A Value-sensitive Design Perspective of Cryptocurrencies: A Research Agenda
暂无分享,去创建一个
Karlene Cousins | Pouyan Esmaeilzadeh | Hemang Subramanian | Pouyan Esmaeilzadeh | H. Subramanian | Karlene C. Cousins
[1] Martin Guha,et al. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets without Compromising Employee Privacy or Trust , 2008 .
[2] Richard T. Watson,et al. Information Systems and Environmentally Sustainable Development: Energy Informatics and New Directions for the IS Community , 2010, MIS Q..
[3] M. McHugh. Interrater reliability: the kappa statistic , 2012, Biochemia medica.
[4] Vesna Harasic. It's Not Just About The Money: A Comparative Analysis Of The Regulatory Status Of Bitcoin Under Various Domestic Securities Laws , 2015 .
[5] A. Strauss,et al. Basics of qualitative research: Grounded theory procedures and techniques. , 1993 .
[6] Batya Friedman,et al. Informed consent in the Mozilla browser: implementing value-sensitive design , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[7] Robin I. M. Dunbar. Neocortex size as a constraint on group size in primates , 1992 .
[8] Ebru Gökalp,et al. Analysing Opportunities and Challenges of Integrated Blockchain Technologies in Healthcare , 2018, SIGSAND/PLAIS.
[9] A. Strauss,et al. Grounded theory methodology: An overview. , 1994 .
[10] Michel Avital. Peer Review: Toward a Blockchain-enabled Market-based Ecosystem , 2018, Commun. Assoc. Inf. Syst..
[11] Mathias Weske,et al. Blockchains for Business Process Management - Challenges and Opportunities , 2017, ACM Trans. Manag. Inf. Syst..
[12] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[13] T. Moore,et al. Bitcoin: Economics, Technology, and Governance , 2014 .
[14] Corina Sas,et al. Design for Trust: An Exploration of the Challenges and Opportunities of Bitcoin Users , 2017, CHI.
[15] Benedikt Notheisen,et al. Trading Real-World Assets on Blockchain , 2017, Business & Information Systems Engineering.
[16] Geoffrey Lightfoot,et al. Price Fluctuations and the Use of Bitcoin: An Empirical Inquiry , 2015, Int. J. Electron. Commer..
[17] Daniel Neyland,et al. Privacy, surveillance and public trust , 2006 .
[18] Sooyong Park,et al. Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.
[19] Lyn Richards,et al. Handling Qualitative Data: A Practical Guide , 2020 .
[20] Marten Risius,et al. A Blockchain-Based Approach Towards Overcoming Financial Fraud in Public Sector Services , 2017, Bus. Inf. Syst. Eng..
[21] Omri Ross,et al. KYC Optimization Using Distributed Ledger Technology , 2017, Bus. Inf. Syst. Eng..
[22] Kevin J. Peterson,et al. A Blockchain-Based Approach to Health Information Exchange Networks , 2016 .
[23] Michael J. Casey,et al. Cryptocurrency : how Bitcoin and digital money are challenging the global economic order , 2015 .
[24] D. Yermack. Is Bitcoin a Real Currency? An Economic Appraisal , 2013 .
[25] Alessandro Vespignani,et al. Modeling Users' Activity on Twitter Networks: Validation of Dunbar's Number , 2011, PloS one.
[26] Hemang Subramanian,et al. Decentralized blockchain-based electronic marketplaces , 2017, Commun. ACM.
[27] Caitlin Lustig,et al. Algorithmic Authority: The Case of Bitcoin , 2015, 2015 48th Hawaii International Conference on System Sciences.
[28] Barbara Di Eugenio,et al. Squibs and Discussions: The Kappa Statistic: A Second Look , 2004, CL.
[29] Marshall W. van Alstyne,et al. Why Bitcoin has value , 2014, CACM.
[30] P. Giungato,et al. Current Trends in Sustainability of Bitcoins and Related Blockchain Technology , 2017 .
[31] Sandra Slaughter,et al. Understanding the Motivations, Participation, and Performance of Open Source Software Developers: A Longitudinal Study of the Apache Projects , 2006, Manag. Sci..
[32] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[33] Alan Borning,et al. Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.
[34] Kai Spohrer,et al. A Blockchain Research Framework , 2017, Business & Information Systems Engineering.
[35] Andrea Pinna,et al. Blockchain-Oriented Software Engineering: Challenges and New Directions , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
[36] Detmar W. Straub,et al. Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..
[37] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[38] Marie-Claude Boudreau,et al. Accounting for the Contradictory Organizational Consequences of Information Technology: Theoretical Directions and Methodological Implications , 1999, Inf. Syst. Res..
[39] Bitcoin as money , 2014 .
[40] Wei Jiang,et al. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.
[41] Claire Ingram Bogusz,et al. How infrastructures anchor open entrepreneurship: The case of Bitcoin and stigma , 2018, Inf. Syst. J..
[42] James Martin,et al. Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’ , 2014 .
[43] Robin I. M. Dunbar. Social Brain Hypothesis , 1998, Encyclopedia of Evolutionary Psychological Science.
[44] Florian Hawlitschek,et al. The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy , 2018, Electron. Commer. Res. Appl..
[45] Qing Bai,et al. How Does Social Media Impact Bitcoin Value? A Test of the Silent Majority Hypothesis , 2018, J. Manag. Inf. Syst..
[46] Deborah Bunker,et al. Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization , 2010, MIS Q..
[47] Michael Abramowicz,et al. Cryptocurrency-Based Law , 2015 .
[48] Malte Möser,et al. An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.
[49] Don’t believe the amiodarone ‘hype’ , 1991 .
[50] Robert E. Crossler,et al. A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers , 2012, Decis. Support Syst..
[51] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[52] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[53] M. Arnold,et al. On the phenomenology of technology: the "Janus-faces" of mobile phones , 2003, Inf. Organ..
[54] Aleh Tsyvinski,et al. Risks and Returns of Cryptocurrency , 2018, The Review of Financial Studies.
[56] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[57] Amy J. Connolly,et al. What Differentiates Early Organization Adopters of Bitcoin From Non-Adopters? , 2015, AMCIS.
[58] Song Han,et al. Research for practice , 2007, Commun. ACM.
[59] Mario C Cuomo,et al. Lincoln on Democracy , 1990 .
[60] Adam S. Hayes,et al. Cryptocurrency Value Formation: An Empirical Analysis Leading to a Cost of Production Model for Valuing Bitcoin , 2016, MCIS.
[61] Xin Li,et al. The Technology and Economic Determinants of Cryptocurrency Exchange Rates: The Case of Bitcoin , 2014, Decis. Support Syst..
[62] Miklos A. Vasarhelyi,et al. Toward Blockchain-Based Accounting and Assurance , 2017, J. Inf. Syst..
[63] Christof Weinhardt,et al. Breaking down the Blockchain Hype - towards a Blockchain Market Engineering Approach , 2017, ECIS.
[64] Trevor M. Harris,et al. Empowerment, Marginalization, and "Community-integrated" GIS , 1998 .
[65] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[66] Primavera De Filippi,et al. The Invisible Politics of Bitcoin: Governance Crisis of a Decentralized Infrastructure , 2016 .
[67] Karl J. O'Dwyer,et al. Bitcoin mining and its energy footprint , 2014 .
[68] Martin Elsman,et al. Automated Execution of Financial Contracts on Blockchains , 2017 .
[69] David Godes,et al. Introduction to the Special Issue - Social Media and Business Transformation: A Framework for Research , 2013, Inf. Syst. Res..
[70] K. D. Joshi,et al. The Duality of Empowerment and Marginalization in Microtask Crowdsourcing: Giving Voice to the Less Powerful Through Value Sensitive Design , 2016, MIS Q..
[71] Stacey Kuznetsov,et al. Motivations of contributors to Wikipedia , 2006, CSOC.