Skip to main content

Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12059))

Included in the following conference series:

Abstract

With the massive growth of cryptocurrency markets in recent years has come an influx of new users and investors, pushing the overall number of owners into the millions. At the same time, the number of distinct cryptocurrencies has exploded to over 4,900. In this burgeoning and chaotic “cryptojungle,” new and unexplored incentives and risks drive the behavior of users and non-users of cryptocurrencies. While previous research has focused almost exclusively on Bitcoin, other cryptocurrencies and utility tokens have been ignored. This paper presents findings from an interview study of cryptocurrency users and non-users \((N=20)\). We specifically focus on their perceptions and management of cryptocurrency risks as well as their reasons for or against involvement with cryptocurrencies. Our results suggest that associated risks and mitigation strategies (among other factors) might be specific to a particular crypto-asset and its application area. Further, we identify misunderstandings of both users and non-users that might lead to skewed risk perceptions or dangerous errors. Lastly, we discuss ways of aiding users with managing risks, as well as design implications for coin management tools.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    We use the prefix “PU” when referring to those participants who used crypto-assets at the time of the interview.

  2. 2.

    We use the prefix “PN” to refer to those participants who did not use crypto-assets at the time of the interview.

  3. 3.

    A pejorative term for crypto-assets that have no intrinsic value.

References

  1. BIP 39 Standard. https://github.com/bitcoinbook/bitcoinbook/blob/

  2. Cointelegraph: ICO Scams (2018). https://cointelegraph.com/news/new-study-says-80-percent-of-icos-conducted-in-2017-were-scams. Accessed 23 Sept 2019

  3. Cointelegraph: Ponzi Schemes (2019). https://cointelegraph.com/news/from-ponzi-schemes-to-ico-exits-ethereums-blockchain-has-been-the-platform-of-choice-for-scammers. Accessed 23 Sept 2019

  4. Abramova, S., Böhme, R.: Perceived benefit and risk as multidimensional determinants of bitcoin use: a quantitative exploratory study. In: Proceedings of the Thirty Seventh International Conference on Information Systems (ICIS), Dublin, Ireland (2016)

    Google Scholar 

  5. Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34–51. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_4

    Chapter  Google Scholar 

  6. Bitcoin.com: Illegal Activity No Longer Dominant Use of Bitcoin: DEA Agent. https://news.bitcoin.com/illegal-activity-use-bitcoin-dea-agent/. Accessed 28 Feb 2019

  7. Blockplate: The BIP39 (Mnemonic Seed) Wallet List (2019). https://www.blockplate.com/blogs/blockplate/list-of-bip39-wallets-mnemonic-seed. Accessed 20 July 2019

  8. Böhme, R., Christin, N., Edelman, B., Moore, T.: Bitcoin: economics, technology, and governance. J. Econ. Perspect. 29(2), 213–38 (2015)

    Article  Google Scholar 

  9. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy, pp. 104–121, May 2015. https://doi.org/10.1109/SP.2015.14

  10. CoinDesk: Mt. Gox Allegedly Loses \$350 Million in Bitcoin (744,400 BTC), Rumoured to be Insolvent (2014). https://www.coindesk.com/mt-gox-loses-340-million-bitcoin-rumoured-insolvent. Accessed 27 Apr 2019

  11. CoinDesk: From Law to Lawlessness: Bits of the Untold QuadrigaCX Story (2019). https://www.coindesk.com/from-law-to-lawlessness-bits-of-the-untold-quadrigacx-story. Accessed 27 Apr 2019

  12. CoinMarketCap: Distinct Cryptocurrencies (2019). https://coinmarketcap.com/all/views/all/. Accessed 15 Sept 2019

  13. Conti, M., Sandeep Kumar, E., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutorials 20(4), 3416–3452 (2018)

    Article  Google Scholar 

  14. Corbin, J., Strauss, A.: Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. SAGE Publications (2014). https://books.google.ca/books?id=hZ6kBQAAQBAJ

  15. Eskandari, S., Barrera, D., Stobert, E., Clark, J.: A first look at the usability of bitcoin key management. In: NDSS Symposium 2015. Internet Society (2015)

    Google Scholar 

  16. Gao, X., Clark, G.D., Lindqvist, J.: Of two minds, multiple addresses, and one ledger: characterizing opinions, knowledge, and perceptions of bitcoin across users and non-users. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. CHI 2016, pp. 1656–1668. ACM, New York (2016). https://doi.org/10.1145/2858036.2858049

  17. Goldfeder, S., Kalodner, H., Reisman, D., Narayanan, A.: When the cookie meets the blockchain: privacy risks of web payments via cryptocurrencies. Proc. Priv. Enhancing Technol. 4, 179–199 (2018)

    Article  Google Scholar 

  18. Grant, G., Hogan, R.: Bitcoin: risks and controls. J. Corp. Account. Finance 26(5), 29–35 (2015)

    Article  Google Scholar 

  19. Khairuddin, I.E., Sas, C., Clinch, S., Davies, N.: Exploring motivations for bitcoin technology usage. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2872–2878. ACM (2016)

    Google Scholar 

  20. Kiran, M., Stanett, M.: Bitcoin Risk Analysis. NEMODE Policy Paper (2015)

    Google Scholar 

  21. Krombholz, K., Judmayer, A., Gusenbauer, M., Weippl, E.: The other side of the coin: user experiences with bitcoin security and privacy. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 555–580. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_33

    Chapter  Google Scholar 

  22. Kumar, R.L., Smith, M.A., Bannerjee, S.: User interface features influencing overall ease of use and personalization. Inf. Manag. 41(3), 289–302 (2004)

    Article  Google Scholar 

  23. Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference. IMC 2013, pp. 127–140. ACM, New York (2013). https://doi.org/10.1145/2504730.2504747

  24. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). http://bitcoin.org/bitcoin.pdf. Accessed 28 Feb 2019

  25. Sas, C., Khairuddin, I.E.: Design for trust: an exploration of the challenges and opportunities of bitcoin users. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. CHI 2017, pp. 6499–6510. ACM, New York (2017). https://doi.org/10.1145/3025453.3025886

Download references

Acknowledgements

This research has been supported in part by a gift from Scotiabank to UBC and by an NSERC Engage Grant (with Symetria), #EGP538930-19. We would like to thank members of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE), who provided their feedback on the reported research and earlier versions of the paper. We thank our anonymous reviewers for all the feedback and suggestions they provided to improve the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artemij Voskobojnikov .

Editor information

Editors and Affiliations

Appendices

Appendices

A Interview Questions

Interview guides for both users and non-users of cryptocurrencies follow. Research questions that were addressed are in bold.

1.1 A.1 Users of Cryptocurrencies

RQ1: What are the current usages of cryptocurrencies?

Q1. Please tell me about how you got into cryptocurrencies.

Q2. How much money have you spent?

Q3. What do you use cryptocurrencies for?

Q3.1 How many transactions do you perform?

Q4. How has this usage changed over time? If it did, why?

Q5. How many different currencies do you own?

Q5.1 What three currencies have you invested the most money in? Why?

Q5.2 Do you use these currencies for different use cases? Why?

Q6. What factors influence you when making a decision to invest in a currency?

Q6.1 How well do you research the currency prior to an investment?

Q6.2 How knowledgeable are you about currencies that you have invested in?

Q6.3 Can you explain the concept behind blockchain to me?

RQ2: How do holders manage their cryptocurrency?

Q.7 How do you store your cryptocurrencies?

Q7.1 Please name the wallets you personally use the most.

Q7.2 Why did you choose these wallets?

Q7.3 How many different wallets do you use?

Q7.4 For how many of these wallets do you own the private key?

Q7.5 Can you explain to me what a private key is?

Q7.6 What do you need the private key for?

Q7.8 How is a private key different from a public key?

Q7.9 Do you store different currencies in different wallets?

RQ3: What is the perception of cryptocurrency-related security risk?

Q8 Have you ever lost cryptocurrency?

Q8.1 How much money did you lose?

Q8.2 Were you able to recover the key(s)?

Q9 What risks are you personally aware of when it comes to cryptocurrencies?

Q9.1 What is the most severe one according to you? Why?

Q10 What measures do you use to mitigate those risks? (RQ4)

Q10.1 What measures worked and which ones did not? Why?

Q11. In what ways do you protect different cryptocurrencies? (RQ5)

Q11.1 What factors influence your decisions?

1.2 A.2 Non-Users of Cryptocurrencies

RQ1: What are the current usages of cryptocurrencies?

Q1. What payment systems do you use in your daily life?

Q2. How did you hear about cryptocurrencies for the first time?

Q3. What cryptocurrencies have you heard of?

Q4. How do you view your understanding of cryptocurrencies?

Q4.1 And of the underlying technological background?

Q5. What do you think cryptocurrencies are used for?

Q6. Why do you believe people purchase cryptocurrencies?

Q7. Why did you choose not to purchase cryptocurrencies?

Q7.1 What would have to happen for you to reconsider?

RQ3: What is the perception of cryptocurrency-related security risk?

Q8. What risks come with the usage of cryptocurrencies?

Q8.1 What is the most severe one? Why?

Q9. Can you think of ways users can protect themselves? (RQ4)

B Participant Demographics

The following two tables display the participants’ demographics. The number of owned crypto-assets was self-reported and the ownership was not validated (Tables 1 and 2).

Table 1. User demographics
Table 2. Non-user demographics

C Schematic Overview of the Results

The following figure depicts the findings of the interview study. Based on our research questions we created five groups, use cases, reasons against an involvement, perceived risks, reasons for losses, and risk management. We use distinct colors for users and non-users and show relationships where appropriate (Fig. 1).

Fig. 1.
figure 1

Findings overview

Rights and permissions

Reprints and permissions

Copyright information

© 2020 International Financial Cryptography Association

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Voskobojnikov, A., Obada-Obieh, B., Huang, Y., Beznosov, K. (2020). Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users. In: Bonneau, J., Heninger, N. (eds) Financial Cryptography and Data Security. FC 2020. Lecture Notes in Computer Science(), vol 12059. Springer, Cham. https://doi.org/10.1007/978-3-030-51280-4_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-51280-4_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-51279-8

  • Online ISBN: 978-3-030-51280-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics