Cryptocurrency and State Sovereignty: Comprehensive Review of Bitcoin, Blockchain, and Virtual Currency Technology, Hash Functions, Merkle Trees, and Security, Government Bans and Regulations

Business & Finance, Economics, Money & Monetary Policy, Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems
Cover of the book Cryptocurrency and State Sovereignty: Comprehensive Review of Bitcoin, Blockchain, and Virtual Currency Technology, Hash Functions, Merkle Trees, and Security, Government Bans and Regulations by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463341223
Publisher: Progressive Management Publication: September 5, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463341223
Publisher: Progressive Management
Publication: September 5, 2018
Imprint: Smashwords Edition
Language: English

This mid-2018 report has been professionally converted for accurate flowing-text e-book format reproduction. Since Bitcoin's release in late 2008, the cryptocurrency has grown and proven itself as a disruptive technology, resistant to sovereign law and international financial regulations, and an alternative to the sovereign state's concept of fiat money. The Wild West nature of cryptocurrency has enabled a number of individuals, criminal organizations, terrorist groups, and sovereign states to use Bitcoin, among other cryptocurrencies, to avoid detection, interference, or punishment from regulatory agencies to commit actions such as money laundering, trafficking narcotics, purchasing weapons, and bypassing international sanctions. This study addresses the disruptive nature of cryptocurrency by asking what legislative options are available to sovereign states to maximize the effectiveness of sovereign laws while limiting undesired cryptocurrency use. To tackle this question, this study breaks down the legislative actions countries may take into three categories—prohibition, regulation, and adoption—to investigate the benefits, limitations, and effects of each policy. By examining the legislative actions of countries like China, the United States, and Russia, this study finds that sovereign states have had limited success in preventing illicit cryptocurrency use; however, without implementing a refined, multifaceted global regulatory standard on cryptocurrency transactions in the near future, cryptocurrency will remain an unchecked means to transact on an international scale.

The questions in this study are built upon the premise that cryptocurrencies offer new and unprecedented challenges to sovereign states' ability to regulate and enforce laws governing its monetary policy, security, and trade; therefore, the state—and by extension the international community—will endeavor to develop policies to increase sovereign states' control on the use of cryptocurrency. The questions this study seeks to answer are: What options are available to the sovereign state to limit cryptocurrency' s capacity to challenge domestic and international laws? What allows cryptocurrency to sidestep the established financial order and enforcement institutions? What are the challenges sovereign states face when introducing cryptocurrency legislation? Finally, as cryptocurrency technology becomes more popular and countries begin developing their own blockchain-based tools, what factors will inhibit or promote a sovereign state from developing their own sovereign cryptocurrency?

The first chapter of this study consists of the study question and its importance, the literature review, and chapter outline. The second chapter is dedicated to describing the functionality of cryptocurrency, including the innovative technology that makes it an attractive method of transaction. Also, this chapter dissects blockchain technology into its key parts as a means to present the advantages, disadvantages and weaknesses inherent in blockchain based cryptocurrency. It is this study's goal to analyze the potential impact that cryptocurrency has on the state's sovereignty and they methods the state and international institutions could take to manage cryptocurrency implementation. To do this, this study divides the potential actions a state may take into the last three chapters, Chapter III Banning Cryptocurrency, Chapter IV Regulating Cryptocurrency, and Chapter V Adopting Cryptocurrency. Chapter III focuses on listing the potential methods that states may take to regulate cryptocurrency and analyzes each method's effectiveness. Chapter IV lists and analyzes how different levels of a ban on cryptocurrency could affect a state's capability to prevent illicit activity and the consequences resulting from extreme measures.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This mid-2018 report has been professionally converted for accurate flowing-text e-book format reproduction. Since Bitcoin's release in late 2008, the cryptocurrency has grown and proven itself as a disruptive technology, resistant to sovereign law and international financial regulations, and an alternative to the sovereign state's concept of fiat money. The Wild West nature of cryptocurrency has enabled a number of individuals, criminal organizations, terrorist groups, and sovereign states to use Bitcoin, among other cryptocurrencies, to avoid detection, interference, or punishment from regulatory agencies to commit actions such as money laundering, trafficking narcotics, purchasing weapons, and bypassing international sanctions. This study addresses the disruptive nature of cryptocurrency by asking what legislative options are available to sovereign states to maximize the effectiveness of sovereign laws while limiting undesired cryptocurrency use. To tackle this question, this study breaks down the legislative actions countries may take into three categories—prohibition, regulation, and adoption—to investigate the benefits, limitations, and effects of each policy. By examining the legislative actions of countries like China, the United States, and Russia, this study finds that sovereign states have had limited success in preventing illicit cryptocurrency use; however, without implementing a refined, multifaceted global regulatory standard on cryptocurrency transactions in the near future, cryptocurrency will remain an unchecked means to transact on an international scale.

The questions in this study are built upon the premise that cryptocurrencies offer new and unprecedented challenges to sovereign states' ability to regulate and enforce laws governing its monetary policy, security, and trade; therefore, the state—and by extension the international community—will endeavor to develop policies to increase sovereign states' control on the use of cryptocurrency. The questions this study seeks to answer are: What options are available to the sovereign state to limit cryptocurrency' s capacity to challenge domestic and international laws? What allows cryptocurrency to sidestep the established financial order and enforcement institutions? What are the challenges sovereign states face when introducing cryptocurrency legislation? Finally, as cryptocurrency technology becomes more popular and countries begin developing their own blockchain-based tools, what factors will inhibit or promote a sovereign state from developing their own sovereign cryptocurrency?

The first chapter of this study consists of the study question and its importance, the literature review, and chapter outline. The second chapter is dedicated to describing the functionality of cryptocurrency, including the innovative technology that makes it an attractive method of transaction. Also, this chapter dissects blockchain technology into its key parts as a means to present the advantages, disadvantages and weaknesses inherent in blockchain based cryptocurrency. It is this study's goal to analyze the potential impact that cryptocurrency has on the state's sovereignty and they methods the state and international institutions could take to manage cryptocurrency implementation. To do this, this study divides the potential actions a state may take into the last three chapters, Chapter III Banning Cryptocurrency, Chapter IV Regulating Cryptocurrency, and Chapter V Adopting Cryptocurrency. Chapter III focuses on listing the potential methods that states may take to regulate cryptocurrency and analyzes each method's effectiveness. Chapter IV lists and analyzes how different levels of a ban on cryptocurrency could affect a state's capability to prevent illicit activity and the consequences resulting from extreme measures.

More books from Progressive Management

Cover of the book National Defense Intelligence College Paper: The Creation of the National Imagery and Mapping Agency: Congress's Role as Overseer - Colin Powell, John Glenn, Newt Gingrich, CIA by Progressive Management
Cover of the book Understanding the Anti-Access and Area Denial Threat: An Army Perspective – Air-Sea Battle, Prevention of Opposing Forces From Maneuvering to or Within an Operational Area by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Food Sanitation for the Supervisor Field Manual - FM 8-34 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Kite Balloons to Airships: the Navy's Lighter-than-Air Experience - Goodyear, Goodrich, Helium, Airship Disasters, Lakehurst, USS Akron, Macon, Heli-Stat, Aerocrane, ZP-32 and ZP-21 by Progressive Management
Cover of the book Yemen in Perspective: Orientation Guide and Yemeni Cultural Orientation: Geography, History, Economy, Security, Customs, Aden, Sanaa, Sunni and Shi'a, Sufism, Qat Chewing, Al Qaeda, Houthi Rebellion by Progressive Management
Cover of the book The Cheshire Jet: Harnessing Metamaterials to Achieve an Optical Stealth Capability - Cloaking Technology for Aircraft, Composites with Unique Electromagnetic Properties, Directed Energy Weapons by Progressive Management
Cover of the book 21st Century FEMA Study Course: Introduction to Hazard Mitigation (IS-393.a) - Flood, Earthquake, Tornado, Hurricane, Wildfire, Critical Facilities Protection, Community Programs by Progressive Management
Cover of the book Foundation of the Force: Air Force Enlisted Personnel Policy 1907-1956 - World War I and II, Doolittle Board, Advertising, Teaching Youth, Recruiting, Military Careers, Training, Specialization by Progressive Management
Cover of the book 21st Century VA Independent Study Course: Hearing Impairment, Ototoxic and Noise-induced Hearing Loss, Audiology, Auditory Problems, Balance Disorders, Ear Pathologies, Tinnitus, Deafness by Progressive Management
Cover of the book Planning for Action: Campaign Concepts and Tools - Wargaming, Military Decision Making Process (MDMP), Joint Operation Planning Process (JOPP), Military End State, Measurements of Performance (MOP) by Progressive Management
Cover of the book The Modern Catholic Just War Tradition: Pope John Paul II and Pope Benedict XVI, Pacifism, Presumption Against War or For Justice, Questions and Suggestions, Moral Reasoning for War by Progressive Management
Cover of the book Once in a Blue Moon: Airmen in Theater Command: Lauris Norstad, Albrecht Kesselring, and Their Relevance to the Twenty-First Century Air Force - Historical Analysis of Rise to Regional CINC by Progressive Management
Cover of the book Vision, Education and Experimentation: Marine Corps Organizational Behavior and Innovation During the Interwar Period - Gallipoli, Tarawa, John Lejeune, Amphibious Warfare Prophet Ellis, Commandants by Progressive Management
Cover of the book Qatar in Perspective: Geography, History, Economy, Security, Doha (Ad Dawhah), Ar Rayyan, Al Khawr, Umm Sa'id (Mesaieed), Dukhan, Bani Utub, Wahhabis, Al Than, Ottoman, Saudi, British Intrigues by Progressive Management
Cover of the book 21st Century Textbooks of Military Medicine - Medical Consequences of Nuclear Warfare: Radiation, Radionuclide Contamination, Power Plant Accidents, Chernobyl (Emergency War Surgery Series) by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy