Why do some IT freelancers in certain countries prefer digital payment with cryptocurrency despite it being illegal?

A. Pathan
{"title":"Why do some IT freelancers in certain countries prefer digital payment with cryptocurrency despite it being illegal?","authors":"A. Pathan","doi":"10.1080/1206212X.2023.2193778","DOIUrl":null,"url":null,"abstract":"The legal status of cryptocurrency varies from country to country. The intent of this article is to investigate the key reasons behind some IT Freelancers’ preference of getting their remuneration via digital transactions of cryptocurrency even though by law, it is illegal in their country. We also explore the unique characteristics of cryptocurrency that make it distinct from e-cash and other types of currencies.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"51 1","pages":"285 - 287"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computers and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/1206212X.2023.2193778","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

The legal status of cryptocurrency varies from country to country. The intent of this article is to investigate the key reasons behind some IT Freelancers’ preference of getting their remuneration via digital transactions of cryptocurrency even though by law, it is illegal in their country. We also explore the unique characteristics of cryptocurrency that make it distinct from e-cash and other types of currencies.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
为什么某些国家的一些IT自由职业者更喜欢使用加密货币进行数字支付,尽管这是非法的?
加密货币的法律地位因国家而异。本文的目的是调查一些IT自由职业者倾向于通过加密货币的数字交易获得报酬的关键原因,尽管根据法律,这在他们的国家是非法的。我们还探讨了加密货币的独特特征,使其区别于电子现金和其他类型的货币。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Computers and Applications
International Journal of Computers and Applications Computer Science-Computer Graphics and Computer-Aided Design
CiteScore
4.70
自引率
0.00%
发文量
20
期刊介绍: The International Journal of Computers and Applications (IJCA) is a unique platform for publishing novel ideas, research outcomes and fundamental advances in all aspects of Computer Science, Computer Engineering, and Computer Applications. This is a peer-reviewed international journal with a vision to provide the academic and industrial community a platform for presenting original research ideas and applications. IJCA welcomes four special types of papers in addition to the regular research papers within its scope: (a) Papers for which all results could be easily reproducible. For such papers, the authors will be asked to upload "instructions for reproduction'''', possibly with the source codes or stable URLs (from where the codes could be downloaded). (b) Papers with negative results. For such papers, the experimental setting and negative results must be presented in detail. Also, why the negative results are important for the research community must be explained clearly. The rationale behind this kind of paper is that this would help researchers choose the correct approaches to solve problems and avoid the (already worked out) failed approaches. (c) Detailed report, case study and literature review articles about innovative software / hardware, new technology, high impact computer applications and future development with sufficient background and subject coverage. (d) Special issue papers focussing on a particular theme with significant importance or papers selected from a relevant conference with sufficient improvement and new material to differentiate from the papers published in a conference proceedings.
期刊最新文献
Weight assignment in cloud service selection based on FAHP and rough sets The social force model: a behavioral modeling approach for information propagation during significant events A comprehensive study on social networks analysis and mining to detect opinion leaders A machine learning approach for skin lesion classification on iOS: implementing and optimizing a convolutional transfer learning model with Create ML Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1