Curbing crypto deception: evaluating risks, mitigating prac-tices and regulatory measures for preventing fraudulent transactions in the middle east

Autores/as

DOI:

https://doi.org/10.5281/zenodo.13732337

Resumen

-

Descargas

Los datos de descargas todavía no están disponibles.

Citas

A. Crypto: ‘' Phishing attack on MyEtherWallet affects multiple users in Saudi Arabia’', Electronic resource, 2018

A. Dahdal: ‘'Finance and fairness: enhancing the customer dispute resolution scheme (CDRS) in the Qatar financial centre (QFC)’', Law and Financial Markets Review, 12, 2018, pp. 133 - 40

A. Miller, M. Moeser, K. Lee, and A. Narayanan: ‘'An Empirical Analysis of Linkability in the Monero Blockchain’', 2017

A. Trozze, J. Kamps, E. A. Akartuna, F. J. Hetzel, B. Kleinberg, T. Davies, and S. D. Johnson: ‘'Cryptocurrencies and future financial crime’', Crime Sci, 11, (1), 2022, pp. 1

A. Zohar: ‘'Bitcoin: under the hood’', Commun. ACM, 58, (9), 2015, pp. 104–13

BIS: ‘'Central bank digital currencies: foundational principles and core features’', Bank for International Settlements, 2020

C. Dierksmeier, and P. Seele: ‘'Cryptocurrencies and Business Ethics’', Journal of Business Ethics, 152, 2018, pp. 1-14

CBB: ‘'Central Bank of Bahrain Regulatory Sandbox Framework’', Electronic resource, 2017

Chainalysis: ‘'The 2020 state of crypto crime’', Electronic resource, 2020

D. Dupuis, and K. Gleason: ‘'Old Frauds with a New Sauce: Digital Coins and Behavioral Paradigms’', Cryptocurrencies eJournal, 2021

D. He, S. Li, C. Li, S. Zhu, S. Chan, W. Min, and N. Guizani: ‘'Security Analysis of Cryptocurrency Wallets in Android-Based Applications’', IEEE Network, 34, 2020, pp. 114-19Y. Wu, F. Tao, L. Liu, J. Gu, J. Panneerselvam, R. Zhu, and M. N. Shahzad: ‘'A Bitcoin Transaction Network Analytic Method for Future Blockchain Forensic Investigation’', IEEE Transactions on Network Science and Engineering, 8, 2020, pp. 1230-41

D. Kim, M. H. Bilgin, and D. Ryu: ‘'Are suspicious activity reporting requirements for cryptocurrency exchanges effective?’', Financial Innovation, 7, 2021, pp. 1-17

D. Reynolds: ‘'The differential effects of identity theft victimization: how demographics predict suffering out-of-pocket losses’', Security Journal, 34, 2020, pp. 737 - 54

FATF: ‘'Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers’', Force Financial Action Task 2019

G. M. Caporale, W.-Y. Kang, F. Spagnolo, and N. Spagnolo: ‘'Cyber-Attacks and Cryptocurrencies’', CESifo Working Paper Series, 2020

G. P. Dwyer: ‘'Regulation of cryptocurrencies’', Understanding cryptocurrency fraud, 2021

H. A. Adela: ‘'The impact of cryptocurrencies capitalization on banking deposits variability in the UAE: evidence from the NARDL approach’', International Journal of Emerging Markets, ahead-of-print, (ahead-of-print), 2023

H. Hadan, L. Zhang-Kennedy, L. Nacke, and V. Mäkelä: ‘'Comprehending the Crypto-Curious: How Investors and Inexperienced Potential Investors Perceive and Practice Cryptocurrency Trading’', International Journal of Human-Computer Interaction, 2023, pp. 1-22

H. Min: ‘'Blockchain technology for enhancing supply chain resilience’', Business Horizons, 2019

IMF: ‘'The Bali Fintech Agenda’', International Monetary Fund, 2018

J. A. Kamps, and B. Kleinberg: ‘'To the moon: defining and detecting cryptocurrency pump-and-dumps’', Crime Science, 7, 2018

J. T. Hamrick, F. Rouhi, A. Mukherjee, A. Feder, N. Gandal, T. W. Moore, and M. Vasek: ‘'The Economics of Cryptocurrency Pump and Dump Schemes’', CEPR Discussion Paper Series, 2018

L. Schiffauer: ‘'DANGEROUS SPECULATION’', God Land, 2018

M. Al-Jaber, and Muhanna, A.: ‘'The adoption of cryptocurrencies in the Middle East: An institutional approach’', Journal of Financial Regulation and Compliance, 28, (2), 2020, pp. 245-62

M. J. Shayegan, H. R. Sabor, M. Uddin, and C.-L. Chen: ‘'A Collective Anomaly Detection Technique to Detect Crypto Wallet Frauds on Bitcoin Network’', Symmetry, 14, 2022, pp. 328

M. N. Aman, M. H. Basheer, and B. K. Sikdar: ‘'Two-Factor Authentication for IoT With Location Information’', IEEE Internet of Things Journal, 6, 2019, pp. 3335-51

M. Tiwari, A. Gepp, and K. Kumar: ‘'The future of raising finance - a new opportunity to commit fraud: a review of initial coin offering (ICOs) scams’', Crime, Law and Social Change, 73, 2020, pp. 417-41

N. Sapkota, K. Grobys, and J. Dufitinema: ‘'How Much Are We Willing To Lose in Cyberspace? On the Tail Risk of Scam in the Market for Initial Coin Offerings’', Corporate Finance: Governance, 2020

O. S. Kerr: ‘'The Next Generation Communications Privacy Act’', University of Pennsylvania Law Review, 162, 2013, pp. 373

O. Y. Marian: ‘'A Conceptual Framework for the Regulation of Cryptocurrencies’', Criminology eJournal, 2014

P. Koshy, D. Koshy, and P. McDaniel: ‘An Analysis of Anonymity in Bitcoin Using P2P Network Traffic’, in Editor (Ed.)^(Eds.): ‘Book An Analysis of Anonymity in Bitcoin Using P2P Network Traffic’ (Springer Berlin Heidelberg, 2014, edn.), pp. 469-85

R. Arjona, P. López-González, R. Román, and I. Baturone: ‘'Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece’', Applied Sciences, 2023

R. Mcmillan: ‘'The Inside Story of Mt. Gox, Bitcoin's $460 Million Disaster’', Electronic resource, 2014

S. ?ahan, A. F. Ekici, and ?. Bahtiyar: ‘'A Multi-Factor Authentication Framework for Secure Access to Blockchain’', Proceedings of the 2019 5th International Conference on Computer and Technology Applications, 2019

S. A. Harrast, D. E. McGilsky, and Y. Sun: ‘'Determining the Inherent Risks of Cryptocurrency: A Survey Analysis’', Current Issues in Auditing, 2021

S. Corbet, B. M. Lucey, A. Urquhart, and L. Yarovaya: ‘'Cryptocurrencies as a Financial Asset: A Systematic Analysis’', Legal Perspectives in Information Systems eJournal, 2018

S. Corbet, D. J. Cumming, B. M. Lucey, M. Peat, and S. A. Vigne: ‘'The destabilising effects of cryptocurrency cybercriminality’', Economics Letters, 2020

S. Ebrahimi, P. Hasanizadeh, S. M. A. Aghamirmohammadali, and A. Akbari: ‘'Enhancing Cold Wallet Security with Native Multi-Signature schemes in Centralized Exchanges’', ArXiv, abs/2110.00274, 2021

S. Foley, J. R. Karlsen, and T. J. Putni?š: ‘'Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed through Cryptocurrencies?’', The Review of Financial Studies, 32, (5), 2019, pp. 1798-853

S. Nakamoto: ‘'Bitcoin: A peer-to-peer electronic cash system’', Decentralized business review, 2008

S. Shanaev, S. Sharma, A. Shuraeva, and B. Ghimire: ‘'Taming the Blockchain Beast? Regulatory Implications for the Cryptocurrency Market’', Regulation of Financial Institutions eJournal, 2019

T. Dmytrenko, O. Lyubich, and Y. S. Parkhomenko: ‘'Virtual assets market regulation: global and national level of implementation of AML/CFT international standards’', Fìnansi Ukraïni, 2021

T. Papadopoulos: ‘'International Organization of Securities Commissions (IOSCO)’', Organizations & Markets: Formal & Informal Structures eJournal, 2015

T. Senate: ‘'Australia as a Technology and Financial Centre—Select Committee—Final report, dated October 2021’', Parliament of Australia, 2021

U. D. o. Justice: ‘'Global Disruption of Three Terror Finance Cyber-Enabled Campaigns’', Electronic resource, 2020

W. Bank: ‘'World Development Report 2021: Data for Better Lives’', Online Source of World Bank, 2020

X. Huang, Xu, C., Wang, P., and Niu, X.: ‘'A systematic study on cryptocurrency crime classification and forensics’', Computers & Security, 97, 2020

X. Yin, Z. Liu, G. Yang, G. Chen, and H. Zhu: ‘Secure Hierarchical Deterministic Wallet Supporting Stealth Address’, in Editor (Ed.)^(Eds.): ‘Book Secure Hierarchical Deterministic Wallet Supporting Stealth Address’ (2022, edn.), pp.

Y.-L. Xiao, P. Zhang, and Y. Liu: ‘'Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform’', IEEE Transactions on Information Forensics and Security, 16, 2022, pp. 1782-94

Descargas

Publicado

2024-11-05

Cómo citar

Oudha Yousif, Mohammed Dawood, Faiez Thanoon Jassem, & Nameer Hashim Qasim. (2024). Curbing crypto deception: evaluating risks, mitigating prac-tices and regulatory measures for preventing fraudulent transactions in the middle east. Encuentros. Revista De Ciencias Humanas, Teoría Social Y Pensamiento Crítico., (22 (septiembre-diciembre), 311–334. https://doi.org/10.5281/zenodo.13732337