References

  • Abbasi, A.; Albrecht, C.; Vance, A.; and Hansen, J. Metafraud: A meta-learning framework for detecting financial fraud. MIS Quarterly, 36, 4 (2012), 1293–1327.
  • Abbasi, A.; Chen, H.; and Nunamaker, J.F. Stylometric identification in electronic markets: Scalability and robustness. Journal of Management Information Systems, 25, 1 (2008), 49–78.
  • Abbasi, A.; Zahedi, F.M.; Zeng, D.; Chen, Y.; Chen, H.; and Nunamaker Jr, J.F. Enhancing predictive analytics for anti-phishing by exploiting website genre information. Journal of Management Information Systems, 31, 4 (2015), 109–157.
  • Abbasi, A.; Zhang, Z.; Zimbra, D.; Chen, H.; and Nunamaker Jr, J.F. Detecting fake websites: The contribution of statistical learning theory. MIS Quarterly, 34, 3 (2010), 435–461.
  • Ajello, N.J. Fitting a square peg in a round hole: Bitcoin, money laundering, and the fifth amendment privilege against self-incrimination. Brooklyn Law Review, 80, 2 (2014), 435–461.
  • Ali, S.T.; Clarke, D.; and McCorry, P. Bitcoin: Perils of an unregulated global p2p currency. In B. Christianson, P. Švenda, V. Matyáš, J. Malcolm, F. Stajano, and J. Anderson (eds.), Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science, vol. 9379. Cham: Springer, 2015.
  • Androulaki, E.; Karame, G.O.; Roeschlin, M.; Scherer, T.; and Capkun, S. Evaluating user privacy in Bitcoin. In A.R. Sadeghi (ed.), Financial Cryptography and Data Security. FC 2013. Lecture Notes in Computer Science, vol. 7859. Berlin: Springer, 2013.
  • Aral, S.; Dellarocas, C.; and Godes, D. Introduction to the special issue-social media and business transformation: A framework for research. Information Systems Research, 24, 1 (2013), 3–13.
  • Arruñada, B. Blockchain’s struggle to deliver impersonal exchange. Minnesota Journal of Law, Science & Technology, 19, 1 (2018), 55–105.
  • Atzori, M. (2016). Blockchain technology and decentralized governance: Is the state still necessary? Social Science Research Network Working Paper Series, 2015. https://doi.org/http://dx.doi.org/10.2139/ssrn.2709713
  • Ba, S.; Stallaert, J.; Whinston, A.B.; and Zhang, H. Choice of transaction channels: The effects of product characteristics on market evolution. Journal of Management Information Systems, 21, 4 (2005), 173–197.
  • Back, A. Hashcash-a denial of service counter-measure, 2002. http://www.hashcash. org/papers/hashcash.pdf. (accessed on January 24, 2019)
  • Baesens, B. Analytics in a Big Data World: The Essential Guide to Data Science and its Applications. Hoboken: John Wiley & Sons, 2014.
  • Barber, S.; Boyen, X.; Shi, E.; and Uzun, E. Bitter to better — How to make Bitcoin a better currency. In A.D. Keromytis (ed.), Financial Cryptography and Data Security. FC 2012. Lecture Notes in Computer Science, vol. 7397. Berlin: Springer, 2012.
  • Beck, R. Beyond bitcoin: The rise of blockchain world. Computer, 51, 2 (2018), 54–58.
  • Beck, R.; Czepluch, J.S.; Lollike, N.; and Malone, S. Blockchain-the gateway to trust-free cryptographic transactions. In Proceedings of ECIS, ResearchPaper153. İstanbul,Turkey: Springer Publishing Company, 2016, pp. 1–14.
  • Beck, R.; Müller-Bloch, C.; and King, J.L. Governance in the blockchain economy: A framework and research agenda. Journal of the Association for Information Systems, 19, 10 (2018), pp. 1020–1034.
  • Benjamin, V.; Zhang, B.; Nunamaker Jr, J.F.; and Chen, H. Examining hacker participation length in cybercriminal internet-relay-chat communities. Journal of Management Information Systems, 33, 2 (2016), 482–510.
  • Bergstra, J.; and Bengio, Y. Random search for hyper-parameter optimization. Journal of Machine Learning Research, 13, Feb (2012), 281–305.
  • Bitcoin.org. Protect your privacy. 2018. https://bitcoin.org/en/protect-your-privacy. (accessed on January 24, 2019)
  • BitFury Group. On blockchain auditability. 2016. http://bitfury. com/content/5-white-papers-research/bitfury_white_paper_on_blockchain_ auditability.pdf. (accessed on January 24, 2019)
  • BitFury Group. Proof of stake versus proof of work. 2015. http://bitfury.com/content/5-white-papers-research/pos-vs-pow-1.0.2.pdf. (accessed on January 24, 2019)
  • Blundell-Wignall, A. The bitcoin question: Currency versus trust-less transfer technology. OECD Working Papers on Finance, Insurance and Private Pensions, 37, 1 (2014), pp. 1–21.
  • Böhme, R.; Christin, N.; Edelman, B.; and Moore, T. Bitcoin: Economics, technology, and governance. The Journal of Economic Perspectives, 29, 2 (2015), 213–238.
  • Bonneau, J.; Narayanan, A.; Miller, A.; Clark, J.; Kroll, J.A.; and Felten, E.W. Mixcoin: anonymity for Bitcoin with accountable mixes. In N. Christin, and R. Safavi-Naini (eds.), Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science, vol. 8437. Berlin: Springer, 2014.
  • Brazier, F.; Oskamp, A.; Prins, C.; Schellekens, M.; and Wijngaards, N. Anonymity and software agents: An interdisciplinary challenge. Artificial Intelligence and Law, 12, 1–2 (2004), 37–157.
  • Bryans, D. Bitcoin and money laundering: Mining for an effective solution. Indiana Law Journal, 89, 1 (2014), 441–472.
  • Chainanalysis. Protecting the Integrity of Digital Assets, 2017. https://www.chainalysis. com/. (accessed on January 24, 2019)
  • Chainanalysis. The Changing Nature of Cryptocrime, 2018. https://www.chainalysis.com/static/Cryptocrime_Report_V2.pdf. (accessed on January 24, 2019)
  • Chawla, N.V.; Bowyer, K.W.; Hall, L.O.; and Kegelmeyer, W.P. Smote: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research, 16(2002), 321–357.
  • Chen, P., Jiang, B., and Wang, C. Blockchain-based payment collection supervision system using pervasive Bitcoin digital wallet. In Proceedings of the IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Rome, (2017), 139–146. doi:https://doi.org/10.1109/WiMOB.2017.8115844
  • Christin, N. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22Nd International Conference on World Wide Web (WWW ’13), (2013), 213–224.
  • Christopher, C.M. The bridging model: Exploring the roles of trust and enforcement in banking, bitcoin, and the blockchain. Nevada Law Journal, 17(2016), 139–180.
  • CoinMarketCap. Cryptocurrency market capitalizations, 2018. https://coinmarketcap.com/. (accessed on January 24, 2019)
  • Colombo, R.J. Bitcoin: Hype or harbinger. Journal of International Business and Law, 16, 1 (2016),1–5. http://scholarlycommons.law.hofstra.edu/jibl/vol16/iss1/3. (accessed on January 24, 2019)
  • DeLong, J.B.; and Froomkin, A.M. Speculative microeconomics for tomorrow’s economy. In B. Kahin, and H. Varian (eds.), Internet Publishing and Beyond: The Economics of Digital Information and Intellectual Property. Cambridge: MIT Press, 2000, pp. 6–44.
  • Fleder, M.; Kester, M.S.; and Pillai, S. Bitcoin transaction graph analysis. arXiv preprint arXiv:1502.01657, 2015. https://arxiv.org/abs/1502.01657 (accessed on January 24, 2019)
  • Friedman, J.; Hastie, T.; and Tibshirani, R. The elements of statistical learning, vol. 1. Springer Series in Statistics. Berlin: Springer, 2001.
  • Friedman, J.H. Greedy function approximation: A gradient boosting machine. The Annals of Statistics, 29, 5 (2001), 1189–1232.
  • Froomkin, A.M. Anonymity and its enmities. Journal of Online Law, art. 4, (1995). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2715621. (accessed on January 24, 2019)
  • Froomkin, A.M. Flood control on the information ocean: Living with anonymity, digital cash, and distributed databases. Journal of Law and Commerce, 15 (1996), 395–507.
  • Froomkin, A.M. Legal issues in anonymity and pseudonymity. The Information Society, 15, 2 (1999), 113–127.
  • Froomkin, A. M. From anonymity to identification. Journal of Self-Regulation and Regulation, 1, (2015), 120–138.
  • Gabison, G. Policy considerations for the blockchain technology public and private applications. Science and Technology Law Review, 19, (2016), 327–350.
  • Geurts, P.; Ernst, D.; and Wehenkel, L. Extremely randomized trees. Machine learning, 63, 1 (2006), 3–42.
  • Glaser, F. Pervasive decentralisation of digital infrastructures: A framework for blockchain enabled system and use case analysis. In Proceedings of the 50th Hawaii International Conference on System Sciences. Honolulu: Hawaii International Conference on System Sciences (HICSS), 2017, pp. 1543–1552.
  • Glaser, F.; and Bezzenberger, L. Beyond cryptocurrencies - a taxonomy of decen- tralized consensus systems. In Proceedings of the 23rd European Conference on Information Systems (ECIS 2015). Atlanta: Association for Information Systems, 2015, pp. 1–18.
  • Glaser, F.; Zimmermann, K.; Haferkorn, M.; Weber, M.; and Siering, M. Bitcoin- asset or currency? Revealing users’ hidden intentions. In Twenty Second European Conference on Information Systems. Atlanta: Association for Information Systems, 2014, pp. 1–15.
  • Godsiff, P. Bitcoin: Bubble or blockchain. Agent and Multi-Agent Systems: Technologies and Applications, 38 (2015), 191–203.
  • Goldfeder, S.; Kalodner, H.; Reisman, D.; and Narayanan, A. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. arXiv preprint arXiv:1708.04748, (2017). https://arxiv.org/pdf/1708.04748.pdf. (accessed on January 24, 2019)
  • Guo, A. Blockchain receipts: Patentability and admissibility in court. Chicago-Kent Journal of Intellectual Property, 16, 2 (2017), 440–452.
  • Harlev, M.A.; Sun Yin, H.; Langenheldt, K.C.; Mukkamala, R.; and Vatrapu, R. Breaking bad: De-anonymising entity types on the bitcoin blockchain using supervised ma- chine learning. In Proceedings of the 51st Hawaii International Conference on System Sciences. Honolulu: Hawaii International Conference on System Sciences (HICSS),  2018, pp. 3497–3506.
  • Ho, T.K. The random subspace method for constructing decision forests. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20, 8 (1998), 832–844.
  • Hout, M.C.V.; and Bingham, T. Silk Road, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy, 24, 5 (2013), 385–391.
  • Hui, K.-L.; Kim, S.H.; and Wang, Q.-H. Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks. MIS Quarterly, 41, 2 (2017), 497–523.
  • Hyvärinen, H.; Risius, M.; and Friis, G. A blockchain-based approach towards overcoming financial fraud in public sector services. Business & Information Systems Engineering, 59, 6 (2017), 441–456.
  • Investinblockchain. Bitcoin estimated transaction volume usd. 32, (2018). https://www.investinblockchain.com/category/bitcoin/. (accessed on January 24, 2019)
  • James, G.; Witten, D.; Hastie, T.; and Tibshirani, R. An Introduction to Statistical Learning. New York: Springer, 2013.
  • Karlstrøm, H. Do libertarians dream of electric coins? the material embeddedness of bitcoin. Distinktion: Scandinavian Journal of Social Theory, 15,1(2014), 23–36.
  • Karwatzki, S.; Dytynko, O.; Trenz, M.; and Veit, D. Beyond the personalization– privacy paradox: Privacy valuation, transparency features, and service personalization. Journal of Management Information Systems, 34, 2 (2017), 369–400.
  • Kennedy, P. A Guide to Econometrics. Cambridge: MIT Press, 2003.
  • Kiviat, T.I. Beyond bitcoin: Issues in regulating blockchain transactions. Duke Law Journal, 65, (2015), 569–608.
  • Kleiman, J.A. Beyond the silk road: Unregulated decentralized virtual currencies continue to endanger us national security and welfare. American University National Security Law Brief, 4, 1 (2013), 59–78.
  • Koshy, P.; Koshy, D.; and McDaniel, P. An analysis of anonymity in bitcoin using p2p network traffic. International Conference on Financial Cryptography and Data Security, 8437 (2014), pp. 469–485.
  • Lamport, L.; Shostak, R.; and Pease, M. The Byzantine Generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4, 3 (1982), 382–401.
  • LBBW. Daimler and LBBW: Successful with Blockchain, 2018. https://www.lbbw.de/articlepage/experience-banking/pilot-project-blockchain-daimler-lbbw_661e61yw9_e.html. (accessed on January 24, 2019)
  • Lee, L. New kids on the blockchain: How bitcoin’s technology could reinvent the stock market. Hastings Business Law Journal, 12, 2 (2016), 81–132.
  • Levmore, S. The internet’s anonymity problem. In S. Lemore and M. Nussbaum (eds.), The offensive Internet: Speech, Privacy, and Reputation. Cambridge: Harvard University Press, 2010.
  • Li, W.; Chen, H.; and Nunamaker Jr, J.F. Identifying and profiling key sellers in cyber carding community: A secure text mining system. Journal of Management Information Systems, 33, 4 (2016), 1059–1086.
  • Li, X.; Sun, S.X.; Chen, K.; Fung, T.; and Wang, H. Design theory for market surveillance systems. Journal of Management Information Systems, 32, 2 (2015), 278–313.
  • Lin, T.C. Compliance, technology, and modern finance. Brooklyn Journal of Corporate, Financial & Commercial Law, 11, 1 (2016), 159–182.
  • Mai, F.; Shan, Z.; Bai, Q.; Wang, X.; and Chiang, R.H. How does social media impact bitcoin value? A test of the silent majority hypothesis. Journal of Management Information Systems, 35, 1 (2018), 19–52.
  • Mamoshina, P.; Ojomoko, L.; Yanovich, Y.; Ostrovski, A.; Botezatu, A.; Prikhodko, P.; Izumchenko, E.; Aliper, A.; Romantsov, K.; Zhebrak, A.; Ogu, I.A.; and Zhavoronkov, A. Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare. Oncotarget, 9, 5 (2018), 5665–5690.
  • Martin, J. Drugs on the Dark net: How Cryptomarkets are Transforming the Global Trade in Illicit Drugs. New York: Palgrave Macmillan, 2014.
  • Martin, J. Lost on the Silk Road: Online drug distribution and the cryptomarket. Criminology & Criminal Justice, 14, 3 (2014), 351–367.
  • McLeod, P. Taxing and regulating bitcoin: The government’s game of catch up. CommLaw Conspectus: Journal of Communications Law and Technology Policy, 22, (2013), 379–406.
  • Meiklejohn, S.; and Orlandi, C. Privacy-enhancing overlays in bitcoin. In International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2015, pp. 27–141.
  • Meiklejohn, S.; Pomarole, M.; Jordan, G.; Levchenko, K.; McCoy, D.; Voelker, G.M.; and Savage, S. A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 Conference on Internet Measurement Conference. New York: ACM, 2013, pp. 127–140.
  • Merkle, R. C. Protocols for public key cryptosystems. In The 1980 IEEE Symposium on Security and Privacy. New York: IEEE, 1980, pp. 122–134.
  • Morgan, J.S. What I learned trading cryptocurrencies while studying the law. University of Miami International and Comparative Law Review, 25, (2018), 159–226.
  • Moser, M.; Bohme, R.; and Breuker, D. An inquiry into money laundering tools in the bitcoin ecosystem. eCrime Researchers Summit (eCRS), 2013, 1–14. https://ieeexplore.ieee.org/document/6805780. (accessed on January 24, 2019)
  • Naerland, K.; Müller-Bloch, C.; Beck, R.; and Palmund, S. Blockchain to rule the waves nascent design principles for reducing risk and uncertainty in decentralized environments. In Proceedings International Conference on Information Systems (ICIS). Atlanta: Association for Information Systems, 2017, pp. 1–16.
  • Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system, 2008. https://bitcoin.org/en/bitcoin-paper. (accessed on January 24, 2019)
  • Narayanan, A.; Bonneau, J.; Felten, E.; Miller, A.; and Goldfeder, S. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton: Princeton University Press, 2016.
  • Nofer, M.; Gomber, P.; Hinz, O.; and Schiereck, D. Blockchain. Business & Information Systems Engineering, 59, 3 (2017), 183–187.
  • Notheisen, B.; Hawlitschek, F.; and Weinhardt, C. Breaking down the blockchain hype towards a blockchain market engineering approach. In Proceedings of the 25th European Conference on Information Systems (ECIS). Atlanta: Association for Information Systems, 2017, pp. 1062–1080.
  • Otjacques, B.; Hitzelberger, P.; and Feltz, F. Interoperability of e-government information systems: Issues of identification and data sharing. Journal of Management Information Systems, 23, 4 (2007), 29–51.
  • Pedregosa, F.; Varoquaux, G.; Gramfort, A.; Michel, V.; Thirion, B.; Grisel, O.; Blondel, M.; Prettenhofer, P.; Weiss, R.; Dubourg, V.; Vanderplas, J.; Passos, A.; Cournapeau, D.; Brucher, M.; Perrot, M.; and Duchesnay, E. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12, (2011), 2825–2830.
  • Pfitzmann, A.; and Köhntopp, M. Anonymity, unobservability, and pseudonymity- a proposal for terminology. Designing Privacy Enhancing Technologies, 2009 (2001), 1–9.
  • Pinsonneault, A.; and Heppel, N. Anonymity in group support systems research: A new conceptualization, measure, and contingency framework. Journal of Management Information Systems, 14, 3 (1997), 89–108.
  • Raileanu, L. E.; and Stoffel, K. Theoretical comparison between the Gini index and information gain criteria. Annals of Mathematics and Artificial Intelligence, 41, 1 (2004), 77–93.
  • Reid, F.; and Harrigan, M. An analysis of anonymity in the bitcoin system. Security and Privacy in Social Networks, (2013), 197–223. https://link.springer.com/chapter/10.1007/978-1-4614-4139-7_10. (accessed on January 24, 2019)
  • Reyes, C.L. Conceptualizing cryptolaw. Nebraska Law Review, 96, 2 (2017), 384–445.
  • Risius, M.; and Spohrer, K. A blockchain research framework. Business & Information Systems Engineering, 59, 6 (2017), 385–409.
  • Ron, D.; and Shamir, A. Quantitative analysis of the full bitcoin transaction graph. International Conference on Financial Cryptography and Data Security, 7859 (2013), 6–24.
  • Rosner, M.T.; and Kang, A. Understanding and regulating twenty-first century payment systems: The ripple case study. Michigan Law Review, 114, 4 (2016), 649–681.
  • Ross, E.S. Nobody puts blockchain in a corner: The disruptive role of blockchain technology in the financial services industry and current regulatory issues. Catholic University Journal of Law and Technology, 25, 2 (2017), 353–386.
  • Samtani, S.; Chinn, R.; Chen, H.; and Nunamaker Jr, J.F. Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems, 34, 4 (2017), 1023–1053.
  • Sasson, E.B.; Chiesa, A.; Garman, C.; Green, M.; Miers, I.; Tromer, E.; and Virza, M. Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy. New York: IEEE, 2014, pp. 459–474.
  • Scott, S.V.; and Orlikowski, W.J. Entanglements in practice: performing anonymity through social media. MIS Quarterly, 38, 3 (2014), 873–893.
  • Shackelford, S.J.; and Myers, S. Block-by-block: Leveraging the power of blockchain technology to build trust and promote cyber peace. Yale Journal of Law and Technology, 19, 1 (2017), 334–338.
  • Sklaroff, J.M. Smart contracts and the cost of inflexibility. University of Pennsylvania Law Review, 166(2018), 263–303.
  • Smith, A.; and Weismann, M.F. Are you ready for digital currency? Journal of Corporate Accounting & Finance, 26, 1 (2014), 17–21.
  • Sonderegger, D. A regulatory and economic perplexity: Bitcoin needs just a bit of regulation. Washington University Journal of Law & Policy, 47, (2015), 175–216.
  • Spagnuolo, M.; Maggi, F.; and Zanero, S. Bitiodine: Extracting intelligence from the bitcoin network. International Conference on Financial Cryptography and Data Security, 8437 (2014), 457–468.
  • Surujnath, R. Off the chain: A guide to blockchain derivatives markets and the implications on systemic risk. Fordham Journal of Corporate & Financial Law, 22, 2 (2017), 257–304.
  • Tsukerman, M. The block is hot: A survey of the state of bitcoin regulation and suggestions for the future. Berkeley Technology Law Journal, 30, 4 (2015), 1127–1169.
  • Turpin, J.B. Bitcoin: The economic case for a global, virtual currency operating in an unexplored legal framework. Indiana Journal of Global Legal Studies, 21, 1 (2014), 335–368.
  • Twyman, N.W.; Lowry, P.B.; Burgoon, J.K.; and Nunamaker Jr, J.F. Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals. Journal of Management Information Systems, 31, 3 (2014), 106–137.
  • Van Hout, M.C.; and Bingham, T. Responsible vendors, intelligent consumers :Silk road, the online revolution in drug trading.International Journal of Drug Policy, 25, 2 (2014), 183–189.
  • Wolpert, D.H.; and Macready, W.G. Coevolutionary free lunches. IEEE Transactions on Evolutionary Computation, 9, 6 (2005), 721–735.
  • Wright, A.; and De Filippi, P. Decentralized blockchain technology and the rise of lex cryptographia. SSRN, (2015). https://ssrn.com/abstract=2580664. (accessed on January 24, 2019)
  • Xu, L. Highly available distributed storage systems. PhD thesis, California Institute of Technology, 1999.
  • Yin, H.S.; and Vatrapu, R. A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using Supervised Machine Learning. In 2017 IEEE International Conference on Big Data. New York: IEEE, 2017, pp. 3690–3699.
  • Young, S. Enforcing constitutional rights through computer code. Catholic University Journal of Law and Technology, 26, 1 (2018), 1–20.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.