JEMI Vol18 Issue4 2022 Article2
JEMI Vol18 Issue4 2022 Article2
Cryptocurrencies as a subject
of financial fraud
Małgorzata Kutera1
Abstract
PURPOSE: The main purpose of this paper was to identify the current scope of
research on cryptocurrencies as a subject of fraud. Detailed research questions
related to the determination of contemporary trends of the conducted research and
the definition of potential opportunities for further investigation of this topic. One of
the questions also concerned identifying the most common crimes committed using
cryptocurrencies. METHODOLOGY: The study is based on a systematic literature
review (SLR) of 57 publications available on the Scopus database. A bibliometric and
descriptive analysis of selected literature items was carried out. Then, vital thematic
clusters were separated, and an in-depth content analysis was performed. FINDINGS:
The detailed bibliometric and descriptive analysis showed that cryptocurrencies as
a subject of financial fraud are generally a new area of scientific research, although it
is developing quite intensively. The relatively small number of publications, compared
to other similar areas, also indicates that this topic has not yet been explored widely
by scientists, and many different research trends can be created in it. Ultimately, the
following key research areas were identified: types of cryptocurrency fraud, crime
detection methods, risks related to blockchain technology, money laundering, and
legal regulations regarding cryptocurrencies. It was also possible to identify that
money laundering is currently the most common fraud. However, it has been pointed
out that the second most frequent fraud is financial pyramids based on the Ponzi
scheme. IMPLICATIONS: The paper clearly presents the main research trends on
using cryptocurrencies in criminal activities. At the same time, it was emphasized
that, compared to other research areas, this topic is relatively new. Therefore, there is
a wide possibility of exploring not only existing but also undiscovered research trends.
In addition, key types of fraud in economic practice have been identified, which is
particularly important for financial market participants. It was clearly indicated which
transactions bear the highest risk. It is also worth paying attention to the critical
timeliness of the topic, as the scale of crimes involving cryptocurrencies has recently
1 Małgorzata Kutera, PhD., Assistant Professor at the Jagiellonian University, Institute of Economics, Finance and
Management, Prof. S. Łojasiewicza 4, 30-348 Krakow, Poland, e-mail: malgorzata.kutera@uj.edu.pl (ORCID: https://orcid.
org/0000-0002-7029-2454).
Received 3 August 2022; Revised 18 September 2022, 9 October 2022; Accepted 20 October 2022.
This is an open access paper under the CC BY license (https://creativecommons.org/licenses/by/4.0/legalcode).
been growing rapidly. The study confirms the insufficient scope of legal regulations,
which are not able to strengthen the security of economic transactions adequately.
Therefore, it can be a clear indication for the governments of individual countries
or international institutions for further efficient changes to the law. ORIGINALITY
AND VALUE: The contribution of this study is threefold. It is one of the first research
papers showing the results of a systematic literature review (SLR) combined with
a bibliographic and in-depth analysis of the content of publications in this field.
During the work, the VOSviewer software was also used, which enabled objective
identification of the main thematic clusters based on the occurrences and link
strength of keywords included in the publications. Secondly, the key types of fraud
have been identified that, at the same time, cause the most significant financial
loss. This allowed for the establishing of directions for further research, which have
profound practical implications for market participants. Some of them relate to the
need to develop and implement modern computer applications, allowing for the
detection of a wider range of emerging abuses.
Keywords: cryptocurrency, bitcoin, blockchain, financial frauds, economic crime,
money laundering, Ponzi scheme, financial pyramid, systematic literature review
INTRODUCTION
financial system (Chen & Bellavitis, 2020; Patel, Migliavacca & Oriani, 2022;
Sánchez, 2022), to create new forms of nonfungible token (NFT) investments
(Regner, Schweizer, & Urbach, 2019), and finally to implement smart contracts
(Cong & He, 2019; Hughes, Park, Kietzmann, & Archer-Brown, 2019; Rozario &
Vasarhelyi, 2018), which are systems that automatically control digital assets
according to arbitrary prespecified rules. There is also an increasing trend
of its mass application in accounting and financial reporting of enterprises
(Schmitz & Leoni, 2019; Pimentel & Boulianne, 2020; Kokina, Mancha, &
Pachamanova, 2017). Therefore, further intensive changes in economic
systems caused by this invention should be expected.
Particularly noteworthy is distributed, decentralized, and reliable
mechanism of cryptocurrencies, thanks to which they have become a global
trading platform (Lin, Wu, Hsu, Tu & Liao, 2019). Unfortunately, these
same features have also become attractive to criminals (Fletcher, Larkin &
Corbet, 2021). In addition, it is worth mentioning the lack of appropriate
legal regulations and related supervisory activities on the part of domestic
or international institutions (Irwin & Dawson, 2019; Al-Tawil & Younies,
2020; Lui & Ryder, 2021). All this contributes to the growing use of the
cryptocurrency market by criminals financing terrorism, money laundering,
and other economic abuses. Cryptocurrencies are under constant threat
of attack. Numerous researchers have conducted studies to document and
combat crimes, such as:
This article is structured as follows. The next part deals with the general
theoretical background of the subject, with particular emphasis on research
conducted in similar areas. Then the research methodology is presented.
In this section, research questions are posed. The process of selecting
publications for their systematic review is explained in detail, as well as the
approach to bibliometric and descriptive analysis. The basic parameters
used to distinguish thematic clusters are also presented in this part of the
study. The following section shows the results of a systematic review of the
literature, including the findings of an in-depth analysis of the content of
individual publications. They provide the basis for a discussion on the context
of the specific research questions. The last part contains conclusions and
presents potential directions for further research in this field.
METHODOLOGY
At the beginning, three main research questions were defined that set
the direction and scope of the systematic literature review, especially in
content analysis. The following questions were asked:
RQ1) What are the current state and the primary considerations of
research relating to cryptocurrencies as a subject of fraud?
RQ2) What are the most common crimes committed with the use of
cryptocurrencies?
RQ3) What could be the future research trends related to cryptocurrencies
and financial fraud?
Journal of Entrepreneurship, Management and Innovation
Volume 18, Issue 4, 2022: 45-77
50 / Cryptocurrencies as a subject of financial fraud
The first stage of searching the database and selecting items was
determining the keywords appropriate for the research subject. This
collection includes cryptocurrencies and crypto assets (crypto *), bitcoin,
Ethereum, fraud, crime, scam, and abuse. The first four keywords generally
refer to cryptocurrencies and their two most popular and longest-functioning
types in the market. The following four keywords are a combination of the
most common terms related to financial fraud in the literature. The “Article
title, abstract, keywords” area was selected as the reference database for the
search. As a result of the database search, 841 publications meeting these
criteria were identified.
Then, the subject area had to be narrowed down due to its substantive
nature. In this regard, two sites were selected: “business, management,
and accounting” and “economics, econometrics, and finance.” The scope
of the publication was 106 items. Another criterion was to narrow the area
of analysis to four types of documents: “article,” “conference paper,” “book
chapter,” and “book.” The database identified 102 publications. Of these, all
articles still in print were discarded, and the focus was solely on the completed
items. As a result of the database search, 95 scientific publications were
finally included in the collection, and the full search criteria were as follows:
The next stage was verifying the titles and abstracts of all 95 bibliographic
items to determine which of them relate to the research questions posed.
The mainstream research was supposed to concern cryptocurrencies in the
context of fraud committed. At this stage, a complete double analysis of
titles and abstracts was performed to eliminate the risk of confusion. Thirty-
eight publications were rejected. For research purposes, the final collection
was 57 literature items. The eliminated publications mainly concerned the
possible innovative applications of blockchain technology related to the
cryptocurrency market in other areas of life (medicine, education).
The summary of the entire process of selecting the research sample is the
following PRISMA diagram presenting the various stages of the elimination of
bibliographic items (Figure 1).
IDENTIFICATION
- records identified from Scopus n = 841
SCREENING
- records excluded by general subject area (only
"business, management and accounting" and
"economics, econometrics and finance") n = 735
- records excluded by type of document (only
"article", "conference paper", "book chapter" and
"book" - final version) n = 11
- records excluded by double content analysis of titles
and abstracts n = 38
the co-occurrence network to identify the main aspects of the discussion. The
most crucial element in this respect was the analysis of the co-occurrence
network of keywords to distinguish clusters. The key parameters used to
define the network of connections are presented in Table 1.
RESULTS
When analyzing the above results, three leading items of the most
significant substantive importance with more than 100 citations should be
identified. They mainly relate to manipulating the bitcoin exchange rate or its
use to build a financial pyramid (Ponzi scheme).
The next stage of the systematic literature review is the in-depth content
analysis of the collection of publications from the point of view of achieving
the main goal and the research questions posed. The starting point for this
analysis was the identification of potential substantive clusters. As mentioned
earlier, VOSviewer Software was used to create the co-occurrence network
using all keywords to identify the main aspects of the publications.
As part of the selection process presented in the methodology section,
a total of 322 keywords were identified, of which only 10 met the assumed
criteria. The number of occurrences and total link strength for the most
important keywords are presented in Table 4.
Cluster “Bitcoin”
Bitcoin as the oldest cryptocurrency and various aspects related to its
functioning, is by far the most frequently discussed topic in the literature
on the subject. Many authors emphasize that the perception of bitcoin has
significantly evolved and is now a normally functioning asset in financial
markets. Therefore, Teo and Low (2018) pointed out that it is necessary
to redefine the concept of “money” as an asset and define its protection
principles. They showed various legal aspects related to defining this concept
and the resulting risks in investment practice. It was especially emphasized
that the main threat in this regard is hacking.
A large part of the publication shows examples of possible illegal use
of bitcoin for various crimes, including money laundering (Esoimeme, 2018;
Bartoletti et al., 2018; Barth et al., 2020; Broadhead, 2018, van Wegberg et
al., 2018). Esoimeme (2018) indicates that bitcoin creates hitherto unknown
opportunities for marketing funds from illegal sources, much more significant
than traditional money transfers. For example, the Mavrodi Mondial
Movement (MMM) pyramid scheme operating in recent years in Nigeria and
the risks associated with new payment methods are given.
Ponzi scheme-based financial pyramids are one of the most commonly
used frauds in the context of bitcoin, with the longest tradition in the
market. It is noted by Bartoletti, Pes, and Serusi (2018), Zhang, Kang, Dai,
Chen, and Zhu (2021), Wang, Cheng, Zheng, Yang, and Zhu (2021). They
build a network of investors, where the profits paid to the first participants
of the system come from payments made by subsequent investors and
not from the funds generated by the system. The authors emphasize that
immediately after the introduction of bitcoin in 2009, there were signs of
building financial pyramids with its use. At the same time, they proposed
various techniques for detecting bitcoin addresses directly related to Ponzi
schemes, allowing early identification of this type of fraud. The method
involves experimenting with different machine learning algorithms and
evaluating their effectiveness using standard validation protocols and
performance metrics. In turn, Wang, Cheng, Zheng, Yang, and Zhu (2021)
proposed a method for detecting pyramid schemes based on oversampling
Long Short-Term Memory. Account features and code features are extracted
from contract call information and contract codes, and the two components
are combined to detect Ponzi scheme smart contracts.
Analyzing bitcoin addresses and their associated transaction types is
also of interest to Lin, Wu, Hsu, Tu, and Liao (2019). They point out that the
ability to identify addresses associated with criminal activities is becoming
the most critical issue in the cryptocurrency network. They experimented
Cluster “Blockchain”
The publications belonging to this cluster mainly concern blockchain as a new
technology covering, among other things, the cryptocurrency market and
they draw attention to various associated risks. It is assumed that this solution
completely revolutionized the existing digital world and brought an entirely
new perspective on its security, flexibility, and efficiency (Srivasthav, Maddali,
& Vigneswaran, 2021). On the one hand, it is emphasized that blockchain
allows for a completely different dimension of transactions or exchange of
goods and services. However, its further development depends to a large
extent on regulatory changes protecting against cybercrimes and financial
frauds (Ahram, Sargolzaei, Daniels & Amaba, 2017).
The WannaCry ransomware attack that took place in May 2017 was
given as an example of a new type of crime involving blockchain-based
cryptocurrency payment transactions (Turner, McCombie, & Uhlmann, 2019).
It was a global hacking attack that involved computers running the Microsoft
Windows operating system by encrypting data and demanding ransom
payments in the bitcoin cryptocurrency. At the same time, the authors
developed a model for collecting and analyzing data related to inflows and
outflows of bitcoin-related ransomware transactions. Bitcoin transactions
form graph networks and enable the construction of a target network model
for collecting, analyzing, and sharing intelligence with multiple stakeholders.
It would therefore be possible to counter such attacks more quickly and
effectively in the future.
Karapapas, Pittaras, Fotiou, and Polyzos (2020) draw attention to the
increased risk of hacker attacks using blockchain technology. The authors
clearly showed how technology could be used to launch ransomware
campaigns as a service. They proved that criminals could transact with
related parties and victims without revealing their identity and with multiple
privacy guarantees. The scale of cyber-attacks in cryptocurrency trading and
the use of technology was also the subject of research by Caporale, Kang, and
Spagnolo (2020). They thoroughly analyzed hacking attacks on the four most
popular cryptocurrencies. They confirmed their significant negative financial
consequences and, at the same time, pointed to the need to increase research
in this field. They considered the precise understanding of the mechanisms of
cyber-attacks to be crucial in the fight against this phenomenon.
With the development of blockchain and the cryptocurrency market, the
scale of abuse related to the simple theft of these assets has also increased.
Only the tools used by criminals have changed. These scams operate on visually
similar but seemingly unrelated websites advertised by malicious social media
accounts. With the help of such websites and social media accounts, they
often perpetrate fraud or act as phishing sites. For example, Phillips and Wilder
(2020) analyzed selected data online and based on blockchain technology.
Using the clustering technique, they developed a typology of prepayment and
phishing scams. It turned out that the same entities carried out very similar
scams in their online activities and using blockchain.
Cluster “Cryptocurrency”
The vast majority of publications in this field see the problem of using
cryptocurrencies for various crimes, including primarily money laundering.
Levin, O’Brien, and Zuberi (2015) explicitly point out that until recently, the
bitcoin market was considered a “virtual Wild West for drug dealers and
other criminals.” At the same time, they pointed out that the support for this
currency is constantly growing, and it has become a global virtual asset. The
regulations governing this market do not keep up with the practice and seem
unclear. The authors cite examples of American administrative proceedings
against operators of platforms on which cryptocurrency trading is carried out
and analyze the current state of legal regulations in this field in the USA.
The issue of appropriate regulation was also raised by Irwin and Dawson
(2019), who specifically dealt with the law of payment methods. The authors
identified the current legal status in Australia, Europe, and America and, at
the same time, indicated potential limitations in their application on a global
scale. In addition, they highlighted the ineffectiveness of the implemented
solutions, which also have a negative impact on the possibility of prosecuting
criminals. One of the reasons they mentioned is the lack of a legal, universally
binding definition of bitcoin.
It is also emphasized that countries that give up cash transactions
entirely are not much less vulnerable to money laundering crimes (Rivera,
2019; Hendrickson & Luther, 2022). In this case, virtual transactions,
including those related to cryptocurrencies, are used on a larger scale. After
all, popular cryptocurrencies like bitcoin are close substitutes for cash. In
addition, they offer a higher level of financial anonymity and thus allow
transactions with a lower risk of detection than traditional digital payments.
Consequently, all efforts to eliminate cash from circulation strongly drive
criminals towards cryptocurrencies.
Experts indicate that a substantial restriction of trading in cryptocurrencies
is not the solution for the future either, because they appeared as a natural
consequence of the intensive development of technology. However, it is
essential to introduce global legal regulations limiting their criminal use
(Al-Tawil & Younies, 2020). Liechtenstein is quite an active country in this
context (Teichmann & Falker, 2020; 2021). Particular guidelines have recently
DISCUSSION
Legal regulations
Money laundering regarding
cryptocurrencies
CONCLUSION
The main purpose of this paper was to identify the current scope of research
on cryptocurrencies as a subject of fraud. Ultimately, 57 publications were
selected for the systematic review of the literature. The detailed bibliometric
and descriptive analysis showed that it is generally a new area of scientific
research, although it is developing quite intensely. The relatively small
number of publications compared to other similar areas also indicates that
this topic is not yet explored widely by scientists, and many different research
trends can be created within it.
However, there are also limitations to this study. Regarding the research
methodology, the Scopus database does not allow the analysis of all available
publications related to the topic (including studies only in paper form).
Moreover, only items published in English were taken into account during
the selection of articles. Various reports prepared by organizations dealing
with the analysis of the cryptocurrency market or institutions responsible for
Journal of Entrepreneurship, Management and Innovation
Volume 18, Issue 4, 2022: 45-77
68 / Cryptocurrencies as a subject of financial fraud
shaping legal regulations in this field were also not taken into account. The
main goal of the article was closely related only to scientific publications.
It is also worth mentioning the time limit. The selection of the items in the
literature on the subject was made as of July 2022. Therefore, the analysis
did not cover the latest publications, which may be important in the
context of the dynamic development and changes that have taken place on
the cryptocurrency market in the recent period of time. Despite this, the
author believes the study will be a helpful resource for current and future
scholars interested in addressing the most critical connections between
cryptocurrencies and financial crimes.
References
Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., & Amaba, B. (2017).
Blockchain technology innovations. Paper presented at the 2017 IEEE
Technology and Engineering Management Society Conference, TEMSCON
2017, 137-141. https://doi.org/10.1109/TEMSCON.2017.7998367
Al-Saqaf, W., & Seidler, N. (2017). Blockchain technology for social impact:
Opportunities and challenges ahead. Journal of Cyber Policy, 2(3), 338–
354. https://doi.org/10.1080/23738871.2017.1400084
Al-Tawil, T.N., & Younies, H. (2020). The implications of the Brexit from the
EU and bitcoin. Journal of Money Laundering Control, 24(1), 137-149.
https://doi.org/10.1108/JMLC-05-2020-0050
Anagnostiy, E., So, E., Vallabhaneni, P., Abedine, A., & Hayes, C.B. (2020). CFTS
jurisdiction over cryptocurrency: Implications for industry participants.
Banking Law Journal, 137(2), 63-69. Retrieved from https://www.hklaw.com
Barth, J.R., Herath, H.S.B., Herath, T.C., & Xu, P. (2020). Cryptocurrency
valuation and ethics: A text analytic approach. Journal of Management
Analytics, 367-388. https://doi.org/10.1080/23270012.2020.1790046
Bartoletti, M., Pes, B., & Serusi, S. (2018). Data mining for detecting bitcoin
Ponzi schemes. Paper presented at the Crypto Valley Conference on
Blockchain Technology, CVCBT 2018, 75-84. https://doi.org/10.1109/
CVCBT.2018.00014
Booth, A., Sutton, A., & Papaioannou, D. (2016). Systematic Approaches to
a Successful Literature Review (2nd ed.). London: SAGE.
Briner, R.B., & Denyer, D. (2012). A systematic review and evidence synthesis
as a practice and scholarship tool. In D.M. Rousseau (Ed.), The Oxford
Handbook of Evidence-Based Management (pp. 112-129). Oxford:
Oxford University Press.
Broadhead, S. (2018). The contemporary cybercrime ecosystem: A multi-
disciplinary overview of the state of affairs and developments. Computer
Law and Security Review, 34(6), 1180-1196. https://doi.org/10.1016/j.
clsr.2018.08.005
Gandal, N., Hamrick, J.T., Moore, T., & Oberman, T. (2018). Price manipulation
in the bitcoin ecosystem. Journal of Monetary Economics, 95, 86-96.
https://doi.org/10.1016/j.jmoneco.2017.12.004
Gandhi, S., & Shabaz, M. (2019). Evichain: Evaluating and scrutinizing
crime using block chain. International Journal of Recent Technology
and Engineering, 8(3), 3992-3994. https://doi.org/10.35940/ijrte.
C5254.098319
Gaur, A., & Kumar, M. (2018). A systematic approach to conducting review
studies: An assessment of content analysis in 25 years of IB research.
Journal of World Business, 53(2), 280-289. Retrieved from https://ssrn.
com/abstract=3069837
Gavrilin, Y.V., Pavlichenko, N.V., & Vasilyeva, M.A. (2019). The remote approach
of distribution of objects withdrawn from circulation: means, legislation
issues, solutions. In A.G. Kravets (Ed.), Big Data-driven World: Legislation
Issues and Control Technologies (pp. 85-93). Cham: Springer. https://doi.
org/10.1007/978-3-030-01358-5_8
Goforth, C.R. (2021). Regulation of crypto: Who is the securities and exchange
commission protecting? American Business Law Journal, 58(3), 643-705.
https://doi.org/10.1111/ablj.12192
Gopalan, S.H., Suba, S.A., Ashmithashree, C., Gayathri, A., & Andrews, J.V.
(2019). Digital forensics using blockchain. International Journal of Recent
Technology and Engineering, 8(11), 182-184. https://doi.org/10.35940/
ijrte.B1030.0982S1119
Hendrickson, J.R., & Luther, W.J. (2022). Cash, crime, and cryptocurrencies.
Quarterly Review of Economics and Finance, 85, 200-207. https://doi.
org/10.1016/j.qref.2021.01.004
Hiebl, M.R.W. (2021). Sample selection in systematic literature reviews of
management research. Organizational Research Methods. https://doi.
org/10.1177/1094428120986851
Huang, D.Y., Dharmdasani, H., Meiklejohn, S., Dave, V., Grier, C., McCoy, D.,
& Levchenko, K. (2014). Botcoin: Monetizing Stolen Cycles (pp. 1-16).
Retrieved from https://scholar.google.com
Hughes, A., Park, A., Kietzmann, J., & Archer-Brown, C. (2019). Beyond
bitcoin: What blockchain and distributed ledger technologies mean
for firms. Business Horizons, 62(3), 273-281. https://doi.org/10.1016/j.
bushor.2019.01.002
Irwin, A.S.M., & Dawson, C. (2019). Following the cyber money trail: Global
challenges when investigating ransomware attacks and how regulation
can help. Journal of Money Laundering Control, 22(1), 110-131. https://
doi.org/10.1108/JMLC-08-2017-0041
Jesson, J.K., Matheson, L., & Lacey, F.M. (2011). Doing Your Literature Review.
Traditional and Systematic Techniques. London: Sage.
Karapapas, C., Pittaras, I., Fotiou, N., & Polyzos, G.C. (2020). Ransomware as
a service using smart contracts and IPFS. Paper presented at the IEEE
Lui, A., & Ryder, N. (2021). FinTech, Artificial Intelligence and the Law:
Regulation and Crime Prevention. London: Routledge. https://doi.
org/10.4324/9781003020998
Morgan, P.J. (2022). Assessing the risks associated with green digital finance
and policies for coping with them. In F. Taghizadeh-Hesary & S. Hyun
(Eds.), Green Digital Finance and Sustainable Development Goals (pp.
51-68). Cham: Springer. https://doi.org/10.1007/978-981-19-2662-4_3
Morin, A., Vasek, M., & Moore, T. (2021). Detecting text reuse in cryptocurrency
whitepapers. Paper presented at the IEEE International Conference on
Blockchain and Cryptocurrency, ICBC 2021. https://doi.org/10.1109/
ICBC51069.2021.9461147
Page, M.J., McKenzie, J.E., Bossuyt, P.M., Boutron, I., Hoffmann, T.C., Mulrow,
C.D., … Moher, D. (2021). The PRISMA 2020 Statement: an Updated
Guideline for Reporting Systematic Reviews. https://doi.org/10.1136/
bmj.n71
Parveen, R., & Alajmi, A. (2019). An overview of bitcoin’s legal and technical
challenges. Journal of Legal, Ethical and Regulatory Issues, 22. Retrieved
from https://www.abacademies.org
Patel, R., Migliavacca, M., & Oriani, M.E. (2022). Blockchain in banking and
finance: A bibliometric review. Research in International Business and
Finance, 62. https://doi.org/10.1016/j.ribaf.2022.101718
Phillips, R., & Wilder, H. (2020). Tracing cryptocurrency scams: Clustering
replicated advance-fee and phishing websites. Paper presented at the
IEEE International Conference on Blockchain and Cryptocurrency, ICBC
2020. https://doi.org/10.1109/ICBC48266.2020.9169433
Pimentel, E., & Boulianne, E. (2020). Blockchain in accounting research
and practice: Current trends and future opportunities. Accounting
Perspectives, 19(4), 325-361. http://doi.org/10.1111/1911-3838.12239
Poursafaei, F., Hamad, G.B., & Zilic, Z. (2020). Detecting malicious Ethereum
entities via application of machine learning classification. Paper presented
at the 2nd Conference on Blockchain Research and Applications for
Innovative Networks and Services, BRAINS 2020, 120-127. https://doi.
org/10.1109/BRAINS49436.2020.9223304
Pussegoda, K., Turner, L., Garritty, C., Mayhew, A., Skidmore, B., Stevens, …
Moher, D. (2017). Systematic review adherence to methodological or
reporting quality. Systematic Reviews, 6(1), 131. https://doi.org/10.1186/
s13643-017-0527-2
Regner, F., Schweizer, A. & Urbach, N. (2019). NFTs in practice: non-fungible
tokens as core component of a blockchain-based event ticketing
application. Paper presented at the 40th International Conference on
Information Systems, ICIS 2019. Retrieved from https://www.fim-rc.de
Riley, J. (2021). The current status of cryptocurrency regulation in China
and its effect around the world. China and WTO Review, 7(1), 135-152.
https://doi.org/10.14330/cwr.2021.7.1.06
Wang, L., Cheng, H., Zheng, Z., Yang, A., & Zhu, X. (2021). Ponzi scheme
detection via oversampling-based long short-term memory for smart
contracts. Knowledge-Based Systems, 228. https://doi.org/10.1016/j.
knosys.2021.107312
Wang, Y., Li, F., Hu, J., & Zhuang, D. (2018). K-means algorithm for recognizing
fraud users on a bitcoin exchange platform. Paper presented at the
International Conference on Electronic Business, ICEB 2018. Retrieved
from http://iceb.johogo.com
Williamson, S. (2018). Is bitcoin a waste of resources? Federal
Reserve Bank of St.Louis Review, 100(2), 107-115. https://doi.
org/10.20955/R.2018.107-15
Wronka, C. (2022). Anti-money laundering regimes: A comparison between
Germany, Switzerland and the UK with a focus on the crypto business.
Journal of Money Laundering Control, 25(3), 656-670. https://doi.
org/10.1108/JMLC-06-2021-0060
Wronka, C. (2022). Money laundering through cryptocurrencies - analysis
of the phenomenon and appropriate prevention measures. Journal of
Money Laundering Control, 25(1), 79-94. https://doi.org/10.1108/JMLC-
02-2021-0017
Zekos, G.I. (2019). Finance Crimes: Insider Trading and Money Laundering.
New York: Nova Science Publishers. https://doi.org/10.0.204.81/
CJZR6968
Zhang, Y., Kang, S., Dai, W., Chen, S., & Zhu, J. (2021). Code will speak: Early
detection of Ponzi smart contracts on Ethereum. Paper presented at the
2021 IEEE International Conference on Services Computing, SCC 2021,
301-308. https://doi.org/10.1109/SCC53864.2021.00043
Abstrakt
CEL: Celem głównym niniejszego opracowania jest identyfikacja aktualnego zakresu
badań dotyczących kryptowalut jako przedmiotu nadużyć finansowych. Szczegóło-
we pytania badawcze odnosiły się do prezentacji najważniejszych kierunków tema-
tycznych prowadzonych badań oraz zdefiniowania potencjalnych możliwości dalszej
analizy tego tematu. Jedno z pytań wiązało się również z identyfikacją najbardziej
popularnych oszustw przeprowadzanych z użyciem kryptowalut. METODYKA: Ar-
tykuł opiera się na systematycznym przeglądzie literatury (SLR) przeprowadzonym
dla 57 publikacji dostępnych w bazie Scopus. Dokonano bibliometrycznej oraz opiso-
wej analizy wybranych pozycji literatury przedmiotu. Następnie wydzielono główne
klastry tematyczne i dokonano pogłębionej analizy ich treści. WYNIKI: Szczegółowa
analiza bibliometryczna i opisowa pokazała, że tematyka kryptowalut jako przedmio-
tu nadużyć finansowych jest generalnie nowym obszarem badań naukowych, choć
rozwija się dość intensywnie. Relatywnie mała liczba publikacji w porównaniu z in-
nymi podobnymi obszarami pokazuje również, że ten temat nie jest jeszcze tak moc-
no eksplorowany przez naukowców i można w nim rozwijać wiele różnych trendów
badawczych. Ostatecznie zidentyfikowano następujące kluczowe obszary badawcze:
Biographical note
Małgorzata Kutera is an assistant professor in the Institute of Economics,
Finance and Management at the Jagiellonian University in Krakow, Poland.
She is also a certified public accountant (CPA) and has many years of
experience in auditing financial statements. The critical areas of her research
include accounting, auditing, and corporate financial reporting. Most of the
publications focus on theoretical and practical aspects of auditing financial
statements, the activity of statutory auditors, the organization of the audit
services market, and the methodology of verification processes. In this
context, fraudulent financial reporting and the role of auditing in detecting
such crimes are of particular importance. Other scientific interests include the
financial reporting system, creative accounting, and issues related to the tax
optimization of enterprises from national and international perspectives.
Conflicts of interest
The author declares no conflict of interest.