Sketching Bitcoin: Empirical Research of Digital Affordances

Chapter

Abstract

Velasco discusses contemporary literature on Bitcoin and distinguish between technical and social research, in an effort to provide a basis for identifying native social structures within this digital assemblage. The chapter is particularly interested in digital research sprouted from the technical affordances of digital objects, yet directed towards socio-political enquiries. With this as a guidance, Velasco develops indicators and a method to map some of the entities of the Bitcoin network on a geographical canvas. The chapter presents this method in detail, and discusses what it is able to show and what are its attached limitations. Ultimately, Velasco argues that many digital methods share unavoidable constraints for social research, embedded in their own digital objects: digital grammar, framework design intentions and epistemological clauses.

References

  1. Agre, P. (1994) Surveillance and Capture: Two Models of Privacy. The Information Society 10(2): 101–27.CrossRefGoogle Scholar
  2. Androulaki, E., Karame, G., Roeschlin, M., et al. (2013) Evaluating User Privacy in Bitcoin. In A.-R. Sadeghi (Ed.), Financial Cryptography and Data Security (Berlin, Heidelberg: Springer), pp. 34–51.CrossRefGoogle Scholar
  3. Baumann, A., Fabian, B. and Lischke, M. (2014) Exploring the Bitcoin Network. Proceedings of 10th International Conference on Web Information Systems and Technologies (Barcelona), pp. 369–74.Google Scholar
  4. Beer, D. (2012) Using Social Media Data Aggregators to Do Social Research. Sociological Research Online 17(3): 10.CrossRefGoogle Scholar
  5. Bergstra, J. and Weijland, P. (2014) Bitcoin: A Money-like Informational Commodity. Working Paper (University of Amsterdam), http://arxiv.org/pdf/1402.4778.pdf (accessed 9 January 2016).
  6. Berry, D. (2014) Critical Theory and the Digital (London: Bloomsburry).Google Scholar
  7. Biryukov, A., Khovratovich, D. and Pustogarov, I. (2014) Deanonymisation of Clients in Bitcoin P2P Network. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (New York), pp. 15–29.Google Scholar
  8. Bitcoin Block Explorer – Blockchain.info (2015) https://blockchain.info (accessed 7 January 2016).
  9. Boase, R. (2013) Cypherpunks, Bitcoin & the Myth of Satoshi Nakamoto. Cybersalon Nov 5: http://www.cybersalon.org/cypherpunk/ (accessed 10 January 2016).
  10. Castelle, M. (2013) Relational and Non-Relational Models in the Entextualization of Bureaucracy. Computational Culture 3: http://computationalculture.net/article/relational-and-non-relational-models-in-the-entextualization-of-bureaucracy (accessed 9 January 2016).
  11. Cawrey, D. (2013) Baidu and China Telecom Stop Accepting Bitcoin, Price Slumps Again. CoinDesk. 7 Dec: http://www.coindesk.com/baidu-stops-bitcoin-price-slumps-again (accessed 10 January 2016).
  12. Cramer, F. (2013) What Is ‘Post-digital’? APRJA 3(1): http://www.aprja.net/?p=1318 (accessed 9 January 2016).
  13. Cusumano, M. and Goeldi, A. (2013) New Businesses and New Business Models. In W. Dutton (Ed.), The Oxford Handbook of Internet Studies (Oxford: Oxford University Press), pp. 239–61.Google Scholar
  14. de Jong, E., Tkacz, N. and Velasco, P. (2015) ‘Live as Friends and Count as Enemies’: On Digital Cash and the Media of Payment. In G. Lovink, N. Tkacz, and P. de Vries (Eds.), Moneylab Reader: An Intervention in Digital Economy (Amsterdam: Institute of Network Cultures), pp. 257–67.Google Scholar
  15. FAQ – Bitcoin (2015) https://bitcoin.org/en/faq (accessed 9 January 2016).
  16. Franco, E. (2015) Inside the Chinese Bitcoin Mine That’s Grossing $1.5M a Month. Motherboard 6 Feb: https://motherboard.vice.com/read/chinas-biggest-secret-bitcoin-mine (accessed 10 January 2016).
  17. Gehl, R. W. (2014) Power/Freedom on the Dark Web: A Digital Ethnography of the Dark Web Social Network. New Media & Society 18(7): 1219–35.Google Scholar
  18. Gerlitz, C. and Helmond, A. (2013) The Like Economy: Social Buttons and the Data-Intensive Web. New Media & Society 15(8): 1348–65.CrossRefGoogle Scholar
  19. Global Legal Research Directorate (2014) Regulation of Bitcoin in Selected Jurisdictions. Law Library of Congress: http://www.loc.gov/law/help/bitcoin-survey/?loclr=bloglaw (accessed 9 January 2016).
  20. Graham, M., Hale, S. and Stephens, M. (2012) Featured Graphic: Digital Divide: The Geography of Internet Access. Environment and Planning A 44(5): 1009–10.CrossRefGoogle Scholar
  21. Internet Live Statistics (2015) Internet Users by Country (2014). http://www.internetlivestats.com/internet-users-by-country (accessed 12 January 2016).
  22. Jack, W. and Suri, T. (2011) Mobile Money: The Economics of M-Pesa. Working Paper 16721 (National Bureau of Economic Research, USA), http://www.nber.org/papers/w16721 (accessed 10 January 2016).
  23. Karlstrøm, H. (2014) Do Libertarians Dream of Electric Coins? The Material Embeddedness of Bitcoin. Distinktion: Scandinavian Journal of Social Theory 15(1): 23–36.CrossRefGoogle Scholar
  24. Kitchin, R. (2016) Thinking Critically About and Researching Algorithms. Information, Communication & Society 20(1): 14–29.Google Scholar
  25. Kitchin, R. and Dodge, M. (2011) Code/Space: Software and Everyday Life (Cambridge, MA: MIT Press).CrossRefGoogle Scholar
  26. Kittler, F. (1995) There Is No Software. ctheory. http://journals.uvic.ca/index.php/ctheory/article/view/14655/5522 (accessed 12 January 2016).
  27. Kondor, D., Pósfai, M., Csabai, I. and Vattay, G. (2014) Do the Rich Get Richer? An Empirical Analysis of the Bitcoin Transaction Network. PLoS One 9(2): e97205.CrossRefGoogle Scholar
  28. Laszka, A., Johnson, B. and Grossklags, J. (2015) When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks between Mining Pools. 2nd Workshop on Bitcoin Research (San Juan: Puerto Rico).CrossRefGoogle Scholar
  29. Latour, B. (2007) Reassembling the Social: An Introduction to Actor-Network-Theory (Oxford: Oxford University Press).Google Scholar
  30. Law, J. and Ruppert, E. (2013) The Social Life of Methods. Journal of Cultural Economy 6(3): 229–40.CrossRefGoogle Scholar
  31. Huang, D., Dharmdasani, H., Meiklejohn, S., et al. (2014) Botcoin: Monetizing Stolen Cycles. Paper presented at NDSS 2014 Symposium (San Diego, USA), http://cseweb.ucsd.edu/~snoeren/papers/botcoin-ndss14.pdf (accessed 10 March 2016).
  32. Litke, P. and Stewart, J. (2014) BGP Hijacking for Cryptocurrency Profit. Dell SecureWorks R7 August: https://www.secureworks.com/research/bgp-hijacking-for-cryptocurrency-profit (accessed 6 January 2016).
  33. Lovink, G. and Zehle, S. (2005) Incommunicado Reader (Amsterdam: Institute of Network Cultures).Google Scholar
  34. Lupton, D. (2014) Digital Sociology (London: Routledge).Google Scholar
  35. Lury, C. and Wakeford, N. (2012) Introduction: A Perpetual Inventory. In C. Lury and N. Wakeford (Eds.), Inventive Methods: The Happening of the Social (London: Routledge), pp. 1–25.Google Scholar
  36. Mackenzie, A. and McNally, R. (2013) Living Multiples: How Large-Scale Scientific Data-Mining Pursues Identity and Differences. Theory, Culture & Society 30(4): 72–91.CrossRefGoogle Scholar
  37. Marres, N. (2012) The Redistribution of Methods: On Intervention in Digital Social Research, Broadly Conceived. The Sociological Review 60(S1): 139–65.CrossRefGoogle Scholar
  38. Marres, N. (2015) Why Map Issues? On Controversy Analysis as a Digital Method. Science, Technology & Human Values 40(5): 655–86.CrossRefGoogle Scholar
  39. Marres, N. and Weltevrede, E. (2013) Scraping the Social? Issues in Live Social Research. Journal of Cultural Economy 6(3): 313–35.CrossRefGoogle Scholar
  40. Maurer, B. (2015) How Would you Like to Pay: How Technology Is Changing the Future of Money (Durham: Duke University Press).CrossRefGoogle Scholar
  41. Maurer, B., Nelms, T. and Swartz, L. (2013) ‘When Perhaps the Real Problem Is Money Itself!’: The Practical Materiality of Bitcoin. Social Semiotics 23(2): 261–77.CrossRefGoogle Scholar
  42. Meiklejohn, S., Pomarole, M., Jordan, G., et al. (2013) A Fistful of Bitcoins: Characterizing Payments among Men with No Names. In Proceedings of the 2013 Conference on Internet Measurement Conference (New York, USA), 127–40.Google Scholar
  43. Mersch, Y. (2014) Euro Banknotes – A Means of Payment Recognised Worldwide. Speech given at the Bergeldsymposium of the Deutsche Bank 19 May, https://www.ecb.europa.eu/press/key/date/2014/html/sp140519.en.html (accessed 15 January 2016).
  44. Rogers, R. (2009) The End of the Virtual: Digital Methods (Amsterdam: University of Amsterdam Press).CrossRefGoogle Scholar
  45. Ruppert, E. (2012) Category. In C. Lury and N. Wakeford (Eds.), Inventive Methods: The Happening of the Social (London: Routledge), pp. 36–47.Google Scholar
  46. Ruppert, E., Law, J. and Savage, M. (2013) Reassembling Social Science Methods: The Challenge of Digital Devices. Theory, Culture & Society 30(4): 22–46.CrossRefGoogle Scholar
  47. Scott, B. (2014) Visions of a Techno-Leviathan: The Politics of the Bitcoin Blockchain. E-International Relations 1 Jun: http://www.e-ir.info/2014/06/01/visions-of-a-techno-leviathan-the-politics-of-the-bitcoin-blockchain/ (accessed 10 January 2016).
  48. Smyth, L. (2014) The Politics of Bitcoin. Simulacrum 7 Mar: http://simulacrum.cc/2014/03/07/the-politics-of-bitcoin (accessed 6 January 2016).
  49. Wynn, J. R. (2009) Digital Sociology: Emergent Technologies in the Field and the Classroom. Sociological Forum 24(2): 448–56.Google Scholar

Copyright information

© The Author(s) 2016

Authors and Affiliations

  1. 1.University of WarwickCoventryUK

Personalised recommendations