Advertising Standards Authority & Committees of Advertising Practice. (2019). Using Technology for Good [Annual Report]. https://www.asa.org.uk/uploads/assets/68dd32b5-ae6a-4993-820a3ff8f1163b8e/c02c8290-0ceb-4946-a98e383d5ee79796/ASA-CAP-2019-Annaul-Report-Full-Version-Singles.pdf
Akin Gump Strauss Hauer & Feld LLP. (2018). Federal judge adopts CFTC position that cryptocurrencies are commodities. Akin Gump Strauss Hauer & Feld LLP. https://www.akingump.com/a/web/65522/aoiZE/litigation-alert-federal-judge-adopts-cftc-position-that-crypt.pdf
Anderson, R., Barton, C., Rainer, B., Clayton, R., Ga, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the Changing Cost of Cybercrime Our Framework for Analysing the Costs of Cybercrime. Workshop on the Economics of Information Security (WEIS), 1–32.
Arksey, H., & O’Malley, L. (2005). Scoping studies: Towards a methodological framework. International Journal of Social Research Methodology: Theory and Practice, 8(1), 19–32. https://doi.org/10.1080/1364557032000119616
Article
Google Scholar
Australian Competition & Consumer Commission. (2018). Targeting scams. http://www.keepmeposted.org.au/wp-content/uploads/2018/05/f1240_targeting-scams-report.pdf
Australian Competition and Consumer Commission. (2019). Targeting scams. Report of the ACCC on scams activity 2018 (Issue May).
Australian Competition & Consumer Commission. (2020). Targeting scams 2019. https://www.accc.gov.au/system/files/1657RPT_Targeting%20scams%202019_FA.pdf
Badawi, E., & Jourdan, G.-V. (2020). Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review. IEEE Access. https://doi.org/10.1109/ACCESS.2020.3034816
Article
Google Scholar
Badawi, E., Jourdan, G.-V., Bochmann, G., & Onut, I.-V. (2020). An automatic detection and analysis of the bitcoin generator scam. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020, 407–416.
Article
Google Scholar
Barnes, P. (2018). Crypto Currency and its Susceptibility to Speculative Bubbles, Manipulation, Scams and Fraud. Journal of Advanced Studies in Finance, 9(2), 60. https://doi.org/10.14505//jasf.v9.2(18).03
Bartoletti, M., Carta, S., Cimoli, T., & Saia, R. (2017). Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact.
Bartoletti, M., Pes, B., & Serusi, S. (2018). Data mining for detecting bitcoin ponzi schemes. In Proceedings—2018 Crypto Valley Conference on Blockchain Technology, CVCBT 2018, pp. 75–84. https://doi.org/10.1109/CVCBT.2018.00014
Bartoletti, M., Carta, S., Cimoli, T., & Saia, R. (2020). Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact. Future Generation Computer Systems, 102, 259–277. https://doi.org/10.1016/j.future.2019.08.014
Article
Google Scholar
Baum, S. (2018). Cryptocurrency fraud: A look into the frontier of fraud.
Bolster. (2019). State of Phishing & Online Counterfeiting [Annual Report]. https://bolster.ai/assets/files/reports/2019.pdf
Boshmaf, Y., Al Jawaheri, H., & Al Sabah, M. (2019). BlockTag: Design and applications of a tagging system for blockchain analysis. In IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 299–313.
Boshmaf, Y., Elvitigala, C., Al Jawaheri, H., Wijesekera, P., & Al Sabah, M. (2020). Investigating MMM Ponzi scheme on Bitcoin. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 519–530.
Burrus, J. (2018). Fighting financial crime in the age of cryptocurrencies (p. 3). Refinitiv. https://www.refinitiv.com/content/dam/marketing/en_us/documents/expert-talks/world-check-expert-talk-fighting-financial-crime.pdf
Capobianco, A. (2019). Digital Disruption in Financial Markets—Note by the United States (p. 10). Organisation for Economic Co-operation and Development. https://www.justice.gov/atr/page/file/1313821/download
Chainalysis. (2019). Crypto Crime Report. Chainalysis. https://uploads-ssl.webflow.com/5a9360f88433cb00018022c2/5c4f67ee7deb5948e2941fda_Chainalysis%20January%202019%20Crypto%20Crime%20Report.pdf
Chainalysis. (2020). The 2020 Geography of Cryptocurrency Report. https://go.chainalysis.com/rs/503-FAP-074/images/2020-Geography-of-Crypto.pdf
Chainalysis. (2021, January 19). Crypto Crime Summarized: Scams and Darknet Markets Dominated 2020 by Revenue, But Ransomware Is the Bigger Story. Chainalysis Insights. https://blog.chainalysis.com/reports/2021-crypto-crime-report-intro-ransomware-scams-darknet-markets
Chen, W., Guo, X., Chen, Z., Zheng, Z., & Lu, Y. (2020). Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem. Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence Special Track on AI in FinTech., 4506–4512.
Chen, W., Guo, X., Chen, Z., Zheng, Z., Lu, Y., & Li, Y. (2020b). Honeypot contract risk warning on ethereum smart contracts. IEEE International Conference on Joint Cloud Computing, 2020, 1–8.
Google Scholar
Chen, W., Wu, J., Zheng, Z., Chen, C., & Zhou, Y. (2019a). Market Manipulation of Bitcoin: Evidence from Mining the Mt. Gox Transaction Network. In Proceedings—IEEE INFOCOM, 2019-April (November 2013), pp. 964–972. https://doi.org/10.1109/INFOCOM.2019.8737364
Chen, W., Xu, Y., Zheng, Z., Zhou, Y., Yang, J. E., & Bian, J. (2019b). Detecting ‘Pump & dump schemes’ on cryptocurrency market using an improved apriori algorithm. In Proceedings—13th IEEE International Conference on Service-Oriented System Engineering, SOSE 2019, 10th International Workshop on Joint Cloud Computing, JCC 2019 and 2019 IEEE International Workshop on Cloud Computing in Robotic Systems, CCRS 2019, pp. 293–298. https://doi.org/10.1109/SOSE.2019.00050
Chen, W., Xu, Y., Zheng, Z., Zhou, Y., Yang, J. E., & Bian, J. (2019c). Detecting" Pump & Dump Schemes" on cryptocurrency market using an improved Apriori Algorithm. IEEE International Conference on Service-Oriented System Engineering (SOSE), 2019, 293–2935.
Article
Google Scholar
Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., & Zhou, Y. (2018). Detecting Ponzi Schemes on Ethereum. pp. 1409–1418. https://doi.org/10.1145/3178876.3186046
Chen, W., Zheng, Z., Ngai, E. C. H., Zheng, P., & Zhou, Y. (2019d). Exploiting blockchain data to detect smart ponzi schemes on ethereum. IEEE Access, 7, 37575–37586. https://doi.org/10.1109/ACCESS.2019.2905769
Article
Google Scholar
Chen, Z., Khoa, L., Teoh, E., Nazir, A., Karuppiah, E., & Lam, K. (2018b). Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: A review. Knowledge and Information Systems, 57(2), 245–285. https://doi.org/10.1007/s10115-017-1144-z
Article
Google Scholar
Chernin, A., Moran, N., & Mola, S. (2020). Trends in CFTC Virtual Currency Enforcement Actions: 2015-Q2 2020 (p. 14). Cornerstone Research. https://www.cornerstone.com/Publications/Reports/Trends-in-CFTC-Virtual-Currency-Enforcement-Actions-2015-Q2-2020/Trends-in-CFTC-Virtual-Currency-Enforcement-Actions-2015-Q2-2020.pdf
CipherTrace. (2018). Cryptocurrency Anti-Money Laundering Report (p. 22). https://ciphertrace.com/crypto-aml-report-2018q3.pdf
CipherTrace. (2020). ALERT: Malicious Crypto Browser Extension—Masked MetaMask. https://ciphertrace.com/alert-malicious-crypto-browser-extension-masked-metamask/
Cohen, D. O., & Crance, R. (2018). Taking a trip around the regulatory block: U.S. regulation of blockchain and digital assets (Financial Services Litigation Alert, p. 4). Schnader Harrison Segal & Lewis LLP. https://www.schnader.com/wp-content/uploads/2019/02/ALERT-Financial-Services-Blockchain-and-Cryptocurrency-Regulation-7-31-18.pdf
CoinMarketCap. (2021). Today’s cryptocurrency prices by market cap. CoinMarketCap. https://coinmarketcap.com/
Conley, B., Echert, J., Fuller, A., Lewis, H., & Lunday, C. (2015). Cryptocurrencies: An introduction for policy makers. Technology Law and Public Policy Clinic.
Conti, M., Gangwal, A., & Ruj, S. (2018). On the economic significance of ransomware campaigns: A Bitcoin transactions perspective. Computers & Security, 79, 162–189. https://doi.org/10.1016/j.cose.2018.08.008
Article
Google Scholar
Conway, L. (2021). Bitcoin Halving. Investopedia. https://www.investopedia.com/bitcoin-halving-4843769
Corporate and Criminal Fraud Accountability Act of 2002, 18 United States Code § 1348 (2009). https://www.law.cornell.edu/uscode/text/18/1348
Coulter, B. B. (2018). CFTC Can Regulate Cryptocurrencies as Commodities (Burr Alert, p. 2). Burr Forman LLP. https://www.burr.com/wp-content/uploads/2018/03/ALERT_CFTC-Can-Regulate-Cryptocurrencies-as-Commodities_Coulter.pdf
Global Blockchain Business Council. (2020). Chain Reaction: Blockchain Enters the Mainstream [Annual Report]. Accenture. https://www.lw.com/thoughtLeadership/gbbc-report-blockchain-enters-mainstream
Crowell & Moring. (2018). Cryptocurrency in Small Bytes: The CFTC Chalks Up a Preliminary Win [Client Alert]. https://www.crowell.com/NewsEvents/AlertsNewsletters/all/Cryptocurrency-in-Small-Bytes-The-CFTC-Chalks-Up-a-Preliminary-Win/pdf
Crowley, B. J. (2018). The Legal and Regulatory Issues Surrounding Cryptocurrency.
Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, 18 United States Code § 1029 (2015). https://www.law.cornell.edu/uscode/text/18/1029
Desai, V., Coderre, R., Kizzee, C., & Kalra, H. (2019). Retail and Hospitality Threat Trend report (No. 190147; p. 46). Accenture.
Devonshires. (2018). Litigation Know How: Staying Ahead of the Game. Devonshires. https://www.devonshires.com/wp-content/uploads/2017/07/Com-Lit-Brief-October-18.pdf
Dubois, S. M. (2019). A Baseline Assessment of Law Enforcement Cryptocurrency Investigations. University of Central Lancashire.
Duff, K. B., & Hays, G. (2018). Recent developments in the war on cryptocurrency fraud. The Receiver, 7, 1–7.
Google Scholar
Eastham, E. B. (2020). Morrison and cryptocurrencies: Is it time to revisit the extraterritorial application of rule 10B–5. Ga. J. Int’l & Comp. l., 48, 563.
Google Scholar
Elder, R., & Rotunda, J. (2018). Widespread Fraud Found in Cryptocurrency Offerings (Investor Alert: Cryptocurrencies). Texas State Securities Board. https://www.ssb.texas.gov/sites/default/files/CRYPTO%20SWEEP%20report%2002112019%20UPDATE.pdf
Elwell, C. K., Murphy, M. M., & Seitzinger, M. V. (2014). Bitcoin: Questions, Answers, and Analysis of Legal Issues (p. 20). Congressional Research Service.
Eversheds Sutherland Ltd. (2018). Navigating the issues Securities Enforcement Global Update. https://us.eversheds-sutherland.com/mobile/portalresource/lookup/poid/Z1tOl9NPluKPtDNIqLMRV56Pab6TfzcRXncKbDtRr9tObDdEpW3CmS3!/fileUpload.name=/Securities-Enforcement-Global-Update_Fall-2018.pdf
Federal Trade Commission Act, 15 United States Code § 45 (2012). https://www.law.cornell.edu/uscode/text/15/45
Financial Integrity Network. (2018). Virtual Currencies: Momentum Building For Regulation and Enforcement [Policy Alert].
Financial Conduct Authority. (2019). Cryptoasset investment scams. https://www.fca.org.uk/scamsmart/cryptoasset-investment-scams
Financial Conduct Authority. (2020). Forex trading scams. https://www.fca.org.uk/scamsmart/forex-trading-scams
Financial Conduct Authority. (2021). FCA Handbook. https://www.handbook.fca.org.uk/handbook/MAR/1/6.html?date=2016-03-07
Frankel, T. (2012). The ponzi scheme puzzle: A history and analysis of con artists and victims. Oxford University Press. https://doi.org/10.1093/acprof:osobl/9780199926619.001.0001
Article
Google Scholar
FSMA. (2020). Cryptocurrency fraud: The FSMA updates its list of suspicious sites (p. 1) [Warnings]. https://web3.cmvm.pt/SDI/IFs/app/docs/fsd852235.pdf
Gandal, N., Hamrick, J. T., Moore, T., & Oberman, T. (2018). Price manipulation in the Bitcoin ecosystem. Journal of Monetary Economics, 95, 86–96. https://doi.org/10.1016/j.jmoneco.2017.12.004
Article
Google Scholar
Gao, B., Wang, H., Xia, P., Wu, S., Zhou, Y., Luo, X., & Tyson, G. (2020). Tracking Counterfeit Cryptocurrency End-to-end. ArXiv Preprint ArXiv:2011.02673.
Garg, S. C., Sawhney, A. P., Tyagi, A., & Kanungo, B. P. (2019). Report of the Committee to propose specific actions to be taken in relation to Virtual Currencies (Committee on Virtual Currencies). Department of Economic Affairs, Ministry of Finance. https://dea.gov.in/sites/default/files/Approved%20and%20Signed%20Report%20and%20Bill%20of%20IMC%20on%20VCs%2028%20Feb%202019.pdf
Goodlett, B. (2020). Texas cracks down on cryptocurrency fraud: 2020 developments (Accelerate, p. 2). DLA Piper.
Gusenbauer, M. (2019). Google Scholar to overshadow them all? Comparing the sizes of 12 academic search engines and bibliographic databases. In Scientometrics (Vol. 118, Issue 1). Springer International Publishing. https://doi.org/10.1007/s11192-018-2958-5
Halverson, G. (2020). Global Payments 2020–30 A quantum shift in the next decade [Submission to RBA Payments Boards]. McLean Roche Consulting Group. https://www.rba.gov.au/payments-and-infrastructure/submissions/review-of-retail-payments-regulation/mclean-roche-consulting.pdf
Hays, G. (2018). Receiver keeping up with the cryptos. The Receiver, 6, 1–7.
Google Scholar
Hedrich, W., Chalmers, B., Viet, P. H., & Koh, J. (2018). 14 Shades of risk in Asia-Pacific. Marsh & McLennan Companies.
Henning, P. J. (2019). A Taxonomy of Cryptocurrency Enforcement Actions (SSRN Scholarly Paper ID 3483198). Social Science Research Network. https://papers.ssrn.com/abstract=3483198
Higgins, S. (2017). A Digital Currency Scam is Misusing the Rothschild Family Name. CoinDesk. https://www.coindesk.com/rothschild-advisory-warns-fraudulent-digital-currency
HM Treasury, Financial Conduct Authority, & Bank of England. (2018). Cryptoassets Taskforce: Final report (p. 58). https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/752070/cryptoassets_taskforce_final_report_final_web.pdf
Identity Theft and Assumption Deterrence Act of 1998, Pub. L. No. 3007, 18 United States Code (2006). https://www.law.cornell.edu/uscode/text/18/1028
Insikt Group. (2018). Shifting Patterns in Internet Use Reveal Adaptable and Innovative North Korean Ruling Elite. https://www.recordedfuture.com/north-korea-internet-usage/
Internet Engineering Task Force. (n.d.). Internet standards. IETF. Retrieved 16 March 2021, from https://www.ietf.org/standards/
Jiaying, J. (2020). Regulating Blockchain? A Retrospective Assessment of China’s Blockchain Policies and Regulations. Tsinghua China L. Rev., 12.
Jung, E., Le Tilly, M., Gehani, A., & Ge, Y. (2019). Data mining-based ethereum fraud detection. IEEE International Conference on Blockchain (Blockchain), 2019, 266–273.
Article
Google Scholar
Kamps, J., & Kleinberg, B. (2018). To the moon: Defining and detecting cryptocurrency pump-and-dumps. Crime Science. https://doi.org/10.1186/s40163-018-0093-5
Article
Google Scholar
Keller, P., Florian, M., & Böhme, R. (2021). Collaborative Deanonymization. ArXiv:2005.03535 [Cs]. http://arxiv.org/abs/2005.03535
Kethineni, S., & Cao, Y. (2019). The rise in popularity of cryptocurrency and associated criminal activity. International Criminal Justice Review. https://doi.org/10.1177/1057567719827051
Article
Google Scholar
Krone, M. J., Lukes, E. M., & McKibbin, C. (2018). Tales from the Crypt: Cryptocurrency is Here—How will crime insurers respond? The Fidelity Law Journal, XXIV, 86.
Lašas, K., Kasputytė, G., Užupytė, R., & Krilavičius, T. (2020). Fraudulent behaviour identification in ethereum blockchain. CEUR Workshop Proceedings [Electronic Resource]: IVUS 2020, Information Society and University Studies, Kaunas, Lithuania, 23 April, 2020: Proceedings. Aachen: CEUR-WS, 2020, Vol. 2698.
Law, J., & Martin, E. A. (2009). Fraud. In J. Law & E. A. Martin (Eds.), Oxford dictionary of law (7th ed.). Oxford.
Leuz, C. (2018). Regulatory approaches to combat retail investor fraud. SEC Investor Advisory Committee. https://www.sec.gov/spotlight/investor-advisory-committee-2012/iac030818-leuz-remarks.pdf
Levac, D., Colquhoun, H., & O’Brien, K. K. (2010). Scoping studies: Advancing the methodology. Implementation Science, 5(1), 69. https://doi.org/10.1186/1748-5908-5-69
Article
Google Scholar
LIFARS. (2018). Bitcoin & cryptocurrency investment prospects & hacking incidents. https://lifars.com/wp-content/uploads/2018/04/V2-Bitcoin-and-Cryptocurrency-Investment-Prospects-Hacking-Incidents.pdf
Lim, B., Murphy, G. E., Heda, K., Hannotin, C., Krauß, O., Popp, F., Maximenko, A., Klutchareva, E., & Low, C. (2019). Blockchain 2018 year-in-review. Debevoise & Plimptom.
Google Scholar
Liu, X. F., Jiang, X.-J., Liu, S.-H., & Tse, C. K. (2020). Knowledge discovery in cryptocurrency transactions: A survey. ArXiv Preprint ArXiv:2010.01031.
Lockhart, J., & Nuesser, A. (2018). Taking Caution: Financial Consumersand the Cryptoasset Sector (Investor Office. Innovative Research Group Inc.
Google Scholar
Lucking, D., & Aravind, V. (2019). Cryptocurrency as a Commodity: The CFTC’s Regulatory Framework. Global Legal Insights.
Mabille, C. (2020). Is cryptocurrency a store of value for the current crisis? Finatic. https://www.finatic.be/bitcoin.pdf
Malta Financial Services Authority. (2019). MSFA Warning—Bitcoin Future. https://web3.cmvm.pt/SDI/IFs/app/docs/fsd816904.pdf
Malyshev, P., Achilles, J., Ottenberg, J., & Stumacher, J. (2018). CFTC enforcement trends in 2017 and considerations for 2018. Journal of Investment Compliance, 19(3), 17–21. https://doi.org/10.1108/JOIC-04-2018-0021
Article
Google Scholar
Manojlovic, D. (2019). Report to the Vancouver Police Board (No. 1902P03). https://vancouver.ca/police/policeboard/agenda/2019/0221/1902P04-Proposed-CAPG-Resolutions.pdf?TB_iframe=true&width=370.8&height=658.8
Martín-Martín, A., Orduna-Malea, E., Thelwall, M., & Delgado López-Cózar, E. (2018). Google Scholar, Web of Science, and Scopus: A systematic comparison of citations in 252 subject categories. Journal of Informetrics, 12(4), 1160–1177. https://doi.org/10.1016/j.joi.2018.09.002
Article
Google Scholar
McAvoy, D., Queenin, C., & Becker, B. (2018). Court confirms CFTC jurisdiction over cryptocurrency fraud and that virtual currencies are commodities (Now + Next, p. 2). Nixon Peabody LLP. https://www.nixonpeabody.com/-/media/Files/Alerts/2018-March/Court-confirms-CFTC-jurisdiction-over-cryptocurrency-fraud.ashx?la=en
McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence. Research Report 75. Chapter 1: Cyber-dependent crimes. In Home Office Research Report 75.
McGuire, M. (2019). Social Media Platforms and the Cybercrime Economy (Into the Web of Profit). Bromium. https://www.bromium.com/wp-content/uploads/2019/02/Bromium-Web-of-Profit-Social-Platforms-Report.pdf
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2016). A fistful of Bitcoins: Characterizing payments among men with no names. Communications of the ACM, 59(4), 86–93. https://doi.org/10.1145/2896384
Article
Google Scholar
Moher, D., Liberati, A., Tetzlaff, J., & Altman, D. G. (2009). Preferred reporting items for systematic reviews and meta-analyses: The PRISMA Statement. PLoS Medicine, 6(7), 1–6. https://doi.org/10.1371/journal.pmed.1000097
Article
Google Scholar
Moore V. United States, (U.S. Supreme Court 1895).
Möser, M., Bohme, R., & Breuker, D. (2013). An inquiry into money laundering tools in the Bitcoin ecosystem. APWG ECrime Researchers Summit. https://doi.org/10.1109/eCRS.2013.6805780
Article
Google Scholar
Munn, Z., Peters, M. D. J., Stern, C., Tufanaru, C., McArthur, A., & Aromataris, E. (2018). Systematic review or scoping review? Guidance for authors when choosing between a systematic or scoping review approach. BMC Medical Research Methodology, 18(1), 1–7. https://doi.org/10.1186/s12874-018-0611-x
Article
Google Scholar
Murko, A., & Vrhovec, S. L. (2019). Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does. In Proceedings of the Third Central European Cybersecurity Conference, pp. 1–6.
Murphy, E. V., Murphy, M. M., & Seitzinger, M. V. (2015). Bitcoin: Questions, answers, and analysis of legal issues.
Musiala, R. A. Jr., Goody, T. M., Reynolds, V., Tenery, L., McGrath, M., Rowland, C., & Sekhri, S. (2020). Cryptocurrencies: Forensic techniques to meet the challenge of new fraud and corruption risks | FVS Eye on Fraud. AICPA. https://future.aicpa.org/resources/download/cryptocurrencies-forensic-techniques-to-face-new-fraud-and-corruption-risks
Najmy, W. G. (2019). Enhanced Tax Compliance for Cryptoasset Transactions. Available at SSRN 3499659.
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. 9.
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and Cryptocurrency Technologies.
Navarro, R. R. (2019). Preventative fraud measures for cryptocurrency exchanges: Mitigating the risk of cryptocurrency scams [M.S., Utica College]. http://search.proquest.com/docview/2312801484/abstract/7B22A14839754F47PQ/1
Nelson, R. M. (2019). Examining regulatory frameworks for digital currencies and blockchain (Testimony No. 7–5700; p. 15). Congressional Research Service. https://www.banking.senate.gov/imo/media/doc/Nelson%20Testimony%207-30-19.pdf
Ngai, K. (2014). Regulating cryptocurrency to prevent fraud and money laundering.
NHS National Services Scotland. (2020). NHS counter fraud services rolling COVID-19 intelligence alert no. 14. https://www.wihb.scot.nhs.uk/wp-content/uploads/2020/08/2020-08-03-CFS-Rolling-COVID-19-Intel-Alert-No14-Final.pdf
Nilsen, A. I. (2019). Limelight: Real-time detection of pump-and-dump events on cryptocurrency exchanges using deep learning. UiT Norges arktiske universitet.
Paré, G., Trudel, M. C., Jaana, M., & Kitsiou, S. (2015). Synthesizing information systems knowledge: A typology of literature reviews. Information and Management, 52(2), 183–199. https://doi.org/10.1016/j.im.2014.08.008
Article
Google Scholar
Parisi, D., Goldman, G., Baris, J. G., Nallengara, L., Sahni, R. A., Greene, N., Szaja, P. J., Reynolds, B., Anderson, S. W., & Oosterbaan, J. (2018). Regulators and courts clarify virtual currency regulation, but overall framework remains murky. Shearman & Sterling. http://www.legalexecutiveinstitute.com/wp-content/uploads/2018/05/345PM-Regulators.pdf
Peters, M. D. J., Godfrey, C. M., Khalil, H., McInerney, P., Parker, D., & Soares, C. B. (2015). Guidance for conducting systematic scoping reviews. International Journal of Evidence-Based Healthcare, 13(3), 141–146. https://doi.org/10.1097/XEB.0000000000000050
Article
Google Scholar
Peterson, J., Pearce, P. F., Ferguson, L. A., & Langford, C. A. (2017). Understanding scoping reviews: Definition, purpose, and process. Journal of the American Association of Nurse Practitioners, 29(1), 12–16. https://doi.org/10.1002/2327-6924.12380
Article
Google Scholar
Pham, M. T., Rajić, A., Greig, J. D., Sargeant, J. M., Papadopoulos, A., & Mcewen, S. A. (2014). A scoping review of scoping reviews: Advancing the approach and enhancing the consistency. Research Synthesis Methods, 5(4), 371–385. https://doi.org/10.1002/jrsm.1123
Article
Google Scholar
Phan, L., Li, S., & Mentzer, K. (2019). Blockchain technology and the current discussion on fraud. Computer Information Systems Journal.
Phillips, R., & Wilder, H. (2020). Tracing cryptocurrency scams: Clustering replicated advance-fee and Phishing Websites. ArXiv Preprint ArXiv:2005.14440.
Podgor, E. S. (2019). Cryptocurrencies and securities fraud: In need of legal guidance. Available at SSRN 3413384.
Pryzmont, P. (2016). An empirical study of how Bitcoin related incidents impact its price volatility. August, 62.
PYMNTS.com & Trulioo. (2019). Keeping crime out of crypto (AML/KYC Tracker). https://www.pymnts.com/wp-content/uploads/2019/07/AML-KYC-Tracker-July-2019.pdf
Reddy, E., & Minaar, A. (2018). Cryptocurrency: A tool and target for cybercrime. Acta Criminologica: Southern African Journal of Criminology, 31(3), 71–92.
Google Scholar
Reik, T. (2019). Bitcoin Revisited. Sprott Asset Management USA, Inc. https://www.sprottusa.com/media/2497/sprott-gold-report-bitcoin-revisited.pdf
Rochemont, S. (2020). A Cashless Society in 2019.
Rognone, L., Hyde, S., & Zhang, S. S. (2020). News sentiment in the cryptocurrency market: An empirical comparison with Forex. International Review of Financial Analysis, 69, 101462.
Article
Google Scholar
Ropes & Gray. (2019). CFTC amends regulations applicable to asset managers including excluded and exempt CPOs and CTAs; action may be required. http://www.ropesgray.com/en/newsroom/alerts/2019/12/CFTC-Amends-Regulations-Applicable-to-Asset-Managers-Including-Excluded-and-Exempt-CPOs-and-CTAs
Samsudeen, Z., Perera, D., & Fernando, M. (2019). Behavioral analysis of bitcoin users on illegal transactions. Advances in Science, Technology and Engineering Systems Journal, 4(2), 402–412. https://doi.org/10.25046/aj040250
Article
Google Scholar
Schär, F. (2021). Decentralized finance: On blockchain- and smart contract-based financial markets. Federal Reserve Bank of St. Louis. https://research.stlouisfed.org/publications/review/2021/02/05/decentralized-finance-on-blockchain-and-smart-contract-based-financial-markets
Scheau, M. C., Link to external site, this link will open in a new window, Crăciunescu, S. L., Brici, I., & Achim, M. V. (2020). A cryptocurrency spectrum short analysis. Journal of Risk and Financial Management; Basel, 13(8), 184. https://doi.org/10.3390/jrfm13080184
Scott, A. P. (2020). Fintech: Overview of Financial Regulators and Recent Policy Approaches (No. R46333; p. 38). Congressional Research Service. https://crsreports.congress.gov/product/pdf/R/R46333
Securities and Exchange Commission. (2013). Ponzi schemes using virtual currencies. SEC Pub. No. 153 (7/13).
Securities and Exchange Comimssion Philippines. (2020). SEC Advisory. https://www.sec.gov.ph/wp-content/uploads/2020/10/2020Advisory_BITCOIN-DIGITAL.pdf
Semenihin, A., & Kondrashin, A. (2018). Leading role of state as a regulator of crypto currency. 217(ICSEAL), 329–334. https://doi.org/10.2991/icseal-18.2018.47
Štefanko, L. (2018). Cryptocurrency scams on Android (ESET Research Whitepapers, p. 15). ESET. https://www.welivesecurity.com/wp-content/uploads/2018/02/Cryptocurrency_Scams_on_Android.pdf
Shearman & Sterling. (2018). Financial Regulatory Developments Focus. 39. https://www.shearman.com/-/media/Files/Perspectives/2018/10/Financial-Regulatory-Developments-Focus--Issue-39-October-5-2018-FIAFR-10052018.pdf?la=en&hash=9FFA4488F1F5BECB70A01332BA0C2FEA9310BCDA
Sureshbhai, P. N., Bhattacharya, P., & Tanwar, S. (2020). KaRuNa: A blockchain-based sentiment analysis framework for fraud cryptocurrency schemes. IEEE International Conference on Communications Workshops (ICC Workshops). https://doi.org/10.1109/ICCWorkshops49005.2020.9145151
Article
Google Scholar
Torres, C. F., Steichen, M., & State, R. (2019). The art of the scam: demystifying honeypots in ethereum smart contracts.
Toyoda, K., Ohtsuki, T., & Mathiopoulos, P. T. (2017). Identification of high yielding investment programs in bitcoin via transactions pattern analysis. 2018-Janua, pp. 1–6. https://doi.org/10.1109/GLOCOM.2017.8254420
Toyoda, K., Ohtsuki, T., & Mathiopoulos, P. T. (2018). Multi-class bitcoin-enabled service identification based on transaction history summarization. September, pp. 1129–1136. https://doi.org/10.1109/Cybermatics
Toyoda, K., Ohtsuki, T., & Mathiopoulos, P. T. (2019). Time series analysis for bitcoin transactions: The case of Pirate@40’s HYIP scheme. IEEE International Conference on Data Mining Workshops, ICDMW, 2018-Novem, pp. 151–155. https://doi.org/10.1109/ICDMW.2018.00028
Toyoda, K., Mathiopoulos, P. T., & Ohtsuki, T. (2019a). A novel methodology for HYIP operators’ bitcoin addresses identification. IEEE Access, 7, 74835–74848.
Article
Google Scholar
U.S. Securities and Exchange Commission. (n.d.). Insider Trading. Investor.Gov. Retrieved 4 March 2021, from https://www.investor.gov/introduction-investing/investing-basics/glossary/insider-trading
urRehman, M. H., Salah, K., Damiani, E., & Svetinovic, D. (2020). Trust in blockchain cryptocurrency ecosystem. IEEE Transactions on Engineering Management. https://doi.org/10.1109/TEM.2019.2948861
Article
Google Scholar
Vasek, M., Bonneau, J., Castellucci, R., Keith, C., & Moore, T. (2017). The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets. In J. Grossklags & B. Preneel (Eds.), Financial cryptography and data security (Vol. 9603, pp. 609–618). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-54970-4_36
Vasek, M. (2017). Measuring Bitcoin-based cybercrime. University of Tulsa.
Vasek, M., & Moore, T. (2018). Analyzing the Bitcoin Ponzi scheme ecosystem. https://doi.org/10.1007/978-3-662-58820-8_8
Vasek, M., & Moore, T. (2015). There’s no free lunch, even using Bitcoin: Tracking the popularity and profits of virtual currency scams. In R. Böhme & T. Okamoto (Eds.), Financial cryptography and data security (pp. 44–61). Springer.
Chapter
Google Scholar
Vrazel, N. (2019). Betting it all on the flip of a coin: Regulating cryptocurrency initial coin offerings and protecting investors. S. Tex. l. Rev., 60, 527.
Google Scholar
Waxenbaum, S. (2019). The SEC and ICOs: Connections between digital assets and citrus groves. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3385064
Article
Google Scholar
Weber, K., Schütz, A. E., Fertig, T., & Müller, N. H. (2020). Exploiting the Human Factor: Social Engineering Attacks on Cryptocurrency Users. In P. Zaphiris & A. Ioannou (Eds.), Learning and Collaboration Technologies. Human and Technology Ecosystems (pp. 650–668). Springer International Publishing. https://doi.org/10.1007/978-3-030-50506-6_45
Webroot. (2018). Webroot Threat Research Review [White Paper]. https://www-cdn.webroot.com/2415/4662/3914/Threat-Roundup-Review-Whitepaper.pdf
Wright, J. (2018). Don’t @ Me: Hunting Twitter Bots at Scale (p. 43). Duo Security.
Wu, J., Yuan, Q., Lin, D., You, W., Chen, W., Chen, C., & Zheng, Z. (2020). Who are the phishers? Phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems.
Xia, P., Wang, H., Luo, X., Wu, L., Zhou, Y., Bai, G., Xu, G., Huang, G., & Liu, X. (2020). Don’t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams. ArXiv Preprint ArXiv:2007.13639.
Xia, P., Wang, H., Zhang, B., Ji, R., Gao, B., Wu, L., Luo, X., & Xu, G. (2020b). Characterizing cryptocurrency exchange scams. Computers & Security, 98, 101993. https://doi.org/10.1016/j.cose.2020.101993
Article
Google Scholar
Xie, R. (2019). Why China had to “Ban” Cryptocurrency but the U.S. did not: A Comparative Analysis of Regulations on Crypto-Markets Between the U.S. and China.
Yli-Huumo, J., Ko, D., Choi, S., Park, S., & Smolander, K. (2016). Where is current research on Blockchain technology?—A systematic review. PLoS ONE, 11(10), 1–27. https://doi.org/10.1371/journal.pone.0163477
Article
Google Scholar
Yuan, Q., Huang, B., Zhang, J., Wu, J., Zhang, H., & Zhang, X. (2020). Detecting Phishing scams on Ethereum based on transaction records. IEEE International Symposium on Circuits and Systems (ISCAS), 2020, 1–5.
Google Scholar
Zetzsche, D., Buckley, R., & Amer, D. (2017). The ICO Gold Rush: It’s a scam, it’s a bubble, it’s a super challenge for regulators. In EBI Working Paper Series (Issue 18).