[1]
|
Kaul, V. (2013) Easy Money: Evolution of Money from Robinson Crusoe to the First World War. Sage Publications, Thousand Oaks.
|
[2]
|
Ferguson, N. (2008) The Ascent of Money: A Financial History of the World. Penguin Books, New York.
|
[3]
|
Eagleton, C., Williams, J., Cribb, J. and Errington, E. (2007) Money: A History. 2nd Edition, Firefly Books, Buffalo.
|
[4]
|
Martin, F. (2013) Money: The Unauthorised Biography. Alfred A. Knopf, New York.
|
[5]
|
Dalton, G. (1982) Barter. Journal of Economic Issues, 16, 181-190.
|
[6]
|
Humphrey, C. (1985) Barter and Economic Disintegration. Man, 20, 48-72. http://dx.doi.org/10.2307/2802221
|
[7]
|
Graeber, D. (2011) Debt: The First 5,000 Years. Melville House Publishing, Brooklyn.
|
[8]
|
Walker, F.A. (1878) Money. Henry Holt & Co., New York.
|
[9]
|
Reynolds, L.G. (1963) Economics: A General Introduction. R.D. Irwin, Homewood.
|
[10]
|
Dalton, G. (1965) Primitive Money. American Anthropologist, New Series, 67, 44-65. http://dx.doi.org/10.1525/aa.1965.67.1.02a00040
|
[11]
|
Hicks, J.R. (1967) Critical Essays in Monetary Theory. Clarendon Press, London.
|
[12]
|
Bergstra, J. and Weijland, P. (2014) Bitcoin: A Money-Like Informational Commodity. Working Paper, University of Amsterdam. http://arxiv.org/pdf/1402.4778.pdf
|
[13]
|
Antonopoulos, A.M. (2014) Mastering Bitcoin. O’Reilly Media, Sebastopol.
|
[14]
|
Franco, P. (2015) Understanding Bitcoin: Cryptography, Engineering and Economics. Wiley, Chichester.
|
[15]
|
Swanson, T. (2014) The Anatomy of a Money-Like Information Commodity: A Study of Bitcoin. https://s3-us-west-2.amazonaws.com/chainbook/The+Anatomy+of+a+Money-like+Informational+Commodity.pdf
|
[16]
|
Bohme, R., Christin, N., Edelman, B. and Moore, T. (2015) Bitcoin: Economics, Technology, and Governance. Journal of Economic Perspectives, 29, 213-238. http://dx.doi.org/10.1257/jep.29.2.213
|
[17]
|
Castonova, E. (2014) Wildcat Currency: How the Virtual Money Revolution is Transforming the Economy. Yale University Press, New Haven.
|
[18]
|
Harrison, A. (1967) The Problem of Privacy in the Computer Age: An Annotated Bibliography, I. Rand Corp, Santa Monica.
|
[19]
|
Harrison, A. (1969) The Problem of Privacy in the Computer Age: An Annotated Bibliography, II. Rand Corp, Santa Monica.
|
[20]
|
Hunt, M.K., and Turn, R. (1974) Privacy and Security in Databank Systems: An Annotated Bibliography, 1970-1973. Rand Corp, Santa Monica.
|
[21]
|
Armer, P. (1968) Privacy Aspects of the Cashless and Checkless Society (Testimony before the Senate Subcommittee on Administrative Practice and Procedure). Rand Corp, Santa Monica, Document Number: P-3822.
|
[22]
|
Oettinger, A. (1964) Proceedings of the National Automation Conference, American Bankers Association, New York.
|
[23]
|
Lee, N.F. (1967) Tomorrow’s Checkless, Cashless Society: The Problems, the Solutions, The Benefits. Financial Executive, June. Reprinted in Management Review, 56, 58-62.
|
[24]
|
Humes, K. (1978) The Checkless/Cashless Society? Don’t Bank on It! Futurist, October 1978, 301-306.
|
[25]
|
Roland, J.D. (1979) The Microelectronic Revolution. Futurist, April. http://www.pynthan.com/microrev.htm
|
[26]
|
US House Subcommittee on Domestic and International Monetary Policy (1996) The Future of Money: Part 2 Hearing. Government Printing Office, Washington DC, 11 October 1995. Reprint, Forgotten Books, London, 2013. http://www.forgottenbooks.com/books/The_Future_of_Money_v2_1000869064
|
[27]
|
Szabo, N. (1997) Formalizing and Securing Relationships on Public Networks. First Monday, 2, 1 September 1997. http://ojphi.org/ojs/index.php/fm/article/view/548/469 http://dx.doi.org/10.5210/fm.v2i9.548
|
[28]
|
Szabo, N. (1997) Contracts with Bearer. Nick Szabo’s Essays, Papers, and Concise Tutorials. http://szabo.best.vwh.net/ http://szabo.best.vwh.net/bearer_contracts.html
|
[29]
|
Szabo, N. (2008) Bit Gold. Unenumerated: An Unending Variety of Topics. Forbes.com Blog Network. http://unenumerated.blogspot.com/2005/12/bit-gold.html
|
[30]
|
Nakamoto, S. (2008) Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf
|
[31]
|
Dai, W. (1998) B-Money. http://www.weidai.com/bmoney.txt
|
[32]
|
Chaum, D. (1982) Blind Signatures for Untraceable Payments. In: Chaum, D., Rivest R.L. and Sherman, A.T., Eds., Advances in Cryptology Proceedings of Crypto 82, Plenum (Springer-Verlag), New York, 199-203. http://www.chaum.com/publications/publications.html
|
[33]
|
Chaum, D. (1985) Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM, 28, 1030-1044. http://dx.doi.org/10.1145/4372.4373
|
[34]
|
Chaum, D. (1992) Achieving Electronic Privacy. Scientific American, 267, 96-101. http://dx.doi.org/10.1038/scientificamerican0892-96
|
[35]
|
Grassmuck, V. (1997) Money on the Internet: Strong Privacy Protection vs. Data Trail (Ecash Goes Live in the US, Finland and Germany). InterCommunication Magazine, No. 19, NTT Publishing, Tokyo. http://waste.informatik.hu-berlin.de/grassmuck/Texts/ecash.e.html
|
[36]
|
Back, A. (2002) Hashcash: A Denial of Service Counter-Measure (5 Years on). http://hashcash.org/papers/hashcash.pdf
|
[37]
|
Back, A. (1997) Hashcash Package Postage Implementation. http://hashcash.org/papers/announce.txt
|
[38]
|
Mougayar, W. (2014) The 8 Identities of Bitcoin. http://startupmanagement.org/2014/02/01/the-8-identities-of-bitcoin/
|
[39]
|
Miller, R., Michalski, W. and Stevens, B. (2002) The Future of Money. In: OECD, Ed., The Future of Money, Chap. 1, 11-30, OECD, Paris.
|
[40]
|
Cuthbertson, A. (2015) Bitcoin Now Accepted by 100,000 Merchants Worldwide. International Business Times, 4 February 2015. http://www.ibtimes.co.uk/bitcoin-now-accepted-by-100000-merchants-worldwide-1486613
|
[41]
|
IMF (International Monetary Fund) (2015) Fact Sheet: Special Drawing Rights (SDRs). IMF, Washington, DC. http://www.imf.org/external/np/exr/facts/sdr.htm
|
[42]
|
Koning, J.P. (2013) Separating the Functions of Money—The Case of Medieval Coinage. Moneyness (The Blog of J.P. Koning), 13 September 2013. http://jpkoning.blogspot.com/2013/09/separating-functions-of-moneythe-case.html
|
[43]
|
Andreessen, M. (2014) Why Bitcoin Matters. New York Times, 21 January 2014. http://dealbook.nytimes.com/2014/01/21/why-bitcoin-matters/?smid=pl-share
|
[44]
|
Ron, D. and Shamir, A. (2012) Quantitative Analysis of the Full Bitcoin Transaction Graph, Working Paper. Weizmann Institute of Science, Rehovot. http://eprint.iacr.org/2012/584.pdf
|
[45]
|
Jost, P.M. and Sandhu, H.S. (2000) The Hawala Alternative Remittance System and Its Role in Money Laundering. A FinCEN/INTERPOL Report, FinCEN, Vienna, VA.
|
[46]
|
Bowers, C.B. (2009) Hawala, Money Laundering, and Terrorism Finance: Micro-Lending as an End to Illicit Remittance. Denver Journal of International Law and Policy, 37, 379-419.
|
[47]
|
Martin, M.B.V. (2012) An Economic History of Hundi, 1858-1978. PhD Thesis, London School of Economics, London.
|
[48]
|
Mayyasi, A. (2014) Hawala: The Working Man’s Bitcoin. Priceonomics Blog, 7 February 2014. http://priceonomics.com/hawala-the-working-mans-bitcoin/
|
[49]
|
Chance, D.M. and Brooks, R. (2013) An Introduction to Derivatives and Risk Management. Ninth Edition, Independence, KY.
|
[50]
|
Hull, J.C. (2014) Options, Futures, and Other Derivatives. Ninth Edition, Pearson, Boston.
|
[51]
|
Jarrow, R.A. and Chatterjea, A. (2013) An Introduction to Derivative Securities, Financial Markets and Risk Management. W.W. Norton Co., New York.
|
[52]
|
Coyle, B. (2000) Currency Swaps. Financial World Publishing, Canterbury.
|
[53]
|
Bock, D.R. (1986) Fixed-to-Fixed Rate Currency Swap: The Origins of the World Bank Borrowing Programme. In: Antl, B., Ed., Swap Finance, Vol. 2, Euromoney Publications, London, 218-223.
|
[54]
|
Bock, D. and Wallich, C.I. (1984) Currency Swaps: A Borrowing Technique in a Public Policy Context, Staff Working Papers No. 640, World Bank, Washington DC. http://documents.worldbank.org/curated/en/1984/05/1554818/currency-swaps-borrowing-technique-public-policy-context
|
[55]
|
Jain, L.C. (1929) Indigenous Banking in India. Macmillan & Co, London.
|
[56]
|
PricewaterhouseCoopers (PwC) (2013) Know Your Customer: Quick Reference Guide. https://www.pwc.com/en_GX/gx/financial-services/assets/pwc-kyc-anti-money-laundering-guide-2013.pdf
|
[57]
|
FBI (Federal Bureau of Investigation) (2012) Bitcoin Virtual Currency: Unique Features Present Distinct Challenges for Deterring Illicit Activity. 24 April. http://www.wired.com/images_blogs/threatlevel/2012/05/Bitcoin-FBI.pdf
|
[58]
|
FinCEN (Financial Crimes Enforcement Network) (Department of the Treasury) (2013) Application of FinCEN’s Regulations to Persons Administering, Exchanging, or Using Virtual Currencies (FIN-2013-G001). 18 March. http://fincen.gov/statutes_regs/guidance/html/FIN-2013-G001.html
|
[59]
|
IRS (Internal Revenue Service) (Department of the Treasury) (2014) Notice 2014-21: IRS Virtual Currency Guidance. 14 April. http://www.irs.gov/irb/2014-16_IRB/ar12.html
|
[60]
|
SEC (Securities and Exchange Commission) (2013) Testimony before the Senate Committee on Homeland Security and Governmental Affairs. 30 August. https://www.documentcloud.org/documents/835843-virtual-currency-hearings.html
|
[61]
|
New York State Department of Financial Services (2014) Virtual Currencies. 17 July. http://www.dfs.ny.gov/about/press2014/pr1407171-vc.pdf
|
[62]
|
New York State Department of Financial Services (2015) Virtual Currencies (Reproposed). 4 February. http://www.dfs.ny.gov/legal/regulations/revised_vc_regulation.pdf
|
[63]
|
Barber, S., Boyen, X., Shi, E. and Uzun, E. (2012) Bitter to Better—How to Make Bitcoin a Better Currency, Working Paper, Stanford University. http://ai.stanford.edu/~xb/fc12/bitcoin.pdf
|
[64]
|
Schneier, B. (2013) Silk Road Author Arrested Due to Bad Operational Security. Schneier on Security. https://www.schneier.com/blog/archives/2013/10/silk_road-au.html
|
[65]
|
Schneier, B. (2013) The Internet is a Surveillance State. Schneier on Security, 16 March 2013. https://www.schneier.com/essays/archives/2013/03/the_internet_is_a_su.html
|
[66]
|
Zetter, K. (2013) NSA Is Wired into Top Internet Companies’ Servers, Including Google and Facebook. Wired, 5 June 2013. http://www.wired.com/2013/06/nsa-tapped-internet-servers/
|
[67]
|
Jaycox, M. and Seth, S. (2013) The Government Wants a Backdoor into Your Online Communications. Electronic Frontier Foundation, 22 May 2013. https://www.eff.org/deeplinks/2013/05/caleatwo
|
[68]
|
RT.com (2015) Yahoo Exec Grills NSA Director over “Backdoor” Access to Private Data. 24 February 2015. http://rt.com/usa/234891-nsa-backdoor-access-data/
|
[69]
|
Kelly, E. (2015) Bill Would Stop Feds from Mandating “Backdoor” to Data. USA Today, 2 April 2015. http://www.usatoday.com/story/news/politics/2015/04/02/encryption-bill-tech-
companies-federal-law-enforcement/70734646/
|