1. Blockchain Technology
Nakamoto
[1] first presented the idea of Bitcoin, a decentralized currency backed by a distributed payment mechanism. Decentralization is a term that refers to a system of operation that enables P2P exchanges or transactions without the intervention of a central authority. This disruptive invention removes the need for dependence on third parties. The Bitcoin cryptocurrency is based on Blockchain technology, which is a continuously expanding list of blocks, each of which maintains scrambled transactional data and may have further decentralization potential
[2]. In this type of collaborative network, each functioning node maintains a duplicate record of transactional data, referred to as a “ledger”. Since DLT is intrinsically shared across participating nodes, it enables the creation of a trustless operating environment devoid of conventional trusted institutions like banks and clearinghouses. P2P exchanges enable the development of confidence with participating nodes as the nodes maintain the shared ledger. To validate new data in a Blockchain ledger, computer nodes adhere to an encrypted protocol. This type of distributed system reaps the advantages of decentralized governance, potentially resolving the problem of data exposure and accountability
[3]. This intrinsic characteristic supports counterparty interactions in the context of commercial activities
[4]. Critical data may be preserved without verifying the consistency of individual datapoints, and each node has a copy of the transactional data, boosting the openness and visibility of business activity.
1.1. Characteristics of Blockchain
Effectively, Blockchains are a decentralized storage network that is completely unrelated to the data included within each block and that exhibits crucial qualities such as decentralization, anonymity, immutability, and transparency
[5].
Decentralization refers to the fact that Blockchain technology lacks a central authority to administer the network among contributors
[6]. A Blockchain network is composed of a distributed computer network and a decentralized P2P network
[7]. The participant in the decentralization network interacts with the system and verifies the transactions without the need for a third party. These features ensure a reduced risk of failure and improve service trust with guaranteed availability
[8].
Immutability, meaning something that cannot be altered or changed, is a distinguishing characteristic of Blockchain. Once a block in the ledger contains a record of transactions, it cannot be edited or amended. Since each block contains a cryptographic hash of the original data, each hash is unique, every block includes the previous block’s hash, and transactions are stored on separate nodes throughout the dispersed network, therefore eliminating any need to modify the block content
[9]. One of the disadvantages of the immutability feature is that it is also impossible to modify data that might be erroneous before entering the Blockchain
[10]. However, it facilitates the tracking of data sequences.
Anonymity a key characteristic of public Blockchain, which permits users to interact with each other in a public Blockchain network. Each user has a private key and a public key, which allows users in the network to interact but does not disclose anyone’s identity. The user is only recognized by the public key
[8]. No single institution or authority is required to administer and maintain classified information. Consequently, real-world identity cannot be determined based on transaction information, which significantly supports and protects privacy. On the other hand, in circumstances like private and permissioned Blockchains, where systems are administered and governed by known organizations, identification is typically necessary
[11].
Blockchain facilitates read-only access to transactions and inspected contents of smart contracts for anyone in the Blockchain network. This supports efficient and accurate record-keeping, but may interfere with privacy to some extent
[12]. Blockchain technology has the potential to provide transparency not just in financial transactions but also in corporate operations
[9].
1.2. Blockchain Types
Blockchains are classified into three forms based on how the network operates and who may join: public Blockchain, private Blockchain, and consortium Blockchain.
Public Blockchains: A public Blockchain can also be called permissionless
[13]. It is a Blockchain in which participation in a public network is entirely free and open without any approval. Anyone with a computer with specialized software of a particular Blockchain can act as user, developer, miner, or community member
[5]. Public Blockchains are constructed to be completely decentralized, and all their transactions are completely transparent. Bitcoin is the first example of a public Blockchain. Generally, public Blockchains are mainly used for cryptocurrencies
[14].
Private Blockchains: Also referred to as permission Blockchains (e.g., Hyperledger), these allow for selecting which nodes should be operated and viewing transactions on the ledger, as well as who may transact with it since the privacy is improved
[15]. This means that participants require permission to join these networks. In contrast to public networks, private Blockchains are managed by a centralized entity. Blockchain communities consider private Blockchains to be distributed databases with a full history that cannot be deleted or changed. Private Blockchains are mainly used in private enterprises with sensitive information that users do not want to be known to the public
[11].
Consortium Blockchains: Consortium Blockchains are hybrids of private and public Blockchains. They enable only a select group of nodes to participate in the consensus process. They are partially centralized and open for limited public use and can be used in scenarios where there are various organizations involved in business activities (e.g., insurance companies, financial institutions, governmental institutions)
[5].
1.3. Blockchain Generations
According to the literature, there are four generations of Blockchain
[13]:
The first generation (Blockchain 1.0): The cryptocurrency, Bitcoin, represents the first generation of Blockchain technology, which is also called Blockchain 1.0. Other examples of this generation are Dash, Monero, and Litecoin.
The second-generation (Blockchain 2.0): The second-generation appeared with the start of the Ethereum network, where smart contracts were introduced. Smart contracts are software programs that contain the rules governing the management and control of smart properties. Ethereum Classic, Ethereum, QTUM, and NEO are all examples of Blockchain 2.0.
The third generation (Blockchain 3.0): With the rapid advancement of Blockchain technology, Blockchain has become more widespread, as in this generation, and it has exceeded the application of Blockchain in the financial field to various fields and industries such as contract management, Internet of Things (IoT), supply chain management, identity management, healthcare, and insurance. Currently, Blockchain technology is considered a general-purpose technology.
The fourth-generation (Blockchain 4.0): This generation is still in development. In Blockchain 4.0, artificial intelligence (AI) will be an essential part of the platform, reducing the need for human management since the work and decision making will depend on systems.
2. Technology Adoption Theories
According to
[16], the rate at which payment systems evolve is primarily determined by the conflict between rapid technology development and natural impediments to the new product or service uptake. Numerous hypotheses have been advanced to account for customers’ adoption of innovative technologies and their desire to utilize them.
2.1. Diffusion of Innovation (DOI)
The DOI theory is used to establish a framework for research on innovation acceptance and adoption, as advocated by
[17]. Rogers integrated findings from over 508 diffusion studies and developed the “diffusion of innovation” hypothesis to explain how individuals and organizations embrace innovative technologies. The idea elucidates “the method by which an invention is communicated among the members of a social organization over time through certain channels”
[17]. Essentially, diffusion is the process through which individuals in a social system disseminate inventions over time via certain channels. According to DOI theory, innovation and adoption happen over a series of phases, including comprehension, persuasion, decision, implementation, and confirmation, which results in the development of
[17] S-shaped adoption curves for innovators, early adopters, early majority, late majority, and laggards, as illustrated in
Figure 1.
Figure 1. Adoption curve of innovation.
2.2. Technology Readiness and Acceptance Model (TRAM)
TRAM was introduced by
[11] following a study of TAM and the architecture of technology readiness. The original research concentrated on customer intentions to engage in internet activity. TRAM associates TRI’s four dimensions with TAM’s two dimensions, namely, perceived utility and perceived ease of use, as mediators of intention to use. According to their investigation, a user’s intention to use is impacted by his or her feelings and past experiences
[12]. Nevertheless, no attempt has been made to utilize TRAM to research the adoption of data-sharing systems, although these systems are extensively used by individuals, businesses, and governments.
2.3. Technology Readiness Index (TRI)
The TRI dimension was developed to measure a firm’s readiness to accept innovative technologies. The optimism factor is a good measure of the sense of certainty and optimism in a company. The higher the optimism, the more the company believes in utilizing technology to simplify its jobs. Users with an optimistic outlook are more likely to sense that innovative technology is both straightforward and beneficial. Following that, it will send them to the next stage to enhance job performance and quality, according to
[18]. Technological readiness refers to “customers’ enthusiasm to implement technologies to improve their effectiveness in life and work.”
2.4. Theory of Planned Behavior (TPB)
TPB was established by
[19], and it focuses on a single element that influences a person’s behavioral intention and attitudes to that behavior, as seen in
Figure 2. The first two components are identical to those discovered in the Theory of Reasonable Action
[20].
Figure 2. The theory of planned behavior.
The TPB is broken down into three major components that influence behavioral intention and actual behavior adoption: attitude, subjective norms, and perceived behavior control. The authors of
[21] evaluated online banking adoption using both the TPB and the Decomposed TPB.
2.5. Task Technology Fit Model (TTF)
TTF, as defined by
[22], places a premium on individual effect. The individual impact is measured in terms of increased efficiency, effectiveness, and/or quality. According to
[22], a strong suit among tasks and technology increases the chance of usage and performance impact because the technology more closely matches users’ work demands and desires. As seen in
Figure 3, this paradigm is well suited for examining the real usage of technology, particularly for testing innovative technology in order to obtain feedback. The TTF is valuable for evaluating technological apps that have already been released in the marketplace, such as on Google Play.
Figure 3. Task technology fit.
2.6. Technology Acceptance Model (TAM)
TAM was developed from TRA theory; however, the subjective norm in TRA theory had not been used in TAM. TAM is considered the first model to use psychological factors that affect the acceptance of new technology
[23][24]. Two factors are added to attitude (A), namely, perceived usefulness (PU) and perceived ease of use (PEOU). TAM assumes that perceived ease of use (PEOU) impact affects the perceived usefulness (PU) directly, and that the perceived usefulness (PU) and perceived ease of use (PEOU) impact attitude directly and behavior intention (BI) indirectly. Additionally, TAM takes into consideration external variables like system attributes, training, etc., as shown in
Figure 4. The technology acceptance model is the most common model and is utilized in technology adoption studies
[25].
Figure 4. Technology acceptance model.
2.7. Unified Theory of Acceptance and Use of Technology (UTAUT)
Ref.
[26] analyzed prior models/theories and developed the UTAUT depicted in
Figure 5. The UTAUT identifies four determinants of users’ behavioral intention: performance expectations, effort expectations, social influence, and enabling factors. The UTAUT model’s performance expectancy is composed of five associated elements: perceived usefulness, intrinsic motivation, job-fit, relative advantage, and result expectancies, whereas effort expectancy contains the concepts of perceived ease of use and complexity. In terms of the social environment, ref.
[26] discovered that social influence was negligible in voluntary settings.
Figure 5. Unified theory of acceptance and use of technology.
2.8. Technology–Organization–Environment (TOE)
By taking into consideration technological, organizational, and environmental circumstances, the TOE framework can provide a unique viewpoint on IT adoption
[27]. The investigation of contingent factors affecting company choices is one of the most exhaustive methods for understanding creativity
[28]. To justify outcomes in organizations, such concerns may be classified as infrastructure, TOE, and organizational effects
[29]. The TOE approach may be used to conduct a systematic examination of an organization’s innovation effect. According to the study in
[30], TOE enables the distinction of intrinsic creative features, organizational capabilities, and motivations, as well as broader environmental factors of innovation.
3. Sustainable Factors
3.1. Relative Advantage
The term “relative advantage” refers to “the degree to which an invention is judged to be superior to the concept it replaces”
[17]. The relative advantage enhances the likelihood of adopting innovative technology
[31]. In comparison to other technologies, Blockchain enables the highest degree of traceability and provenance through the use of trustworthy data
[32].
3.2. Security
Security is described as “the capacity to safeguard stakeholders’ information and transaction data throughout transmission”
[33]. Through distinctive characteristics, such as a secured database
[34] and a privacy-preserving architecture, Blockchain technology enables a high degree of IS
[35] and enables users to conduct transactions anonymously. Information security threats are cited in the literature as a factor influencing the adoption of technology
[36][37].
3.3. Compatibility
Compatibility describes “the degree to which an innovation is judged to be compatible with potential adopters’ existing values, prior experiences, and requirements”
[17]. Blockchain systems are built on a proprietary distributed ledger technology that comes with a variety of governance models
[38]. When choosing a distributed ledger technology for Blockchain deployment, businesses should ensure that it is compatible with the many financial services and products provided and that it meets regulatory criteria. The evolution of governance structures is challenging, since several Blockchain apps are running on a range of several platforms. Additionally, there are other aspects and protocols for public and private Blockchains, each of which may be used for a variety of purposes
[39].
3.4. Complexity
Complexity refers to “the perceived difficulty of learning to use and understand a new system or technology”
[40]. The major sources of complexity in Blockchain applications are scalability
[41], selfish mining
[42], and lack of computing power
[43]. Scalability refers to the phenomenon where a company that adopts an innovation expects their affiliates to possess a similar innovation process to employ the innovation at an inter-organizational level.
3.5. Organisational Readiness
Organizational readiness assesses a manager’s opinion of his company’s capability of embracing technology based on a variety of variables, including awareness, resources, commitment, and governance. This criterion is mostly concerned with financial stability
[44].
3.6. Top Management Support
Authors in
[45] define top management support as the extent to which top management recognizes the strategic value of information systems and participates in information system operations
[46]. Support from senior management creates a compelling vision that enables a business to overcome any obstacle and to foster an atmosphere of dedication and creativity
[32].
3.7. Perceived Usefulness
TAM postulates a relationship between the notions of perceived utility and technological adoption. Perceived ease of use has a positive influence on perceived utility since technologies that require less effort might be more beneficial. Numerous studies have shown perceived utility to be a significant predictor of technology adoption
[47].
3.8. Perceived Ease of Use
The term “perceived ease of use” refers to the extent to which individuals think that utilizing an innovative technology will be effortless. PEoU is a major structural element in the TAM model. This element has a direct influence on PU and attitude in two ways. The TAM hypothesis has been validated and applied in many research projects to predict customer behavior when it comes to new technologies
[47]. PEoU refers to the probability that a user expects the target system to be effort-free. In this context, PEoU refers to the degree to which a user anticipates and feels that utilizing a service or technological system will be effortless
[47].
3.9. Competitive Pressure
Competitive pressure is a term that refers to the level to which a business considers pressure from competitors within its business
[48]. Supply chains may use Blockchain technology to develop a variety of sharing applications, including peer-to-peer, automated payment methods; foreign exchange platforms; digital rights management; and cultural heritage management. Many businesses would like to reap these benefits in today’s ever-increasingly competitive market. By implementing information systems, firms may be able to modify the laws of competition and exploit novel methods of outperforming competitors, ultimately altering the competitive structure of the industry
[49].
3.10. Performance Expectancy
Performance expectation is a theoretical concept developed from UTAUT that refers to the extent to which the adoption of a technology enables actors to perform daily tasks more efficiently. According to
[50], PE is the strongest predictor of the desire to employ a certain technology. Blockchain can increase efficiency and effectiveness in the long run, hence affecting this latter component
[51].
3.11. Effort Expectancy
In the UTAUT, effort expectancy (EE) refers to the level of ease involved in the usage of information systems
[50]. It denotes the essential commitment that players, by definition, must display during any learning process connected with the adoption of innovative technology. The literature indicates that a user’s desire to embrace new technology will likely grow if they believe that integrating this tool into their regular activities will not demand excessive work
[52].
3.12. Social Influence
The term “social influence” refers to a person’s norms, roles, affiliations, and values, which affect how they perceive what they will do
[53]. The social influence component has been included in the most successful online services, allowing the consumer to connect with the platform at the appropriate moment to gain sufficient experience without jeopardizing his or her loyalty to the business. Additionally, social influence is a distinct construct since it affects the level of confidence in the technology. These encounters and communication contexts prompt the consumer to investigate, assess the degree of risk, and develop trust to determine whether or not to utilize the service
[53]. The estimated impact of social influence on Blockchain technology will provide a better awareness of client perceptions of this innovative technology and the anticipated benefits of adoption.
3.13. Facilitating Conditions
Facilitating conditions refer to an employee’s perception of an organization’s technological infrastructure that supports system utilization. Additionally, condition facilitation refers to an understanding of the tools accessible to organizations to support Blockchain adoption. In other words, if consumers perceive a suitable amount of technological, organizational, network, and people support when utilizing Blockchain, they are more likely to have an uncomplicated and enjoyable experience with the technology and, hence, to be more engaged with it. Indeed, the Blockchain maintains a copy of each transaction, supporting the system and streamlining transaction monitoring for all participants.
3.14. Attitude
The term “attitude” refers to a user’s favorable or negative thoughts about a new technological advancement
[54]. The notion of reasoned action led researchers to discover real behavior, which they defined as a user belief system, which was in turn defined as an attitude to utilize and study things such as technological systems. Individuals examine their attitudes towards each alternative in a situation when generating behavioral intentions, and it appears that the attitude-comparable choice procedure does not reveal the formulation of an individual’s estimations of whether they should conduct many actions
[55].
3.15. Intention
Intention is a term that relates to the user’s anticipated possibility or probability of engaging in a specific action; in this example, experiencing innovative technology. Intention aids in the early phases of the application development life cycle by identifying well-formed measurements of user acceptability. Additionally, it assists clients in accepting beneficial technologies or rejecting ineffective ones, hence reducing the danger of supplying ineffective technologies before their rejection
[54]. Intention is defined as the capacity of a user’s subjective reasoning to cause an application to behave in a particular way. The motivation for a user to perform and utilize a technological system is the source of his/her belief in purposeful conduct.
3.16. Trust
Trust is a term that relates to a customer’s sense of comfort, confidence, and security while interacting with technology
[56]. The relationship between the client and the vendor is defined by trust. Trust becomes critical to maintaining an active and sustained communication channel and maintaining confidence in a commercial partner. It is a characteristic of trustworthy partnerships that can help mitigate risk. Trust is defined as the client’s attitude toward the service provider; similarly, protection against negative acts that may be anticipated in advance is defined as providing additional protection and monitoring for customer actions to improve their trust
[57]. When confidence erodes, customers become less willing to take risks, and the likelihood of disloyalty increases. In cases where one must take a risk and cannot control the outcome, trust is the only option. In the case of Blockchain, the risk likelihood should be minimal from the customer’s perspective, while trust should be high.
3.17. Regulatory Support
Regulatory framework and government assistance refer to regulatory frameworks established by the government to oversee and guarantee that both technology service providers and consumers adhere to their commitments and prevent infractions. Government regulation and legislation are critical for e-commerce and service quality monitoring, as well as for authorizing and deploying new technologies within a nation’s rule of law
[58]. These statutes are employed to guarantee that all processes run smoothly and fairly. Similarly, when it comes to client behavior towards Blockchain technology and cryptocurrencies, the same holds true. Regulation is required to minimize or mitigate any uncertainty that emerges. Government rules and directives may affect customers’ willingness to trust technology and secure its use. Nevertheless, there are other obstacles to the worldwide expansion of cryptocurrencies, including lax government regulations
[59].
3.18. Behavioural Expectation
Previously published UTAUT research has indicated that the behavioral intention construct affects the behavioral expectation construct
[60]. In this perspective,
[50] argues that, “The motivational drive to perform a target behavior stems from an individual’s internal evaluation of the behavior”. Therefore, the behavioral purpose of an individual is related to his or her internal appraisal. Thus, behavioral intention precedes Behavioral Expectation. That is, “Behavioral expectation, therefore, reflects the strength of the focal behavioral intention over other (competing) behavioral intentions”
[50].
Blockchain not only refers to the better flow of the information superhighway but also to the workforce and assets of susceptible organizations. Potential Blockchain methods can be lethal to operational controls, financial information, and the workforce associated with the organizations. The benefits of these methods can be maximized by organizational arrangements and support for organizational Blockchain. Additionally, with this sensitive issue under investigation, an organization needs to focus on strategic and acceptable Blockchain methods within the organization. Fear of losing critical organizational transactions, due to complex or unrealistic organizational patterns, can be dealt with by involving the end-users of computing and network facilities (employees) in decisive stages of Blockchain adoption. It is time to focus upon shared visions/goals in dealing with Blockchain issues at the organizational level.