Blokzincir (Blockchain)’in Kamu İdaresine Olası Etkileri Üzerine

Kamu yönetimi, kendi dışındaki yapıların kullandıkları veri protokolü Blokzincir mimarisine uyum sağlamalıdır. Bu uyumla birlikte Blokzincir, demokratik uzlaşmayı gözetmek şartıyla kamu yönetiminin kuralları uygulatma sürecini açık ve meşru kılabilecektir. Kamu yönetimi Blokzincir teknolojisinin hizmet süreçlerine nasıl dahil edebileceğine hızlıca odaklanmalıdır. Devletin daha etkin işleyişi amacına yönelik olarak, bu uyum süreciyse yalnızca nitelikli, iyi hazırlanmış bir kamu teşkilatıyla inşa edilebilecektir. Bu açıdan teşkilatlar yeni vizyonlarla kendilerini geliştirmeli, kamusal değer üretecek kamu yönetici ve memurları yetiştirmelidirler. Makale bu sava Blokzincirin nitelikleri, işleyişi, farklılıkları, avantajları, dezavantajları, akıllı sözleşmeleri, özel sektörde ve kamu idaresindeki kullanımının literatür araştırmasıyla birlikte Dünya örneklerini de değerlendirerek varmaktadır.

Blockchain’s Potential Impact on Public Administration

Public administration should adjust to the architecture of the Blockchain data convention, in which non governmental collective structures practice. With this adjustment, Blockchain would be able to render the process of enforcing the rules of public administration open and legitimate, provided that it observes democratic consensus. Public administration should focus swiftly on how to incorporate the Blockchain technology into service processes. The overall goal being to make government more efficient, this adaptation process need to be addressed with only a competent and well-prepared public structure. In this respect, organizations should equip themselves with new visions; they should train and educate public administrators and civil servants who will create public value. The article approaches to this argument by evaluating the quality, functioning, dissimilarities, advantages, disadvantages, smart contracts, and usage of the Blockchain in the private sector and public administration both literatür works and World wide cases.

___

  • Akkoyunlu E.A., K. Ekanadham ve R.V. Hubert (1975). Some Constraints and Tradeoffs in The Design of Network Communications, ACM SIGOPS Operating Systems Review, 9(5), 67-74, https://dl.acm.org/citation.cfm?id=806523#citedby (17.05.2018)
  • Antonopoulos, A. (2014). Bitcoin Security Model: Trust by Computation, https://medium. com/@aantonop/bitcoin-security-model-trust-by-computation-d5b93a37da6e (14.10. 2018)
  • Atzori M. (2017). Blockchain Technology and Decentralized Governance: is the State Still Necessary?. Journal of Governance and Regulation, 6(1), 45-62, http://dx.doi. org/10.22495/jgr_v6_i1_p5 (10.02.2018)
  • Augur (2019). Define: Augur Protocol, https://www.augur.net/faq/#define-augur-protocol (31.08.2018)
  • Baran, P. (1964). On Distributed Communications, Memorandum RM-3420-PR, California: RAND Corporation, https://www.rand.org/content/dam/rand/pubs/research_memoranda/2006/RM3420.pdf (11.10.2018)
  • Bauerle, N. (2018). What is the Difference Between a Blockchain and a Database?, https://www.coindesk.com/information/what-is-the-difference-blockchain-and-database (13.12.2018)
  • Beck, R., C. Müller-Bloch ve J.L. King (2018). Governance in the Blockchain Economy, Journal of the Association for Information Systems, 19(10), 1020-1034, https://aisel. aisnet.org/jais/vol19/iss10/1/ (03.01.2019)
  • Belin, O. (2018). The Difference Between Blockchain & Distributed Ledger Technology, https://tradeix.com/distributed-ledger-technology/ (10.02.2019)
  • Berryhill, J., T. Bourgery ve A. Hanson (2018). Blockchains Unchained: Blockchain Technology and its Use in the Public Sector, OECD Working Papers on Public Governance 28, https://www.oecd-ilibrary.org/governance/blockchains-unchained_3c32c429-en (23.06.2019)
  • Blockchain.com (2019). Charts. https://www.blockchain.com/charts (21.07.2019)
  • Blokchain Technology in Publıc Service Presentation Accenture (2016). Accenture Debuts Prototype of ‘Editable’ Blockchain for Enterprise and Permissioned Systems, https://newsroom.accenture.com/news/accenture-debuts-prototype-of-editable-blockchain-for-enterprise-and-permissioned-systems.htm (10.05.2019)
  • Bower, J.L. ve C.M. Christensen (1995). Disruptive Technologies: Catching the Wave, Harvard Business Review, 73(1): 43–53, https://hbsp.harvard.edu/ (17.12.2018)
  • Bruns, A. (2008). Blogs, Wikipedia, Second Life, and Beyond: from Production to Produsage, New York: Peter Lang Inc. Cointelegraph (2019). WEF Head of Blockchain Sheila Warren This Tech Can Solve the Trust Crisis, https://cointelegraph.com/news/wef-head-of-blockchain-sheila-warren-thistech-can-solve-the-trust-crisis (01.04.2019)
  • De Vries, A. (2018). Bitcoin’s Growing Energy Problem, Joule, 2(5), 801-805, https:// www.cell.com/action/showPdf?pii=S2542-4351%2818%2930177-6 (15.05.2019)
  • DeFilippi, P. ve G. McMullen (2018). Governance of Blockchain Systems. Blockchain Research Institute and COALA, https://hal.archives-ouvertes.fr/hal-02046787/document (02.03.2019)
  • Deloitte (2018). 2018 Global Blockchain Survey, https://www2.deloitte.com/tr/tr/pages/ financial-services/articles/2018-global-blockchain-survey.html (21.02.2019)
  • Derbil, S. (1950). Kamu Hizmeti Nedir? Ankara Üniversitesi Hukuk Fakültesi Dergisi, 7(3), 29–36, http://dergiler.ankara.edu.tr/dergiler/38/248/2245.pdf (21.06.2019)
  • Digiconomist (2019). Bitcoin Energy Consumption Index, https://digiconomist.net/bitcoin-energy-consumption (12.01.2019)
  • Durukal, O. ve N.K. Öztürk (2019). Kamusal Hizmet Sunumunda Blokchain Teknolojisi, EKEV Akademi Dergisi, 23(77), 449-456, http://www.ekevakademi.org/DergiDosyalar/332571370_00%20KUNYE%20(77).pdf, (14.11.2019)
  • Dwork, C. ve M. Naor (1992). Pricing via processing or combatting junk mail, Advances in Cryptology – CRYPTO’92, 139–147https://dl.acm.org/citation.cfm?id=705669 (21.01.2019)
  • E-Estonia (2016). Guardtime Secures Estonian Health Records, https://e-estonia.com/ guardtime-secures-estonian-health-records/ (03.06.2019)
  • Everledger (2019). Industry Applications, https://www.everledger.io/industry-applications (31.08.2019)
  • Forbes (2017). Dubai Sets Its Sights on Becoming the World’s First Blockchain-Powered Government. https://www.forbes.com/sites/suparnadutt/2017/12/18/dubai-setssights-on-becoming-the-worlds-first-blockchain-powered-government/#18d9a27a454b (22.12.2018)
  • Future Thinkers (2017). 19 Industries The Blockchain Will Disrupt, https://futurethinkers. org/industries-blockchain-disrupt/ (15.05.2019)
  • Georgian Prime Minister’s Press Office (2019). “Mamuka Bakhtadze: Plots Registered under Land Registration Reform Make up over 300,000 Hectares”, http://gov.ge/index. php?lang_id=ENG&sec_id=526&info_id=70040 (10.07.2019)
  • Gupta, M. (2017). Blockchain-IBM Limited Edition, New Jersey: John Wiley & Sons, Inc., https://www.ibm.com/tr-tr/blockchain/what-is-blockchain (03.02.2019)
  • Guthrie, W.K.C. (2011). Yunan Felsefe Tarihi-I, İstanbul: Kabalcı
  • Güven, V. ve E. Şahinöz (2018). Blokzincir, Kripto Paralar, Bitcoin, (2. Baskı). İstanbul: Kronik
  • HM Land Registry (2019). “HM Land Registry to Explore the Benefits of Blockchain”, https://www.gov.uk/government/news/hm-land-registry-to-explore-the-benefits-ofblockchain, (10.07.2019)
  • Houben, R. ve A. Snyers (2018). Cryptocurrencies and Blockchain, EU Publications, http://www.europarl.europa.eu/cmsdata/150761/TAX3%20Study%20on%20cryptocurrencies%20and%20blockchain.pdf (27.02.2019)
  • IBM (2018). Blockchain and GDPR (White Paper), https://iapp.org/media/pdf/resource_ center/blockchain_and_gdpr.pdf (20.04.2019)
  • Jakobsson, M. ve A. Juels (1999). Proofs of Work and Bread Pudding Protocols (Extended Abstract), Preneel B. (eds) Secure Information Networks. The International Federation for Information Processing, Vol: 23. Boston: Springer, 258-272, https://link.springer. com/chapter/10.1007/978-0-387-35568-9_18#citeas (20.10.2018)
  • Kar, I. (2016). The Latest Customers for the Technology Behind Bitcoin are NATO and the U.S. Military, Quartz, https://qz.com/681580/the-latest-customers-for-the-technology-behind-bitcoin-are-nato-and-the-us-military/ (21.03.2018)
  • Karahan, Ç. ve A. Tüfekçi (2019). Blokzincir Teknolojisi ve Kamu Kurumlarınca Verilen Hizmetlerde Blokzincirin Kullanım Durumu. Verimlilik Dergisi, (4), 157-193, https://dergipark.org.tr/tr/pub/verimlilik/issue/49238/444617 (14.11.2019)
  • Kerr, Z. (2018). It Only Costs $531 to Mine One BTC if You Live in Venezuela: Bitcoin Mining Around the World. https://mineable.com/it-only-costs-531-to-mine-one-btc-ifyou-live-in-venezuela-bitcoin-mining-around-the-world/ (27.01.2019)
  • Lamport, L., R. Shostak and M. Pease (1982). The Byzantine Generals Problem, ACM TOPLAS, 4(3), 382-401, https://people.eecs.berkeley.edu/~luca/cs174/byzantine.pdf (12.10. 2018)
  • Lantmateriet (2018). “Block chain tested live-can save billions for home buyers and mortgage customers”, https://www.lantmateriet.se/en/nyheter-och-press/nyheter/2018/ blockkedjan-testad-live--kan-spara-miljarder-at-bostadskopare-och-bolanekunder/ (10.07.2019)
  • Lemieux, V., D. Flores, ve C. Lacombe (2017). “Title and code: Real Estate Transaction Recording in the Blockchain in Brazil”, https://www.researchgate.net/ publication/322665512_Title_and_code_Real_Estate_Transaction_Recording_ in_the_Blockchain_in_Brazil_RCPLAC-01-Case_Study_1_Document_Control_Version_history_Version_Date_By_Version_notes (10.07.2019)
  • Lessig, L. (2000). Code is Law: On Liberty in Cyberspace, Harvard Magazine, https:// harvardmagazine.com/2000/01/code-is-law-html (12.10. 2018)
  • Lightning Network (2019). The Bitcoin Lightning Network, https://lightning.network/ lightning-network-summary.pdf (13.02.2019)
  • Lyons, T., L. Courcelas ve K. Timsit (2018). Blockchain for Government and Public Services, The EU Blockchain Observatory & Forum Publication, https://dutchblockchaincoalition.org/uploads/pdf/eu-observatory-blockchain-in-government-services.pdf (24.02.2019)
  • Malone, T.W. (2004). The Future of Work How the New Order of Business Will Shape Your Organization, Your Management Style, and Your Life. Boston: Harvard Business School
  • Nakamoto, S. (2008). Bitcoin a Peer-to-Peer Electronic Cash System, https://bitcoin.org/ bitcoin.pdf (10.12.2018)
  • Narayanan, A. ve J. Clark (2017). Bitcoin’s Academic Pedigree, Queue, 15(4) 36-45, https://dl.acm.org/citation.cfm?id=3136559 (17.12. 2018)
  • Narayanan, A., J. Bonneau, E. Felten, A. Miller ve S. Goldfeder (2016). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction, New Jersey: Princeton University
  • Nomura Research Institute (2019). “Survey on Blockchain Technologies and Related Services FY2015 Report”, Tokyo: Japan’s Ministry of Economy, https://www.meti.go.jp/ english/press/2016/pdf/0531_01f.pdf, (10.07.2019)
  • Ølnes S. ve A. Jansen (2017). Blockchain Technology as Support Infrastructure in e-Government, Janssen M. et al. (eds) Electronic Government, EGOV 2017 Lecture Notes in Computer Science, Vol: 10428, Switzerland: Cham, Springer, 215-227, http://link.springer.com/10.1007/978-3-319-64677-0_18 (07.08.2018)
  • OpenBazaar (2016). What is OpenBazaar? https://openbazaar.zendesk.com/hc/en-us/articles/208020193-What-is-OpenBazaar- (23.12.2018)
  • Oprunenco A. ve C. Akmeemana (2019). “Using Blockchain to Make Land Registry More Reliable in India” https://blogs.lse.ac.uk/businessreview/2018/04/13/using-blockchain-to-make-land-registry-more-reliable-in-india/ (10.07.2019)
  • Provenance (2016). From Shore to Plate: Tracking Tuna on the Blockchain, https://www. provenance.org/tracking-tuna-on-the-blockchain (03.02.2019)
  • Ramathal, N. V. ve K. B. Greene (2019). Hardware Blockchain Corrective Consensus Operating Procedure Enforcement, U.S. Patent No: 10291413, http://patft.uspto.gov/netahtml/PTO/srchnum.htm (20.04.2019)
  • Rosreestr (2018). “Pilot Project For Registering D.D.U.”, https://rosreestr.ru/site/press/ news/rosreestr-predstavil-na-vsemirnom-sammite-blokcheyna-i-kriptovalyut-pilotnyy-proekt-po-registratsii-/?sphrase_id=15809286 (10.07.2019)
  • Safahi, A. (2018). ZED Global Platform for Money Transfer Operators (MTOs). Toronto: ZED Network Inc., https://assets.ctfassets.net/xwo28v1qbyr0/1kHadIdBOY6UOSku8Ag80Y/476b77be54b9d28405bf0fadf8ac0a36/ZED_Investor_Presentation_-_Final.pdf (21.09.2018)
  • Symantec, (2018). Smartphone, Blockchain Voting Technologies to Get Big Test This Fall, https://www.symantec.com/blogs/election-security/smartphone-blockchain-votingtechnologies-get-big-test-fall (17.12.2018)
  • Szabo, N. (1994). Smart Contracts, http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart.contracts.html (12.12.2018)
  • Tapscott, D. ve A.D. Williams (2006). Wikinomics: How Mass Collaboration Changes Everything, New York: Portfolio.
  • Tecnopedia (2019a). Definition: What Does Node Mean?, https://www.techopedia.com/ definition/5307/node (15.05.2019)
  • Tecnopedia (2019b). Definition: What Does BotNet Mean?, https://www.techopedia.com/ definition/384/botnet (11.04.2019)
  • Transparencia Mexicana (2011). Indice Nacional deCorrupción y Buen Gobierno 2010, Mexico City, https://www.tm.org.mx/wp-content/uploads/2013/05/01-INCBG-2010-Informe-Ejecutivo1.pdf (01.05.2019)
  • Transparency International (TI) (2011). Corruption in the Land Sector (Working paper 04/2011), www.fao.org/docrep/014 /am943e/am943e00.pdf (01.05.2019)
  • Transparency International (TI) Bangladesh (2012). Corruption in Service Sectors: National Household Survey 2012, https://www.ti-bangladesh.org/files/HHSurvey-ExecSum-Eng-fin.pdf (01.05.2019)
  • Transparency International (TI) India (2005). TII-CMS India Corruption Study 2005: With Focus on BPL Households, www.transparencyindia.org/resource/survey_study/India%20 Corruption%20Study%202005.pdf (01.05.2019)
  • Transparency International (TI) Kenya (2011). East African Bribery Index 2011, https:// tikenya.org/wp-content/uploads/2017/08/TI-Kenya_East-African-Bribery-Index-2011. pdf (01.05.2019)
  • Ujo Music (2018). Frequently Asked Questions, https://www.ujomusic.com/faq (23.12.2018)
  • Usta A. ve Doğantekin S., (2017). Blockchain 101, İstanbul: Kapital Medya
  • Warner, M. (2018). General Election: A Huge Success for West Virginia, https://sos. wv.gov/news/Pages/11-15-2018-A.aspx (17.12.2018)
  • World Bank (2018). Identification for Development (ID4D)-2018 (Annual Report), https://id4d.worldbank.org/sites/id4d.worldbank.org/files/2018_ID4D_Annual_Report. pdf (30.01.2019)
  • World Economic Forum (WEF) (2018). Building Block(chain)s for a Better Planet, http:// www3.weforum.org/docs/WEF_Building-Blockchains.pdf (12.01.2019)
  • Yıldırım, H. (2018). Açık ve Uzaktan Öğrenmede Blokzincir Teknolojisinin Kullanımı. Açıköğretim Uygulamaları ve Araştırmaları Dergisi, 4(3), 142-153
  • Merkle, R. C. (1980). Protocols for public key cryptosystems. IEEE Symposium on Security and Privacy, http://www.merkle.com/papers/Protocols.pdf
  • Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2): 84-90. https://dl.acm.org/citation.cfm?id=358563
  • Chaum, D. (1983). Blind signatures for untraceable payments. Advances in Cryptology, 199-203. https://sceweb.sce.uhcl.edu/yang/teaching/csci5234WebSecurityFall2011/Chaum-blind-signatures.PDF
  • Chaum, D. (1985). Security without identification: transaction systems to make Big Brother obsolete. Communications of the ACM 28(10), 1030-1044. https://dl.acm.org/citation. cfm?id=4373
  • Lamport, L. (1989). The part-time parliament. (Report), Digital Equipment Corporation. https://computerarchive.org/files/mirror/www.bitsavers.org/pdf/dec/tech_reports/SRCRR-49.pdf
  • Bayer, D., Haber, S., Stornetta, W. S. (1991). Improving the efficiency and reliability of digital time-stamping. Proceedings of Sequences. https://link.springer.com/chapter/10.1007/978-1-4613-9323-8_24
  • Haber, S., Stornetta, W. S. (1991). How to Time-Stamp a Digital Document, Journal of Cryptology, 3(2), 99-112. https://www.anf.es/pdf/Haber_Stornetta.pdf
  • Benaloh, J., De Mare, M. (1991). Efficient broadcast time-stamping. http://citeseerx.ist. psu.edu/viewdoc/summary?doi=10.1.1.38.9199
  • Dwork, C., Naor, M. (1992). Pricing via processing or combatting junk mail. https:// dl.acm.org/citation.cfm?id=705669
  • Szabo, N. (1994). Smart contracts. http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart.contracts.html
  • Rivest, R. L., Shamir, A. (1996). PayWord and MicroMint: Two simple micropayment schemes. International Workshop on Security Protocols. https://people.csail.mit.edu/rivest/ RivestShamir-mpay.pdf
  • Back, A. (1997). Apartial hash collision based postage scheme. http://www.hashcash. org/papers/announce.txt
  • Haber, S., Stornetta, W. S. (1997). Secure names for bit-strings. Proceedings of the 4th ACM Conference on Computer and Communications Security: 28-35. http://dl.acm.org/ citation.cfm?id=266430
  • Dai, W. (1998). B-Money. http://www.weidai.com/bmoney.txt
  • Castro, M., Liskov, B. (1999). PracticalByzantinefault tolerance. Proceedings of the Third Symposium on Operating Systems Design and Implementation. http://pmg.csail. mit.edu/papers/osdi99.pdf
  • Juels, A., Brainard, J. (1999). Client puzzles: a cryptographic counter measure against connection completion attacks. Proceedings of Networks and Distributed Security Systems: 151-165. https://www.isoc.org/isoc/conferences/dss/99/proceedings/papers/juels. pdf
  • Goldberg, I. (2000). A pseudonymous communications infrastructure for the Internet (Ph.D. Dissertation), University of California Berkeley. http://moria.freehaven.net/anonbib/cache/ian-thesis.pdf
  • Lamport, L. (2001). Paxos made simple; http://lamport.azurewebsites.net/pubs/ paxos-simple.pdf
  • Douceur, J. R. (2002). the Sybil attack. https://dl.acm.org/citation.cfm?id=687813
  • Aspnes, J., Jackson, C., Krishnamurthy, A. (2005). Exposing computationally challenged Byzantine imposters (Report). Yale University, http://cs.yale.edu/publications/techreports/tr1332.pdf
  • Szabo, N. (2008). Bit gold. https://unenumerated.blogspot.com/2005/12/bit-gold.html
  • Nakamoto, S. (2008). Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/ bitcoin.pdf
  • Blankstein, A., Bonneau, J., Felten, E. W., Freedman, M. J. (2015). CONIKS: Bringing key transparency to end users. Proceedings of the 24th Usenix Security Symposium. https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf