{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T00:15:54Z","timestamp":1774311354485,"version":"3.50.1"},"reference-count":49,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JICES"],"published-print":{"date-parts":[[2020,6,10]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This paper aims to look at shifts in internet-related content and services economies, from audience labour economies to Web 2.0 user-generated content, and the emerging model of user computing power utilisation, powered by blockchain technologies. The authors look at and test three models of user computing power utilisation based on distributed computing (Coinhive, Cryptotab and Gridcoin) two of which use cryptocurrency mining through distributed pool mining techniques, while the third is based on distributed computing of calculations for scientific research. The three models promise benefits to their users, which the authors discuss throughout the paper, studying how they interplay with the three levels of the digital divide.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The goal of this article is twofold as follows: first to discuss how using the mining hype may reduce digital inequalities, and secondly to demonstrate how these services offer a new business model based on value rewarding in exchange for computational power, which would allow more online opportunities for people, and thus reduce digital inequalities. Finally, this contribution discusses and proposes a method for a fair revenue model for content and online service providers that uses user device computing resources or computational power, rather than their data and attention. The method is represented by a model that allows for consensual use of user computing resources in exchange for accessing content and using software tools and services, acting essentially as an alternative online business model.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Allowing users to convert their devices\u2019 computational power into value, whether through access to services or content or receiving cryptocurrency and payments in return for providing services or content or direct computational powers, contributes to bridging digital divides, even at fairly small levels. Secondly, the advent of blockchain technologies is shifting power relations between end-users and content developers and service providers and is a necessity for the decentralisation of internet and internet services.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The article studies the effect of services that rely on distributed computing and mining on digital inequalities, by looking at three different case studies \u2013 Coinhive, Gridcoin and Cryptotab \u2013 that promise to provide value in return for using computing resources. The article discusses how these services may reduce digital inequalities by affecting the three levels of the digital divide, namely, access to information and communication technologies (ICTs) (first level), skills and motivations in using ICTs (second level) and capacities in using ICTs to get concrete benefits (third level).<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/jices-02-2020-0018","type":"journal-article","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T10:42:38Z","timestamp":1591699358000},"page":"339-355","source":"Crossref","is-referenced-by-count":2,"title":["Distributed pool mining and digital inequalities, From cryptocurrency to scientific research"],"prefix":"10.1108","volume":"18","author":[{"given":"Hanna M.","family":"Kreitem","sequence":"first","affiliation":[]},{"given":"Massimo","family":"Ragnedda","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020080406594447000_ref001","first-page":"71","article-title":"Exploitation in the data mine","volume-title":"Internet and Surveillance: The Challenges of Web 2.0 and Social Media","year":"2012"},{"issue":"3","key":"key2020080406594447000_ref002","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2695533.2695545","article-title":"Proof of activity: extending bitcoin\u2019s proof of work via proof of stake [extended abstract]","volume":"42","year":"2014","journal-title":"Sigmetrics Performance Evaluation Review"},{"key":"key2020080406594447000_ref003","unstructured":"Berners-Lee, T. (2017), \u201cThree challenges for the web, according to its inventor\u201d, available at: https:\/\/webfoundation.org\/2017\/03\/web-turns-28-letter\/ (accessed 16 March 2020)."},{"key":"key2020080406594447000_ref004","article-title":"The attention economy: measuring the value of free digital services on the internet","volume-title":"ICIS 2012 Proceedings","year":"2012"},{"issue":"1","key":"key2020080406594447000_ref005","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2019.2920585","article-title":"You could be mine(d): the rise of cryptojacking","volume":"1","year":"2019","journal-title":"IEEE Security Privacy"},{"key":"key2020080406594447000_ref006","volume-title":"The Network Society: A Cross-Cultural Perspective","year":"2004"},{"key":"key2020080406594447000_ref007","article-title":"Firefox working on protection against in-browser cryptojacking scripts","year":"2018","journal-title":"bleepingcomputer"},{"issue":"3","key":"key2020080406594447000_ref008","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1080\/13600860701701421","article-title":"Privacy issues in mobile advertising, international review of law","volume":"21","year":"2007","journal-title":"Computers and Technology"},{"issue":"3","key":"key2020080406594447000_ref009","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1057\/palgrave.dddmp.4350098","article-title":"Web 2.0: conceptual foundations and marketing issues","volume":"9","year":"2008","journal-title":"Journal of Direct, Data and Digital Marketing Practice"},{"key":"key2020080406594447000_ref010","unstructured":"DiMaggio, P. and Hargittai, E. (2001), \u201cFrom the \u2018digital divide\u2019 to digital inequality\u2019: studying internet use as penetration increases\u201d, working paper 15, Princeton Center for Arts and Cultural Policy Studies, available at: https:\/\/pdfs.semanticscholar.org\/4843\/610b79d670136e3cdd12311f91f5cc98d2ee.pdf (accessed 30 March 2020)."},{"key":"key2020080406594447000_ref011","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/eurospw.2018.00014","article-title":"A first look at browser-based cryptojacking","volume-title":"2018 IEEE European Symposium on Security and Privacy Workshops (euros pw)","year":"2018"},{"key":"key2020080406594447000_ref012","article-title":"Your torrent client may be mining bitcoin without telling you","year":"2015","journal-title":"Gizmodo"},{"key":"key2020080406594447000_ref013","article-title":"App developer settles FTC and New jersey charges it hijacked consumers\u2019 phones to mine cryptocurrency","author":"FTC","year":"2015","journal-title":"Press Release"},{"key":"key2020080406594447000_ref014","volume-title":"Television and New Media: must-Click tv","year":"2010"},{"issue":"4","key":"key2020080406594447000_ref015","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1111\/j.1468-2885.2012.01416.x","article-title":"A corresponding fields model for the links between social and digital exclusion","volume":"22","year":"2012","journal-title":"Communication Theory"},{"issue":"1","key":"key2020080406594447000_ref016","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","article-title":"Users of the world, unite! the challenges and opportunities of social media","volume":"53","year":"2010","journal-title":"Business Horizons"},{"issue":"1","key":"key2020080406594447000_ref017","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.tele.2014.02.001","article-title":"A new dimension of the digital divide: exploring the relationship between broadband connection, smartphone use and communication competence","volume":"32","year":"2015","journal-title":"Telematics and Informatics"},{"key":"key2020080406594447000_ref018","unstructured":"Lestoc, C. (2018), \u201cUpcoming firefox update blocks in-browser cryptojackers\u201d, windows report \u2013 windows 10 and Microsoft news, how-to tips, available at: https:\/\/windowsreport.com\/firefox-cryptojacking-protection\/ (accessed 14 March 2020)."},{"key":"key2020080406594447000_ref019","volume-title":"Surveillance after September 11","year":"2003"},{"issue":"3","key":"key2020080406594447000_ref020","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1177\/0011392102050003007","article-title":"From digital divides to digital entitlements in knowledge societies","volume":"50","year":"2002","journal-title":"Current Sociology"},{"issue":"4","key":"key2020080406594447000_ref021","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1177\/2057047316679418","article-title":"On the transactional ecosystems of digital media","volume":"1","year":"2016","journal-title":"Communication and the Public"},{"key":"key2020080406594447000_ref022","volume-title":"Invention of Communication","year":"1996"},{"key":"key2020080406594447000_ref023","article-title":"Your browser could be mining cryptocurrency for a stranger","year":"2017","journal-title":"Wired"},{"issue":"2","key":"key2020080406594447000_ref024","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1080\/10641734.2014.899529","article-title":"Legal and ethical challenges of online behavioral targeting in advertising","volume":"35","year":"2014","journal-title":"Journal of Current Issues and Research in Advertising"},{"issue":"1","key":"key2020080406594447000_ref025","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1177\/1464884917719145","article-title":"The business of news in the attention economy: audience labor and MediaNews group\u2019s efforts to capitalize on news consumption","volume":"21","year":"2020","journal-title":"Journalism"},{"key":"key2020080406594447000_ref026","volume-title":"Digital Divide: civic Engagement, Information Poverty, and the Internet Worldwide","year":"2001"},{"key":"key2020080406594447000_ref027","unstructured":"O\u2019reilly, T. (2005), \u201cWhat is web 2.0\u201d, available at: https:\/\/oreilly.com (accessed 16 March 2020)."},{"issue":"3","key":"key2020080406594447000_ref028","first-page":"172","article-title":"Text advertising blindness: the new banner blindness?","volume":"6","year":"2011","journal-title":"Journal of Usability Studies"},{"issue":"4","key":"key2020080406594447000_ref029","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1111\/jcom.12045","article-title":"Digital divides from access to activities: comparing mobile and personal computer internet users","volume":"63","year":"2013","journal-title":"Journal of Communication"},{"issue":"6","key":"key2020080406594447000_ref030","first-page":"180","article-title":"Social control and surveillance in the society of consumers","volume":"3","year":"2011","journal-title":"International Journal of Sociology and Anthropology"},{"key":"key2020080406594447000_ref031","volume-title":"The Third Digital Divide: A Weberian Approach to Digital Inequalities","year":"2017"},{"key":"key2020080406594447000_ref032","volume-title":"Blockchain and Web 3.0: social, Economic, and Technological Challenges","year":"2019"},{"key":"key2020080406594447000_ref033","article-title":"Digital capital","volume-title":"A Bourdieusian Approach to Digital Divide","year":"2020"},{"key":"key2020080406594447000_ref034","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819869604","article-title":"Measuring digital capital: an empirical investigation","year":"2019","journal-title":"New Media and Society"},{"issue":"2","key":"key2020080406594447000_ref035","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/s0024-6301(96)00109-4","article-title":"Consumer strategies for the internet: four scenarios","volume":"30","year":"1997","journal-title":"Long Range Planning"},{"key":"key2020080406594447000_ref036","volume-title":"Diffusion of Innovations","year":"2003","edition":"5th edition"},{"key":"key2020080406594447000_ref037","unstructured":"Salon (2017), \u201cSalon.com | news, politics, business, technology and culture main page\u201d, available at: www.salon.com\/about\/faq-what-happens-when-i-choose-to-suppress-ads-on-salon\/ (accessed 16 March 2020)."},{"key":"key2020080406594447000_ref038","volume-title":"Mass Communications and American Empire","year":"1969"},{"issue":"3","key":"key2020080406594447000_ref039","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1177\/1461444804042519","article-title":"Reconsidering political and popular understandings of the digital divide","volume":"6","year":"2004","journal-title":"New Media and Society"},{"key":"key2020080406594447000_ref040","volume-title":"Dependency Road: communications, Capitalism, Consciousness, and Canada. Norwood","year":"1981"},{"key":"key2020080406594447000_ref041","unstructured":"Symantec (2018), \u201cInternet security threat report\u201d, Report number 23, Symantec, available at: https:\/\/resource.elq.symantec.com\/lp=5840?Cid=70138000000rm1eaaa (accessed 16 March 2020)."},{"key":"key2020080406594447000_ref042","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1108\/S2050-206020150000010002","article-title":"The third level digital divide: who benefits most from being online","volume-title":"Communication and Information Technologies Annual","year":"2015"},{"issue":"3","key":"key2020080406594447000_ref043","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1177\/1461444813487959","article-title":"The digital divide shifts to differences in usage","volume":"16","year":"2013","journal-title":"New Media and Society"},{"issue":"5","key":"key2020080406594447000_ref044","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1080\/01972243.2015.1069770","article-title":"Toward a multifaceted model of internet access for understanding digital divides: an empirical investigation","volume":"31","year":"2015","journal-title":"The Information Society"},{"key":"key2020080406594447000_ref045","volume-title":"The Deepening Divide: inequality in the Information Society","year":"2005"},{"key":"key2020080406594447000_ref046","unstructured":"Venskutonis, S, Hao, F. and Collison, M. (2019), \u201cOn legitimate mining of cryptocurrency in the browser \u2013 a feasibility study\u201d, in Arxiv:1812.04054 [cs], available at: http:\/\/arxiv.org\/abs\/1812.04054"},{"issue":"3","key":"key2020080406594447000_ref047","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.telpol.2010.12.013","article-title":"Assessing the regional digital divide across the European union-27","volume":"35","year":"2011","journal-title":"Telecommunications Policy"},{"issue":"2","key":"key2020080406594447000_ref048","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.lrp.2010.01.005","article-title":"Strategic development of business models: implications of the web 2.0 for creating value on the internet, long range planning","volume":"43","year":"2010","journal-title":"Business Models"},{"issue":"7\/8","key":"key2020080406594447000_ref049","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1108\/03090569810224074","article-title":"The relationship between advertising and content provision on the internet","volume":"32","year":"1998","journal-title":"European Journal of Marketing"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-02-2020-0018\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-02-2020-0018\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:38:11Z","timestamp":1753393091000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/18\/3\/339-355\/434721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6,10]]}},"alternative-id":["10.1108\/JICES-02-2020-0018"],"URL":"https:\/\/doi.org\/10.1108\/jices-02-2020-0018","relation":{},"ISSN":["1477-996X","1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"},{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2020,6,10]]}}}