Bitcoin: a Money-like Informational Commodity

The question "what is Bitcoin" allows for many answers depending on the objectives aimed at when providing such answers. The question addressed in this paper is to determine a top-level classification, or type, for Bitcoin. We will classify Bitcoin as a system of type money-like informational commodity (MLIC).

[1]  Elaine Shi,et al.  Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.

[2]  Jan A. Bergstra,et al.  Instruction sequence processing operators , 2009, Acta Informatica.

[3]  Jan A. Bergstra,et al.  Programming an Interpreter Using Molecular Dynamics , 2008, Sci. Ann. Comput. Sci..

[4]  Jan A. Bergstra,et al.  Transmission Protocols for Instruction Streams , 2009, ICTAC.

[5]  A. Barros,et al.  A constructive version of AIP revisited , 2008 .

[6]  Jan A. Bergstra,et al.  Instruction sequences and non-uniform complexity theory , 2008, ArXiv.

[7]  Martin Doerr,et al.  Information Carriers and Identification of Information Objects: An Ontological Approach , 2012, ArXiv.

[8]  Jan A. Bergstra,et al.  Bitcoin and Beyond: Exclusively Informational Monies , 2013, ArXiv.

[9]  Nikolei M. Kaplanov Nerdy Money: Bitcoin, the Private Digital Currency, and the Case Against Its Regulation , 2012 .

[10]  Jan A. Bergstra,et al.  Timed Tuplix Calculus and the Wesseling and van den Bergh Equation , 2009, Sci. Ann. Comput. Sci..

[11]  Jan A. Bergstra,et al.  Thread Extraction for Polyadic Instruction Sequences , 2008, Sci. Ann. Comput. Sci..

[12]  廖宏梓,et al.  On the Elliptic Curve Digital Signature Algorithm , 2006 .

[13]  E. Anderson Is women's labor a commodity? , 1990, Philosophy & public affairs.

[14]  Luciano Floridi,et al.  What is the Philosophy of Information , 2002 .

[15]  John Frow,et al.  Information as gift and commodity , 1996 .

[16]  Jan A. Bergstra,et al.  Outsourcing Competence , 2011, ArXiv.

[17]  Elke Greifender,et al.  The History of Information Security: A Comprehensive Handbook , 2008 .

[18]  Karl Maria,et al.  The History of Information Security: A Comprehensive Handbook , 2007 .

[19]  Jan A. Bergstra,et al.  Partial Komori fields and imperative Komori fields , 2009, ArXiv.

[20]  R. Epstein Possession as the Root of Title , 1979 .

[21]  T. Merrill Property and the Right to Exclude , 1998 .

[22]  Joseph P. Kopachevsky,et al.  Interpretations of tourism as commodity. , 1994 .

[23]  Pieter W. Adriaans,et al.  Philosophy of information , 2008 .

[24]  B. Maurer,et al.  “When perhaps the real problem is money itself!”: the practical materiality of Bitcoin , 2013 .

[25]  Chris Christensen Review of The History of Information Security: A Comprehensive Handbook edited by Karl de Leeuw and Jan Bergstra , 2008, Cryptologia.

[26]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[27]  Jerry Brito,et al.  Bitcoin: A Primer for Policymakers , 2016 .

[28]  Brian P. Hanley,et al.  The False Premises and Promises of Bitcoin , 2013, ArXiv.

[29]  Jan A. Bergstra,et al.  Meadow Enriched ACP Process Algebras , 2009, ArXiv.

[30]  Angela Rogojanu,et al.  The issue of competing currencies. Case study – Bitcoin , 2014 .

[31]  Jan A. Bergstra,et al.  Questions related to Bitcoin and other Informational Money , 2013, ArXiv.

[32]  Christian Decker,et al.  Have a snack, pay with Bitcoins , 2013, IEEE P2P 2013 Proceedings.

[33]  M. Herrmann Implementation, evaluation and detection of a doublespend-attack on Bitcoin , 2012 .

[34]  H. Williams Kant's Concept of Property , 1977 .

[35]  Reuben Grinberg Bitcoin: An Innovative Alternative Digital Currency , 2011 .

[36]  Jan A. Bergstra,et al.  Autosolvability of halting problem instances for instruction sequences , 2009, ArXiv.

[37]  David I. Spivak Ologs: A Categorical Framework for Knowledge Representation , 2011, PloS one.

[38]  Jan A. Bergstra,et al.  Formaleuros, formalcoins and virtual monies , 2010, ArXiv.

[39]  Jan A. Bergstra,et al.  Instruction sequence expressions for the secure hash algorithm SHA-256 , 2013, ArXiv.

[40]  Profit-Driven Abuses of Virtual Currencies , 2013 .

[41]  Jan A. Bergstra,et al.  The rational numbers as an abstract data type , 2007, JACM.

[42]  Jan A. Bergstra,et al.  Instruction sequence notations with probabilistic instructions , 2009, ArXiv.

[43]  Jan A. Bergstra,et al.  Inversive meadows and divisive meadows , 2009, J. Appl. Log..

[44]  Kees Middelburg,et al.  Interest Prohibition and Financial Product Innovation , 2011, 1104.2471.

[45]  Michael Uschold,et al.  The Enterprise Ontology , 1998, The Knowledge Engineering Review.

[46]  Sami Al‐Suwailem Preliminaries to an Investigation of Reduced Product Set Finance , 2011 .

[47]  Jan A. Bergstra,et al.  A static theory of promises , 2008, ArXiv.

[48]  Nicolas Courtois,et al.  The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining , 2013, ArXiv.

[49]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[50]  Ian Horrocks,et al.  From SHIQ and RDF to OWL: the making of a Web Ontology Language , 2003, J. Web Semant..

[51]  Raymond T. Nimmer,et al.  Information as a Commodity: New Imperatives of Commercial Law , 1992 .

[52]  Jan A. Bergstra Informaticology: combining Computer Science, Data Science, and Fiction Science , 2012, ArXiv.

[53]  Jan A. Bergstra,et al.  On the Expressiveness of Single-Pass Instruction Sequences , 2010, Theory of Computing Systems.

[54]  Ellen G. Detlefsen User costs: Information as a social good vs. information as a commodity , 1984 .