Convenience theory of cryptocurrency crime: a content analysis of U.S. federal court decisions

This article examines cryptocurrency cases decided in the U.S. District and Circuit Courts to determine the applicability of Gottschalk’s convenience theory of white-collar crime to cryptocurrency crime litigation and to empirically analyze whether the conditions under which cryptocurrency offenses...

Full description

Saved in:  
Bibliographic Details
Authors: Nolasco Braaten, Claire (Author) ; Vaughn, Michael (Author)
Format: Electronic Article
Language:English
Published: 2021
In: Deviant behavior
Year: 2021, Volume: 42, Issue: 8, Pages: 958-978
Online Access: Presumably Free Access
Volltext (lizenzpflichtig)
Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:
Description
Summary:This article examines cryptocurrency cases decided in the U.S. District and Circuit Courts to determine the applicability of Gottschalk’s convenience theory of white-collar crime to cryptocurrency crime litigation and to empirically analyze whether the conditions under which cryptocurrency offenses occurred show support for the convenience theory. Analysis of U.S. federal district and circuit court case law involving cryptocurrency crimes and fraud indicates support for the convenience theory of white-collar crime. Defendants in various schemes were motivated by financial gain, either for the company or for personal use. Their roles and positions in the businesses allowed them access to resources that helped them perpetrate fraud through the following mechanisms: (1) operating front companies; (2) relationship building by defendants; (3) over representing profits that investors would obtain from purchases of virtual currencies, representing that cryptocurrencies were safe and reliable investments when they were risky, and overestimating abilities and capacities to provide services promised to investors in securities fraud; (4) breaching fiduciary duties to their clients and corporate stockholders by misappropriating profits for their own personal gain; and (5) engaging in dark web transactions that guaranteed anonymity. Defendants also employed various neutralization techniques to justify their crimes.
Item Description:Literaturverzeichnis: Seite 974-978
ISSN:1521-0456
DOI:10.1080/01639625.2019.1706706