skip to main content
10.1145/3360664.3360679acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceccConference Proceedingsconference-collections
research-article

Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does

Published:14 November 2019Publication History

ABSTRACT

Bitcoin is the most successful cryptocurrency with more than half of the market capitalization of all more than 2,000 currently existing cryptocurrencies. In recent years, there have been several high-profile hacks and scams that resulted in billions of stolen funds. In this paper, we focus on the impact of Bitcoin cybersecurity and privacy characteristics on its adoption. A survey (N = 152) has been conducted among users and non-users of Bitcoin in Slovenia to test the proposed research model. The results suggest that in addition to known factors (i.e., usefulness, ease of use and subjective norm) trust into Bitcoin security also influences Bitcoin adoption. The results however show no support for the influence of perceived threat of Bitcoin scams or Bitcoin anonymity on Bitcoin adoption.

References

  1. Ane Alexandre. 2018. Study: Crypto Coverage in Media Peaked Following Market Slump. https://cointelegraph.com/news/study-crypto-coverage-in-media-peaked-following-market-slumpGoogle ScholarGoogle Scholar
  2. Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, 375--392. https://doi.org/10.1109/SP.2017.29Google ScholarGoogle Scholar
  3. Paul Barnes. 2018. Cryptocurrency and its susceptibility to speculative bubbles, manipulation, scams and fraud. Journal of Advanced Studies in Finance 9, 2 (2018), 60--77. https://doi.org/10.14505//jasf.v9.2(18).03Google ScholarGoogle ScholarCross RefCross Ref
  4. Massimo Bartoletti, Barbara Pes, and Sergio Serusi. 2018. Data mining for detecting Bitcoin Ponzi schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, Zug, Switzerland, 75--84. https://doi.org/10.1109/CVCBT.2018.00014Google ScholarGoogle ScholarCross RefCross Ref
  5. Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. 2015. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy. IEEE, San Jose, CA, 104--121. https://doi.org/10.1109/SP.2015.14Google ScholarGoogle Scholar
  6. Giangiacomo Bravo, Mikko Laitinen, Magnus Levin, Welf Löwe, and Göran Petersson. 2017. Big data in cross-disciplinary research. Journal of Universal Computer Science 23, 11 (2017), 1035--1037. https://doi.org/10.3217/jucs-023-11-1035Google ScholarGoogle Scholar
  7. Stephen Chan, Jeffrey Chu, Saralees Nadarajah, and Joerg Osterrieder. 2017. A Statistical Analysis of Cryptocurrencies. Journal of Risk and Financial Management 10, 2 (may 2017), 12. https://doi.org/10.3390/jrfm10020012Google ScholarGoogle ScholarCross RefCross Ref
  8. Ankur Chattopadhyay, Michael J. Schulz, Katie L. Turkiewicz, and Eli Hughes. 2018. A Novel Visual Recognition-based Authentication Model Using a Hybrid Trust Theme to Verify Provider Profiles for Enhancing Information Assurance in Online Healthcare. Journal of Cyber Security and Mobility 7, 3 (2018), 1--46. https://doi.org/10.13052/jcsm2245-1439.733Google ScholarGoogle ScholarCross RefCross Ref
  9. T.C. Edwin Cheng, David Y.C. Lam, and Andy C.L. Yeung. 2006. Adoption of internet banking: An empirical study in Hong Kong. Decision Support Systems 42, 3 (2006), 1558--1572. https://doi.org/10.1016/j.dss.2006.01.002Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Nicolas Christin. 2013. Traveling the silk road. In Proceedings of the 22nd international conference on World Wide Web - WWW '13. ACM Press, Rio de Janeiro, Brazil, 213--224. https://doi.org/10.1145/2488388.2488408Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. CipherTrace. 2019. Cryptocurrency Anti-Money Laundering Report, 2018 Q4. Technical Report January. CipherTrace.Google ScholarGoogle Scholar
  12. CoinMarketCap. 2019. CoinMarketCap. https://coinmarketcap.com/Google ScholarGoogle Scholar
  13. Fred D. Davis. 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly 13, 3 (1989), 319. https://doi.org/10.2307/249008Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Nikhilesh De. 2019. Hackers Steal $40.7 Million in Bitcoin From Crypto Exchange Binance.Google ScholarGoogle Scholar
  15. Peter D. DeVries. 2016. An Analysis of Cryptocurrency, Bitcoin, and the Future. International Journal of Business Management and Commerce 1, 2 (2016), 1--9.Google ScholarGoogle Scholar
  16. Damjan Fujs, Anže Mihelič, and Simon L. R. Vrhovec. 2019. Social Network Self-Protection Model: What Motivates Users to Self-Protect? Journal of Cyber Security and Mobility 8, 4 (2019), 467--492. https://doi.org/10.13052/jcsm2245-1439.844Google ScholarGoogle ScholarCross RefCross Ref
  17. Damjan Fujs, Simon Vrhovec, and Anže Mihelič. 2018. What drives the motivation to self-protect on social networks? The role of privacy concerns and perceived threats. In Proceedings of the Central European Cybersecurity Conference 2018 - CECC 2018. ACM, New York, NY, USA, a11. https://doi.org/10.1145/3277570.3277581Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Christos K. Georgiadis, Nikolaos Polatidis, Haralambos Mouratidis, and Elias Pimenidis. 2017. A Method for Privacy-preserving Collaborative Filtering Recommendations. Journal of Universal Computer Science 23, 2 (2017), 146--166. https://doi.org/10.3217/jucs-023-02-0146Google ScholarGoogle Scholar
  19. Swati Goyal. 2018. The History of Blockchain Technology: Must Know Timeline. https://101blockchains.com/history-of-blockchain-timeline/Google ScholarGoogle Scholar
  20. Princely Ifinedo. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security 31, 1 (2012), 83--95. https://doi.org/10.1016/j.cose.2011.10.007Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Jurjen Jansen and Paul van Schaik. 2018. Testing a model of precautionary online behaviour: The case of online banking. Computers in Human Behavior 87 (2018), 371--383. https://doi.org/10.1016/j.chb.2018.05.010Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Yogita Khatri. 2018. Nearly $1 Billion Stolen In Crypto Hacks So Far This Year: Research. https://www.coindesk.com/nearly-1-billion-stolen-in-crypto-hacks-so-far-this-year-researchGoogle ScholarGoogle Scholar
  23. Dac-Nhuong Le, Bijeta Seth, and Surjeet Dalal. 2018. A Hybrid Approach of Secret Sharing with Fragmentation and Encryptionin Cloud Environment for Securing Outsourced Medical Database: A Revolutionary Approach. Journal of Cyber Security and Mobility 7, 4 (2018), 379--408. https://doi.org/10.13052/jcsm2245-1439.742Google ScholarGoogle ScholarCross RefCross Ref
  24. H. Liang and Y. Xue. 2010. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective. Jurnal of the Association for Information Systems 11, 7 (2010), 394--413.Google ScholarGoogle ScholarCross RefCross Ref
  25. Robert McMillan. 2014. The Inside Story of Mt. Gox, Bitcoinâçs $460 Million Disaster. https://www.wired.com/2014/03/bitcoin-exchange/Google ScholarGoogle Scholar
  26. Rok Meden and Anton Kos. 2017. Rudarjenje bitcoinov s podatkovno pretokovnimi računalniki Maxeler. Elektrotehniški vestnik / Electrotechnical Review 84, 5 (2017), 253--258.Google ScholarGoogle Scholar
  27. Anže Mihelič and Simon Vrhovec. 2018. A model of self-protection in the cyberspace / Model samozaščite v kibernetskem prostoru. Elektrotehniški vestnik / Electrotechnical Review 85, 1-2 (2018), 13--22.Google ScholarGoogle Scholar
  28. Tyler Moore, Nicolas Christin, and Janos Szurdi. 2018. Revisiting the Risks of Bitcoin Currency Exchange Closure. ACM Transactions on Internet Technology 18, 4 (2018), 1--18. https://doi.org/10.1145/3155808Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Miguel Morales Chan, Roberto Barchino Plata, Jose Amelio Medina, Carlos Alario-Hoyos, Rocael Hernández Rizzardini, and Mónica de la Roca. 2018. Analysis of Behavioral Intention to Use Cloud-Based Tools in a MOOC: A Technology Acceptance Model Approach. Journal of Universal Computer Science 24, 8 (2018), 1072--1089.Google ScholarGoogle Scholar
  30. Elise Moreau. 2019. 13 Major Retailers and Services That Accept Bitcoin. https://www.lifewire.com/big-sites-that-accept-bitcoin-payments-3485965Google ScholarGoogle Scholar
  31. Saad B. Murtaza. 2019. Cryptocurrency and Bitcoin mass adoption is increasing in 2019; data report. https://www.cryptopolitan.com/cryptocurrency-and-bitcoin-mass-adoption-is-increasing-in-2019-data-report/Google ScholarGoogle Scholar
  32. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. (2008). https://doi.org/10.1007/s10838-008-9062-0Google ScholarGoogle Scholar
  33. Danny Paez. 2017. Bitcoin Stolen: How NiceHash Was Robbed Of $78 Million and What's Next. https://www.inverse.com/article/39221-nicehash-robbed-of-78-million-worth-of-bitcoinGoogle ScholarGoogle Scholar
  34. Umberto Panniello, Lorenzo Ardito, and Antonio Messeni Petruzzelli. 2017. Does the Users' Tendency to Seek Information Affect Recommender Systems' Performance? Journal of Universal Computer Science 23, 2 (2017), 187--207. https://doi.org/10.3217/jucs-023-02-0187Google ScholarGoogle Scholar
  35. Alain Pinsonneault and Nelson Heppel. 1997. Anonymity in group support systems research: new conceptualization and measure. In Proceedings of the Thirtieth Hawaii International Conference on System Sciences. IEEE, Wailea, HI, 134--145. https://doi.org/10.1109/HICSS.1997.665469Google ScholarGoogle ScholarCross RefCross Ref
  36. Frederick F. Reichheld. 2003. The one number you need to grow. Harvard Business Review December, 4 (2003), 46--54.Google ScholarGoogle Scholar
  37. Kate Rooney. 2018. Bitcoin turns 10 - how it went from an abstract idea to a $100 billion market in a decade. https://www.cnbc.com/2018/10/31/bitcoin-turns-10-years-old.htmlGoogle ScholarGoogle Scholar
  38. Amit Shankar and Biplab Datta. 2018. Factors Affecting Mobile Payment Adoption Intention: An Indian Perspective. Global Business Review 19, 3_suppl (2018), S72--S89. https://doi.org/10.1177/0972150918757870Google ScholarGoogle ScholarCross RefCross Ref
  39. Hardwin Spenkelink. 2014. The Adoption Process of cryptocurrencies. Ph.D. Dissertation. University of Twente.Google ScholarGoogle Scholar
  40. N.S. Tinu. 2018. A Survey on Blockchain Technology- Taxonomy, Consensus Algorithms and Applications. International Journal of Computer Sciences and Engineering 6, 5 (2018), 691--696. https://doi.org/10.26438/ijcse/v6i5.691696Google ScholarGoogle ScholarCross RefCross Ref
  41. Marie Vasek and Tyler Moore. 2015. There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. In Financial Cryptography and Data Security (FC 2015). Springer, San Juan, Puerto Rico, 44--61. https://doi.org/10.1007/978-3-662-47854-7_4Google ScholarGoogle Scholar
  42. Marie Vasek and Tyler Moore. 2018. Analyzing the Bitcoin Ponzi Scheme Ecosystem. In International Conference on Financial Cryptography and Data Security. Springer, Nieuwpoort, Curaçao, 101--112. https://doi.org/10.1007/978-3-662-58820-8_8Google ScholarGoogle Scholar
  43. Viswanath Venkatesh and Hillol Bala. 2008. Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences 39, 2 (2008), 273--315. https://doi.org/10.1111/j.1540-5915.2008.00192.xGoogle ScholarGoogle ScholarCross RefCross Ref
  44. Viswanath Venkatesh, Michael G. Morris, Gordon B. Davis, and Fred D. Davis. 2003. User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly 27, 3 (2003), 425--478. https://doi.org/10.2307/30036540Google ScholarGoogle ScholarCross RefCross Ref
  45. Joseph M Woodside, Fred K Augustine Jr, Will Giberson, Fred K Jr Augustine, and Will Giberson. 2017. Blockchain Technology Adoption Status and Strategies. Journal of International Technology and Information Management 26, 2 (2017), 65--93.Google ScholarGoogle Scholar

Index Terms

  1. Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          CECC 2019: Proceedings of the Third Central European Cybersecurity Conference
          November 2019
          134 pages
          ISBN:9781450372961
          DOI:10.1145/3360664

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 November 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          CECC 2019 Paper Acceptance Rate19of35submissions,54%Overall Acceptance Rate38of65submissions,58%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader