Information Systems Frontiers ( IF 6.9 ) Pub Date : 2024-07-06 , DOI: 10.1007/s10796-024-10498-7 Klein Galit , Assadi Djamchid , Zwilling Moti
As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as legislation and regulation are proposed. However, these are foreign to the P2P spirit of trusted interactions and transactions. This paper aims to identify solutions that align with P2P technologies and relationships to combat the criminal use of cryptocurrencies. In line with our research question, we adopt the method of grounded theory. Based on 45 interviews on 1,500 h of podcasts, blogs, and TV shows, we observed how experts in finance, technology, and cryptocurrency analyzed the hazards, as well as, the solutions for cryptocurrencies schemes. The results indicate that this new technology has also engendered new types of criminal schemes; thus, we can categorize malicious behaviors into conventional and P2P hazards. In addition, experts also point to conventional and P2P solutions to crypto-crimes at the individual, organizational, communal, and national levels. As such, they underscore the discrepancies between those who push for solutions favoring conventional regulatory forces versus those advocating for normative legitimacy, hence pulling the industry to preserve the P2P identity. Following institutional theory and the need for legitimacy in this new and disruptive industry, we discuss the tension between agendas and suggest unorthodox solutions for an innovative yet troubled technology.
中文翻译:
以毒攻毒:以 P2P 思维打击加密货币犯罪滥用
作为 P2P 共享经济的一部分,加密货币提供了创造性和犯罪机会。为了对付违法者,提出了立法和监管等解决方案。然而,这些与可信交互和交易的 P2P 精神是陌生的。本文旨在确定与 P2P 技术和关系相一致的解决方案,以打击加密货币的犯罪使用。根据我们的研究问题,我们采用扎根理论的方法。基于 1,500 个小时的播客、博客和电视节目中的 45 次采访,我们观察了金融、技术和加密货币领域的专家如何分析加密货币方案的危害以及解决方案。结果表明,这项新技术也催生了新型犯罪计划;因此,我们可以将恶意行为分为传统危害和P2P危害。此外,专家还指出了个人、组织、社区和国家层面针对加密货币犯罪的传统和 P2P 解决方案。因此,他们强调了那些推动有利于传统监管力量的解决方案的人与那些主张规范合法性的人之间的差异,从而推动行业保留 P2P 身份。根据制度理论和这个新兴的颠覆性行业对合法性的需求,我们讨论了议程之间的紧张关系,并为创新但陷入困境的技术提出了非正统的解决方案。