ABSTRACT
Bitcoin is the most successful cryptocurrency with more than half of the market capitalization of all more than 2,000 currently existing cryptocurrencies. In recent years, there have been several high-profile hacks and scams that resulted in billions of stolen funds. In this paper, we focus on the impact of Bitcoin cybersecurity and privacy characteristics on its adoption. A survey (N = 152) has been conducted among users and non-users of Bitcoin in Slovenia to test the proposed research model. The results suggest that in addition to known factors (i.e., usefulness, ease of use and subjective norm) trust into Bitcoin security also influences Bitcoin adoption. The results however show no support for the influence of perceived threat of Bitcoin scams or Bitcoin anonymity on Bitcoin adoption.
- Ane Alexandre. 2018. Study: Crypto Coverage in Media Peaked Following Market Slump. https://cointelegraph.com/news/study-crypto-coverage-in-media-peaked-following-market-slumpGoogle Scholar
- Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, 375--392. https://doi.org/10.1109/SP.2017.29Google Scholar
- Paul Barnes. 2018. Cryptocurrency and its susceptibility to speculative bubbles, manipulation, scams and fraud. Journal of Advanced Studies in Finance 9, 2 (2018), 60--77. https://doi.org/10.14505//jasf.v9.2(18).03Google ScholarCross Ref
- Massimo Bartoletti, Barbara Pes, and Sergio Serusi. 2018. Data mining for detecting Bitcoin Ponzi schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, Zug, Switzerland, 75--84. https://doi.org/10.1109/CVCBT.2018.00014Google ScholarCross Ref
- Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. 2015. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy. IEEE, San Jose, CA, 104--121. https://doi.org/10.1109/SP.2015.14Google Scholar
- Giangiacomo Bravo, Mikko Laitinen, Magnus Levin, Welf Löwe, and Göran Petersson. 2017. Big data in cross-disciplinary research. Journal of Universal Computer Science 23, 11 (2017), 1035--1037. https://doi.org/10.3217/jucs-023-11-1035Google Scholar
- Stephen Chan, Jeffrey Chu, Saralees Nadarajah, and Joerg Osterrieder. 2017. A Statistical Analysis of Cryptocurrencies. Journal of Risk and Financial Management 10, 2 (may 2017), 12. https://doi.org/10.3390/jrfm10020012Google ScholarCross Ref
- Ankur Chattopadhyay, Michael J. Schulz, Katie L. Turkiewicz, and Eli Hughes. 2018. A Novel Visual Recognition-based Authentication Model Using a Hybrid Trust Theme to Verify Provider Profiles for Enhancing Information Assurance in Online Healthcare. Journal of Cyber Security and Mobility 7, 3 (2018), 1--46. https://doi.org/10.13052/jcsm2245-1439.733Google ScholarCross Ref
- T.C. Edwin Cheng, David Y.C. Lam, and Andy C.L. Yeung. 2006. Adoption of internet banking: An empirical study in Hong Kong. Decision Support Systems 42, 3 (2006), 1558--1572. https://doi.org/10.1016/j.dss.2006.01.002Google ScholarDigital Library
- Nicolas Christin. 2013. Traveling the silk road. In Proceedings of the 22nd international conference on World Wide Web - WWW '13. ACM Press, Rio de Janeiro, Brazil, 213--224. https://doi.org/10.1145/2488388.2488408Google ScholarDigital Library
- CipherTrace. 2019. Cryptocurrency Anti-Money Laundering Report, 2018 Q4. Technical Report January. CipherTrace.Google Scholar
- CoinMarketCap. 2019. CoinMarketCap. https://coinmarketcap.com/Google Scholar
- Fred D. Davis. 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly 13, 3 (1989), 319. https://doi.org/10.2307/249008Google ScholarDigital Library
- Nikhilesh De. 2019. Hackers Steal $40.7 Million in Bitcoin From Crypto Exchange Binance.Google Scholar
- Peter D. DeVries. 2016. An Analysis of Cryptocurrency, Bitcoin, and the Future. International Journal of Business Management and Commerce 1, 2 (2016), 1--9.Google Scholar
- Damjan Fujs, Anže Mihelič, and Simon L. R. Vrhovec. 2019. Social Network Self-Protection Model: What Motivates Users to Self-Protect? Journal of Cyber Security and Mobility 8, 4 (2019), 467--492. https://doi.org/10.13052/jcsm2245-1439.844Google ScholarCross Ref
- Damjan Fujs, Simon Vrhovec, and Anže Mihelič. 2018. What drives the motivation to self-protect on social networks? The role of privacy concerns and perceived threats. In Proceedings of the Central European Cybersecurity Conference 2018 - CECC 2018. ACM, New York, NY, USA, a11. https://doi.org/10.1145/3277570.3277581Google ScholarDigital Library
- Christos K. Georgiadis, Nikolaos Polatidis, Haralambos Mouratidis, and Elias Pimenidis. 2017. A Method for Privacy-preserving Collaborative Filtering Recommendations. Journal of Universal Computer Science 23, 2 (2017), 146--166. https://doi.org/10.3217/jucs-023-02-0146Google Scholar
- Swati Goyal. 2018. The History of Blockchain Technology: Must Know Timeline. https://101blockchains.com/history-of-blockchain-timeline/Google Scholar
- Princely Ifinedo. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security 31, 1 (2012), 83--95. https://doi.org/10.1016/j.cose.2011.10.007Google ScholarDigital Library
- Jurjen Jansen and Paul van Schaik. 2018. Testing a model of precautionary online behaviour: The case of online banking. Computers in Human Behavior 87 (2018), 371--383. https://doi.org/10.1016/j.chb.2018.05.010Google ScholarDigital Library
- Yogita Khatri. 2018. Nearly $1 Billion Stolen In Crypto Hacks So Far This Year: Research. https://www.coindesk.com/nearly-1-billion-stolen-in-crypto-hacks-so-far-this-year-researchGoogle Scholar
- Dac-Nhuong Le, Bijeta Seth, and Surjeet Dalal. 2018. A Hybrid Approach of Secret Sharing with Fragmentation and Encryptionin Cloud Environment for Securing Outsourced Medical Database: A Revolutionary Approach. Journal of Cyber Security and Mobility 7, 4 (2018), 379--408. https://doi.org/10.13052/jcsm2245-1439.742Google ScholarCross Ref
- H. Liang and Y. Xue. 2010. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective. Jurnal of the Association for Information Systems 11, 7 (2010), 394--413.Google ScholarCross Ref
- Robert McMillan. 2014. The Inside Story of Mt. Gox, Bitcoinâçs $460 Million Disaster. https://www.wired.com/2014/03/bitcoin-exchange/Google Scholar
- Rok Meden and Anton Kos. 2017. Rudarjenje bitcoinov s podatkovno pretokovnimi računalniki Maxeler. Elektrotehniški vestnik / Electrotechnical Review 84, 5 (2017), 253--258.Google Scholar
- Anže Mihelič and Simon Vrhovec. 2018. A model of self-protection in the cyberspace / Model samozaščite v kibernetskem prostoru. Elektrotehniški vestnik / Electrotechnical Review 85, 1-2 (2018), 13--22.Google Scholar
- Tyler Moore, Nicolas Christin, and Janos Szurdi. 2018. Revisiting the Risks of Bitcoin Currency Exchange Closure. ACM Transactions on Internet Technology 18, 4 (2018), 1--18. https://doi.org/10.1145/3155808Google ScholarDigital Library
- Miguel Morales Chan, Roberto Barchino Plata, Jose Amelio Medina, Carlos Alario-Hoyos, Rocael Hernández Rizzardini, and Mónica de la Roca. 2018. Analysis of Behavioral Intention to Use Cloud-Based Tools in a MOOC: A Technology Acceptance Model Approach. Journal of Universal Computer Science 24, 8 (2018), 1072--1089.Google Scholar
- Elise Moreau. 2019. 13 Major Retailers and Services That Accept Bitcoin. https://www.lifewire.com/big-sites-that-accept-bitcoin-payments-3485965Google Scholar
- Saad B. Murtaza. 2019. Cryptocurrency and Bitcoin mass adoption is increasing in 2019; data report. https://www.cryptopolitan.com/cryptocurrency-and-bitcoin-mass-adoption-is-increasing-in-2019-data-report/Google Scholar
- Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. (2008). https://doi.org/10.1007/s10838-008-9062-0Google Scholar
- Danny Paez. 2017. Bitcoin Stolen: How NiceHash Was Robbed Of $78 Million and What's Next. https://www.inverse.com/article/39221-nicehash-robbed-of-78-million-worth-of-bitcoinGoogle Scholar
- Umberto Panniello, Lorenzo Ardito, and Antonio Messeni Petruzzelli. 2017. Does the Users' Tendency to Seek Information Affect Recommender Systems' Performance? Journal of Universal Computer Science 23, 2 (2017), 187--207. https://doi.org/10.3217/jucs-023-02-0187Google Scholar
- Alain Pinsonneault and Nelson Heppel. 1997. Anonymity in group support systems research: new conceptualization and measure. In Proceedings of the Thirtieth Hawaii International Conference on System Sciences. IEEE, Wailea, HI, 134--145. https://doi.org/10.1109/HICSS.1997.665469Google ScholarCross Ref
- Frederick F. Reichheld. 2003. The one number you need to grow. Harvard Business Review December, 4 (2003), 46--54.Google Scholar
- Kate Rooney. 2018. Bitcoin turns 10 - how it went from an abstract idea to a $100 billion market in a decade. https://www.cnbc.com/2018/10/31/bitcoin-turns-10-years-old.htmlGoogle Scholar
- Amit Shankar and Biplab Datta. 2018. Factors Affecting Mobile Payment Adoption Intention: An Indian Perspective. Global Business Review 19, 3_suppl (2018), S72--S89. https://doi.org/10.1177/0972150918757870Google ScholarCross Ref
- Hardwin Spenkelink. 2014. The Adoption Process of cryptocurrencies. Ph.D. Dissertation. University of Twente.Google Scholar
- N.S. Tinu. 2018. A Survey on Blockchain Technology- Taxonomy, Consensus Algorithms and Applications. International Journal of Computer Sciences and Engineering 6, 5 (2018), 691--696. https://doi.org/10.26438/ijcse/v6i5.691696Google ScholarCross Ref
- Marie Vasek and Tyler Moore. 2015. There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. In Financial Cryptography and Data Security (FC 2015). Springer, San Juan, Puerto Rico, 44--61. https://doi.org/10.1007/978-3-662-47854-7_4Google Scholar
- Marie Vasek and Tyler Moore. 2018. Analyzing the Bitcoin Ponzi Scheme Ecosystem. In International Conference on Financial Cryptography and Data Security. Springer, Nieuwpoort, Curaçao, 101--112. https://doi.org/10.1007/978-3-662-58820-8_8Google Scholar
- Viswanath Venkatesh and Hillol Bala. 2008. Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences 39, 2 (2008), 273--315. https://doi.org/10.1111/j.1540-5915.2008.00192.xGoogle ScholarCross Ref
- Viswanath Venkatesh, Michael G. Morris, Gordon B. Davis, and Fred D. Davis. 2003. User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly 27, 3 (2003), 425--478. https://doi.org/10.2307/30036540Google ScholarCross Ref
- Joseph M Woodside, Fred K Augustine Jr, Will Giberson, Fred K Jr Augustine, and Will Giberson. 2017. Blockchain Technology Adoption Status and Strategies. Journal of International Technology and Information Management 26, 2 (2017), 65--93.Google Scholar
Index Terms
- Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does
Recommendations
End-User Adoption of Cryptocurrency: A Literature Review
HCI International 2022 - Late Breaking Papers. Design, User Experience and InteractionAbstractThe increasing presence of cryptocurrency has disrupted various areas such as financial, e-commerce, etc. This has attracted many scholars to investigate this technology, including its adoption. Yet, end-users adoption remains low despite numerous ...
Cryptocurrencies as a Disruption? Empirical Findings on User Adoption and Future Potential of Bitcoin and Co
Open and Big Data Management and InnovationAbstractIn this paper, we examine cryptocurrencies as a potentially disruptive sort of payment method. Due to its relative importance, we focus in particular on Bitcoin. Through an inductive, exploratory interview approach with 13 individuals in three ...
Double-spending prevention for Bitcoin zero-confirmation transactions
Zero-confirmation transactions, i.e. transactions that have been broadcast but are still pending to be included in the blockchain, have gained attention in order to enable fast payments in Bitcoin, shortening the time for performing payments. Fast ...
Comments