRef]
- Grech, I. Sood, and L. Ariño, “Blockchain, Self-Sovereign Identity and Digital Credentials: Promise Versus Praxis in Education,” Frontiers in Blockchain, vol. 4, 2021. [CrossRef]
- J. Cabrera-Gutierrez, E. Castillo, A. Escobar-Molero, J. A. Alvarez-Bermejo, D. P. Morales, and L. Parrilla, “Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks,” IEEE Access, vol. 10, 2022. [CrossRef]
- Y. Lee, S. Rathore, J. H. Park, and J. H. Park, “A blockchain-based smart home gateway architecture for preventing data forgery,” Human-centric Computing and Information Sciences, vol. 10, no. 1, 2020. [CrossRef]
- Cantu, J. Geng, and C. Rong, “NFT as a proof of Digital Ownership-reward system integrated to a Secure Distributed Computing Blockchain Framework,” in Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, 2022. [CrossRef]
- R. Lendo, A. Jacobus, and H. A. Mapaly, “Rancang Bangun Aplikasi Perpustakaan Digital Berbasis Mobile Menggunakan Framework Flutter,” Jurnal Teknik Informatika, vol. 18, no. 1, 2023. [CrossRef]
- C. Moreaux and M. P. Mitrea, “Royalty-Friendly Digital Asset Exchanges on Blockchains,” IEEE Access, vol. 11, 2023. [CrossRef]
- E. Giannatou, G. M. Campagnolo, M. Franklin, J. K. Stewart, and R. Williams, “Revolution postponed? Tracing the development and limitations of open content filmmaking,” Information Communication and Society, vol. 22, no. 12, 2019. [CrossRef]
- Cheung and J. Keung, “On the Scrutinization of the NFT Valuation Factors,” in Proceedings - Asia-Pacific Software Engineering Conference, APSEC, 2022. [CrossRef]
- Kucheryaviy, “System of professional-digital competencies of a teacher ofahigher pedagogical educational institution,” ScienceRise: Pedagogical Education, no. 2(47), 2022. [CrossRef]
- M. Casillo, F. Colace, B. B. Gupta, A. Lorusso, F. Marongiu, and D. Santaniello, “Blockchain and NFT: a novel approach to support BIM and Architectural Design,” in 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022, 2022. [CrossRef]
- Luan, “On the inheritance of national music culture in colleges and universities and the reform and innovation of music education in colleges and universities under block-chain technology,” in ACM International Conference Proceeding Series, 2021. [CrossRef]
- R. Almajed, A. Z. Abualkishik, A. Ibrahim, and N. Mourad, “Forecasting NFT Prices on Web3 Blockchain Using Machine Learning to Provide SAAS NFT Collectors,” Fusion: Practice and Applications, vol. 10, no. 2, 2023. [CrossRef]
- L. Elena Agudelo-Gonzalez, C. Marta-Lazo, and I. Aguaded, “Digital Competencies in the Journalism Curriculum: Case Analysis of a Central American University,” Vivat Academia, no. 155, 2022.
- M. Dowling, “Is non-fungible token pricing driven by cryptocurrencies?,” Finance Research Letters, vol. 44, 2022. [CrossRef]
- Mwanzu, “Perceptions of Librarians on the Usefulness of DRM Technology in Protecting against Copyright Violation,” Library Philosophy and Practice, vol. 2021, 2021.
- E. Sung, O. Kwon, and K. Sohn, “NFT luxury brand marketing in the metaverse: Leveraging blockchain-certified NFTs to drive consumer behavior,” Psychology and Marketing, vol. 40, no. 11, 2023. [CrossRef]
- F. Ruchkina and D. N. Ermakov, “Analysis of foreign experience in the regulatory framework of distributed ledgers and ico (Initial coin offering) within innovative economy,” Humanities and Social Sciences Reviews, vol. 7, no. 4, 2019. [CrossRef]
- R. Kräussl and A. Tugnetti, “Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications and Opportunities,” Journal of Economic Surveys, vol. 38, no. 2, 2024. [CrossRef]
- N. Kholiavko, O. Popelo, I. Bazhenkov, I. Shaposhnykova, and O. Sheremet, “Information and Communication Technologies As a Tool of Strategy for Ensuring the Higher Education Adaptability To the Digital Economy Challenges,” International Journal of Computer Science and Network Security, vol. 21, no. 8, 2021.
- S. M. H. Bamakan, N. Nezhadsistani, O. Bodaghi, and Q. Qu, “Patents and intellectual property assets as non-fungible tokens; key technologies and challenges,” Scientific Reports, vol. 12, no. 1, 2022. [CrossRef]
- S. B. Far, S. M. H. Bamakan, Q. Qu, and Q. Jiang, “A Review of Non-fungible Tokens Applications in the Real-world and Metaverse,” in Procedia Computer Science, 2022. [CrossRef]
- Dev, K. Shaji Gomez, and S. V. Mathew, “Non-Fungible Tokens (NFT): New Emerging Digital Asset,” International Journal of Research in Engineering and Science (IJRES) ISSN, vol. 10, no. 4, 2022.
| Year | Number of papers |
|---|---|
| 2018 | 7 |
| 2019 | 6 |
| 2020 | 16 |
| 2021 | 33 |
| 2022 | 34 |
| 2023 | 34 |
| 2024 | 2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).