Fighting Fire with Fire: Combating Criminal Abuse of Cryptocurrency with a P2P Mindset
Galit Klein (),
Djamchid Assadi () and
Moti Zwilling ()
Additional contact information
Galit Klein: Ariel University
Djamchid Assadi: Burgundy School of Business, Université Bourgogne Franche-Comté
Moti Zwilling: Ariel University
Information Systems Frontiers, 2025, vol. 27, issue 3, No 14, 1153-1179
Abstract:
Abstract As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as legislation and regulation are proposed. However, these are foreign to the P2P spirit of trusted interactions and transactions. This paper aims to identify solutions that align with P2P technologies and relationships to combat the criminal use of cryptocurrencies. In line with our research question, we adopt the method of grounded theory. Based on 45 interviews on 1,500 h of podcasts, blogs, and TV shows, we observed how experts in finance, technology, and cryptocurrency analyzed the hazards, as well as, the solutions for cryptocurrencies schemes. The results indicate that this new technology has also engendered new types of criminal schemes; thus, we can categorize malicious behaviors into conventional and P2P hazards. In addition, experts also point to conventional and P2P solutions to crypto-crimes at the individual, organizational, communal, and national levels. As such, they underscore the discrepancies between those who push for solutions favoring conventional regulatory forces versus those advocating for normative legitimacy, hence pulling the industry to preserve the P2P identity. Following institutional theory and the need for legitimacy in this new and disruptive industry, we discuss the tension between agendas and suggest unorthodox solutions for an innovative yet troubled technology.
Keywords: Cryptocurrency; Bitcoin; Cybercrime; P2P; Institutional theory; Cybersecurity (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s10796-024-10498-7 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:infosf:v:27:y:2025:i:3:d:10.1007_s10796-024-10498-7
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/10796
DOI: 10.1007/s10796-024-10498-7
Access Statistics for this article
Information Systems Frontiers is currently edited by Ram Ramesh and Raghav Rao
More articles in Information Systems Frontiers from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().