376 research outputs found

    The rise and fall of cryptocurrency coins and tokens

    Get PDF
    Since Bitcoin’s introduction in 2009, interest in cryptocurrencies has soared. One manifestation of this interest has been the explosion of newly created coins and tokens. In this paper, we analyze the dynamics of this burgeoning industry. We consider both cryptocurrency coins and tokens. The paper examines the dynamics of coin and token creation, competition and destruction in the cryptocurrency industry. In order to conduct the analysis, we develop a methodology to identify peaks in prices and trade volume, as well as when coins and tokens are abandoned and subsequently “resurrected”. We also study trading activity. Our data spans more than 4 years: there are 1082 coins and 725 tokens in the data. While there are some similarities between coins and tokens regarding dynamics, there are some striking differences as well. Overall, we find that 44% of publicly-traded coins are abandoned, at least temporarily. 71% of abandoned coins are later resurrected, leaving 18% of coins to fail permanently. Tokens experience abandonment less frequently, with only 7% abandonment and 5% permanent token abandonment at the end of the data. Using linear regressions, we find that market variables such as the bitcoin price are not associated with the rate of introducing new coins, though they are positively associated with issuing new tokens. We find that for both coins and tokens, market variables are positively associated with resurrection. We then examine the effect that the bursting of the Bitcoin bubble in December 2017 had on the dynamics in the industry. Unlike the end of the 2013 bubble, some alternative cryptocurrencies continue to flourish after the bursting of this bubble

    Analyzing Target-Based Cryptocurrency Pump and Dump Schemes

    Get PDF
    As the number of cryptocurrencies has exploded in recent years, so too has the fraud. One popular strategy is when actors promote coordinated purchases of coins in hopes of temporarily driving up prices. Prior work investigating such pump and dump schemes has focused on the immediate impact to prices following pump signals, which were largely interpreted as following the same strategy. The reality, as with most cybercrimes, is that the operators of the schemes try out a much more heterogeneous mix of tactics. From a population of 12,252 pump signals observed between July 2017 and January 2019, we identify and examine 3,683 so-called target-based pump signals that announce promoted coins alongside buy and sell targets, but without a coordinated purchase time. We develop a strategy to measure the success of target pumps over longer time horizons. We find that around half of these pumps reach at least one of their sell targets, and that reaching their peak price often takes days, as opposed to the seconds or minutes required in pumps studied previously. We also examine the various groups promoting coins and present evidence that groups try a variety of distinct strategies and experience varying success. We find that the most successful groups promote many coins and issue many pumps, but not for the same coins. As decentralized finance becomes more popular, a deeper understanding of price manipulation techniques like target pumps is needed to combat fraud

    An examination of the cryptocurrency pump-and-dump ecosystem

    Get PDF
    The recent introduction of thousands of cryptocurrencies in an unregulated environment has created many opportunities for unscrupulous traders to profit from price manipulation. We quantify the scope of one widespread tactic, the “pump and dump”, in which actors coordinate to bid up the price of coins before selling at a profit. We joined all relevant channels on two popular group-messaging platforms, Telegram and Discord, and identified thousands of different pumps targeting hundreds of coins. We find that pumps are modestly successful in driving short-term price rises, but that this effect has diminished over time. We also find that the most successful pumps are those that are most transparent about their intentions. Combined with evidence of concentration among a small number of channels, we conclude that regulators have an opportunity to effectively crack down on this illicit activity that threatens broader adoption of blockchain technologies

    Profiling allele-specific gene expression in brains from individuals with autism spectrum disorder reveals preferential minor allele usage.

    Get PDF
    One fundamental but understudied mechanism of gene regulation in disease is allele-specific expression (ASE), the preferential expression of one allele. We leveraged RNA-sequencing data from human brain to assess ASE in autism spectrum disorder (ASD). When ASE is observed in ASD, the allele with lower population frequency (minor allele) is preferentially more highly expressed than the major allele, opposite to the canonical pattern. Importantly, genes showing ASE in ASD are enriched in those downregulated in ASD postmortem brains and in genes harboring de novo mutations in ASD. Two regions, 14q32 and 15q11, containing all known orphan C/D box small nucleolar RNAs (snoRNAs), are particularly enriched in shifts to higher minor allele expression. We demonstrate that this allele shifting enhances snoRNA-targeted splicing changes in ASD-related target genes in idiopathic ASD and 15q11-q13 duplication syndrome. Together, these results implicate allelic imbalance and dysregulation of orphan C/D box snoRNAs in ASD pathogenesis

    Peer influence in network markets: a theoretical and empirical analysis

    Get PDF
    Network externalities spur the growth of networks and the adoption of network goods in two ways. First, they make it more attractive to join a network the larger its installed base. Second, they create incentives for network members to actively recruit new members. Despite indications that the latter "peer effect" can be more important for network growth than the installed-base effect, it has so far been largely ignored in the literature. We address this gap using game-theoretical models. When all early adopters can band together to exert peer influence-an assumption that fits, e.g., the case of firms supporting a technical standard-we find that the peer effect induces additional growth of the network by a factor. When, in contrast, individuals exert peer influence in small groups of size n, the increase in network size is by an additive constant-which, for small networks, can amount to a large relative increase. The difference between small, local, personal networks and large, global, anonymous networks arises endogenously from our analysis. Fundamentally, the first type of networks is "tie-reinforcing," the other, "tie-creating". We use survey data from users of the Internet services, Skype and eBay, to illustrate the main logic of our theoretical results. As predicted by the model, we find that the peer effect matters strongly for the network of Skype users-which effectively consists of numerous small sub-networks-but not for that of eBay users. Since many network goods give rise to small, local networks
    • …
    corecore