Analysis of Blockchain Technology and Security Principles in Cryptocurrency Transactions according to the perspective of Islamic Economics
Case study : Smart Contract on the Ethereum Blockchain Network
DOI:
https://doi.org/10.58223/taamul.v1i1.2Keywords:
Security, Transactions, Blockchain, Cryptocurrencies, Smart contractsAbstract
This study aims to understand the concept of security and privacy in blockchain technology through Islamic economics. Cryptocurrencies have been around for less than a decade, but they have caused divisions among religious scholars. Some Islamic scholars say that cryptocurrencies are haram or forbidden because they are based on speculation. Other scholars claim that cryptocurrencies are halal or permitted because they can be used for transactions that Islam considers legal. The debate over the legality of cryptocurrencies is complicated by the lack of a clear consensus among Islamic scholars. There is also disagreement over whether or not to allow investments in cryptocurrencies. This study uses a qualitative approach. Data collection was carried out using structured interviews with a number of respondents, including Islamic scholars and lecturers. The results of the study show that blockchain as a digital security transaction solution with its data decentralization is in line with the principles of Islamic Economics in the non-monetary field, but contradicts the principles of Islamic Economics in the monetary sector because of the obligation to follow the official Government in Monetary Policy.
References
Ali, S. T. (2015, March). Bitcoin: perils of an unregulated global P2P currency (Transcript of Discussion). In Cambridge International Workshop on Security Protocols (pp. 294-306). Springer, Cham.
Westin, A. F. (1972). Databanks in a free society: Computers, record-keeping and privacy. Report of the Project on Computer Databanks of the Computer Science and Engineering Board.
Anwar, N. S. (2019). Analisis Transaksi Digital Cryptocurrency Sebagai Investasi Global Dalam Perspektif Hukum Islam (Studi Kasus Dinar Dirham di Makassar). Gordon, JM (1998). Business Law: An Introduction. Business Law: An Introductionby TheBusinessProfessor. Com, 501, 428-431.
Barker, E., & Barker, E. (2016). Guideline for using cryptographic standards in the federal government: Cryptographic mechanisms. US Department of Commerce, National Institute of Standards and Technology.
Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., & Felten, E. W. (2015, May). Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In 2015 IEEE symposium on security and privacy (pp. 104-121). IEEE.
Bygrave, L. A. (2014). Data privacy law: an international perspective (Vol. 10). Oxford: Oxford University Press.
Chaum, D., Fiat, A., & Naor, M. (1990). Untraceable electronic cash. InProc. on Advances in Cryptology, ser. CRYPTO’88, Santa Barbara, CA.
Danial, K. (2019). Cryptocurrency Investing For Dummies. John Wiley & Sons
De Hert, P., & Gutwirth, S. (2006). Privacy, data protection and law enforcement. Opacity of the individual and transparency of power. Privacy and the criminal law.
Dierks, T., & Rescorla, E. (2008). RFC 5246-the transport layer security (TLS) protocol version 1.2. The Internet Engineering Task Force (IETF).
Dr, P. (2008). Sugiyono, Metode Penelitian Kuantitatif Kualitatif dan R&D. CV. Alfabeta, Bandung.
Finney, H. (2004). Reusable proofs of work. Web Archives Homepage
Girasa, R. (2018). Regulation of cryptocurrencies and blockchain technologies: national and international perspectives. Springer.
Hyvärinen, H., Risius, M., & Friis, G. (2017). A blockchain-based approach towards overcoming financial fraud in public sector services. Business & Information Systems Engineering.
j Moleong, L. (2005). metodologi penelitian kualitatif, edisi revisi bandung: remaja Rosdakarya.
Judmayer, A., Stifter, N., Krombholz, K., & Weippl, E. (2017). Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms. Synthesis Lectures on Information Security, Privacy, & Trust, 9(1), 1-123.
Leenes, R., Van Brakel, R., Gutwirth, S., & De Hert, P. (Eds.). (2017). Data protection and privacy:(In) visibilities and infrastructures. Springer International Publishing.
Liu, A. X., & Li, R. (2021). Algorithms for Data and Computation Privacy (pp. 3-404). Springer.
Luhmann, N. (1992). What is communication?. Communication theory.
Maulana, M. I., Kurnia, A. D., & Nurbaeti, A. (2021). Studi Kajian Bisnis Tambang Uang Digital (Cryptomining) Dalam Konteks Ijarah. EKSISBANK (Ekonomi Syariah Dan Bisnis Perbankan), 5(1), 35-56.
Mantra, I. B. (2004). Filsafat penelitian & metode penelitian sosial. Pustaka Pelajar.
Mills, D. C., Wang, K., Malone, B., Ravi, A., Marquardt, J., Badev, A. I., ... & Baird, M. (2016). Distributed ledger technology in payments, clearing, and settlement.
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2017). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction.
Nayak, K., Kumar, S., Miller, A., & Shi, E. (2016, March). Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 305-320). IEEE.
Purhantara, W. (2010). Metode Penelitian Kualitatif Kuantitatif Untuk Bisnis. Cet. I. Yogyakarta: Graha Ilmu.
Prusty, N. (2017). Building blockchain projects. Packt Publishing Ltd.
Quest, M. (2018). Cryptocurrency Foundation Success: The Beginners and Experts Guide to Understanding Basic and Advanced Concepts of Cryptocurrency, Bitcoin, Ethereum, and Altcoin Trading and Investing.
Sihombing, M. S. P., Nawir, J., & Mulyantini, S. (2020). CRYPTOCURRENCY, NILAI TUKAR DAN REAL ASSET TERHADAP HARGA SAHAM PADA PERBANKAN INDONESIA YANG TERDAFTAR DI BURSA EFEK INDONESIA. Ekonomi dan Bisnis, 7(2), 171-196.
Soediro, S. (2018). Prinsip Keamanan, Privasi, dan Etika dalam Undang-undang Informasi dan Transaksi Elektronik dalam Perspektif Hukum Islam. Kosmik Hukum, 18(2).
Sun Yin, H. H., Langenheldt, K., Harlev, M., Mukkamala, R. R., & Vatrapu, R. (2019). Regulating cryptocurrencies: a supervised machine learning approach to de-anonymizing the bitcoin blockchain. Journal of Management Information Systems, 36(1), 37-73.
Tamò-Larrieux, A., Tamò-Larrieux, & Seyfried. (2018). Designing for privacy and its legal framework. Cham: Springer.
Tavani, H. T. (2008). Floridi’s ontological theory of informational privacy: Some implications and challenges. Ethics and Information Technology, 10(2-3), 155-166.
Wood, G. (2017). Ethereum: a secure decentralised generalised transaction ledger (2014).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Fahmi Sihabudin, Listian Indriyani Achmad, Muhammad Hamdan 'Ainulyaqin, Kisanda Midisen, Sarwo Edy
This work is licensed under a Creative Commons Attribution 4.0 International License.