2018
DOI: 10.1108/jmlc-07-2017-0031
|View full text |Cite
|
Sign up to set email alerts
|

Illicit Bitcoin transactions: challenges in getting to the who, what, when and where

Abstract: Purpose The purpose of this paper is to highlight the intelligence and investigatory challenges experienced by law enforcement agencies in discovering the identity of illicit Bitcoin users and the transactions that they perform. This paper proposes solutions to assist law enforcement agencies in piecing together the disparate and complex technical, behavioural and criminological elements that make up cybercriminal offending. Design/methodology/approach A literature review was conducted to highlight the main … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(23 citation statements)
references
References 21 publications
(21 reference statements)
0
23
0
Order By: Relevance
“…The full list of the selected papers can be seen in Table 1. Electrical Engineering in Japan [24] Software Engineering and Algorithms in Intelligent Systems [25] Accounting and Finance [26] Journal of Economics and Business [27] Production and Operations Management [28] Quality-Access to Success [29,30] European Business Organization Law Review [31] NMIMS Management Review [9] Strategic Change-Briefings in Entrepreneurial Finance [32] International Journal of Environmental Research and Public Health [33] Proceedings of The International Conference on Business Excellence [34] Technological Forecasting and Social Change [35] 2018 IEEE International Conference on Intelligence and Security Informatics (ISI) [36] Journal of Investment Management [37] Blockchain Technology: Platforms, Tools and Use Cases [38] Handbook of Blockchain, Digital Finance, and Inclusion, Vol 1: Cryptocurrency, Fintech, Insurtech, and Regulation [39] 2018 9th IFIP International Conference on New Technologies, Mobility, and Security (NTMS) [40] Journal of Money Laundering Control [41] Australian Feminist Studies [42] Internet Science, INSCI 2017 [43] Emerging Markets Finance and Trade [44] Financial and Credit Activity-Problems of Theory and Practice [45] 2018 6th International Symposium on Digital Forensics and Security (ISDFS) [46] Journal of Management Information Systems [47] Journal of Risk Finance [48,49] Review of International Business and Strategy [50] International Journal [51] Financial Innovation [52] Business Horizons [53] Enfoque UTE [54] Computer [55] Symmetry-Basel…”
Section: Paper Informationmentioning
confidence: 99%
See 3 more Smart Citations
“…The full list of the selected papers can be seen in Table 1. Electrical Engineering in Japan [24] Software Engineering and Algorithms in Intelligent Systems [25] Accounting and Finance [26] Journal of Economics and Business [27] Production and Operations Management [28] Quality-Access to Success [29,30] European Business Organization Law Review [31] NMIMS Management Review [9] Strategic Change-Briefings in Entrepreneurial Finance [32] International Journal of Environmental Research and Public Health [33] Proceedings of The International Conference on Business Excellence [34] Technological Forecasting and Social Change [35] 2018 IEEE International Conference on Intelligence and Security Informatics (ISI) [36] Journal of Investment Management [37] Blockchain Technology: Platforms, Tools and Use Cases [38] Handbook of Blockchain, Digital Finance, and Inclusion, Vol 1: Cryptocurrency, Fintech, Insurtech, and Regulation [39] 2018 9th IFIP International Conference on New Technologies, Mobility, and Security (NTMS) [40] Journal of Money Laundering Control [41] Australian Feminist Studies [42] Internet Science, INSCI 2017 [43] Emerging Markets Finance and Trade [44] Financial and Credit Activity-Problems of Theory and Practice [45] 2018 6th International Symposium on Digital Forensics and Security (ISDFS) [46] Journal of Management Information Systems [47] Journal of Risk Finance [48,49] Review of International Business and Strategy [50] International Journal [51] Financial Innovation [52] Business Horizons [53] Enfoque UTE [54] Computer [55] Symmetry-Basel…”
Section: Paper Informationmentioning
confidence: 99%
“…Irwin et al [41] point out that a solution could come from policies that would support data sharing between different members from the law enforcement, intelligence entities, and organizations dealing with cyber-security as well as the FinTech industry. The result would be the creation of behavioral models and threat landscapes that could help recognize the identities behind the attacks.…”
Section: Cyber-risksmentioning
confidence: 99%
See 2 more Smart Citations
“…Reclamation of these stolen funds is identified as a major risk to users by Tu and Meredith (2015). Irwin and Turner (2018) argue that cryptocurrency systems, in contrast with traditional money transmission businesses and financial institutions, are relatively unhindered by anti-money laundering and counter-terrorism financing (AML/CTF) regulations. In addition, these systems do not collect the necessary Personal Identifiable Information (PII) that will allow for the implementation of strict financial transaction reporting procedures for the purposes of mitigating illicit financial activity and the misappropriation of funds (Irwin and Turner, 2018).…”
Section: The Regulatory Environmentmentioning
confidence: 99%