請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/58079
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 李瑞庭(Anthony J.T. Lee) | |
dc.contributor.author | Hsin-Ying Lin | en |
dc.contributor.author | 林欣穎 | zh_TW |
dc.date.accessioned | 2021-06-16T08:05:35Z | - |
dc.date.available | 2024-06-25 | |
dc.date.copyright | 2014-07-08 | |
dc.date.issued | 2014 | |
dc.date.submitted | 2014-06-25 | |
dc.identifier.citation | Alptekinoğlu, A., & Corbett, C. J. (2008). Mass Customization vs. Mass Production: Variety and Price Competition. Manufacturing & Service Operations Management, 10(2), 204–217.
Baake, P., & Boom, A. (2001). Vertical Product Differentiation, Network Externalities, and Compatibility Decisions. International Journal of Industrial Organization, 19(1-2), 267–284. Barber, S., Boyen, X., Shi, E., & Uzun, E. (2012). Bitter to Better — How to Make Bitcoin a Better Currency. In Proceedings of Financial Cryptography and Data Security (pp. 399–414). Basu, A., & Mazumdat, T. (2003). Indirect Network Externality Effects on Product Attributes. Marketing Science, 22, 209–221. Bitzer, J., & Schroder, P. (2003). Competition and Innovation in a Technology Setting Software Duopoly (No. 363). Berlin, Germany: Deutsches Institut fur Wirtschaftsforschung. Brezo, F., & Bringas, P. (2012). Issues and Risks Associated with Cryptocurrencies Such as Bitcoin. In In Proceedings of the Second International Conference on Social Eco-Informatics(pp. 20–26). Chinn, M., & Frankel, J. (2007). Will the Euro Eventually Surpass the Dollar As Leading International Reserve Currency? In Proceedings of G7 Current Account Imbalances: Sustainability and Adjustment (pp. 283–338). D’Aveni, R. (1990). Top Managerial Prestige and Organizational Bankruptcy. Organization Science, 1(2), 121–142. Dou, Y., Niculescu, M., & Wu, D. (2013). Engineering Optimal Network Effects via Social Media Features and Seeding in Markets For Digital Goods and Services. Information Systems Research, 24(1), 164–185. Dowd, K., & Greenaway, D. (1993). Currency Competition, Network Externalities and Switching Costs: Towards an Alternative View of Optimum Currency Areas. Economics Journal, 103(420), 1180–1189. European Central Bank. (2012). Virtual Currency Schemes. Frankfurt, Germany: European Central Bank. Farrell, J., & Saloner, G. (1986). Installed Base and Compatibility: Innovation, Product Preannouncements, and Prediction. The American Economic Review, 76(5), 940–955. Fuentelsaz, L., Maicas, J. P., & Polo, Y. (2012). Switching Costs, Network Effects, and Competition in the European Mobile Telecommunications Industry. Information Systems Research, 23(1), 93–108. Gabszewicz, J. (1979). Price Competition, Quality and Income Disparties. Journal of Economic Theory, 359, 340–359. Guo, J., & Chow, A. (2008). Virtual Money Systems: A Phenomenal Analysis. In Proceedings of E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-Services (pp. 267–272). Guo, L. (2006). Consumption Flexibility, Product Configuration, and Market Competition. Marketing Science, 25(2), 116–130. Johnson, B., Laszka, A., & Grossklags, J. (2014). Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools. In Proceedings of 1st Workshop on Bitcoin Research, ser. Lecture Notes in Computer Science, to appear. Jones, R., & Mendelson, H. (2011). Information Goods vs. Industrial Goods: Cost Structure and Competition. Management Science, 57(1), 164–176. Katz, M. L., & Shapiro, C. (1985). Network Externalities, Competition, and Compatibility. The American Economic Review, 75(3), 424–440. Kuksov, D., & Lin, Y. (2010). Information Provision in a Vertically Differentiated Competitive Marketplace. Marketing Science, 29(1), 122–138. Lee, D., & Mendelson, H. (2007). Adoption of Information Technology Under Network Effects. Information Systems Research, 18(4), 395–413. Luther, W. J. (2013). Cryptocurrencies, Network Effects, and Switching Costs. Available at Social Science Research Network(SSRN) 2295134. Rochet, J., & Tirole, J. (2003). Platform Competition in Two-Sided Markets. Journal of the European Economics Association, 1(4), 990–1029. Sun, B., Xie, J., & Cao, H. H. (2004). Product Strategy for Innovators in Markets with Network Effects. Marketing Science, 23(2), 243–254. Syam, N. B., & Pazgal, A. (2013). Co-Creation with Production Externalities. Marketing Science, 32(5), 805–820. Trejos, A., & Wright, R. (1996). Search-Theoretic Models of International Currency. Review-Feberal Reserve Bank of Saint Louis, 78, 117–132. Witteloostuijn, A. Van. (1998). Bridging Behavioral and Economic Theories of Decline: Organizational Inertia, Strategic Competition, and Chronic Failure. Management Science, 44(4), 501–519. Xia, N., & Rajagopalan, S. (2009). Standard vs. Custom Products: Variety, Lead Time, and Price Competition. Marketing Science, 28(5), 887–900. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/58079 | - |
dc.description.abstract | 過往文獻所提出的競爭模型,只能讓消費者從競爭廠商中選擇一個提供較高效益的商品。然而,在密碼幣市場中,挖礦者可同時挖掘數種密碼幣,不受限於只能選擇一種密碼幣。因此,在本篇論文中,我們提出一權重式選擇模型以探討密碼幣的競爭情形,其中,每一位挖礦者可投注部份資源於一個密碼幣,再將剩餘資源投注於另一個密碼幣。此模型延伸了過往貨幣文獻中以網路外部性建構密碼幣的價值,並將挖礦成本、外部風險以及挖礦者對於挖礦效用的敏感度納入考量。有別於過往所提出的非權重式選擇模型(勝者全拿),我們的權重式選擇模型將挖礦者所投注的小部份資源納入考量,使得較小的密碼幣,即使沒有網路外部性優勢,依然可以透過從每一挖礦者所蒐集的小部份資源而生存。另外,分析結果亦顯示,若採用權重式選擇策略,密碼幣基金會更能克服嚴峻的競爭情形,且挖礦者亦可獲得更高的效益。本研究的成果可提供挖礦者策略性的洞見,並幫助密碼幣基金會制定競爭策略以運作其密碼幣。 | zh_TW |
dc.description.abstract | Many previously proposed competition models only allow consumers to choose a product with a higher utility, provided by just one of the competitors. However, in cryptocurrency market, miners are allowed to mine multiple cryptocurrencies simultaneously, not just limited to one. Therefore, in this thesis, we propose a weighted effort model to study the competition between two cryptocurrencies, where every miner is allowed to allocate some efforts to one cryptocurrency and the rest to the other. The proposed model extends the concept of the previous currency studies by using the network benefit to model the value of a cryptocurrency, and takes mining cost, exogenous risk, miners’ intrinsic mining benefit sensitivity into account. Unlike previously proposed un-weighted effort models (winner-take-all), our weighted effort model takes the small amount of efforts collected from miners into account, and shows that the smaller cryptocurrency can survive by aggregating the small amount of efforts even though it doesn’t have the advantage of network benefit over its competitor. It also shows that foundations are more likely to overcome stiff competition and miners can obtain higher utilities if weighted effort strategy is adopted. The analytical results can provide some strategic insights for miners and help foundations formulate competitive strategies to run their cryptocurrencies. | en |
dc.description.provenance | Made available in DSpace on 2021-06-16T08:05:35Z (GMT). No. of bitstreams: 1 ntu-103-R01725020-1.pdf: 3364960 bytes, checksum: 0225f2dbdf07f3decd0713bd12741dca (MD5) Previous issue date: 2014 | en |
dc.description.tableofcontents | Table of Contents i
List of Figures ii List of Tables iii Chapter 1 Introduction 1 Chapter 2 Literature Review 7 Chapter 3 Model Setup 11 3.1 Miners’ and Foundations’ Formulations 12 3.2 Timeline of Model 13 Chapter 4 Equilibrium and Analysis 15 4.1 The Equilibrium 15 4.2 Impact of Risk Ratio and Unit Mining Cost 21 4.3 Discussions on Cryptocurrency Market Competition 28 4.4 Un-weighted Effort Model 34 Chapter 5 Conclusions and Future Work 39 Appendix A 42 References 49 | |
dc.language.iso | en | |
dc.title | 密碼幣採礦之競爭模型 | zh_TW |
dc.title | A Competition Model for Mining Cryptocurrencies | en |
dc.type | Thesis | |
dc.date.schoolyear | 102-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 孔令傑(Ling-Chieh Kung),陳柏安(Po-An Chen) | |
dc.subject.keyword | 競爭模型,密碼幣,權重式選擇,網路外部性, | zh_TW |
dc.subject.keyword | competition model,cryptocurrency,weighted effort allocation,network benefit, | en |
dc.relation.page | 51 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2014-06-25 | |
dc.contributor.author-college | 管理學院 | zh_TW |
dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
顯示於系所單位: | 資訊管理學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-103-1.pdf 目前未授權公開取用 | 3.29 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。