Information bias and trust in bitcoin speculation
暂无分享,去创建一个
[1] Thomas C. Toppino,et al. Frequency and the Conference of Referential Validity. , 1977 .
[2] Pavlin Mavrodiev,et al. The digital traces of bubbles: feedback cycles between socio-economic signals in the Bitcoin economy , 2014, Journal of The Royal Society Interface.
[3] P. Ciaian,et al. The economics of BitCoin price formation , 2014, 1405.4498.
[4] Russell H. Fazio,et al. Attitudes as object-evaluation associations: Determinants, consequences, and correlates of attitude accessibility. , 1995 .
[5] R. Nickerson. Confirmation Bias: A Ubiquitous Phenomenon in Many Guises , 1998 .
[6] Christof Weinhardt,et al. Trust-free Systems in the Trust Age? A Review on Blockchain and Trust in the Sharing Economy , 2017 .
[7] Sandeep K. Shukla,et al. Editorial: Cyber Security, IoT, Block Chains - Risks and Opportunities , 2017, ACM Trans. Embed. Comput. Syst..
[8] Catherine Martin Christopher. Why on Earth Do People Use Bitcoin? , 2014 .
[9] Jens Riegelsberger,et al. Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems , 2005, NSPW '05.
[10] Patrick Olivier,et al. Your Money's No Good Here: The Elimination of Cash Payment on London Buses , 2015, CHI.
[11] S. Shyam Sundar,et al. News cues: Information scent and cognitive heuristics , 2007, J. Assoc. Inf. Sci. Technol..
[12] T. Moore,et al. Bitcoin: Economics, Technology, and Governance , 2014 .
[13] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[14] Matthijs L. Noordzij,et al. Topic familiarity and information skills in online credibility evaluation , 2013, J. Assoc. Inf. Sci. Technol..
[15] Aniket Kate,et al. Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins , 2015, CCS.
[16] B. Laurie. Decentralised Currencies Are Probably Impossible But Let ’ s At Least Make Them Efficient , 2011 .
[17] Laura A. Brannon,et al. The moderating role of attitude strength in selective exposure to information , 2007 .
[18] Michael D. Lee,et al. Inferring Expertise in Knowledge and Prediction Ranking Tasks , 2012, Top. Cogn. Sci..
[19] Kai Zimmermann,et al. Bitcoin - Asset or Currency? Revealing Users' Hidden Intentions , 2014, ECIS.
[20] Jingbo Meng,et al. Selective Exposure to Attitude-Consistent and Counterattitudinal Political Information , 2011 .
[21] Masooda N. Bashir,et al. Who Uses Bitcoin? An exploration of the Bitcoin community , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[22] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[23] Jens Riegelsberger,et al. Ignore These At Your Peril: Ten principles for trust design , 2010, Trust 2010.
[24] R. Sugden,et al. Positive confirmation bias in the acquisition of information , 2001 .
[25] Jan Mendling,et al. Untrusted Business Process Monitoring and Execution Using Blockchain , 2016, BPM.
[26] R. Tweney,et al. Rationality and the psychology of inference , 1983, Synthese.
[27] A. Tversky,et al. Judgment under Uncertainty: Heuristics and Biases , 1974, Science.
[28] B. J. Fogg,et al. The elements of computer credibility , 1999, CHI '99.
[29] D. Hilton. The Psychology of Financial Decision-Making: Applications to Trading, Dealing, and Investment Analysis , 2001 .
[30] Janne Lindqvist,et al. Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users , 2016, CHI.
[31] S. Sitkin,et al. Explaining the Limited Effectiveness of Legalistic “Remedies” for Trust/Distrust , 1993 .
[32] Miriam J. Metzger,et al. behaviors on the perceived credibility of web-based information The role of site features, user attributes, and information verification , 2007 .
[33] Davide Carboni. Feedback based Reputation on top of the Bitcoin Blockchain , 2015, ArXiv.
[34] Roman Beck,et al. Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.
[35] Ladislav Kristoufek,et al. BitCoin meets Google Trends and Wikipedia: Quantifying the relationship between phenomena of the Internet era , 2013, Scientific Reports.
[36] E. Thorndike. A constant error in psychological ratings. , 1920 .
[37] Martijn Bastiaan,et al. Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .
[38] George Danezis,et al. Centrally Banked Cryptocurrencies , 2015, NDSS.
[39] Nigel Davies,et al. Exploring Motivations for Bitcoin Technology Usage , 2016, CHI Extended Abstracts.
[40] J. Klayman,et al. Confirmation, Disconfirmation, and Informa-tion in Hypothesis Testing , 1987 .
[41] Bin Gu,et al. Information Valuation and Confirmation Bias in Virtual Communities: Evidence from Stock Message Boards , 2013, Inf. Syst. Res..
[42] Wei Dong,et al. Human factors in software security risk management , 2008, LMSA '08.
[43] L. Cosmides,et al. Cognitive adaptations for social exchange. , 1992 .
[44] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[45] J. Simpson. Psychological Foundations of Trust , 2007 .
[46] Caitlin Lustig,et al. Algorithmic Authority: The Case of Bitcoin , 2015, 2015 48th Hawaii International Conference on System Sciences.
[47] Thomas Chesney,et al. An empirical examination of Wikipedia's credibility , 2006, First Monday.
[48] John M. Carroll,et al. Creating Value Together: The Emerging Design Space of Peer-to-Peer Currency and Exchange , 2015, CSCW.
[49] J. Klayman. Varieties of Confirmation Bias , 1995 .
[50] Aaron Yelowitz,et al. Characteristics of Bitcoin users: an analysis of Google search data , 2014 .
[51] Thomas Oberlechner,et al. Information sources, news, and rumors in financial markets: Insights into the foreign exchange market , 2004 .
[52] Chee-Wee Tan,et al. Value Creation in Cryptocurrency Networks: Towards A Taxonomy of Digital Business Models for Bitcoin Companies , 2015, PACIS.
[53] Elaine Shi,et al. Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.
[54] Roderick M. Kramer,et al. Trust and Intergroup Negotiation , 2008 .
[55] S. Pouget,et al. Price Formation with Confirmation Bias , 2009 .
[56] Jan Maarten Schraagen,et al. Trust in wikipedia: how users trust information from an unknown source , 2010, WICOW '10.
[57] J. Kruger,et al. Unskilled and unaware of it: how difficulties in recognizing one's own incompetence lead to inflated self-assessments. , 1999, Journal of personality and social psychology.
[58] Soumava Bandyopadhyay,et al. Antecedents And Consequences Of Consumers" Online Privacy Concerns , 2011 .
[59] N. L. Chervany,et al. Initial Trust Formation in New Organizational Relationships , 1998 .
[60] G. Becker,et al. A Note on Restaurant Pricing and Other Examples of Social Influences on Price , 1991, Journal of Political Economy.
[61] S. Chaiken. Heuristic versus systematic information processing and the use of source versus message cues in persuasion. , 1980 .
[62] Jeroen Weesie,et al. The management of matches : A research program on solidarity in durable social relations , 2000 .
[63] Ghassan O. Karame,et al. Is Bitcoin a Decentralized Currency? , 2014, IEEE Security & Privacy.
[64] Malte Möser,et al. An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.
[65] Markus Bick,et al. Cryptocurrencies as a Disruption? Empirical Findings on User Adoption and Future Potential of Bitcoin and Co , 2015, I3E.
[66] Saskia Brand-Gruwel,et al. Information problem solving by experts and novices: analysis of a complex cognitive skill , 2005, Comput. Hum. Behav..
[67] Soo Young Rieh,et al. Developing a unifying framework of credibility assessment: Construct, heuristics, and interaction in context , 2008, Inf. Process. Manag..
[68] Jerry M. Evensky,et al. ADAM SMITH’S ESSENTIALS: ON TRUST, FAITH, AND FREE MARKETS , 2011, Journal of the History of Economic Thought.
[69] P C Wason,et al. Reasoning about a Rule , 1968, The Quarterly journal of experimental psychology.
[70] David J. Weiss,et al. Performance-based assessment of expertise: How to decide if someone is an expert or not , 2002, Eur. J. Oper. Res..
[71] A. Strauss. Basics Of Qualitative Research , 1992 .
[72] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[73] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[74] Guo Li,et al. Evaluating the Potential of Alternative Cryptocurrencies , 2015 .
[75] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[76] Bing Liu,et al. Mining and summarizing customer reviews , 2004, KDD.
[77] Corina Sas,et al. Design for Trust: An Exploration of the Challenges and Opportunities of Bitcoin Users , 2017, CHI.
[78] L. Festinger,et al. A Theory of Cognitive Dissonance , 2017 .
[79] H. Simon. Models of Bounded Rationality: Empirically Grounded Economic Reason , 1997 .
[80] Brad M. Barber,et al. Journal of Economic Perspectives—Volume 15, Number 1—Winter 2001—Pages 41–54 The Internet and the Investor , 2022 .
[81] Yves Rosseel,et al. lavaan: An R Package for Structural Equation Modeling , 2012 .
[82] W. R. Howard. Managing the Human Factor in Information Security: How to Win Over Staff and Influence Business Managers , 2010 .
[83] Tyler Moore,et al. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.
[84] Charles J. Kacmar,et al. Factors of Information Credibility for an Internet Advice Site , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[85] W. Miller. Humiliation: And Other Essays on Honor, Social Discomfort, and Violence , 1993 .
[86] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[87] R. Keyes. The Post-Truth Era , 2004 .
[88] D. Kahneman. Maps of Bounded Rationality: Psychology for Behavioral Economics , 2003 .
[89] Jason Alexander,et al. ThumbReels: query sensitive web video previews based on temporal, crowdsourced, semantic tagging , 2014, CHI.
[90] Jaroslav Bukovina,et al. Sentiment and Bitcoin Volatility , 2016 .
[91] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[92] Bipin Indurkhya,et al. Providing Web Credibility Assessment Support , 2014, ECCE.
[93] Robert Viglione,et al. Does Governance Have a Role in Pricing? Cross-Country Evidence from Bitcoin Markets , 2015 .
[94] D Kahneman,et al. On the reality of cognitive illusions. , 1996, Psychological review.
[95] M. Montgomery,et al. Post-truth politics?: Authenticity, populism and the electoral discourses of Donald Trump , 2017 .
[96] Benjamin K. Johnson,et al. Confirmation Bias in Online Searches: Impacts of Selective Exposure Before an Election on Political Attitude Strength and Shifts , 2015, J. Comput. Mediat. Commun..
[97] A. H. Dyhrberg. Bitcoin, gold and the dollar – A GARCH volatility analysis , 2016 .
[98] Frank Schweitzer,et al. Social signals and algorithmic trading of Bitcoin , 2015, Royal Society Open Science.
[99] Tyler Moore,et al. Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk , 2013, Financial Cryptography.
[100] Elizabeth F. Churchill. Why should we care about Bitcoin? , 2015, Interactions.
[101] C. I. Hovland,et al. The Influence of Source Credibility on Communication Effectiveness , 1951 .
[102] William A. Wallace,et al. Trust in digital information , 2008, J. Assoc. Inf. Sci. Technol..
[103] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[104] J. Schraagen,et al. Reference Blindness:The Influence of References on Trust in Wikipedia , 2011 .
[105] Ladislav Kristoufek,et al. What Are the Main Drivers of the Bitcoin Price? Evidence from Wavelet Coherence Analysis , 2014, PloS one.
[106] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[107] Francois R. Velde. Bitcoin: a primer , 2013 .
[108] Eng-Tuck Cheah,et al. Speculative bubbles in Bitcoin markets? An empirical investigation into the fundamental value of Bitcoin , 2015 .
[109] Xusen Cheng,et al. Trust in Digital Currency Enabled Transactions Model , 2015, MCIS.
[110] M. Barratt. Silk Road: eBay for drugs. , 2012, Addiction.
[111] Corina Sas,et al. Exploring Trust in Bitcoin Technology: A Framework for HCI Research , 2015, OZCHI.
[112] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[113] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[114] Teun Lucassen,et al. Propensity to trust and the influence of source and medium cues in credibility evaluation , 2012, J. Inf. Sci..
[115] Sarah Meiklejohn,et al. Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.
[116] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[117] A. Giddens. The consequences of modernity , 1990 .
[118] Iddo Bentov,et al. How to Use Bitcoin to Play Decentralized Poker , 2015, CCS.
[119] Bryan Ford,et al. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.
[120] B. Maurer,et al. “When perhaps the real problem is money itself!”: the practical materiality of Bitcoin , 2013 .
[121] Lindsay Fullerton,et al. Trust Online: Young Adults' Evaluation of Web Content , 2010 .
[122] Sarah Underwood,et al. Blockchain beyond bitcoin , 2016, Commun. ACM.
[123] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[124] H. Leibenstein. Bandwagon, Snob, and Veblen Effects in the Theory of Consumers' Demand , 1950 .
[125] J. Coleman. Foundations of Social Theory , 1990 .
[126] Nigel Dodd. The politics of Bitcoin , 2017 .
[127] Miriam J. Metzger,et al. Social and Heuristic Approaches to Credibility Evaluation Online , 2010 .
[128] Geoffrey Lightfoot,et al. Price Fluctuations and the Use of Bitcoin: An Empirical Inquiry , 2015, Int. J. Electron. Commer..
[129] M. Deutsch. Trust and suspicion , 1958 .
[130] J. Whitehead. Factors of source credibility , 1968 .
[131] Jan Maarten Schraagen,et al. Factual accuracy and trust in information: The role of expertise , 2011, J. Assoc. Inf. Sci. Technol..