Professional Documents
Culture Documents
Volatile-Uncertain-Complex-Ambiguous
World Kaliyan Mathiyazhagan
Visit to download the full and correct content document:
https://ebookmass.com/product/blockchain-in-a-volatile-uncertain-complex-ambiguou
s-world-kaliyan-mathiyazhagan/
Blockchain in a
VOLATILE-UNCERTAIN-
COMPLEX-AMBIGUOUS
WORLD
This page intentionally left blank
Blockchain in a
VOLATILE-UNCERTAIN-
COMPLEX-AMBIGUOUS
WORLD
Edited by
KALIYAN MATHIYAZHAGAN
Professor, Thiagarajar School of Management,
Madurai, Tamil Nadu, India
V. RAJA SREEDHARAN
Senior Lecturer, Cardiff School of
Management, Cardiff Metropolitan
University, Llandaff, United Kingdom
DEEPAK MATHIVATHANAN
Assistant Professor, Centre for Logistics and Supply Chain
Management, Loyola Institute of Business Administration
(LIBA), Nungambakkam, Chennai, India
VIJAYA SUNDER M
Assistant Professor, Indian School of Business,
Hyderabad, India
Elsevier
Radarweg 29, PO Box 211, 1000 AE Amsterdam, Netherlands
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
Copyright © 2023 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying, recording, or any
information storage and retrieval system, without permission in writing from the
publisher. Details on how to seek permission, further information about the
Publisher’s permissions policies and our arrangements with organizations such as the
Copyright Clearance Center and the Copyright Licensing Agency, can be found at our
website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under
copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research
and experience broaden our understanding, changes in research methods, professional
practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge
in evaluating and using any information, methods, compounds, or experiments
described herein. In using such information or methods they should be mindful of
their own safety and the safety of others, including parties for whom they have a
professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or
editors, assume any liability for any injury and/or damage to persons or property as a
matter of products liability, negligence or otherwise, or from any use or operation of
any methods, products, instructions, or ideas contained in the material herein.
ISBN: 978-0-323-89963-5
Contributors xi
1. Introduction 29
2. Blockchain 30
3. VUCA 34
4. Final thoughts and conclusion 40
References 41
v
vi Contents
1. Introduction 57
2. Blockchain and supply chain management 58
3. Blockchain architecture for SCM 62
4. Implementation challenges of blockchain in SCM 65
5. Applications of blockchain and supply chain in a different sector 67
6. Conclusion 72
References 72
1. Introduction 149
2. Understanding blockchain technology and theorization of
blockchain-induced HRM 150
3. Use cases for blockchain HR 152
4. Future of blockchain in HR 157
5. Conclusions 158
References 158
1. Introduction 163
2. Supply chain volatility 164
3. Dimensions of supply chain volatility 164
4. Problems of supply chain volatility 170
5. Role of blockchain in supply chain volatility 177
6. Benefits of blockchain technology 178
7. Global landscape in the applications of BCT in supply chain technology 187
8. BCT Applications in Indian banking industry 189
9. Proposed model of further research 190
10. Conclusion 190
References 191
1. Introduction 233
2. Literature review 235
3. Problem statement 237
4. Solution methodology 237
5. Results and discussion 247
References 248
Index 277
This page intentionally left blank
Contributors
M.A.S.R. Abhilash
National Institute of Technology Patna, Patna, Bihar, India
Ajith Abraham
Machine Intelligence Research Labs (MIR Labs), Scientific Network for Innovation and
Research Excellence, Auburn, Washington, United States
Alpana Agarwal
Amity University, Noida, Uttar Pradesh, India
B. Aiswarya
Loyola Institute of Business Administration Loyola College, Chennai, Tamil Nadu, India
Hamda Alhameli
Department of Industrial Engineering Technology, Abu Dhabi Women’s Campus,
Higher Colleges of Technology, Abu Dhabi, United Arab Emirates
Anood Mohammed Alhosani
Department of Industrial Engineering Technology, Abu Dhabi Women’s Campus,
Higher Colleges of Technology, Abu Dhabi, United Arab Emirates
S. Aravind Raj
School of Mechanical Engineering, Vellore Institute of Technology, Vellore, Tamil
Nadu, India
R. Deepa
Loyola Institute of Business Administration (LIBA), Chennai, India
Ameeta Fernando
Loyola Institute of Business Administration Loyola College, Chennai, Tamil Nadu, India
Moaz Nagib Gharib
Department of Management, College of Commerce and Business Administration, Dhofar
University, Salalah, Sultanate of Oman
Peiman Ghasemi
Department of Logistics, Tourism & Service Management, German University of
Technology in Oman (GUtech), Muscat, Oman
Fariba Goodarzian
Machine Intelligence Research Labs (MIR Labs), Scientific Network for Innovation and
Research Excellence, Auburn, Washington, United States; Engineering Group, School of
Engineering, University of Seville, Camino de los Descubrimientos s/n, Seville, Spain
Chalicham Hanish
School of Mechanical Engineering, Vellore Institute of Technology, Vellore, Tamil
Nadu, India
xi
xii Contributors
Bavly Hanna
University of Technology Sydney, Sydney, NSW, Australia
Jahangir Hossain
University of Technology Sydney, Sydney, NSW, Australia
Esha Jain
IILM University, Gurugram, Haryana, India
K. Jayakrishna
School of Mechanical Engineering, Vellore Institute of Technology, Vellore, Tamil
Nadu, India
Simranjeet Kaur
University School of Business (USB), Chandigarh University, Gharuan, Punjab, India
Raj Kumar Reddy Kotha
Department of Mechanical Engineering, Indian Institute of Information Technology
Design & Manufacturing (IIITDM), Kancheepuram, Tamil Nadu, India
Jonika Lamba
School of Management & Liberal Studies, The NorthCap University, Gurugram,
Haryana, India
VM Manickavasagam
Dean - Faculty of Management, Alagappa University, Karaikudi, India
K. Mathiyazhagan
Thiagarajar School of Management, Madurai, Tamil Nadu, India
Divya Mishra
Department of Computer Science and Engineering, ABES Engineering College,
Ghaziabad, Uttar Pradesh, India
MP Pandikumar
Loyola Institute of Business Administration, Chennai, Tamil Nadu, India
Sasikumar Perumal
Department of Industrial Engineering Technology, Abu Dhabi Women’s Campus,
Higher Colleges of Technology, Abu Dhabi, United Arab Emirates
Sonu Rajak
National Institute of Technology Patna, Patna, Bihar, India
G. Rajyalakshmi
School of Mechanical Engineering, Vellore Institute of Technology, Vellore, Tamil
Nadu, India
G. Ramasundaram
PSG Institute of Management Studies, Coimbatore, Tamil Nadu, India
Raga Ravali B
Senior Consultant, Ernst & Young LLP, Hyderabad, Telangana, India
K.N.G.L. Reshwanth
School of Mechanical Engineering, Vellore Institute of Technology, Vellore, Tamil
Nadu, India
Contributors xiii
V. Senthil
Thiagarajar School of Management, Madurai, Tamil Nadu, India
Om Ji Shukla
National Institute of Technology Patna, Patna, Bihar, India
Rajesh Kr Singh
Management Development Institute Gurgaon, Haryana, India
Pushpa Singh
Department of Computer Science and Engineering, GL Bajaj Institute of Technology
and Management, Greater Noida, India
Narendra Singh
Department of Management Studies, G. L. Bajaj Institute of Technology and
Management, Greater Noida, Uttar Pradesh, India
Yendeti Venkata Siva Prasanth
School of Electronics Engineering, Vellore Institute of Technology, Vellore, Tamil
Nadu, India
Micheal Sony
Faculty of Engineering, Namibia University of Science and Technology, Windhoek,
Namibia
Laxmi Pandit Vishwakarma
Management Development Institute Gurgaon, Haryana, India
Xianzhi Wang
University of Technology Sydney, Sydney, NSW, Australia
Guandong Xu
University of Technology Sydney, Sydney, NSW, Australia
This page intentionally left blank
SECTION 1
1
This page intentionally left blank
CHAPTER 1
Introduction to blockchain in
supply chain management
Raga Ravali B
Senior Consultant, Ernst & Young LLP, Hyderabad, Telangana, India
The digital world today is highly unpredictable and vulnerable with new
innovations entering the market every day. To survive in the VUCA world
.
1. Components of blockchain
• Node: A node is a computer or a user in the network. They form the
fundamental elements of the blockchain network. All nodes in the
network are connected to exchange information. The functions of a
node are as follows,
• Nodes verify if a transaction block is valid and accept or reject it
accordingly.
• Nodes archive the blocks of transactions.
Introduction to blockchain in supply chain management 5
2. Working of blockchain
It is a network of interconnected nodes in which the data is published on a
shared ledger. The first node, which does not have a reference to the
previous node is called the genesis node. Every transaction in the network is
stored in the form of a hash, making it highly secure. The validation of data
is done by the process called mining while the nodes performing this
process are called miners. The users can access the system with the help of
public and private keys. Some of the powerful characteristics of blockchain,
which make it a promising technology are immutability, decentralized,
transparency, persistence, independent operation, anonymity, auditability,
privacy, and consensus-driven (Zheng et al., 2018). Blockchain also has the
capability of executing smart contracts, which are conditions and rules of a
contract coded into the system. The code is self-executed by the system,
and it notifies the parties involved in the contract about the terms of the
contract at the right time (Mol et al., 2019).
The header and body are two elements of each block in a blockchain.
The block header consists of the block version, parent block hash, merkle
tree root hash, timestamp, nBits, and nonce. The transaction counter and
the actual transactions make up the block body. Asymmetric cryptographic
mechanisms are used to validate the transactions (Zheng et al., 2018). It uses
a digital cryptographic signature in a trust less environment. The crypto-
graphic security check is done at two levels. At the first level, private keys
are used to authenticate the transaction while at the second level; miners
verify the transaction (Lipton, 2018).
Blockchain Technology (BCT) is distributed ledger that enables secure
asset transfer. Blockchain can be used to tokenize any physical asset such as
6 Blockchain in a Volatile-Uncertain-Complex-Ambiguous World
land, gold, etc., for ease of exchange. Blockchain stores the data in a
decentralized manner. Every node in the blockchain network has a
duplicate copy of the complete ledger. Every transaction in the blockchain
network is recorded in the distributed ledger database. The database is
immutable but visible to every participant in the network, thereby ensuring
transparency. Blockchain differs from other databases in the way data is
encrypted and structured. Blockchain appends a timestamp to every
transaction and every transaction hash code is linked to the next transaction
forming a chain. This clearly explains the name, which means, the data
chunks (blocks) are linked as a chain. Blockchain has immense potential in
terms of embedding the control norms by means of smart contracts. Smart
contracts also play a significant role in quality control by ensuring the
product parameters match the predefined standards. The temperature
compliance for goods across the cold chain can be accurately verified using
smart contracts (Azzi et al., 2019). This eliminates the need for other
external legal advisors. The true value of blockchain is still decades away
from reaching the early and late majority.
3. Digital signature
The data authenticity of blockchain systems is maintained using digital
signature. It is a mathematical scheme based on public key cryptography.
During each transaction in the blockchain network, there is an encryption
and decryption process. The digital signature algorithm used in blockchain
is Elliptic curve digital signature algorithm (ECDSA). Every user owns a
public and a private key. The sender encrypts or signs the data using the
private key. The encrypted data is sent to everyone in the network. This
data is accessed using public keys. There are two stages in assigning digital
signatures, namely signing stage, and verifying stage.
In a blockchain system, the large input data is first broken into portions
of 512 bits. The last portion will not have 512 bits because every input
message may not be a multiple of 512. This part is appended with additional
bits to make it 512. This altered data is passed through a compression
function and converted to 256 bits. This is then appended to the next block
and the process of compression is repeated further. Thus the data of a block
becomes a part of the next block, thereby forming a chain. Two properties
of the hash value are: collision-free and immutable. Collision-free implies
that no two blocks can have the same hash value, and immutable means
that the hash value cannot retrieve block info.
6. Classification of blockchain
Blockchains are classified under three distinctive categories based on the
access permissions. They are Public blockchain, consortium blockchain and
Private blockchain.
Public blockchain: These types of blockchains have no restrictions on
validations and participation. The authority and control over the block-
chain is equally distributed among all the participants (Kiran et al., 2018).
Private blockchain: These are restricted blockchains, which require
permission to perform transactions. This results in improved governance
and control than the public blockchain. They are used within closed net-
works (Kiran et al., 2018).
Consortium blockchain: These blockchains are also known as hybrid
blockchains. It has the combined characteristics of private and public
blockchain. These are usually governed by groups rather than single entity
(Kiran et al., 2018).
8 Blockchain in a Volatile-Uncertain-Complex-Ambiguous World
7. Consensus algorithms
A consensus algorithm is a mechanism used to verify the validity of data in
the system. This enhances the security of the system and makes it trust-
worthy. There are several types of consensus algorithms used at present
with Proof of stake being the most efficient algorithm. The different
consensus algorithms are explained below.
8. Blockchain platforms
Blockchain platforms enable building blockchain-based applications. These
platforms can be permissioned or permissionless. The blockchain platform
suitable for a particular application can be chosen based on the ease of
working on it, consensus algorithm used, ledger type and how secure the
platform is. There are several platforms available today; a few popular
platforms are discussed below in detail.
Hyperledger Fabric: It was developed for permissioned systems. Only
authorized participants can perform the transactions over this platform. It was
developed by Linux foundation. It has variants such as Sawtooth and Ioha.
Ripple: It was found in 2012. It enables global transfers as a “XRP or
Ripple” digital currency, which is now one of the successful crypto-
currencies such as Ether and Bitcoin. Companies such as American express
and Delloite are testing the platform.
10 Blockchain in a Volatile-Uncertain-Complex-Ambiguous World
9. Characteristics of blockchain
Resilience: Every member in the blockchain network has a copy of the
data, which protects the system from attacks.
Decentralization: A blockchain network functions without any third
party central authority. The users in the system verify the transactions,
which is more reliable than a central authority doing the verification.
Anonymity: The identity of a user in the blockchain system is not
exposed, as the transactions are carried out using their addresses. These
addresses can be changed any number of times by the user.
Auditability: Every transaction on blockchain can be traced back using
the timestamp and every node on the network is accessible to the users.
This enhances the transparency and traceability of the system.
Immutability: The data in a blockchain is in the form of hashes and
the hash of the new block contains the information of the previous block.
This makes the system fool proof. There have been evidenced of hackers
using forking to manipulate the data. But the original data remains intact.
Security: Security is crucial for any supply chain system. Blockchain
offers high data security as the historical data is immutable. The data is
stored in several systems across the network; hence data manipulation be-
comes difficult.
Introduction to blockchain in supply chain management 11
chain. Everledger, a firm has recognized the need for traceability and is
aiming to increase transparency in the diamond supply chain, eliminating
fraud, illegal markets, and trafficking. The company has identified 40
metadata points that characterize a diamond (e.g., serial number, color,
carats, cut, clarity, angles) digitally secured records on blockchain with links
to the laser inscription on the stone’s girdle. There have been 1.6 million
gems uploaded to the blockchain network thus far. Their services are
mostly used by insurance companies, banks, and open markets in the
transaction verification process, but they have lately expanded their business
model to include other luxury goods such as wines and artworks (Dutta
et al., 2020).
Food and FMCGdTo track the state of food, its quality, expiry, etc.,
from farm to fork. Implementing blockchain is also touted to aid brand
owners to protect their data while also integrating their online and offline
traceability systems for food safety and quality management channels. RFID
tags are used to gather information about the products such as moisture,
movement, temperature, chemical/gas, and the data was transferred over
IoT. This data is stored on blockchain, which provides the data mapping
across the entire supply chain (Dutta et al., 2020).
E.g.: Cargill, an American agriculture firm, is testing blockchain tech-
nology to allow customers to trace the turkey’s origins back to the farm.
Using an IBM-developed blockchain infrastructure, Walmart is attempting
to track fresh and leafy greens items back to the farm. Walmart utilizes
blockchain technology to trace the meat it imports from China. Data such
as cold chain operations and sales dates are maintained in the blockchain for
this purpose.
LogisticsdBlockchain integration helps in tracking the product from
its raw material stage at the origin till it is turned into final product and sold
at a retail store. The primary objectives are to cut costs, prevent theft and
fraud, and shorten transaction times. For hyperconnected logistics, block-
chain can be combined with smart contracts. CargoCoin company uses
smart contracts in a project to establish a safe mechanism of storing and
transferring tokenized items in a variety of supply chain businesses (shipping
via land, sea, and air). On a global scale, it facilitates communication be-
tween cargo traders and transporters. This allows all supply chain stake-
holders to have a way for submitting, receiving, rejecting, approving, or
signing necessary documentation.
Introduction to blockchain in supply chain management 13
It was amongst these wild and lawless Rifians that Mr. Hay found
the most thorough sportsmen, and also men capable of great
attachment and devotion. Always much interested in the history of
this race, in their customs and mode of life, he wrote an interesting
account of the tribes which inhabit the north of Morocco and of his
personal intercourse with them.