Abstract
With the massive growth of cryptocurrency markets in recent years has come an influx of new users and investors, pushing the overall number of owners into the millions. At the same time, the number of distinct cryptocurrencies has exploded to over 4,900. In this burgeoning and chaotic “cryptojungle,” new and unexplored incentives and risks drive the behavior of users and non-users of cryptocurrencies. While previous research has focused almost exclusively on Bitcoin, other cryptocurrencies and utility tokens have been ignored. This paper presents findings from an interview study of cryptocurrency users and non-users \((N=20)\). We specifically focus on their perceptions and management of cryptocurrency risks as well as their reasons for or against involvement with cryptocurrencies. Our results suggest that associated risks and mitigation strategies (among other factors) might be specific to a particular crypto-asset and its application area. Further, we identify misunderstandings of both users and non-users that might lead to skewed risk perceptions or dangerous errors. Lastly, we discuss ways of aiding users with managing risks, as well as design implications for coin management tools.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
We use the prefix “PU” when referring to those participants who used crypto-assets at the time of the interview.
- 2.
We use the prefix “PN” to refer to those participants who did not use crypto-assets at the time of the interview.
- 3.
A pejorative term for crypto-assets that have no intrinsic value.
References
BIP 39 Standard. https://github.com/bitcoinbook/bitcoinbook/blob/
Cointelegraph: ICO Scams (2018). https://cointelegraph.com/news/new-study-says-80-percent-of-icos-conducted-in-2017-were-scams. Accessed 23 Sept 2019
Cointelegraph: Ponzi Schemes (2019). https://cointelegraph.com/news/from-ponzi-schemes-to-ico-exits-ethereums-blockchain-has-been-the-platform-of-choice-for-scammers. Accessed 23 Sept 2019
Abramova, S., Böhme, R.: Perceived benefit and risk as multidimensional determinants of bitcoin use: a quantitative exploratory study. In: Proceedings of the Thirty Seventh International Conference on Information Systems (ICIS), Dublin, Ireland (2016)
Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34–51. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_4
Bitcoin.com: Illegal Activity No Longer Dominant Use of Bitcoin: DEA Agent. https://news.bitcoin.com/illegal-activity-use-bitcoin-dea-agent/. Accessed 28 Feb 2019
Blockplate: The BIP39 (Mnemonic Seed) Wallet List (2019). https://www.blockplate.com/blogs/blockplate/list-of-bip39-wallets-mnemonic-seed. Accessed 20 July 2019
Böhme, R., Christin, N., Edelman, B., Moore, T.: Bitcoin: economics, technology, and governance. J. Econ. Perspect. 29(2), 213–38 (2015)
Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy, pp. 104–121, May 2015. https://doi.org/10.1109/SP.2015.14
CoinDesk: Mt. Gox Allegedly Loses \$350 Million in Bitcoin (744,400 BTC), Rumoured to be Insolvent (2014). https://www.coindesk.com/mt-gox-loses-340-million-bitcoin-rumoured-insolvent. Accessed 27 Apr 2019
CoinDesk: From Law to Lawlessness: Bits of the Untold QuadrigaCX Story (2019). https://www.coindesk.com/from-law-to-lawlessness-bits-of-the-untold-quadrigacx-story. Accessed 27 Apr 2019
CoinMarketCap: Distinct Cryptocurrencies (2019). https://coinmarketcap.com/all/views/all/. Accessed 15 Sept 2019
Conti, M., Sandeep Kumar, E., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutorials 20(4), 3416–3452 (2018)
Corbin, J., Strauss, A.: Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. SAGE Publications (2014). https://books.google.ca/books?id=hZ6kBQAAQBAJ
Eskandari, S., Barrera, D., Stobert, E., Clark, J.: A first look at the usability of bitcoin key management. In: NDSS Symposium 2015. Internet Society (2015)
Gao, X., Clark, G.D., Lindqvist, J.: Of two minds, multiple addresses, and one ledger: characterizing opinions, knowledge, and perceptions of bitcoin across users and non-users. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. CHI 2016, pp. 1656–1668. ACM, New York (2016). https://doi.org/10.1145/2858036.2858049
Goldfeder, S., Kalodner, H., Reisman, D., Narayanan, A.: When the cookie meets the blockchain: privacy risks of web payments via cryptocurrencies. Proc. Priv. Enhancing Technol. 4, 179–199 (2018)
Grant, G., Hogan, R.: Bitcoin: risks and controls. J. Corp. Account. Finance 26(5), 29–35 (2015)
Khairuddin, I.E., Sas, C., Clinch, S., Davies, N.: Exploring motivations for bitcoin technology usage. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2872–2878. ACM (2016)
Kiran, M., Stanett, M.: Bitcoin Risk Analysis. NEMODE Policy Paper (2015)
Krombholz, K., Judmayer, A., Gusenbauer, M., Weippl, E.: The other side of the coin: user experiences with bitcoin security and privacy. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 555–580. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_33
Kumar, R.L., Smith, M.A., Bannerjee, S.: User interface features influencing overall ease of use and personalization. Inf. Manag. 41(3), 289–302 (2004)
Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference. IMC 2013, pp. 127–140. ACM, New York (2013). https://doi.org/10.1145/2504730.2504747
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). http://bitcoin.org/bitcoin.pdf. Accessed 28 Feb 2019
Sas, C., Khairuddin, I.E.: Design for trust: an exploration of the challenges and opportunities of bitcoin users. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. CHI 2017, pp. 6499–6510. ACM, New York (2017). https://doi.org/10.1145/3025453.3025886
Acknowledgements
This research has been supported in part by a gift from Scotiabank to UBC and by an NSERC Engage Grant (with Symetria), #EGP538930-19. We would like to thank members of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE), who provided their feedback on the reported research and earlier versions of the paper. We thank our anonymous reviewers for all the feedback and suggestions they provided to improve the paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendices
A Interview Questions
Interview guides for both users and non-users of cryptocurrencies follow. Research questions that were addressed are in bold.
1.1 A.1 Users of Cryptocurrencies
RQ1: What are the current usages of cryptocurrencies?
Q1. Please tell me about how you got into cryptocurrencies.
Q2. How much money have you spent?
Q3. What do you use cryptocurrencies for?
Q3.1 How many transactions do you perform?
Q4. How has this usage changed over time? If it did, why?
Q5. How many different currencies do you own?
Q5.1 What three currencies have you invested the most money in? Why?
Q5.2 Do you use these currencies for different use cases? Why?
Q6. What factors influence you when making a decision to invest in a currency?
Q6.1 How well do you research the currency prior to an investment?
Q6.2 How knowledgeable are you about currencies that you have invested in?
Q6.3 Can you explain the concept behind blockchain to me?
RQ2: How do holders manage their cryptocurrency?
Q.7 How do you store your cryptocurrencies?
Q7.1 Please name the wallets you personally use the most.
Q7.2 Why did you choose these wallets?
Q7.3 How many different wallets do you use?
Q7.4 For how many of these wallets do you own the private key?
Q7.5 Can you explain to me what a private key is?
Q7.6 What do you need the private key for?
Q7.8 How is a private key different from a public key?
Q7.9 Do you store different currencies in different wallets?
RQ3: What is the perception of cryptocurrency-related security risk?
Q8 Have you ever lost cryptocurrency?
Q8.1 How much money did you lose?
Q8.2 Were you able to recover the key(s)?
Q9 What risks are you personally aware of when it comes to cryptocurrencies?
Q9.1 What is the most severe one according to you? Why?
Q10 What measures do you use to mitigate those risks? (RQ4)
Q10.1 What measures worked and which ones did not? Why?
Q11. In what ways do you protect different cryptocurrencies? (RQ5)
Q11.1 What factors influence your decisions?
1.2 A.2 Non-Users of Cryptocurrencies
RQ1: What are the current usages of cryptocurrencies?
Q1. What payment systems do you use in your daily life?
Q2. How did you hear about cryptocurrencies for the first time?
Q3. What cryptocurrencies have you heard of?
Q4. How do you view your understanding of cryptocurrencies?
Q4.1 And of the underlying technological background?
Q5. What do you think cryptocurrencies are used for?
Q6. Why do you believe people purchase cryptocurrencies?
Q7. Why did you choose not to purchase cryptocurrencies?
Q7.1 What would have to happen for you to reconsider?
RQ3: What is the perception of cryptocurrency-related security risk?
Q8. What risks come with the usage of cryptocurrencies?
Q8.1 What is the most severe one? Why?
Q9. Can you think of ways users can protect themselves? (RQ4)
B Participant Demographics
The following two tables display the participants’ demographics. The number of owned crypto-assets was self-reported and the ownership was not validated (Tables 1 and 2).
C Schematic Overview of the Results
The following figure depicts the findings of the interview study. Based on our research questions we created five groups, use cases, reasons against an involvement, perceived risks, reasons for losses, and risk management. We use distinct colors for users and non-users and show relationships where appropriate (Fig. 1).
Rights and permissions
Copyright information
© 2020 International Financial Cryptography Association
About this paper
Cite this paper
Voskobojnikov, A., Obada-Obieh, B., Huang, Y., Beznosov, K. (2020). Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users. In: Bonneau, J., Heninger, N. (eds) Financial Cryptography and Data Security. FC 2020. Lecture Notes in Computer Science(), vol 12059. Springer, Cham. https://doi.org/10.1007/978-3-030-51280-4_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-51280-4_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-51279-8
Online ISBN: 978-3-030-51280-4
eBook Packages: Computer ScienceComputer Science (R0)