Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
The Minimum Hybrid Contract (MHC): Combining Legal and Blockchain Smart Contracts Master Thesis Jørgen Svennevik Notland Norwegian University of Science and Technology (NTNU) School of Entrepreneurship TIØ4530 Spring 2019 Faculty of Economics Management Department of Industrial Economics and Technology Management. Supervisors: Roger Sørheim & Donn Morrison Table of Contents Table of Contents 1 Abstract 3 Acknowledgments 5 1 Introduction 6 2 Context 2.1 Corruption 2.2 Illustrative Case: Brazil 9 9 11 3 Theoretical Framework: Agency Theory 3.1 Principal-Agent Relationship 3.2 Information Asymmetry 3.3 Agency Costs 3.4 Organizations and Governance 3.5 Transparency 13 15 16 20 21 23 4 Blockchain Literature Review 4.1 Money 4.1.1 Cryptocurrency 4.1.2 Fungibility 4.2 Public-private key cryptography 4.3 Bitcoin 4.4 Forking 4.5 Smart Contract 24 28 28 32 33 35 37 38 5 Discussion 5.1 Minimum Hybrid Contract (MHC) Architecture 5.2 The MHC and Agency Theory Development 5.2.1 Principal-Agent Relationship & MHC 5.3 Strategy for Regulating Blockchain 5.3.1 Fungibility 5.3.2 Financial innovation 5.3.3 The MHC in Context 5.3.4 The MHC and The Legal Status Quo 41 42 47 51 53 56 56 59 60 1 6 Conclusion 62 References 64 2 Abstract Having identified contracts as the nexus of corruption, I sought to find how contracts, blockchain smart contracts, and financial regulations can be used to make them both secure, accountable, transparent, and inclusive. Then I explored how corruption in a contractual relationship could be mitigated, using the term Minimum Hybrid Contract (MHC) which I coined, where a smart contract is a supplement to a legal contract providing transparency and immutability to the contract’s financial transactions, privacy is accepted as a human need and total transparency must be avoided. The extensive literature review on blockchain explains its key features for financial transaction; transparency and immutability. Blockchain smart contracts can interplay with, or replace legal contract, and mitigate agency theory issues which increases trust in the principal-agent relationship. The MHC is an evolutionary change proposition to ensure stability because it leaves the legal contract as it provides a smart contract as a supplemental transactional tool. To implement the MHC architecture in a legislation cryptocurrencies are required for the blockchain smart contract to work. Because there is regulatory uncertainty around cryptocurrencies whereas they are illegal in several countries, regulatory strategies such as sandboxes and safe harbors giving regulatory slack and closer collaboration with innovators to ensure financial stability while searching for the optimal regulation is an elaboration on the design of the MHC. Key agency theory issues are be mitigated significantly when blockchain smart contract’s transparent, open, and immutable properties are leveraged in financial transactions. Information sharing increases when using blockchain because a receipt for a financial transactions is indistinguishable from the transaction itself, thus the MHC provides a deterrent against financial crime by removing the opportunity of conducting receipt fraud. Moreover, the MHC mitigates 3 moral hazard because auditing the immutable and transparent blockchain-based transactions does not require trust in the auditor because the process can be automated by automatically reading data from the blockchain smart contract. Thus agency costs are also reduced as the monitoring costs of financial transactions are reduced, and blockchain smart contracts replace auditors. 4 Acknowledgments First, I want to thank my supervisors Roger Sørheim and Donn Morrison for providing guidance. I also want to thank Emil Sina Emami, Andri Karoline Lunøe Spilker, Svein Grimholt and Stian Sandø for proof-reading this paper and providing valuable feedback. Thanks to blockchain experts Jakob Svennevik Notland, Ken Siva Lie, Alf Johansen and Håvard Kittilsen for being insightful and delightful discussion partners on the topic as we simultaneously finished our theses on the same topic; blockchain, spring 2019. 5 1 Introduction While the fall of the Soviet Union marked the end of the discussions regarding the type of financial institutions a country ought to implement, discussion for the last three decades have revolved around discovering, and implementing the ideal mechanisms for achieving the established ideal, which is a free market economy. At the heart of these debates has been the question of how a free market economy can be both secure, accountable, transparent and inclusive to the actors involved, with the solution to these issues being contract and financial regulations. Inclusive. However, the precarious nature of contracts and existing financial regulations were brought to the surface when several Brazilian politicians got arrested for "Operation Car Wash” in 2015. The scandal, which is still under investigation at the time of writing, is estimated thus far to have resulted in a total loss of $13.8 billion in lost tax revenues (Global Witness 2018; Figueiredo 2016). Importantly, scandals like this are not limited to emerging economies of non-western states, as was made evident when it was revealed that Danske Bank was involved in facilitating the biggest money laundering scheme in human history involving $230 billion (Milne & Winter 2018). As a result, the world today is experiencing what has been defined by Edelman (2017) as a trust "trust crisis,” which reached its nadir in 2017, but remains relatively low in most of the world today (Edelman 2019). While understood to be necessary for political, social and financial stability, the plethora of laws, directives and regulations emerging from state bureaucracies and international organisations have in many respects failed to prevent corruption and financial crime, while also contributing to stifling innovation and cause regulatory insecurity to startups and new emerging actors in the market (Department of Justice 2014; KYC360 2016; Stacher 2018), thereby failing to reach their objectives of optimising the free market economy. 6 By limiting the scope of smart contracts exclusively to financial transactions, this paper, therefore, proposes an evolutionary─as opposed to revolutionary─change to the legal contract as a practical and realistic solution to existing problems, where a smart contract supplements the legal contract. The product of this synthesis is the Minimum Hybrid Contract (MHC) which seeks to implement the accountability and transparency of smart contracts into the realm of human judgment and discretion, which governs legal verdicts today. This thesis will demonstrate that using blockchain technology as a supplement can improve legal contracts. In Chapter 3 Under agency theory "moral hazard,” "agency costs” and "information asymmetry”─which will be explained in detail below─ is defined as recurrent issues in contractual relationships, which this thesis sets out to overcome using blockchain technology. The argument advanced here is that in addition to using a court for legal disputes in contractual relationships, supplementing the legal contract with blockchain as a tool for setting the rules for financial transactions can yield benefits. Correctly, subsequently, the discussion in chapter five will argue that doing so provides transparency, immutable transactions while also lowering the cost of conducting due diligence and auditability assessments by lowering the cost of information sharing. The Research Questions (RQ) of this thesis are, therefore: RQ1​: How can traditional legal contracts become more trustworthy? RQ2​: How can blockchain technology improve existing contractual frameworks In what follows Chapter 2 will provide a general discussion on corruption in contracting as basis as a contextual basis for the theoretical framework of this thesis; agency theory. It will use agency theory to focus on the contractual "principal-agent relationships,” and how trust, transparency, and information sharing in the light of agency theory affects its outcome. Chapter 5 argues that MHC is an excellent governance tool for optimal information sharing in agent-principal relationships. By reaching optimal information sharing and to reducing 7 information asymmetry, it will show how increased transparency and trust as understood in agency theory terms can reduce the agency costs or risk-sharing and monitoring. Having done so, Chapter 3 provides a literature review of agency theory and the principal-agent relationship, and Chapter 4 will provide a literature review of blockchain technology, with particular reference to cryptocurrency as a form of money controlled by anyone with a device and internet connection. "Bitcoin,” the first cryptocurrency will be used to demonstrate how the largest and most battle-tested blockchain works, while the negative sentiment around cryptocurrencies and how its seen as a criminal gambling object in the media will also be addressed. Then the concept of smart contracts will be explained to provide a conceptual explanation for how public-private key cryptography is used as addresses for receiving and for authentication for signing and approving cryptocurrency transactions. Chapter 5 will provide an overview of how an MHC can be designed to answer RQ2. Here generally how legal contract can be forged in a one-to-one relationship with a legal contract and how they interact is explained. Public-private key pairs are used for authentication and attribution to whom approved transactions and transactions are openly and immutably available for auditors. The legal contract is still used for settling disputes and declaring the legal text and a smart contract, and its capabilities are leverage for conducting transactions. Chapter 5 will look at the MHC as a potential tool for solving agency issues and mitigate trust in agent-principal relationships laying the foundation for answering RQ1. Then there is a meta discussion on how MHCs affects agency theory focusing on the principal-agent relationship and its effects on the relationships based on hand-picked propositions by Eidenhard (1989). Finally, Chapter 5 discusses how regulators can proceed with regulating the MHC as an elaboration on the design of the MHC further answering RQ2 as regulatory compliance is required for the MHC to be legal. 8 2 Context The 2017 Edelman trust barometer discovered that trust in institutions, including NGOs and corporations, have in 2016 declined to trust "lows” similar to trust levels during the financial crisis. 85% of respondents indicated that it does not "trust the system.” Moreover, only 52% of the respondents trust in businesses (Edelman 2017). Trust is now higher than in 2017 but remains relatively low in most of the world (Edelman 2019). In what follows, this chapter will present a context section first focusing on corruption literature in contracting as a backdrop for agency theory and the discussion. Although this thesis will focus on corruption in contracting in general, Brazil will be used as an illustrative case for discussion and background. The corruption case in Brazil is well documented, recent, and it overlaps with the corruption literature from contracting as governments issue such contracts frequently (Hayne 2017). 2.1 Corruption The 2017 Edelman trust barometer discovered that trust in institutions, including NGOs and corporations, have in 2016 declined to trust "lows" similar to trust levels during the financial crisis. 85% of respondents indicated that it does not "trust the system." Moreover, only 52% of the respondents trust in businesses (Edelman 2017). Trust is now higher than in 2017 but remains relatively low in most of the world (Edelman 2019). In what follows, this chapter will present a context section first focusing on corruption literature in contracting as a backdrop for agency theory and the discussion. Although this thesis will focus on corruption in contracting in general, Brazil will be used as an illustrative case for discussion and background. The corruption case in Brazil is well documented, recent, and it overlaps with the corruption literature from contracting as governments issue such contracts frequently (Hayne 2017). 9 The most extensive literature in contract fraud regarding corruption focuses on the construction industry. Construction industry contracts in the United States have been documented to experience a fraudulent trend as the fragmented nature of the industry makes it challenging to trace payment information (Ahmad et al. 1995; Kenny 2009). Nevertheless, such corruption mostly arose from a lack of transparency and was estimated to have reached approximately USD 340 billion in 2008. Since the global construction market is valued at around USD 3.2 trillion, this means that approximately 10% of the total market value was corrupted, thereby revealing that corruption is not an anomaly, but instead a significant problem of an essential industry in one of the world's most developed economies. According to Sohail and Cavill (2008), the primary reasons for corruption in the construction sector in the US has been attributed to: (1) overcompetition in the tendering process, (2) insufficient transparency in the selection criteria for tenderers, (3) inappropriate political interference in cost decisions,(4) complexity of institutional roles and functions, and (5) asymmetric information amongst project parties. Other relevant cases of contract fraud in the construction industry appear to takes form as misinformation by withholding information, misleading, and altering documents. Other malpractices such as making payments and invoices for materials never received is also prevalent. (Heuvel 2005; Bowen et al. 2007). For example, two surveys conducted in South Africa and Australia has shown that deceit and misinformation are the most common types of fraud (Vee & Skitmore 2003). Moreover, the Danish Institute for International Studies has shown using the World Bank Governance Indicators that the countries situated in the bottom 20 percentile on corruption control are also the most fragile states (Orre & Mathisen 2008). States characterized by the weak central government and political instability also experience high levels of corruption (Foreign 10 Policy 2008). States with these characteristics are often defined as developing countries, which according to The World Bank and the United Nations Office of Drugs and Crimes (UNODC), are estimated to lose USD 20-40 billion due corrupt practices (UNODC 2010). One of the direst statistics can be seen in the estimates of the African Union, which suggests that USD 150 billion (25% of the continent's GDP) is lost every year due to financial malpractices (Transparency International 2007). 2.2 Illustrative Case: Brazil As mentioned in Chapter 1, corruption is not limited to the developed world but also a characteristic of emerging economies, as well as countries rich in natural resources. When resource-rich countries have lousy performance in socio-economic development or a "resource curse,” corruption is seen as a critical factor in explaining it (Mehlum et al. 2006; Robinson et al. 2006; Ross 2001). An example that both qualifies as an emerging market, and a "resource cursed” country, and I have chosen Brazil as an illustrative case for this thesis in order to demonstrate how and why the relevant cornerstone capabilities of blockchain are relevant for corruption. While the Danske Bank corruption scandal and the Panama Papers (Obermayer Obermaier 2016) suggests that the extent of corruption in the West is yet to be revealed, Brazil makes a particularly useful case study due to its well documented corruption scandal which emerged in 2014 with unprecedented judicial and political repercussions, called "Operation Car Wash” (Portuguese: Operação Lava Jato). The scandal uncovered large scale money laundering, kickbacks, and bribery, which has been estimated to result in a loss of $13.8 billion in lost tax revenues. Public contracts were overcharged and channeled back to the pockets of politicians, their political campaigns, parties, and other bureaucrats (Global Witness 2018; Figueiredo 2016). Specifically, Brazilian politician Eduardo Cunha has been indicted for taking bribes of around USD 1.8 million connected to Operation Car Wash. Several public officials also accepted bribes in return for handing out inflated, fraudulent contracts which supplied various goods and services 11 to Petrobras, a huge state-run oil company. The 35th president of Brazil Luiz Inácio Lula da Silva, known as "Lula,” wrote a "Letter to the Brazilian People” where he promised that if he won (which he did), he would secure the country’s economic stability and honor contracts (Melo 2016). Following the revelation of Operation Car Wash, Lula is now serving a 12-year prison sentence for passive corruption and money laundering (New York Times 2018). The financial contracting environment in Brazil, therefore, appears unreliable to financial actors. Indicators of country risk have consistently rated Brazil as moderate to high risk due to its weak institutions, an interventionist state, high inflation, and volatile real-sector activity (Anderson 1999). What is more, Business infrastructure in Brazil is also in a fragile state, as was made evident in PWC’s report, which outlined factors for contracting/business deal failure in Brazil (PWC 2017): ● Excessive legal formalities/bureaucracy ● Low quality of available information ● Insufficient due diligence before investment ● Overestimated synergy/restructuring gains ● Inefficient post-acquisition monitoring In addition to the factors mentioned above, Brazil also suffers from accounting practices dominated by legal and administration systems inherited from Spanish and Portuguese colonizers (Ball 1995). These arguably outdated practices have blighted the quality of disclosure in Brazil, despite financial statements being required by law to be audited, but rarely relied upon (da Costa 1993; Silvia & Colauto 2016). Consequently, it is common practice for firms in Brazil to have financial statements which do not correspond to the reality of their operations, with both the records of small and large firms commonly subjected to manipulation (Silva 1990; Silvia & Colauto 2016). Therefore, while the five largest auditing firms audit fraud in the USA at a rate of 91%, the percentage in Brazil was 32% (Silva & Cardozo 2012). Despite being written in 1993, da Costa’s (1993) argument that faulty information combined with a regulatory framework 12 which is often not enforced by the state means that auditing standards are lower than the developed countries it is aiming to compete with remains true nearly 30 years later. Seeking to solve these issues, in 2014, Brazil implemented an anti-bribery and corruption act (Lei No. 12.846 2013) known as the "Clean Company Act.” This law provides severe administrative and civil responsibilities for companies who commit or are involved in fraud or corruption involving a domestic or foreign public official. The law also includes a successor liability clause were acquiring companies are responsible for the misdeeds of acquired companies (GAN 2019). However, as Ball (1995) argues, in order to regain public trust, Institutions in Brazil also need to reduce the costs of enforcing contracts, defining property rights, and measuring attributes of exchange. The most relevant organizations and Ball recommends for reform are: ● Juridical enforcement such as a law court or judge and quasi-judicial enforcement such as an arbitrator. ● Practices for accounting and disclosure. ● Credit rating agencies, appraisers and auditors ● Regulatory bodies to promote market integrity Using agency theory as an analytical lens, the remainder of this paper will utilize blockchain to achieve these objectives and present an alternative remedy to the symptom that has blighted not only Brazil’s economy but the world economy as a whole. 3 Theoretical Framework: Agency Theory The relationship investigated in agency theory is one of the most commonly codified and oldest codes of social interaction. Agency theory revolves around the "principal-agent” relationship, where a "principal” hires an "agent” using a legal contract. As the "principal,” delegates work to another, the "agent” (Eisenhardt 1985), with the agent thereby acting on behalf of the principal in a particular decision problem domain (Ross 1973). 13 In what follows, this chapter will first outline the principal-agent relationship and it’s problem domains outlined in agency theory, here it will argue that there is a difference in how much risk the principal and agent is willing to take and that their goals might differ. Having done so, it will examine information asymmetries between agent and principal and how the principal want to avoid subsequent agency costs. Finally, it will illustrate how organizations are seen as a nexus of contracts and transparency in contractual relationships. Figure 1: An overview of agency theory (Eisenhardt 1989). 14 3.1 Principal-Agent Relationship The essence of agency theory is the study of principal-agent relationships such as lawyer-client, buyer-supplier, and employer-employee, to name a few (Harris & Raviv 1978). The principal-agent literature intends to construct a blueprint for an optimal contract between principal and agent. Eisenhardt (1989) shows that the problem domain studied in the principal-agent relationship is where the principal and the agent have different preferences for what the goal of the relationship is, and how much risk they are willing to take. For example, how much the agent should be compensated if one party prefers to whistle-blow when there are illegal practices in the relationship. Therefore, it is assumed that the principal and agent have different goals, and "goal-conflict" is thus assumed. As the study of agent-principal relationships started to receive more scholarly attention in the 1960s and early 1970, studies on risk sharing in individuals and groups revealed that the risk-sharing problem arises when cooperating actors have different attitudes towards risk (Arrow 1971; Wilson 1968). Another aspect of the principal-agent relationship is what is known as "Moral hazard," which refers to the lack of effort in the side of the agent, argues that an agent can not make the agreed-upon effort and neglects contractual responsibilities. For example, moral hazard occurs if a research scientist uses company time to work on a personal research project. The personal project could be so complex that corporate management fails to detect that what the scientist is actually doing in company time. This violates the interests of the management (principal), and moral hazard occurs (Eisenhardt 1989; Holström 1979). "Adverse selection" is another aspect concerned with the possibility for a principal making a misinformed decision regarding the choice of agent. An Agent can claim to have certain skills and abilities when signing a contract, but adverse selection occurs since there is no way to completely verify the skills and abilities of an agent on the job or when hiring an agent. If a 15 research scientist that claims to have experience in a field and an employer is incapable of judging whether this is the case, adverse selection occurs (Eisenhardt 1989). In many respects, agency theory functions as an attempt to solve issues related to trust mostly discussed as an absent factor, which it seeks to replace with an optimal contractual framework. In doing so, it intends to allow clear communication and acceptance of taking risks and experimenting (Golembiewski 1979; Carnevale 1995). What is more, trust is also valuable in agency theory as it is in the principal's interest to develop trusting relationships with agents as this reduces the need to spend resources on monitoring the agent, thereby making the relationship more cost effective for the principal (Shankman 1999). 3.2 Information Asymmetry It is rational for a principal and an agent to enter into an agency relationship when there are information asymmetries. Information asymmetry occurs when either; (a) An agent has competencies or general information to complete a task that the principal does not possess, or;(b) both have the same competencies, but the agent has the opportunity to complete the task at a lower cost. (Pratt & Zeckhauser 1985). The claim is that agency theory can contribute to an overall framework for placing various forms of self-interest in corporate behaviors such as lying and secrecy (Sitkin 1987) and blame (Leatherwood & Conlon 1987). This can lead to a better knowledge when the behaviors above are effective, and moral hazard and adverse selection occurs (Eisenhardt 1989). Identifying the optimal choice between these two options is determined by finding the optimal trade-off between the cost of monitoring behavior and the cost of outcome measurement, and shifting risk to the agent. The agent is assumed to have a stronger dislike and opposition to risk than the principal and is seen as "risk-averse." Agency theory also assumes that the result or outcome of the agent's action is easily measured while the agent's actions leading to the outcome is hard to measure (Eisenhardt 1985). 16 When a principal cannot monitor competencies before and after the fact, and map out the agents' intentions beforehand, there is information asymmetry. It also arises when knowledge of an agent's behavior is unclear and not deemed trustworthy. As mentioned above Eisenhardt (1989) notes that agency theory regards information as a commodity: Information has a cost and can be purchased and organizations can invest in information systems to control opportunistic behavior from the agent. The commodity principle requires information to monitor the agents' effort in behavior-based contracts, and pay him accordingly in outcome-based contracts. Information on environmental processes or states can also influence an agents' performance and is thus needed by the principal. Arrow's (1962) information asymmetry paradox where information is regarded as a commodity which can be bought and sold sheds light on the key problem in information transfer: The information buyer does not know exactly what he is buying, but if the seller were to provide the potential buyer with that information, he would be transferring it free of charge. In such circumstances, the ownership advantage the supplier has in an asset would be given away without any gain. Another aspect of information asymmetry can be seen in the transfer of tacit knowledge which knowledge that is hard to transfer to other people by verbalizing or writing it down. Understood as the knowledge that is difficult to transfer by verbalizing or writing it down, and cannot be stated on a technical drawing, such as financial records or a patent. Tacit knowledge needs to be transferred from person to person, and it is intangible, and hard to put a price on using market mechanisms, Hennart (1989) notes that: The higher the tacit component in the technology package and the weaker the legal protection afforded to innovators, the less efficient markets will be in effect the transfer. Many cases are used to describe the information asymmetry approach (Demski & Feltham 1978), such as these two outlined by Eisenhardt (1989): 17 1. Complete information The principal knows what the agent has done. Given that the principal is buying the agent's behavior, then a contract that is based on behavior is deemed efficient. An outcome-based contract would needlessly transfer risk to the agent, who is assumed to be more risk-averse than the principal. 2. Incomplete information The second case is when the principal does not know precisely what the agent has done. Given the self-interest of the agent, the agent may or may not have behaved as agreed. The agency problem arises because (a) the principal and the agent have different goals, and (b) The principal cannot determine if the agent has behaved appropriately. When a principal has incomplete information about an agents behavior, it has two options to control it. Eisenhardt (1985) notes: 1. Monitoring behavior: The principal can purchase information about the agent's behavior and reward those behaviors. This requires the purchase of surveillance mechanisms such as cost accounting measures, budgeting systems, or additional layers of management. 2. Rewarding outcome: Alternatively, the principal can reward the agent based on outcomes (e.g., profitability). Such outcomes are surrogate measures for behaviors. However, in this option, the agent it penalized or rewarded for outcomes partially outside his/her control. In other words, good outcomes can occur despite small efforts, and poor outcomes can occur despite reasonable efforts. While this scheme encourages effort on the part of the agent, it does so at the price of shifting some of the risks of the firm to the agent Figure 2 provides an overview of the principal-agent relationship when information asymmetry is added. The principal (P) hires the agent (A) which subsequently performs actions. Asymmetric information and self-interests of both parties give way for "moral hazard" and "adverse selection." 18 Figure 2: Principal-agent relationship flowchart. Scholars have highlighted the basic need of information sharing if supply chains are to increase their performance on a supply chain which contains several contractual agent-principal relationships (Stank et al. 1999; Lambert & Cooper; Lau & Lee 2000). This has been coined by Mason-Jones and Towill (1997) as "information enrichment," or the instantaneous sharing of data from the marketplace with all actors in the supply chain is not only desirable but mandatory. "Information enrichment" needs to be achieved in a process integration scenario where the goal is reaching a "seamless" supply chain where all "players" act and think as one (Towill 1997). However, "information enrichment" raises the issue of privacy and the issue of ownership of information. Concerns about information privacy constitute an obstacle to interpersonal sharing of information in supply chains, the question of what information can be shared with third parties. To foster interpersonal information exchange in supply chains, scholars such as Razavi 19 and Iverson (2006) have argued that a trusted network where individuals can share information should be built. While this issue has been highlighted in agency theory, no optimal solutions have been provided as of today. Chapter 5.2 argues that this can be solved through blockchain using the MHC. This argument was created before the concept of Bitcoin (and eventually blockchain) was conceived in 2008 (Nakamoto 2008). 3.3 Agency Costs The directors of such [joint-stock] companies, however, being the managers rather of other people’s money than of their own, it cannot well be expected, that they should watch over it with the same anxious vigilance with which the partners in a private copartnery frequently watch over their own. Like the stewards of a rich man, they are apt to consider attention to small matters as not for their master’s honur, and very easily give themselves a dispensation from having it. Negligence and profusion, therefore, must always prevail, more or Iess, in the management of the affairs of such a company (Smith 1776). "Agency costs" in agency theory expands Adam Smith's (1776) "theory of the firm" by addressing the problem of a black box of the firm, whereas merely changing the inputs changes the outputs. The theory stems from investigating the behavioral implications of property rights specified in legal contracts between owners (principals) and managers of firms (agents). Agency costs occur in principal-agent relationships when the agent has an incentive to perform differently than in the best interest of the principal. The principal cannot observe the actions of the agent and imperfect information sharing leads to a moral hazard problem, and thus marked the probability for an agent acting in a principal's interest lower. Jensen and Meckling (1976) argue that agency cost occurs in a principal-agent relationship when: ... there will be some divergence between the agent’s decisions and those decisions which would maximize the welfare of the principal. The dollar equivalent of the reduction in welfare experienced by the principal due to this divergence is also a cost of the agency relationship, and we refer to this latter cost as the "residual loss”. We define agency costs as the sum of: 1. The monitoring expenditures by the principal 2. The bonding expenditures by the agent, 20 3. The residual loss. Agency Costs includes stakeholders in corporate governance such as management, owners, and other stakeholders such as government acting as principals and agents in various relationships. Organizations are mostly seen as "legal fictions which serve as a nexus for a set of contracting relationships among individuals." For example, if corporate management (agents) seeks to spend money on wasteful pet projects and acquiring companies to expand power instead of maximizing shareholders (principal) agency costs occur. This can also affect the population of a political district (the principal) if a politician (the agent) passes legislation which is helpful to large donors and their political campaign, but not the voters (Jensen and Meckling 1976). Better information sharing has been a widely suggested solution for reducing agency costs (Claus & Kim 2004), something which Chapter 7 will demonstrate being possible using blockchain technology. 3.4 Organizations and Governance Organizations are often understood to be the nexus of contracts in agency theory and are perceived to have two key features. The first one is the divergence of preferences among organizational members, as people's preferences for their actions are not necessarily aligned with the preferences of the organization members. This view of an organization puts the role of rewards and control measures in the hands of actors, assuming that their self-interest will align with the interest of the collective. If there is no divergence between outcome and behavior, measurement is unnecessary for control (Eisenhardt 1985). The second key feature is the outcome uncertainty of organizations, whereas organizations futures are assumed to be uncertain. The future of an organization can bring both bankruptcy, prosperity, and a myriad of intermediate outcomes. Principals (owners) in an organization bear part of the risk, but agents (employees) carry increasing risk as principals control measures become outcome-based. In this view, rewards and control system measures both motivate 21 behavior and alter risk sharing patterns at the same time. However, organizations are not only viewed as risk sharing systems but also work sharing collectives (Eisenhardt 1985). Organizational approaches to control (e.g., Ouchi 1979) suggest two underlying control strategies. On the one hand, control can be accomplished through performance evaluation. Performance evaluation refers to the cybernetic process of monitoring and rewarding performance. This strategy emphasizes the information aspects of control. Namely, to what degree can the various elements of performance be assessed? Alternatively, control can be achieved by minimizing the divergence of preferences among organizational members. That is, members cooperate in the achievement of organizational goals because the members understand and have internalized these goals. This strategy emphasizes people policies such as selection, training, and socialization. The two control strategies are interrelated. An organization can tolerate a workforce with highly diverse goals if a precise evaluation system exists. In contrast, a lack of precision in performance evaluation can be tolerated when goal incompatibility is minor (Ouchi 1979). The ease of performance evaluation drives the choice between the two. What governance is optimal for one firm at a certain point in time is not necessarily optimal for another. In respect to agency conflicts and despite its faults, McColgan (2001) argues that the modern corporation is the most popular form of organization. This could be mostly attributed to governance mechanisms seeking to limit agency problems. Devices such as the modern corporation should continue to evolve, and further research should focus on understanding what, when, and why they work. According to Denis (2001), a country’s legal system sets the premise for how its governance system evolves. He argues that two conditions ensure effective governance mechanisms; (a) Governance serves as a device to narrow gaps between shareholders’ and managers’ interests, and; (b) meaningful relationships between mechanisms, performance and value can be observed, if firms are in equilibrium with their governance mechanisms. 22 3.5 Transparency There is currently no consensus on the definition of transparency in agency theory (Kaufmann & Bellver 2005; Arajo & Tejedo-Romero 2016). Narrowing down the definition of transparency used in this paper, the amount, accuracy, scope, and timeliness of information as outlined in Vishwanath and Kaufmann (1999) will be used. Focusing on transparency in economics, the scholar Islam (2003) has developed a transparency index which is based on timeliness and availability of economic data. Verily, this paper uses Kaufmann’s (2002) definition of transparency understood as "increased flow of timely and reliable economic, social and political information, which is accessible to all relevant stakeholders” by being relevant, accessible, reliable and of good quality. Lack of transparency can exacerbate corruption-related problems in economics that are rich in natural resources (Kolstad and Wiig 2009). Empirical evidence which suggests that transparency is associated with less corruption, and greater press freedom has been shown to have strong associations with less corruption (Suphachalasai 2005; Brunetti & Weder 2003). Kolstad and Wiig (2009) note that: Several studies argue, however, that the effect of transparency on corruption is not unconditional. In other words, transparency is a necessary, but not sufficient condition to reduce corruption. In addition to access to information, you need an ability to process the information, and the ability and incentives to act on the processed information A well-known example is from Uganda from the 1990s, where surveys showed that only 13% of education grants reached schools, and the rest was captured in the process by the local government. When the Ugandan government started publishing every monthly grant in district newspapers, there was a substantial effect on grants received by schools. Surveyed in 2001, over 80% of the grants reached a school, on average. Thus the impact of access to information about the grants was positive and statistically significant (Reinikka and Svensoon 2005). 23 Therefore, in normative terms, access to information and transparency is considered a human right in democratic societies, as it is assumed to constitute a fundamental right to be informed about government actions and the reasons for them. In practical terms, transparency is essential for human development as it provides incentives for inclusiveness and redistribution (Stiglitz 1999) To minimize moral hazard principals incur in monitoring expenditures, for example, the cost of using external auditors for scrutinizing financial statements. On the other hand, agents can incur bonding cost where they purchase an internal audit to signal to the principal that they are acting in consistency with the legal contract (Adams 1994). Wallace (1980) argues that a principal's costs for monitoring an agent's actions will be reflected in the agent's salary and therefore, agents have the interest to demand monitoring such as internal auditing to reduce the risk of the principal making adverse adjustments to executive compensation. 4 Blockchain Literature Review An open source and open access blockchain (hereby "blockchain”) is practically a distributed database using a standard protocol such as Bitcoin. It is a dynamically updated ledger of records that is accessible for anyone that has an Internet connection. The records are organized into in (Bitcoins case) chunks of 2000-3000 transactions each or a "block.” Each block is linked to the previous block using a cryptographic method called a "Merkle three,” creating a chain of blocks with all transactions that have ever occurred (Nakamoto 2008). Blockchain enables transparency as the history of all transactions can be open and accessible for anyone. On the other hand, the transactions can be encrypted (Ben-Sasson et al. 2014), enabling privacy and anonymized transactions. Using a blockchain like Bitcoin, two parties can make an exchange without oversight or intermediation from a third party. The peers can rely on the cryptographic proof for trust instead 24 of a third party, which strongly reduces counterparty risk. This puts the privacy and control of data in the hands of the individual (McFarlane et al. 2017). Ross William Ulbricht or "Dread Pirate Roberts” funded an online marketplace for trading narcotics and other illicit items because the Bitcoin blockchain enabled an anonymous and uncensorable payment system without governmental interference (Adler 2018). Thus the whole concept of cryptocurrencies is borderline tabu from the onset. Verily Jamie Dimon, the chief executive officer of JP Morgan, stated in 2017 that: Bitcoin is a fraud and will blow up” (Henry & Irrera 2017). The statement crashed the price of Bitcoin, and subsequently, JP Morgan Securities Ltd (Redman 2017) purchased roughly €3M worth of Bitcoin note shares for their clients. Extreme price volatility also frames cryptocurrencies as dangerous gambling objects and several banks including JP Morgan has outright banned customers from buying cryptocurrencies with credit cards (Aslam 2018) while simultaneously opening a The Blockchain Center of Excellence within the bank and released (JP Morgan 2019). Thus, banks see blockchain as scary and useful at the same time. Being ripe for disruption, the global financial industry both crumbles and invests. Centralized incumbents of global financially-based power such as the USA are also wary of cryptocurrencies and wants to ban them. As United States Congressman Brad Sherman (D) states: An awful lot of our international power stems from the fact that the dollar is the standard unit of international finance and transactions [...] it is the announced purpose of the supporters of cryptocurrencies to take that power away from us (Marie 2019). Distributed networks such as these account for approximately 43% (Africa) to 70% (Russia/Eastern Europe) of all internet traffic (Hendrik & Mochalski 2009). These networks are peer-to-peer connected and operate on any user’s computers without a central server, or other central points of failure or control attackers can leverage to shut down the network. 25 Therefore, one would have to shut down the internet, in general, to stop blockchain completely. Considering the negative sentiment around the words cryptocurrencies and Bitcoin, the word blockchain has been adopted by the industry to put a silver coating on the subject and explain the technology more objectively. Blockchain is essentially a neutral technology and can be used for mundane and useful tasks without challenging global power or empowering illicit narcotics trade. Blockchain has the capability of conducting transparent and immutable financial transactions. This makes blockchain more reliable than current financial systems with comparatively easily hackable centralized servers with completely closed or lost/deleted internal records. Blockchain also has mechanisms in place so that all parties can reach a consensus on what the canonical truth is. The trust and power in blockchain are distributed among the stakeholders in the system rather than concentrated in an entity or individual such as a government, bank, or financial institution. However, blockchain differs from traditional financial institutions such as banks and payment networks such as VISA as a centralized authority does not regulate it, and as such, whereas the ‘trust in the system’ in the case of a credit card provider is trust in an individual or a group of individuals, trust in the blockchain system is trust in a static code and the network it runs on which is owned by its user base (Zheng et al. 2017, Crosby 2016). By using mathematics, code, and decentralized verification of transactions, blockchain can solve the issue of multiparty contention without having to involve any human. What is more, due to its distributed nature, blockchain also eliminates other variables of trust, such as security. The reason for this is that there is no central authority to steal authentication credentials from and corrupt the system, and unilateral government interference, it is not owned by any institution. Instead, the fundamental premise for blockchain is trust in the code, which is open source. Parties that have different sets of interests will probably relax contention if public blockchain systems replace untrusted systems and processes since public blockchains are self-administered, self-executing and administrator-free. Instead of a system involving an authority that can control 26 and corrupt the system, blockchain creates a trusted and decentralized way of managing who owns what, or "the current state of the world." This is the first time a network of globally distributed individuals can reach agreement or consensus on every transaction that took place in a network since it started. Transactions are protected by mathematical principles making them immutable. Bitcoin is designed to be secure and is an example of a distributed computing system that solves the Byzantine general's problem (Nakamoto 2008). The Byzantine general's problem is when an attacker can easily spawn almost an infinite number of fake network nodes, dominate the network and impose an illicit consensus on what transaction has occurred, known as the Sybil attack (Douceur 2002). The anonymous person or group "Satoshi Nakamoto" combined cryptography and game theory to create a "Byzantine Fault Tolerant protocol" using a reward system for actors contributing to the security of the network. Nakamotos (2008) protocol uses "Proof-of-Work” (PoW) (Cynthia & Moni 1993) which requires actors who want to be rewarded by the system or "miners” to solve cryptographic puzzles that require a lot of computing power. This enables a critical security capability, which makes it too expensive for a business or nation state to perform Sybil attacks as a blockchain system grows. The benefits of cheating are less than the costs. Once a transaction has been executed, it cannot be reverted without breaching the whole, which is extremely expensive, hard to orchestrate, and thus, a breach is extremely unlikely to happen. The transactions are permanently protected by mathematical principles making them impossible to edit and immutable (Nakamoto 2008). PoW miners have to spend money on electricity and computer hardware to solve a random cryptographic puzzle. Another solution for solving the same problems as PoW solved is "Proof-of-stake” (PoS) where not miners but "forgers” (Popov 2016) stake funds in the form of cryptocurrency instead of solving a cryptographic puzzle thus using less computational power and electricity to secure the system (Nxt 2014). The blockchain development team of the 27 Ethereum blockchain has planned to switch from PoW to PoS in their Ethereum 2.0 (Named "Serenity”) version (EthHub 2019). When utilizing Blockchain, data is freed from data silos such as in banks, Facebook, and Google. Using this technique for managing data makes it high quality, complete, timely, and consistent while at the same time giving the users control of their information (Werbach 2016). Blockchain also has faster transactions than interbank transactions, which can take several days for clearing and settlement. Transacting on blockchain protocols reduces transaction times to minutes and sometimes seconds depending on the blockchain protocol. The transaction fees also decrease when intermediaries and overhead costs are eliminated for asset ownership transactions (Deloitte 2016). To enable this self-sovereignty crucial public-private cryptography is used to put authentication entirely in the hands of the users. 4.1 Money In what follows, I will first argue that a cryptocurrency is a new form of money in the context of the history of money from barter, gold, and properties of the state-controlled monetary systems today. Finally, I will illustrate how fungibility is a crucial property of any money and if it breaks down the money system itself loses its value because users can never be sure how much one money unit is worth. 4.1.1 Cryptocurrency In this section, I will make the simple yet profound argument that cryptocurrencies are simply money. It is a new form of money technology openly accessible for anyone with a smartphone with internet. Thus, when pure cryptocurrency or smart-contract based solutions are in question both the 2.2 billion adults globally with access to financial services and the 2.5 billion adults without access to financial services are all automatically included as potential users (Chaia et al. 2009). All cryptocurrency is presented as legal money systems still has to recognize it as legal 28 tender: A payment medium which is valid for meeting financial obligations (The Royal Mint 2019). What backs money is being accepted by many people. A populace can buy into the illusion of the money as a concept. Thus, if a more significant number of people agrees with the notion of cryptocurrency as money, starts accepting and trust them, cryptocurrency money can become as liquid as fiat money (Swan 2015, 70). There are no gods in the universe, no nations, no money and no human rights — except in the common imagination of human beings (Harari 2014). In this thesis, the definition of cryptocurrency follows from the Oxford dictionary (Oxforddictionaries.com 2005) and the author's description of blockchain: A cryptocurrency is money in the form of a digital currency. transactions are verified on a decentralized network based on a consensus protocol. Cryptocurrencies are intriguing because of the intersection of industries and disciplines spanning the field. There are examples of technology, game theory, geopolitics, energy management, and psychology. Nobody is an expert in all, but one can aspire to grasp the basics of each element. Cryptocurrencies are currently being more and more accepted as payment for services, goods such as paying for coffee at Starbucks, buying food at Whole Foods (Castillo 2019) or paying a mobile carrier subscriptions at AT&T (2019). A cryptocurrency can be used as a medium of exchange by sending cryptocurrencies such as Bitcoin from one address one individual controls the private key to the address another individual controls the private key. Cryptocurrencies can also be used as a store of value. Bitcoin can, for example, be saved, retried and exchange at a later point in time and when the Bitcoin is retrieved it is predictably useful due to the strong antifragility and immutability of the Bitcoin network (Nakamoto 2008). 29 Cryptocurrencies such as Bitcoin, which is put a simple form of a smart contract with one functionality: Money. Cryptocurrencies have had a complicated and often negative sentiment in media and public forums. Distributed networks such as "BitTorrent" for file, sharing is historically discussed in comparison to Bitcoin. Both are distributed networks but Bitcoin transfers not data, but value. Thus there is a discussion on how being an alternative form of a network such as Bitcoin and BitTorrent outside of including banks and governments is. Distributed protocols operating freely on the internet is historically received with controversy by industrial incumbents and legislators due to its extensive capabilities challenging closed power structures and information/value flows. When centralized file-sharing companies such as Napster and eventually the distributed BitTorrent file sharing protocol spread during the end of the 1990s, it ended in lawsuits, jail-time and stifled innovation when essentially these were better tools for sharing information. We now have a better tool for sharing not only information but the value in an open, borderless, censorship-resistant, and neutral fashion. We call it blockchain to explain what theory the innovation behind the first cryptocurrency Bitcoin brought us. If smart-contracts are to supplement legal contracts, they need to have the power to interact with money to conduct financial transactions. Thus I will argue what money is and show that cryptocurrency is a new kind of money readily accessible by smart contracts. Therefore this thesis will make no strategy or recommendation as to how cryptocurrencies will be procured and bought in the first place and assume all actors mentioned has to access to purchase and use it in smart contracts. Money is a store of value, medium of exchange, a standard of deferred payment, and a unit of account. "Fiat money” adds a particular socio-economic context such as a country or regulation to the definition (Mankiw 2007). In 1977 long before cryptocurrency existed Hayek advocates in his book Decentralization of Money that a competitive private market for money to replace the 30 government monopoly of fiat money (von Hayek 1977) should exist. He argues against inflationary money (Economica 1931) and posits a model where any financial institution can issue its currency. In his model, there can be several concurrent currencies. These currencies require the institutions to compete to maintain the value of the money through productive activities (Ferrara 2013). Initially, non-monetary societies have operated along with the principles of debt and gift economy (Graeber 2011). Trading assets without an abstract representation of value or barter was also used, but primarily between potential enemies and strangers (Graeber 2001). Eventually, many cultures around the world developed commodity money. The value of commodity money derives from the value of the object itself. For example, gold and silver are commodities that have been used as mediums of exchange (O'Sullivan & Sheffrin 2003). After the second world war, the Bretton woods agreement state issued money based on the gold reserve of the country, or gold-backed national currencies (Mankiw 2014) changed. Many countries fixed the exchange rate of their national currencies to the united states dollar. The dollar was still pegged to gold, and therefore, all currencies pegged to the dollar value had a value in terms of gold (Ipsey 1975). After the second world war the bretton woods agreement state issued money based on the gold reserve of the country, or gold-backed national currencies (Mankiw 2014) changed. Many countries fixed the exchange rate of their national currencies to the united states dollar. The dollar was still pegged to gold and therefore all currencies pegged to the dollar value had a value in terms of gold (Ipsey 1975). In 1971 the United States president Richard Nixon ended international convertibility from the united states dollar to gold creating a kind of money (Wong 2016) and in 1976 references to gold were officially removed from the statues of the united states dollar creating a new state-issued currency: Government on-demand issued Fiat money. From this point until the time of writing 31 the global monetary system is run on this kind of money which is not pegged to anything in the physical world directly and has no intrinsic value (Kiyotaki & Wright 1991). In fiat money, central banks can introduce new money into the economy by means such as lending money or buying financial assets. For example, in the united states, the money supply grew from $6.407 trillion in 2005 to $8.319 trillion in 2009 (Federalreserve.gov 2009). Commercial banks then use this money for fractional reserve banking. This again expands the total supply of money (Abel & Bernanke 2005). Thus, fiat money is controlled by centralized states and organizations and is a centralized form of money as opposed to the distributed nature of cryptocurrencies such as Bitcoin. 4.1.2 Fungibility As defined by the Oxford dictionary: "Fungible (...) replaceable by another identical item; mutually interchangeable”. In the context of money, fungibility means that all unit of a currency such as dollars or Bitcoin is interchangeable for precisely one of any other unit. The bottom line is that if fungibility breaks down, the money itself is unusable and therefore regulators have to process with caution not to break fungibility when regulating cryptocurrencies. If fungibility is destroyed, the basic premise for smart contracts conducting cryptocurrency transaction is lost. Consider the following case as an example of how fungibility almost was destroyed to illustrate why it is deemed as a prerequisite for any form of money fiat or cryptocurrency to maintain its integrity. In the court case following the incident, the judge ruled in favor of the bank where the note appeared, and the note would not be returned to Crawford. The court argued that if notes that were stolen were to be returned, then it’s fungibility and potentially the fungibility of all other notes would be destroyed. This is because if Crawford had received the note, no merchant would ever take the risk of accepting a banknote unless they knew the full transactional history of it. This problem would damage the "currency” of the financial system and the premise for money in general. It would require merchants to pour through newspapers to verify that the note was 32 legally obtained and the serial number not announced as a "criminal note” (Reid 2013). Thus making it extremely impractical to conduct transactions while simultaneously not being sure what one paper note is actually worth in comparison to the rest. In the court case following the incident, the judge ruled in favor of the bank where the note appeared and the note would not be returned to Crawford. The court argued that if notes that were stolen were to be returned, then it’s fungibility and potentially the fungibility of all other notes would be destroyed. This is because if Crawford had received the note no merchant would ever take the risk of accepting a banknote unless they knew the full transactional history of it. This problem would damage the "currency” of the financial system and the premise for money in general. It would require merchants to pour through newspapers to verify that the note was legally obtained and the serial number not announced as a "criminal note” (Reid 2013). Thus making it extremely impractical to conduct transactions while simultaneously not being sure what one paper note is actually worth in comparison to the rest. In this sense there are currently emerging cryptocurrencies where transactions are private by default, such as Monero (2019) and ZCash (2019), and Dash (2019) where privacy is optional which can be leveraged by the MHC to find a golden middle way in between transparency and privacy. 4.2 Public-private key cryptography A public-private key pair is a form of digital identity. Simply put public key an address, and a private key is a password used to prove ownership of it. Private keys have to be kept a secret to retain adequate security, and the corresponding public key can safely be distributed openly (Stallings 1990). Thus blockchain uses the public key for addresses of users and private key for authentication for conducting a transaction. The public-private key pair enables robust authentication because a sender of information over the internet can combine a message with a private key. This pegs a digital signature to the 33 message. Anyone who received the message can use the digital signature and the proposed sender's public key to verify that the proposed sender owns the private key that was used to sign the message (Menezes et al. 1996). Entities such as individuals and organizations can share their public key with identity institutions such as the Swiss city of Zug has done using the Uport digital identity solution. Using public/private keys managed in Uport, Zug issues digital citizenship credentials to citizens effectively making the private key the password controlling each citizens identity (Uport 2017). Digital identity solutions have long been in development, laying aside centralized authentication providers like Facebook and Google authentication. Using a distributed system where the user is in control has recently been allowed by advances in distributed computing. Public-private key authentication and identification systems like Uport has now been realized (Uport 2017). Solutions like these are dubbed self-sovereign identity solutions because no malicious actor can censor the underlying public/private key pairs actions, impersonate or delete them. As long as the private key is protected, the identity is under complete control of its entity and thus is self-sovereign (Tobin & Reed 2017) Since a public/private key pair is self-sovereign, blockchain uses them to sign transactions and thus authenticate the owner. The owner of the private key is the owner of the cryptocurrency it controls. "Wallet” is currently used by most of the blockchain sector because it relates to a common word used for storing fiat currencies and other valuables. However, it is a faulty metaphor because it is a tool for managing public-private key pairs. Thus a "Digital Keychain” or "Keychain” is a more descriptive phrase, and I recommend using it. There are four different types of digital keychains: software client, hardware device, material and brain (Bitcoin.org 2019): ● Software Client 34 A digital keychain client is a software program that runs on devices with operating systems such as computers, smartphones, or smart tablets. Anyone can develop and build a keychain client, and keychain clients are often released as open-source projects. ● Hardware Device When a hardware device is used as digital keychain hardware, the device is a secure special purpose hardware device that stores public-private key pairs. Being stored offline most of the time, these keychain devices are considered very safe and very hard to hack. A keychain like this is only connected to the internet via the USB port of a computer and thus has less attack surface and is not as vulnerable as a software client. Up to the time of writing, there have been no verifiable incidents of cryptocurrencies being stolen from a hardware device. ● Material A digital brain keychain is when the public-private key pair is stored in one’s mind by memorizing a twenty-word long recovery phrase which can be used to recover the public-private key pair. If the recovery phrase is forgotten, the person dies or is permanently incapacitated, the corresponding cryptocurrencies are lost forever ● Brain A digital brain keychain is when the public-private key pair is stored in one’s own mind by memorizing a twenty-word long recovery phrase which can be used to recover the public-private key pair. If the recovery phrase is forgotten, the person dies or is permanently incapacitated, the corresponding cryptocurrencies are lost forever. 4.3 Bitcoin Bitcoin is the classic example for illustrating cryptocurrency. It inherently uses and spawned the concept of blockchain. Bitcoin is a decentralized peer-to-peer open source protocol and has a set of rules written in computer software code that runs on a network of different computers around the world connected over the internet. Several key innovations and capabilities from cryptography have been combined to enable the capabilities of Bitcoin, Including: 35 Bitcoin is the classical example for illustrating cryptocurrency. It inherently uses and spawned the concept of blockchain. Bitcoin is a decentralized peer-to-peer open source protocol, and has a set of rules written in computer software code that runs on a network of different computers around the world connected over the internet. Several key innovations and capabilities from cryptography have been combined to enable the capabilities of Bitcoin, Including: ● A public and immutable transaction ledger ● Mining using PoW: A distributed transaction verification system ● Distributed issuance of new Bitcoins ● Public-private key cryptography (last section) for authentication and addresses The Bitcoin protocol is used as a peer-to-peer electronic cash payment system based on cryptographic proof instead of trust using a PoW protocol. Being the first successful cryptocurrency Bitcoin is deflationary, borderless, neutral and not owned or controlled by any state or company (Nakamoto 2008). To participate in the Bitcoin public ledger, users send and receive Bitcoins by having their keychain clients; public-private key keychains generated by cryptographic hash functions. Transactions in Bitcoin use cryptographic hashing, digital signing, and verification by the miners of the network. The Bitcoin network is an open network, meaning that there is no information to steal and anyone can join to mine or transact in the system by following the rules of the Bitcoin protocol. Apart from the security of the network, there is a concern for the safety of each individual's keychains. This is up to each user to choose to balance between convenience and risk (Nakamoto 2008). To participate in the Bitcoin public ledger, users send and receive Bitcoins by having their own keychain clients; public-private key keychains generated by cryptographic hash functions. Transactions in Bitcoin use cryptographic hashing, digital signing, and verification by the miners of the network. The Bitcoin network is an open network, meaning that there is no information to steal and anyone can join to mine or transact in the network by following the rules of the Bitcoin protocol. Apart from the security of the network, there is a concern for the security of each 36 individual's keychains. This is up to each user to choose to balance between convenience and risk (Nakamoto 2008). 4.4 Forking On a blockchain such as Bitcoin, the code for the consensus layer is the most difficult to change. This is because the consensus layer defines whether each transaction that is appended to a blockchain record by a miner is valid. These rules include checking if data is formatted correctly, how much the miners are rewarded, and managing transactions. Any changes to these rules is a change in the consensus layer and can create a chain split. For examples changes such as deleting unused files and moving things around to increase the readability of the code, also known as refactoring, have no impact on the consensus layer as it does not change the rules of the protocol and is usually adopted instantaneously (Lombrozo 2017). On a blockchain such as Bitcoin, the code for the consensus layer is the most difficult to change. This is because the consensus layer defines whether each transaction that is appended to a blockchain record by a miner is valid. These rules include checking if data is properly formatted, how much the miners are rewarded and managing transactions. Any changes to these rules is a change in the consensus layer and can create a chain split. For examples changes such as deleting unused files and moving things around to increase the readability of the code, also known as refactoring, have no impact on the consensus layer as it does not change the rules of the protocol and is usually adopted instantaneously (Lombrozo 2017). For example, if 60% of the Bitcoin miners upgrade their software and 40% do not upgrade their software, there will effectively have been created two unique blockchains forked out of the original blockchain with 60% of the miners. This is referred to as a "chain split” because where 60% of the miners dedicate their computing power to one blockchain network, and 40% of the miners dedicate their computing power to the other blockchain network (Lin & Liao 2017). The Ethereum blockchain has for example hard forked into two blockchains: Ethereum classic (ETC) and Ethereum (ETH) due to the controversy caused by a security breach. A chain split is also 37 referred to as a consensus fork because the actors in the blockchain fail to reach consensus on what code to use and end up on different versions of it (Lombrozo 2017). A chain split will also lead to a "coin split” because of the coin distribution, or what public-private key pairs control what addresses will initially be identical in both the blockchains in the old and the new software. From a user who controls the private keys of addresses in for example ethereum, a chain split will lead to control over an identical amount of ethereum in the new ethereum network that resulted from the new rules (Wirdum 2017). This happened when Ethereum was forked into Ethereum classic. Every ETH cryptocurrency on the Ethereum network was copied with equal public-private key ownership into the Ethereum classic ETC cryptocurrency (Ethereum Classic 2017). 4.5 Smart Contract A smart contract is a piece of computer code that executes on a blockchain and can transfer value. The purest form of a smart contract is a cryptocurrency for transferring funds to other users based on a public-private key pair of digital signatures (Geiregat 2018). On a smart contract, the terms of the agreement are defined by computer code as a set of instructions (Blockchaintechnologies.com 2016), like unlocking value based on certain conditions. When a value is reached, or certain conditions are met, such as when a user with self-sovereign identity connected to the smart contract sends a command, a smart contract executes predefined code which triggers an event such as a financial transaction. It is characterized by being autonomous, self-sufficient, and decentralized (Swan 2015). Nick Szabo materialized the concept of a smart contract in (1996) before the crucial cryptographic concept of a blockchain needed to make smart contracts work as intended existed. Szabo defines smart contracts as a combination of protocols with user interfaces that formalizes and secures relationships over computer networks. Smart contract applications discussed include contracting, credit and payment systems enabled by cryptography and other security 38 mechanisms. Relationships can be algorithmically secured from third-party eavesdropping or malicious interference, and breach by principals (Szabo 1997). Szabo’s idea of a smart contract was too hard and fragile to be implemented as an alternative to traditional financial services due to the lack of blockchain at the time and was never materialized. Possibly because the smart contract conceptualized could be breached by principals controlling the centralized point of failure which existed before blockchain was used to make smart contracts — using the current smart contract technology assets and anything of value that can use blockchain as a public or private ledger of ownership. For example, money, pictures, personal data, academic certificates, medical records, supply-chain assets, physical assets like properties, and gold can be bound to self-sovereign identities. Don Tapscott calls this growing network the Internet of Value (Tapscott & Tapscott 2016). Using this blockchain, smart contracts have evolved. For example, blockchain networks optimized for smart contracts such as Ethereum (Buterin 2013) is being used as a ledger of ownership of assets such as gold. It also facilitates crowdfunding firms and issuing stocks reliably and transparently, providing immutable receipts for all transactions (Ante & Fiedler 2019). Werbach and Cornell pose in their (2017) duke law journal entry that there are reasons to be skeptical about whether smart contracts can deliver gains over conventional contracts for contract efficiency and flexibility. Even though smart contracts could fulfill its promises, the bigger question is whether smart contracts can do what courts do, only better. They argue that contract litigation plays a fundamental role in our social system that smart contracts cannot replicate. A contract often is a manifestation of an ongoing relationship and is often more than a one-shot interaction between parties followed by a judicial resolution of a dispute (Macneil 1978). Several scholars argue that business practices around contracts assume that a contract does not clearly 39 contemplate all the possible scenarios which can materialize (Hart 1988). Before the event, before a particular dispute, and after a contract is signed parties in contractual relationships must expect a renegotiation of the contract, and after the fact, courts must exercise their authority to settle disputes to fill any gaps in the agreed-upon contract (Holmes 1881). Smart contracts are software programs where the time dimension of interaction between parties is formally stripped away. The uncertain futures of judicial resolution is ignored, yet smart contracts bind real people with real relationships and how their performance unfolds over time, and there is still a possibility of moral hazard and adverse selection. Thus relying on smart contracts is a bet on before the fact formalization, which will never be able to match the flexibility of human decision making (Werbach & Cornell 2017). Because once written and deployed a smart contract is immutable and enforces itself, it removes the role of courts and authorities as enforcement agents. This means that once the smart contract is deployed, the machinery for its execution is unavoidably set in motion. Such immutability hinders the parties in the contract from affecting the transaction in disputes after the fact unless the smart contract has such a governing mechanism programmed into its code before it is deployed. Ultimately smart contracts cannot supplant the role that law and courts pay. Smart contracts are not a replacement for judicial contract adjudication (Werbach 2018). To make a smart contract consistent with legal enforcement, the two can be connected. The approach here is to pair smart contracts and contracts explicitly. This idea was explored in the "Ricardian Contract” by the information security expert Ian Grigg in 2004 before the advent of cryptocurrencies while developing the Ricardo digital transaction platform for financial instruments. The Ricardo platform defines its contractual integration solution as having three components: 1. Legal code: The human-readable text in a contract. 2. Computer code: What steps a smart contract can execute. 3. Parameters: Variables for influencing for the computer code execution. 40 (Grigg 2004). Grigg’s solution never took off and integrating smart and legal contracts in this manner was mostly a theoretical construct. It was not until blockchain was invented and particularly before the ethereum blockchain successfully implemented smart contracts that this approach was rediscovered and gained momentum. There are currently several groups integrating smart contracts and legal contracts. These include a sub-group within the R3 blockchain consortium led by the British bank Barclays (Reutzel 2016, Rizzo 2016), Mattereum (2019), OpenLaw (2017), JP Morgan (2019) and the Hyperledger open-source initiative (Eris:Legal 2014). 5 Discussion Having identified contracts as the nexus of corruption, and agency theory as the appropriate framework for identifying the weak spots in existing contractual frameworks, this section will demonstrate how the MHC can help reduce corruption utilizing the transparent, open and immutable properties. In what follows, I answer ​RQ2​ by outlining the design of a Minimum Hybrid Contract (MHC) which is a practical model for using a smart contract as a supplement to a legal contract for conducting financial transactions. Then I will discuss how blockchain affects agency theory in the case of using a smart contract as a transactional supplement to a legal contract. Here I will argue that key agency theory issues can be mitigated if blockchain’s transparent, open, and immutable properties are leveraged in financial transactions. Finally, to address regulation as a part of the design of the MHC further answering ​RQ2​, I will discuss regulatory strategies concerning financial innovations and the new regulation of the internet, and give practical recommendations for how regulators and blockchain innovators can proceed in symbiosis. 41 5.1 Minimum Hybrid Contract (MHC) Architecture Being a supplement, not a replacement, for existing contractual frameworks, the smart contract will, on the one hand, facilitate safe and transparent transactions, whose records are immutable, while the traditional contract─and the institutions that ensure its validity─ will continue to take care of the required legal framework and disputes. The outcome of this synthesis of conventional legal structures and blockchain technology is the Minimum Hybrid Contract (MHC) which seeks to reduce corruption and enhance social well being by increasing transparency, information sharing, auditability and cut the cost of financial activity. Current legal contracts are defined in the Oxford dictionary characterized by being: A written or spoken agreement, especially one concerning employment, sales, or tenancy, that is intended to be enforceable by law (Oxforddictionaries.com 2019). While being a feature of ancient history dating back to the ancient philosopher Plato from the ancient Greece empire (Plato 348 BC), eventually modern law and contracting have evolved but it has nevertheless failed to cope with the economic malpractices discussed in Chapter 2.1 (corruption chapter). What is more, existing contractual frameworks leave substantial room for improvement because of the money and financial system used to conduct financial transactions breeds corruption, and has inferior immutability, transparency, control, and information sharing compared to smart contracts. This is why I propose the MHC as an alternative solution to the shortcomings of the existing status quo. While I coin the concept of MHC in this thesis, discussions regarding synthesizing traditional and smart contracts have been going on for a few years. For example, legal scholar Werbach (2018) has argued that smart contracts can be used to reinforce traditional law by offering new ways to achieve legal objectives. Smart contracts can address issues that obstruct the enforcement of law and increase trust in legal systems. They are capable of serving in legal 42 compliance with contracts but still faces adoption challenges as it challenges the power of state currently controlling fiat money supply in currencies such as the United States Dollar and is unregulated by default, but also groups and individuals who either legally or illegally are benefiting from the existing status quo. Improving a contract using a smart contract does not mean that it improves the situation and increases trust enough to gain traction; Law, legal institution, and businesses need to work together (Werbach 2018). The MHC is a continuation of Werbachs (2018) work on blockchain, smart contract, and building an architecture of trust. The architecture of the MHC a practical model based on the supplement type of possible legal and smart contract interactions outlined in the list proposed by Werbach (2018): 1. Supplement: Law is the primary means of enforcement, and the primary value proposition of the smart contract is the gain of an immutable and transparent record. In supplement scenarios, smart contracts do not necessarily replace contracts. 2. Complement: When a smart contract acts as a complement to a legal regime. Any legal system can fail, and sometimes the volume of activity scales beyond the capacity of legal mechanisms to regulate them. A legal system can benefit from better tracking of people and things it regulates. Enforcement lags when incentives are improperly aligned. Thus a blockchain system can step in to fill enforcement gaps through traditional means. 3. Substitute: Substitute: When smart contracts entirely replace the law as the enforcement mechanism. Based on the aforementioned supplement legal and smart contract interaction outline by Werbach (2018), the MHC connects the legal text and computer code using cryptographic hash functions as whos in Figure 4. The legal contract text and the smart contract computer code is forged into a one-to-one relationship. The legal code includes a cryptographic hash string of the computer code which guarantees that it references the right smart contract. Also, the smart contract includes a cryptographic hash string of the text of the legal contract making the smart contract and legal contract definitively linked, making each contract depend on the other. The 43 smart contract facilitates the transactions in the MHC; this makes the transactions instantly auditable because each transaction is indistinguishable from a receipt. Thus contractors and auditors can transparently audit the financial performance of the contract, and if there is an after the fact dispute the legal contract is turned to for resolving it (Grigg 2004). Figure 4: A one-to-one relationships between a legal and smart contract forming the basis of an MHC. In Figure 4, a principal and an agent signs a contractual agreement. The contracts cross-reference each other. On one hand a cryptographic hash is generated from the legal contract text and written into the computer code of the smart contract. On the other hand a cryptographic hash is generated from the computer code of the smart contract and referenced in the legal document. When a smart contract and legal contract is connected, public-private key pairs are used to authenticate and identify users. A supplemented contract can use computer code in the smart contract to delegate privileges such as transferring funds to certain public-private key pairs. Each principal and agent hold public-private key pair consisting of their public key (address) and their private key (password), and the public key is used for receiving funds and the private key is used for authorizing transactions. To identify who is the owner of a public key the corresponding identification of the public key (address) of all authorized actors in the smart/legal contract can be stored in a private or government database. Thus, the identity of each public-private key pair 44 owner is known. Because only the known key pairs can authorize transactions, there is effectively no other way to conduct transactions than using these. Figure 5: A simple model of a MHC transaction using a smart contract and public-private key pairs. Figure 5 shows how a transaction is conducted in an MHC. Given the aforementioned one-to-one relationships, the transactions in the smart contract are given legal status. When the principal wants to do a transaction of a certain amount of cryptocurrency, the private key is used for authenticating the transaction. Looking at Figure 5, the transaction is first digitally signed by the principal’s private key. Secondly, when the transaction is approved by the blockchain network, the agent address (public key) receives the cryptocurrency. Thus, the cryptocurrency is in the sovereign control of the agent. Only the private key in his possession, which is corresponding to the receiving address (public key), now controls the cryptocurrency. 45 Figure 6: A simple model of the most relevant elements of a dispute in an MHC. If an organization or individual experiences a contract breach in an MHC after the fact, the transactions in the smart contract cannot be reversed or censored, although it can be used for unveiling illegal and fraudulent transactions. In this case, the dispute is reported to a court which investigates the legal contract and actions taken in the contractual relationship such as transactions which are being openly auditable. If the court orders a financial settlement, the smart contract cannot conduct the transaction of a dispute as a reversal because immutability is a main capability of the smart contract and thus a new transaction has to be undertaken. If an organization or individual experiences a contract breach in a MHC after the fact, the transactions in the smart contract cannot be reversed or censored, although it can be used for unveiling illicit and fraudulent transactions. In this case the dispute is reported to a court which investigates the legal contract and actions taken in the contractual relationship such as transactions which are being openly auditable. If the court orders a financial settlement the smart contract cannot conduct the transaction of a dispute as a reversal because immutability is a main capability of the smart contract and thus a new transaction has to be conducted. 46 Smart contracts can directly shape compliance with legal obligations if integrated correctly (Werbach 2018). Therefore, the MHC architecture outlined in this section is chosen as it is the most evolutionary and conservative. This is because I want to make the MHC an iterative suggestion and keep the legal contract intact, thus making the MHC backward compatible with all legal contracts. In addition to that, the MHC leverages the transparent and immutable properties of the smart contract as it conducts the financial transactions. Because of its simplicity, I believe that the MHC is the hybrid architecture regulators most likely will agree with first. 5.2 The MHC and Agency Theory Development As agency theory primarily revolves around traditional contracts, not all of the concepts and issues discussed in Chapter 5 will be applied to the specialized discussion below. For example, goal conflict in the principal-agent relationship lies outside the scope of financial transactions and will, therefore, not be discussed further. This is because the discussion on goal conflict revolves more around motivation, and I consider changing financial instrument mostly irrelevant for the goals of principals and agents as it does not change their motivation and the nature of the contract. Moreover, MHCs outcome-based contracts will be less affected as agency theory assumes that the outcome of a contract is easily measured. Being able to have less information asymmetry with regards to financial transactions will increase transparency, but as the outcome is assumed to be easily measured this part of contracting is downplayed in this Thesis. Consequently, Information asymmetries become a critical issue the MHC seeks to solve. As is the case with adverse selection that in several instances, the principal cannot monitor the competencies of the agent. If previous contracts are used for due diligence when a principal is prospecting for potential agents, adverse selection can be mitigated by using financial information from MHC transactions. A principal can demand to audit the transactions ledgers from previous contractual relationships to verify that an agent has conducted the previous contract and not trying to fake last contractual relationships. 47 Information asymmetries also arise when the knowledge of an agents behavior is unclear. Therefore making financial behavior instantly auditable will help close this financial information gap. Since information is regarded as a commodity, which has a cost in behavior-based contracts, financial information is usually costly to obtain and flawed as in the cases discussed in Chapter 3. The price of information goes down when using the MHC, as there is no longer need to hire an auditing firm to review financial records and there is no need to trust the auditor and the issuer and safe keeper of the receipt. The principal can make the agent prove which transactions have been conducted using the agent’s public-private key pair to prove they were done by the agent and then inspect the transactions using the MHC. Considering Arrow’s (1962) information asymmetry paradox where the buyer of the information cannot know precisely what he is buying, using public-private key pairs in the MHC to prove that a particular individual or organization conducted a transaction shows precisely who did the immutable transaction. On the other hand, in the case of tacit knowledge defined by Hennart (1989), it is not transferred through financial records, and an MHC will not increase the sharing of it. As in the case of complete and incomplete information, the MHC gives the principal the capability to have full details of all financial transactions conducted by the agent. The principal can use the MHC for budgeting and complete information on cost accounting and complete information in auditing (Eisenhardt 1989). In the case of a principal having incomplete information, Eisenhardt (1985) notes that monitoring behavior is a solution. Here the principal can purchase information and reward them. This is said to among other things require cost accounting systems, as an MHC provides a cost transaction system built into the transactions itself this creates an environment where the information is not necessarily purchased but read of the blockchain transaction ledger directly on the internet. 48 In agency theory, a supply chain is seen as a nexus of contracts. Using MHCs can increase financial information sharing and improve the performance of the supply chain. MHCs, which can instantly share data, can give the financial part of the supply chain information enrichment. Thus the goal stated by Towill (1997) that all players act and think as one is approached. The topic of information sharing raises the issue of privacy and ownership of information and what information can be shared with third parties. As for financial information, the MHC is a tool with the capabilities to foster the interpersonal information exchange for supply chains as defined by Razavi and Iverson (2006). They argue that a trusted network where individuals can share information should be built, and now that we have MHCs there are lots of room to experiment and explore. Verily IBM and the shipping giant Maersk is experimenting with a blockchain smart contract project for supply chain "in the name of transparency, information sharing, and innovation” (Takashi 2019). Considering moral hazard (Eisenhardt 1989; Holström 1979) which is the danger of agent acting contradictory to the principal's interest, the MHC provides a deterrent against financial crime. The MHC offers transparency and immutability for financial transactions, and the receipt for a transaction is indistinguishable from the transaction itself there is zero opportunity to fake receipts, and thus receipt fraud is theoretically impossible. Using the MHC to pool funds for budgeting and using the immutable and transparent transaction in the MHC for cost accounting can reduce the risk of illicit activity because of immutable financial records are available for cost accounting Considering agency costs where incomplete information leads to moral hazard a principal has to invest in monitoring expenditures (Jensen & Meckling 1976), and better information systems are seen as a cure (Claus & Kim 2004) the MHC has a role to play. As mentioned above the MHC is an excellent financial tool for internal and external auditing, and information about transactions 49 can be shared instantly and transparently. Therefore, the MHC provides a better financial information system for contracts, which also reduces agency costs. A principal incurs in monitoring costs such as external auditing, and an agent incurs in bonding costs such as internal auditing to reduce moral hazard (Eisenhardt 1985). These costs can be reduced when auditors are replaced by computers code. Because a principal’s costs for monitoring an agent is reflected in the agent's salary using MHC to cut these costs will be reflected in the agent’s salary and yields a competitive advantage over principal-agent relationships using legacy financial systems with expensive auditors. Transparency is a way of reducing the monitoring cost (Eisenhardt 1985) for a principal when monitoring the behavior of an agent. Because full transparency and thus surveillance is no worthy trade-off silver bullet for reducing corruption, I seek to outline a golden middle way which can be leveraged for the common good. Transparency has lately been seen as a critical factor in reducing dysfunctionalities in countries with an abundance of natural resources (EITI 2019). Thus countries rich in resources have taken several initiatives like the Extractive Industries Transparency Initiative (EITI). The initiative focuses on revenue streams from extractive industries such as minerals and petroleum (EITI 2019). In organizations which are seen as a nexus of contracts (Eisenhardt 1985) where risk is shared collectively performance can be evaluated through monitoring and rewards performance. Here a country’s legal system is vital for how the governance of the firm evolves. If a country requires external auditing of financial information, MHC’s immutable and transparent transactions can help reach equilibrium with the governance mechanisms of the state. Thus, as Denis (2001) argues, meaningful relationships between mechanisms, performance, and value can be observed. Using the MHC in organizational contracts reduces the risk of illicit financial operations such as fake receipts increases the whole organizations' financial transparency (Eisenhardt 1985). This makes internal audits easier, and making fake receipts is impossible as the transaction is indistinguishable from the receipt. 50 The MHC has the capabilities to increase financial transparency because the smart contract transactions provide timely and extremely reliable economic information, which can be made accessible to relevant stakeholders. The financial information provided is concerned, of good quality, and reliable as the transaction and receipt is indistinguishable, accessible as it is openly available on the internet. Therefore, it is crucial to consider blockchain not exclusively as a financial tool but also a governing tool. Certain conditions can, for example, be put in place for transparently conducting certain transactions. For example, when all transactions are immutably recorded, accounting practices get automated, and the trusted individual doing the accounting is replaced by predictable and immutable software code. This reduces the need for internal government audits and due diligence to find if the accountants are trustworthy because a massive part of their job can be automated. Using the MHC to increase financial transparency can help reduce corruption Because a lack of transparency can increase corruption in natural resource-rich countries, and empirical evidence suggests that transparency is associated with less corruption (Sohail & Cavill 2008). Transparency is also essential for human development and given blockchain; a tool for transparency in finance; it might also be necessary for social development. 5.2.1 Principal-Agent Relationship & MHC Given the capabilities of blockchain, and the capabilities of cryptocurrency transactions in smart contracts as s transactional supplement to legal, the principal-agent relationship will be investigated. This section will focus on how using cryptocurrency transactions as an alternative to bank and cash transactions in legal contracts as outlined in 7.1 Minimum Hybrid Contract (MHC) impacts agency theory. 51 I have chosen four relevant propositions to the principal-agent relationship proposed by Eisenhardt (1989) as a premise for this part of the discussion. Proposition I: When the contract between the principal and agent is outcome based, the agent is more likely to behave in the interests of the principal (Eisenhardt 1989). The smart contract in the MHCs cannot read the state of the world with high reliability and accuracy, incorrect information about a package being delivered can, for example, be given to the smart contract in an MHC to trigger a cryptocurrency transaction. Thus an outcome-based contract will be mostly unaffected by MHCs compared to current legal contract as for now unless the transaction is the goal of the contract itself such as paying back a loan. This is because it is trivial to audit the transaction, and thus, there are low costs of acquiring the information about the outcome in the MHC. Therefore if the outcome is a financial transaction agency costs as in monitoring the agent’s actions, information asymmetry and agency costs are reduced. Proposition 2: When the principal has information to verify agent behavior, the agent is more likely to behave in the interests of the principal (Eisenhardt 1989). Considering that transactions in the MHC can be audited instantly and are immutable, all financial actions of agents are transparent to the principal if blockchain is used. For example, an MHC can be used to pool funds a principal gives to an agent to conduct the assigned task(s) and every time the agent spends the funds the principal can receive the financial information. Thus the MHC can be used as a transparency and surveillance mechanism for financial information such as accounting, cost accounting, and budgeting. Proposition 3: Information systems are positively related to behavior-based contracts and negatively related to outcome-based contracts (Eisenhardt 1989). In the context of this thesis, the smart contract in the MHC is an information system for figuring out the state of who owns what money. Thus MHC indicates that behavior-based contracts will 52 be affected positively, and outcome-based contracts will be less affected unless the financial transaction or audit is the outcome. Proposition 4: Outcome uncertainty is positively related to behavior-based contracts and negatively related to outcome-based contracts. Using the MHC for budgeting and financial surveillance can reduce outcome uncertainty. The financial behaviour of the agent is surveillable and all transactions can be inspected as they are conducting. Thus the outcome becomes more certain for the principal as the financial transactions point in a certain direction and shows what financial actions the agent conducting to reach the goal of the contract in real time. Also behaviour-based contracts can be enhanced if the behaviour is financial. 5.3 Strategy for Regulating Blockchain This chapter discusses how financial regulators can regulate smart contracts in such a way that the adoption of the MHC is feasible. I will argue that to regulate cryptocurrencies without destroying it, fungibility must be maintained, and it must be treated as money. Having done so, I will discuss how previous financial innovations has been unsuccessfully regulated and cause global systemic havoc, then regulatory lessons from the early days of the internet are presented as feasible options, and finally, regulatory strategies for adopting the MHC are recommended because: Financial legislation has never really involved any elements revealing a consistent or logical system of legislation (Tietje & Lehmann 2010). The MHC is fundamentally challenging to incumbents such as clearinghouses, states issuing fiat currencies and banks as it uses a new form of money; cryptocurrency. The computer and incentive infrastructure being used by financial incumbents relies on decades-old technology and corporate structures. Several financial regulators, such as the Financial Crimes Enforcement Network (FinCEN) and the Internal Revenue Service (IRS) in the United States, are currently 53 adopting and defining positions related to cryptocurrencies in their regulations. An example is "Coin Center," a cryptocurrency think thank (Valkenburgh 2019), which deems that the latest regulations released by FinCEN (2019) as of the time of writing mostly follow their recommendations. On the other hand, the IRS's current stance on smart contracts is underdeveloped and confusing, and the cryptocurrency experts at Coin Center experts are not sure how to interpret the information. Current legal frameworks have to adopt if their citizens are to leverage the capabilities of MHCs. Most importantly, the Securities and Exchange Commission (SEC) has recently suggested that the cryptocurrencies Bitcoin and Ethereum can serve as legal tender (Schlegelmilch 2019). Furthermore, US legislators have already begun supplementing contracts with smart contracts. Delaware has adopted legislation authorizing smart contract ledgers for state records and regulatory functions such as tracking liens and corporate shares (Roberts 2017). The state Arizona has instigated a law declaring that blockchain-based digital signatures are legally enforceable (Higgins 2017) and Vermont has declared that blockchain-based evidence is admissible in court (Vermont general assembly 2018). This suggests that blockchain, irrespective of the MHC is transcending being a marginal technology and increasingly becoming an established de facto standard for transferring value over the internet, similar to how the TCP/IP protocol is the de facto standard for transferring information over the internet. For example, alternative cryptocurrencies claiming to be money are not always accepted by regulators as money. The "Kin” so-claimed cryptocurrency controlled by a private company (Canellis 2019) is as of the time of writing in a dispute with the IRS. Kik, the company behind Kin, is aiming to develop a form of money using cryptocurrency but the IRS holds the position that Kin is not money, but a security. No matter the outcome, regulatory disputes as this stifles development and promotes insecurities as how to proceed and if there will be any legal consequences. 54 Even if cryptocurrencies are made illegal, they would still work for anyone with access to the internet, and the company Blockstream (2019) has released a satellite relay which gives the capability to conduct a Bitcoin transaction using a satellite antenna. Blockchain has been used for several scams and Ponzi-schemes such as the pyramid scheme "Bitconnect," due to its unregulated nature, which enables an entirely free market (Chohan 2018). More than 80% of all cryptocurrency-based crowdfunding campaigns conducted online in 2017 were outright scams (SATIS Group 2018). Thus even though cryptocurrencies are jurisdiction-neutral, barriers such as laws and regulations can have unintended consequences and halter innovation as a bi-effect, in the end, state regulators have been given the responsibility to intervene in illicit/fraudulent cases and bring justice to criminals to keep order in society. I am not going to elaborate whether any cryptocurrency is legitimate because the point is that these disputes can undermine the legitimacy of cryptocurrencies in general and stifle experimentation and innovation. Setting barriers for further development can halter the adoption of blockchain technologies in general and delay the time until society can reap the benefits. For example, the Special Secretary of the Federal Revenue of Brazil (RBF 2019), a financial regulator in the country, has issued "Instruction 1888” which passes new rules to come into force on August 1st. Essentially this means that all legal entities, exchanges and individuals carrying out operations using cryptocurrencies have to inform the Brazilian treasury of every detail of their transaction, with the exception of foreign exchanges this an outright 100% transparent policy. This also equals to 100% in domestic cryptocurrency transactions and is domestically a tool for totalitarian surveillance. Blockchain startups often search for and settle in the legislations most fitting to their business model known as "regulation shopping”. The largest cryptocurrency exchange in the world by volume "Binance”, which has conducted a strategic regulation shopping move by moving their corporation from Hong Kong to the more cryptocurrency friendly regulation of Malta (Paul 2018). When tax revenues from cryptocurrency exchanges such as Binance are realised, I believe 55 competition among regulators for bringing the most profitable cryptocurrency companies into their regulation and reaping the tax benefits could occur. 5.3.1 Fungibility Entrepreneurs become wary when regulators choose to obtain all information about cryptocurrencies and transactions such as what a person owns what cryptocurrency. Having cryptocurrencies accepted as a form of money without destroying its fungibility by making certain units illegal, is favorable for entrepreneurs exploring the blockchain space and societies seeking to leverage blockchain’s capabilities. Entrepreneurs have to take a financial risk when choosing to work on a startup. If there is regulatory opposition or uncertainty in addition to the financial risk, the entrepreneur acts risk-adversely and tries to avoid it through regulation shopping and incorporates in the new legislation. Entrepreneurs become wary when regulators choose to obtain all information about cryptocurrencies and transactions such as what person owns what cryptocurrency. Having cryptocurrencies accepted as a form of money without destroying its fungibility by making certain units illegal, is favourable for entrepreneurs exploring the blockchain space and societies seeking to leverage blockchain’s capabilities. Entrepreneurs have to take a financial risk when choosing to work on a startup. If there is regulatory opposition and/or uncertainty in addition to the financial risk, the entrepreneur acts risk-adversely and tries to avoid it through regulation shopping and incorporates in a new legislation. 5.3.2 Financial innovation The MHC is a financial innovation which is interconnected to the existing legal and regulatory space. Extensive experience with financial innovations as in how new financial products are invented, introduced, and diffused is only one generation old. Both regulators and inventors have low experience with adopting financial innovations which are critical to the health of global economies and markets (Delimiatsis 2011). 56 The financial crisis in 2008 was caused by rapid innovative developments in global financial services such as over-the-counter derivatives products (Pagano & Volpin 2008). These innovations were used for credit risk modeling causing information asymmetry problems, and the increased complexity of the system made risk assessment harder and therefore, risk management more difficult (Delimiatsis 2011). The dynamic nature of financial innovations can cause their consequences to change over time. This is exemplified in the financial crisis of 2008 when regulators failed to act proactively, neither did they react swiftly in regulating new financial innovations (Marques-Ibanez & Scheicher 2009). Innovative financial products are linked inextricably to global financial markets coordination, financial markets, regulatory cooperation, and one should consider how financial innovations can lead to financial fragility and instability as seen in the financial crisis of 2007-08 (Delimatsis 2011). Financial innovation is a dynamic, ongoing process entailing the creation and popularization of new financial instruments and technologies, markets, and institutions (Lerner & Tufano 2011). Litan (2010) argues that financial innovation has transformed how finance works. Structural changes, technological advances or new industrial structure in financial sectors has boosted globalization by increasing cross-border trade in financial services (Claessens 2010), and Allen and Gale (1994) argue that financial innovation increases welfare. Financial innovation is a dynamic, ongoing process entailing the creation and popularization of new financial instruments and technologies, markets and institutions (Lerner & Tufano 2011). Litan (2010) argues that financial innovation has transformed how finance works. Structural changes, technological advances or new industri structure in financial sectors has boosted globalization by increasing cross-border trade in financial services (Claessens 2010), and Allen and Gale (1994) argues that financial innovation increases welfare. Financial innovation is, in most instances, very much ahead of current regulation (Delimatsis 2011). For example Bitcoin which is the first cryptocurrency was unregulated for many years after it launched, and the MHC would be illegal by default in any of the legislations where 57 Bitcoin is unlawful such as in Dar al-lifta (2017) which is the primary Islamic legislator in Egypt has classified Bitcoin transactions as "haram” (prohibited under Islamic law), and Algeria where the financial law has prohibited the use of any cryptocurrencies (Journal Officiel 2018). Regulating innovative financial products after the fact is regarded as being counterproductive and a delaying factor for innovation, but regulators prefer to intervene when the side-effects of business innovation have become apparent. In practice agency problems, supervisory forbearance and complex products can delay regulatory intervention and regulatory intervention vis-a-vis the financial innovation can be challenging (Freixas & Parigi 2009). In the current stage of financial development, it is argued that more is at stake when regulatory intervention affects the pace of financial innovation. When regulators create inflexible and stringent rules, this can be a disincentive for the innovator and stifles the development of innovative financial products. (Delimatsis 2011). Regulation can stifle innovation, and there is evidence that regulator intervention can cause harmful effects on financial innovation (White 1997). Having a revolutionary change in financial services can cause tremendous systemic risky and be very costly (Tufano 1989), and financial innovation typically happens in evolutionary steps of adopting prior financial products ( Tufano 2003). Regulation can (...) encourage innovation in globalized financial markets if it seeks to harmonize certain requirements across jurisdictions such as reporting requirements, thereby diminishing compliance costs and facilitating market access (Delimatsis 2011) The idea sometimes put forward that more regulation may impede innovation may not hold: Better regulation may direct entrepreneurial talents to financial innovations which can enhance societal wellbeing (Delimatsis 2011). Recent blockchain-based financial innovations similar to the MHC has affected regulation by crossing national borders by default, and in this sense, there is a case for global coordination of 58 financial regulations to level the playing field. In such cases, enhanced transparency, a central good-governance principle, and sharing information across borders can allow for well-meant regulatory competition and ultimately encourage innovation, while allowing for better supervision and informed investment decisions. In any event, there is a high level of learning-by-doing in this area, and we are at the beginning rather than the end of changes and innovations such as the MHC in the global financial architecture (Delimatsis 2011). Requiring public disclosure of certain critical financial business information in specific contracts may ultimately have adverse effects and may even reduce market liquidity. Therefore, it seems that disclosure exclusively to the corresponding regulator or supervisory authority would be much more meaningful. Public disclosure can still be required, but perhaps in a later date so that it does not affect business decisions nor allows for misuse of disclosed information (Delimatsis 2011). 5.3.3 The MHC in Context The MHC architecture described in Chapter 5.1 it leverages the smart contract and leaves the legal contract unchanged, and it handles financial transactions using smart contracts which is a before the fact upgrade to current contracts while leaving after the fact dispute resolution unchanged. After the fact disputes are still left up to legal contracts and institutions to decide and therefore, the MHC will not affect the structure of the legal process, and court processes will remain unchanged. The illustrative case in Chapter 2.2 shows that business infrastructure in Brazil is in a fragile state, and as the PWC (2017) reports factors for business failure in which I believe the MHC can mitigate. The MHC increases financial transparency and removes the need for excessive legal bureaucracy and formalities for auditing, and the financial information is of better quality than a private bank and cash ledgers because transactions and the receipts in the MHC are indistinguishable. Agents can use previous MHCs to show prospecting principals looking for 59 new contracts that transactions from previous contracts were successful, and there is not a significant need for restructuring a contract to implement an MHC. The MHC provides several of the related properties I have selected from what Ball (1995) calls out for in Chapter 2.2 to regain public trust in Brazillian institutions thus it can make the legal contract more trustworthy answering RQ1. The MHC reduces the cost of enforcing financial transactions and auditing in contracts and defines property rights of money using public-private key pairs for addresses and authenticating transactions. Practises for accounting and disclosure become automated and removes potentially corrupt personnel and the capability to tamper with records, and regulators can trust more in market integrity as the financial information they receive about the market is more accurate and cannot be tampered with by corrupt actors. 5.3.4 The MHC and The Legal Status Quo As an elaboration on designing an MHC to answer RQ2 this section, regulatory strategies for states wishing to implement the MHC is discussed. Financial regulators are recommended to use "safe harbors” where specific activities are excluded from legal enforcement and "regulatory sandboxes,” which is similar but regulated in time and scale. Using these strategies regulators can collaborate with actors using MHCs and find a golden middle way which is probably somewhere between not regulating it at all and potentially causing a systemic failure such as outlined in Chapter 5.3.2, and making the smart contract part of the MHC and thus making the MHC itself illegal as is the case in Algeria (Journal Officiel 2017). A safe harbor is a mechanism to forestall legal enforcement. This mechanism excludes specific activities from legal obligations. In a situation where firms can take sufficient measures to police themselves, a safe harbor incentivizes them to do so and specifies what conduct is necessary. Classic examples of safe harbors in the realm of technological advances are: 1. The 1996 Telecommunications Act § 230: "online services will not be treated as publishers” This means that online publishers are not liable for content created by their users. 60 2. The 1998 Digital Millennium Copyright act: protects against copyright infringement as long as infringing material was removed from the platform when notified by authorities. ( Communications Decency act 1996) These broadly defined safe harbors from the early days of the public internet make it hard to restrict online activity, which is clearly harmful. The harmful activity includes bullying and harassment because intermediaries have zero incentive to take an active role. On the flip side, these twin safe harbors were a significant factor in the rapid growth of internet-based application in the 1990s. They were essential to spreading user-driven web services and social media. They encourage innovation because services are assured that they are safe from liability for the user-generated content. To enable adoption of smart contracts in current jurisdictions without the threat of regulatory crackdown legislative safe harbors for blockchain-based services is advocated by blockchain think thank Coin Center (Valkenburgh 2017). Verily in a safe harbor bill named the Blockchain Regulatory Certainty Act, which is at the time of writing being proposed to be accepted into US legislation for the second year in a row. The bill has bipartisan support and could provide room to innovate and integrate smart contracts with current legal frameworks (US Congress 2019). A regulatory sandbox is similar to a safe harbor but is confined in time or scale, and it suggests an enclosed space for experimentation and play. Regulatory authorities exempt specific companies or activities from regulation to foster startup activity and experimentation. The difference between a sandbox and a safe harbor is that regulatory sandboxes are not necessarily permanent and usually only applies to new firms. Safe harbors are designed to help nascent firms with sparse resources to administer content on their platforms but have ended up helping large tech companies such as Google and Facebook (Werbach 2018) Therefore regulatory sandboxes are useful because they can be constructed to help organizations at early stages of development and disappear when they mature. Regulatory sandboxes allow 61 legal regimes to operate more hospitable towards software-directed environments. The Financial Conduct Authority (FCA), which is the primary financial regulator in the United Kingdom, has established a fintech sandbox program for companies to experiment with new services (Financial Conduct Authority 2017). Firms can apply to operate in the sandboxed environment, and if they are approved, they can introduce new services without being obliged to follow specific regulations for a given timeframe. Meanwhile, FCA closely monitors the companies activities and gain a better understanding of new platforms. In the first round of companies being accepted into FCA’s regulatory sandbox, the most significant percentage accepted were blockchain-related. 6 Conclusion In the light of how current contracting practices and legislators globally are all affected by systemic corruption at some level such as in the illustrative case of Operation Car Wash in Brazil in Chapter 2.2, I have developed an architecture for the Minimum Hybrid Contract (MHC). The MHC is a practical and evolutionary step for contracting using smart contracts as supplements to legal agreements for financial transactions. Agency theory, which focused on contractual relationships has been used to discuss the capabilities and implications of the MHC, and finally I have focused on two paths: One strategic path for regulators and innovators and one for how MHCs can affect agency theory issues as it increases information sharing, reduces agency costs and can potentially mitigate moral hazard because the financial transactions in the MHCs and immutable transactions enables more trustworthy and cost-effective auditing. Using the MHC, depending on and trusting a third-party for financial transactions is no longer needed as trust is no longer placed in individuals and central institutions, but instead distributed across the user base. Questionable central authorities are replaced by communities of peers in the form of peer-to-peer networks. No single entity can take unilateral actions on behalf of the community, as has been the case with the Trump Administration’s unilateral decision to ban international trade with Iran by blocking Iranian access to the Society for Worldwide Interbank 62 Financial Telecommunication (SWIFT) network. This prevents the countries banks from using SWIFT, which is the international standard to conduct financial transactions without any basis in international law or customs. In the democratized context offered by smart contracts, corporations and states cannot unilaterally defy the community and break the rules of the system; thereby the MHC can create a more trustworthy system (Sun et al. 2016; Scotts & Zachariadis 2012). Chapter 5.2 shows that the MHC affects information asymmetries, moral hazard, and agency costs in agency theory. In light of the MHC, agency theory is most affected by its transparent and immutable properties. Eased sharing and increased transparency of financial information lower the cost of sharing information and decreases information asymmetries. Thus the agency cost called monitoring cost of the principal is reduced as the price of acquiring financial information is reduced. The MHC provides a similar trusted network as Razavi and Iverson (2006) calls out for in supply chains to exchange interpersonal information, but specifically for financial information. Moral hazard is decreased as the MHC provides a deterrent against financial crime, given the transparent and immutable properties of its business transactions. Chapter 5.3 on blockchain regulation strategy to outlines a regulatory pathway for smart contracts in such a way that adoption of the MHC is feasible. If smart contracts are made illegal such as in Algeria the MHC cannot use a smart contract as a supplement to a legal contract, and innovators building MHCs will probably incorporate in a different country as in the case of the currently largest cryptocurrency exchange by volume: Binance, which moved its business from Hong Kong to Malta due to legislative reasons (Paul 2018). Financial legislators have never managed to create a consistent or logical legislation system, as discussed in Chapter 5.3, and most importantly, regulators must maintain fungibility of the cryptocurrency used in the MHC. To find a golden middle way for the development of regulation without stifling innovation, regulators are recommended to learn from the regulatory strategies used during the emergence of the internet in the late 1990s. To avoid financial turmoil and reap 63 the tax returns from innovators succeeding in building large businesses in their legislation, regulators should implement safe harbors where specific activities are excluded from legal obligations, and regulatory sandboxes where regulatory slack is given in limited time and scale should also be performed. To utilize the MHC for societal wellbeing finding a golden middle way between private and transparent transactions is essential, and a balance must be struck between transparency and the basic human need for privacy and secrets (Harari 2014). Satoshi Nakamoto (2008) has invented a way to conduct open, borderless, censorship-resistant, and neutral transactions without having to trust any corruptible central authority is a game-changer for making contracts more trustworthy (​RQ1​), and will most definitely affect all of finance. As seen in Chapter 5 smart contracts has the capability to disrupt more than just the financial part of a contract (Werbach 2018), using blockchain for after the fact dispute resolution is already being pioneered by the blockchain project augur, showing that governance and contracting might end up relying entirely on online blockchain-based courts (​RQ2​) as opposed to current legal courts currently run by states and organizations such as the European Union. since blockchain transactions are transparent, with immutable properties, it is also more trustworthy and makes auditing more cost-effective. Ultimately it succeeds in mitigating moral hazard, information asymmetries and agency costs emphasises by agency theory. References Abel A. & Bernanke B. (2005). Macroeconomics (5th ed.). New Jersey, United States: Pearson. pp. 522–532. Adams, M. B. (1994). Agency Theory and the Internal Audit. Managerial Auditing Journal, 9(8), pp. 8–12. doi:10.1108/02686909410071133 Adler D. (2018) Silk Road: The Dark Side of Cryptocurrency. Fordham Journal of Corporate Financial Law. [online] Available at: https://news.law.fordham.edu/jcfl/2018/02/21/silk-road-the-dark-side-of-cryptocurrency/​ [Read 23.05.2019] Ahmad, I. U., Russell, J. S., and Abou-Zeid, A. (1995). "Information technology (IT) and integration in the construction industry.” Constr. Manage. Econ., 13(2), 163–171. Allen F. and Gale D (1994) Financial Innovation and Risk Sharing. MIT Press Anderson C. W. (1999) Financial contracting under extreme uncertainty: an analysis of Brazilian corporate debentures. Journal of Financial Economics issue 51 pp.45—84 64 Ante L. & Fiedler I. (2019) "Cheap Signals in Security Token Offerings," Blockchain Research Lab. [online] Available at: https://www.researchgate.net/publication/331287045_Cheap_Signals_in_Security_Token_Offerings​ [Accessed 05.05.2019] Arrow, K. (1962) ‘Economic welfare and the allocation of resources for invention’, in K. Arrow (ed.) The Rate and Direction of Invention Activity: Economic and Social Factors: A Report of the National Bureau of Economic Research, Princeton, NJ: Princeton University Press, pp. 609–25. Arrow K. (1971) Essays in the Theory of Risk-Bearing. Amsterdam:North-Holland Publishing Company. Arajo J. F. F. E, Tejedo-Romero F. (2016) Local government transparency index: determinants of municipalities’ rankings. International Journal of Public Sector Management, 29(4), 327–347. doi:10.1108/ijpsm-11-2015-0199 Aslam N. (2018) Banks Banning Cryptocurrency Purchase On Credit Cards, Why? Forbes. [online] Available at: https://www.forbes.com/sites/naeemaslam/2018/02/05/banks-banning-cryptocurrency-purchase-on-credit-cards-why/#6d73d4783cf9​ [read 23.05.2019] Ball, R., (1995). Making accounting more international: why, how, and how far will it go? Journal of Applied Corporate Finance 8, pp. 19—29. Bellver A. & Kaufmann D. (2005) 'Transparenting Transparency' Initial Empirics and Policy Applications. The World Bank Ben-Sasson E., Chiesa A., Garman C., Green M., Miers I., Tromer E., Virza M. (2014). Zerocash: Decentralized Anonymous Payments from Bitcoin. [online] Available at: h​ ttp://zerocash-project.org/media/pdf/zerocash-extended-20140518.pdf​ [Accessed 03.03.2019]. Bitcoinuptime.com (2019) Bitcoin-uptime. [online] Available at: Bitcoinuptime.com [Accessed 12.03.2019] Bitcoin.org (2019). Choose your Bitcoin wallet. [online] Available at: ​https://Bitcoin.org/en/choose-your-wallet​ [Accessed 14.05.2019]. Blockstream (2019) Blockstream satellite. [online] Available at: h​ ttps://blockstream.com/satellite/​ [read 09.06.2019] Blockchaintechnologies.com (2016). The ultimate guide to blockchain smart contracts. Available at: http://www.blockchaintechnologies.com/blockchain-smart-contracts​ [Accessed 14.05.2019]. Bowen, P. A., Akintoye, A., Pearl, R., and Edwards, P. J. (2007). "Ethical behaviour in the South African construction industry.” Constr. Manage. Econ., 25(6), 631–648. Brunetti, A., & Weder, B. (2003). A free press is bad news for corruption. Journal of Public Economics, 87, 1801–1824. Buterin V. (2013) "Ethereum White Paper", [online] Available at: h​ ttps://github.com/ethereum/wiki/wiki/White-Paper​ [Accessed 05.05.2019] Canellis D (2019) Kik raised $98M with a potentially illegal ICO. Now it wants your money to fight the SEC. Coindesk [online] Available at: https://www.coindesk.com/sec-negotiations-have-cost-kik-5-million-says-ceo​ [read 29.05.2019] Castillo M. (2019) "Customers Can Spend Bitcoin At Starbucks, Nordstrom And Whole Foods, Whether They Like It Or Not". Forbes [online] Available at: https://www.forbes.com/sites/michaeldelcastillo/2019/05/13/starbucks-nordstrom-and-whole-foods-now-accept-Bitcoin-just-dont-ask-them/#35cf f98d2252​ [accessed 28.05.2019] Chaia A., Dalal A., Goland T., Gonzalez M. J., Murduch J. & Schiff R. (2009) Half the World is Unbanked. McKinsey & Company. [online] Available at: h​ ttps://www.mckinsey.com/industries/social-sector/our-insights/half-the-world-is-unbanked​ [read 27.05.2019] Carnevale, D.G. (1995). TRUSTWORTHY GOVERNMENT: LEADERSHIP AND MANAGEMENT STRATEGIES FOR BUILDING TRUST AND HIGH PERFORMANCE. San Francisco: Jossey-Bass Chohan U. W (2018) Bitconnect and Cryptocurrency Accountability. [online] Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3131512​ [read 05.06.2019] Claessens S. 2003 ‘Regulatory Reform and Trade Liberalization in Financial Services’, in A. Mattoo and P. Sauvé (eds), Domestic Regulation and Service Trade Liberalization (Oxford University Press). Claus I. and Kim K. (2004) Agency costs and asymmetric information in a small open economy. Econometric Society 2004 Far Eastern Meetings 787, Econometric Society. Communications Decency act (1996), Pub. L. No. 104-104, § 502, 100 Stat. 133, 134-35 (codified as amended at 47 U.S.C. § 223(2012)); Pub. L. No. 105-304, § 202, 112 Stat. 2860, 2877-78 (codified as amended at 17 U.S.C. § 512(2012) 65 Crosby, M. (2016). "BlockChain Technology: Beyond Bitcoin. Pantas and Ting Sutardja Center for Entrepreneurship and Technology Berkeley Engineering no. 2: 16. Cynthia D. and Moni N. (1993). "Pricing via Processing, Or, Combatting Junk Mail, Advances in Cryptology". CRYPTO’92: Lecture Notes in Computer Science No. 740. Springer: 139–147. [online] Available at: ​http://www.hashcash.org/papers/pvp.pdf​ [read 25.06.2019] da Costa, R. T., (1993). Preface. In: Tertuliano, F., Pessoa, I., Francisco de Aguiar, J., Ayoub, R., Trancanella, R., Rioli, V. (Ed's.), Full Disclosure: como Aperfeiçoar o Relacionamento das Empresas Abertas com o Mercado de Capitais. Editora Maltese, São Paulo. Dar al-lifta (2017) Religious Decree No. 4205, The Status of Transactions in Bitcoins and other Cryptocurrencies under Islamic Law, EGYPT’S DAR AL-IFTA. [online] Available at: http://www.dar-alifta.org/ar/ViewFatwa.aspx?sec=fatwa&ID=14139 archived at https://perma.cc/432D-NHE5 [read 09.06.2019] Dash (2019) Your money, your way. [online] Available at: ​https://www.dash.org​ [read 09.06.2019] Delimatsis P. (2011) Financial Innovation and Transparency in Turbulent Times TILEC Discussion Paper No. 2011-031. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1865747​ [read 04.06.2019] Deloitte (2016) Tech Trends 2016 Innovating in the digital era, Blockchain: Democratized trust. Available at: https://documents.dupress.deloitte.com/TechTrends2016​ [Read: 04.04.2019] Demski, J.. & Feitham, G. (1978) Economic incentives in budgetary control systems. Accounting fleview, 53, 336-359. Denis D. K. (2001) Twenty-five years of corporate governance research … and counting. Review of Financial Economics 10: 191–212 Department of Justice (2014) Second Vice President of Equatorial Guinea Agrees to Relinquish More Than $30 Million of Assets Purchased with Corruption Proceeds. [online] Available at: https://www.justice.gov/opa/pr/second-vice-president-equatorial-guinea-agrees-relinquish-more-30-million-assets-purchased​ [read 03.06.2019] Douceur J. (2002), The Sybil Attack, IPTPS ’01 Revised Papers from the First International Workshop on Peer-to-Peer Systems 251. [online] Available at: ​http://nakamotoinstitute.org/static/docs/the-sybil-attack.pdf​ [Accessed 17.3.2019] Economica (1931). The ‘Paradox’ of Saving. Economica. 32. Eichengreen B. & Temin P. (2000). The Gold Standard and the Great Depression. Contemporary European History, 9(2). pp. 183-207. Edelman (2017) Edelman trust barometer 2017. [online] Available at: ​https://www.edelman.com/trust2017/​ [read 03.03.2019] Edelman (2019) Edelman Trust Barometer Global Report. [online] Available at: https://www.edelman.com/sites/g/files/aatuss191/files/2019-02/2019_Edelman_Trust_Barometer_Global_Report.pdf​ [Accessed 03.06.2019] EITI (2019) Extractive Industries Transparency Initiative. [online] Available at: ​https://eiti.org/​ [Accessed 22.05.2019] Eisenhardt K. M. (1985) Control: organization and economic approaches. Management science Vol. 31 No. 2. Eisenhardt, K.M.. (1989). Agency Theory: An Assessment and Review. The Academy of Management Review, 14(1), Retrieved from https://www.jstor.org/stable/258191 Eris:Legal (2014) "Putting The Contracts in Smart Contracts", Eris industries. [online] Available at: https://www.erisindustries.com/components/erislegal.html​ [Accessed 12.05.2019] Ethereum Classic (2017). ethereum classic. [online] Available at: ​https://ethereumclassic.org/​ [Accessed 14.05.2019]. EthHub (2019) "Ethereum 2.0 (Serenity) Phases" [online] Available at: ​https://docs.ethhub.io/ethereum-roadmap/ethereum-2.0/eth-2.0-phases [Accessed 03.03.2019] Financial Conduct Authority (2017) "financial conduct authority provides update on regulatory sandbox" The Financial Conduct Authority. [online] Available at: ​https://www.fca.org.uk/news/press-releases/financial-conduct-authority-provides-update-regulatory-sandbox​ [Accessed 12.05.2019] FinCen (2019) Application of FinCEN’s Regulations to Certain Business Models Involving Convertible Virtual Currencies. Financial Crimes Enforcement Network (FinCen) [online] Available at: https://www.fincen.gov/sites/default/files/2019-05/FinCEN%20CVC%20Guidance%20FINAL.pdf​ [read 29.05.2019] 66 Federalreserve.gov (2009). Federal reserve statistical release. Archived June 5, 2009, at the Wayback Machine. [online] Available at: https://web.archive.org/web/20090605101615/http://www.federalreserve.gov/releases/h6/hist/h6hist1.htm​ [Accessed 14.05.2019]. Ferrara, P. (2013). Rethinking Money: The Rise Of Hayek’s Private Competing Currencies. [online] Available at: https://www.forbes.com/sites/peterferrara/2013/03/01/rethinking-money-the-rise-of-hayeks-private-competing-currencies/#76d74ba83bab [Accessed 14.05.2019]. Figueiredo F. O. (2016) "Inside the Car Wash: The Narrative of a Corruption Scandal in Brazil". [online] Available at: https://www.psa.ac.uk/sites/default/files/conference/papers/2016/Car%20Wash%20PSA%20final1_0.pdf​ [Accessed 14.05.2019] Foreign Policy (2009) The 2009 Failed States Index. [online] Available at: ​https://foreignpolicy.com/2009/06/21/the-2009-failed-states-index [Accessed 20.05.2019] Freixas X. and Parigi B. (2009) ‘Rules vs. discretion in times of financial innovation’, paper presented at a conference on ‘Internationalization of Services: Competition and Regulatory Interaction in Europe’, pp. 25-27 June, GAN (2019) Compliance Guides. Business Anti-Corruption Portal. Available at: https://www.business-anti-corruption.com/compliance-quick-guides/brazil/ Geiregat S. (2018). Cryptocurrencies are (smart) contracts. Computer Law & Security Review. Volume 34, Issue 5, pp. 1144-1149 Global Witness (2018) "Global Witness reveals Brazil's Car Wash corruption scandal may have cost the country eight times more than the £1.4 billion stolen"[online] Available at: https://www.globalwitness.org/en/press-releases/global-witness-reveals-brazils-car-wash-corruption-scandal-may-have-cost-country-eight-timesmore-14-billion-stolen/​ [Accessed 14.05.2019] Golembiewski R,.T .(1979). Approaches to planned change: Macro-level interventions and change agent strategy. New York: Marcel Dekker. Graeber D. (2001). Toward an anthropological theory of value: the false coin of our own dreams. Basingstoke, United Kingdom: Palgrave Macmillan. pp. 153–154. Graeber D. (2011). Debt: The First 5000 Years. New York: Melville House Publishing. Grigg I. (2004) "The Ricardian Contract.” Accessed March 13, 2019. [online] Available at: h​ ttp://iang.org/papers/ricardian_contract.html [Accessed 12.05.2019] Harari Y. (2014). Sapiens: A Brief History of Humankind. London: Harvill Secker. Harris, M., & Raviv, A. (1978) Some results on incentive contracts with application to education and employment, health insurance, and law enforcement. American Economic Review. 68, 20-30. Hayne K. M. (2017) GOVERNMENT CONTRACTS AND PUBLIC LAW. Melbourne Law School, The University of Melbourne. [online] Available at: h​ ttps://law.unimelb.edu.au/__data/assets/pdf_file/0004/2494336/05-Hayne.pdf​ [read 04.06.2019] Hennart, J-F. (1989) ‘Can the "new forms of investment” substitute for the "old forms?” A transaction cost perspective’, Journal of International Hendrik S. & Mochalski K. (2009). "Internet Study 2008/2009" (PDF). Leipzig, Germany: ipoque. Archived from the original (PDF) on 1 April 2014. Retrieved 3 October 2011. "Peer-to-peer file sharing (P2P) still generates by far the most traffic in all monitored regions – ranging from 43% in Northern Africa to 70% Eastern Europe." Henry T. C. Hu (2015), Financial Innovation and Governance Mechanisms: The Evolution of Decoupling and Transparency, 70 Business Lawyer pp.347- 405, available at h​ ttp://ssrn.com/abstract=2588052 Henry D. & Irrera A. (2017) JPMorgan's Dimon says Bitcoin 'is a fraud'. Reuters [online] Available at: https://www.reuters.com/article/legal-us-usa-banks-conference-jpmorgan/jpmorgans-dimon-says-Bitcoin-is-a-fraud-idUSKCN1BN2PN​ [read 23.05.2019] Heuvel, G. V. D. (2005). "The parliamentary enquiry on fraud in the Dutch construction industry collusion as concept between corruption and state-corporate crime.” Crime Law Social Change, 44(2), 133–151. Higgins S. (2017) "Arizona Governor Signs Blockchain Bill Into Law". Coindesk. [online] Available at: https://www.coindesk.com/arizona-governor-signs-blockchain-bill-law​ [Accessed 05.05.2019] Hoepman J. (2007). Distributed Double Spending Prevention⋆. [online] Available at: ​https://arxiv.org/pdf/0802.0832.pdf​ [Accessed 05.02.2019]. 67 Holmes O. W. Jr., (1881). The Common Law (1 ed.). London: Macmillan. Holström (1979) Moral hazard and observability. The Bell Journal of Economics, Vol. 10, No. 1 pp. 74-91 Macneil I. R. (1978) "Contracts: Adjustment of Long-Term Economic Relations Under Classical, Neoclassical, and Relational Contract Law,” Northwestern University Law Review 72 (854) Ipsey R. (1975). An introduction to positive economics. London, United Kingdom: Weidenfeld & Nicolson. 4th ed. pp. 683–702. Islam, R (2003), Do more transparent Governments govern better?, Policy Research Working Paper 3077, World Bank. Jensen C. M. & Meckling H. W. (1976) Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of Financial Economics 3 305-360 Journal Officiel (2018) DE LA REPUBLIQUE ALGERIENNE DEMOCRATIQUE ET POPULAIRE. [online] Available at: https://www.joradp.dz/FTP/jo-francais/2017/F2017076.pdf​ [read 11.06.2019] JP Morgan (2019) The Blockchain Center of Excellence. [online] Available at: https://www.jpmorgan.com/global/blockchain [read 23.05.2019] Kagan R. A. (2009) "Adversarial Legalism: The American Way of Law”. Cambridge, MA: Harvard University Press Kannan, V. & Tan, K. (2006) Buyer-supplier relationships: the impact of supplier selection and buyer-supplier engagement on relationship and firm performance. International Journal of Physical Distribution & Logistics Kaplan, S.N. and D. Reishus. (1990), ‘Outside Directors and Corporate Performance’, Journal of Financial Economics 27 (2), pp. 389-410. Kenny, C. (2009). "Transport construction, corruption and developing countries.” Transp. Rev., 29(1), 21–41. Kiyotaki N. & Wright R. (1991). A Contribution to the Pure Theory of Money. Journal of economic theory. 53. pp. 215-235. Kolstad I. & Arne W. (2009) Is Transparency the Key to Reducing Corruption in Resource-Rich Countries?. World Development Vol. 37, No. 3, pp. 521–532 KYC360 (2016) Special Report: FAILURES IN ANTI-MONEY LAUNDERING CONTROLS: PAYING THE PRICE. [online] Available at: https://www.riskscreen.com/kyc360/special-report/failures-in-anti-money-laundering-controls-paying-the-price/​ [read 03.06.2019] Lambert, D. & Cooper, M. (2000) Issues in supply chain management. Industrial Marketing Management, 29(1), pp. 65-83. Lau, H. & Lee, W.B. (2000) On a responsive supply chain information system. International Journal of Physical Distribution & Logistics Management, 30(7/8), pp. 598-610. Leatherwood, M., & Conlon, E. (1987) Diffusibility of blame: Effects on persistence in a project. Academy of Management Journal 30, 836-848. Lei No. 12.846, de 1 de Agosto de 2013, Diario Oficial da Uniao [D.O.U] de 2.8.2013 (Braz.) [online] Available at: https://www2.camara.leg.br/legin/fed/lei/2013/lei-12846-1-agosto-2013-776664-publicacaooriginal-140647-pl.html​ [Accessed 23.05.2019] Lerner J. and Tufano P. (2011) ‘The Consequences of Financial Innovation: A Counterfactual Research Agenda’, NBER Working Paper No 16780, February 2011, p. 6. Lin I, & Liao T (2017) International Journal of Network Security, Vol.19, No.5, PP.653-659. (DOI: 10.6633/IJNS.201709.19(5).01) Litan R. (2010)‘In Defense of Much, But Not All, Financial Innovation’, Brookings Institution, February, pp. 2. Litecoin.org (2019). GLOBAL DECENTRALIZED CURRENCY [online] Available at: https://litecoin.org/ [Accessed 12.03.2019]. Lombrozo E. (2017). Forks, Signaling, and Activation. [online] Available at: https://medium.com/@elombrozo/forks-signaling-and-activation-d60b6abda49a​ [Accessed 12.03.2019]. Malhotra D., Murnighan K. (2002) "The Effects of Contracts on Interpersonal Trust”, Administrative Science Quarterly 47, no. 3 pp. 534-559 Mankiw G. (2007). Macroeconomics. 6th ed. New York: Worth Publishers. pp. 22–32. Mankiw G. (2014). Principles of Economics. Boston, Massachusetts, United States: Cengage Learning pp. 220. 68 Marie H. (2019) Us Rep Sherman Calls for Crypto Ban, Says It Threatens to Diminish American Power. Cointelegraph. [online] Available at: https://cointelegraph.com/news/us-rep-sherman-calls-for-crypto-ban-says-it-threatens-to-diminish-american-power​ [read 23.05.2019] Marques-Ibanez D. and Scheicher M. (2009) ‘Securitization – Instruments and Implications’. The Oxford Handbook of Banking (Oxford University Press, 2010), pp. 488. Mason-Jones, R. & Towill, D. (1997) Information enrichment: designing the supply chain for competitive advantage. Supply Chain Management, 2(4), pp. 137-48. Mattereum (2019) Mattereum: Decentralized Digital Twins for Trade, Law and Finance. [online] Available at: h​ ttps://mattereum.com/​ [Accessed 23.05.2019] Mattoo A. and Subramanian A. (2009) ‘From Doha to the Next Bretton Woods – A New Multilateral Trade Agenda’ 88:1 Foreign Affairs 15. McColgan P. (2001) Agency theory and corporate governance: a review of the literature from a UK perspective. Department of Accounting & Finance, University of Strathclyde Draft 22. May 2001. McFarlane C., Beer M., Brown J. and Prendergast N. (2017). Patientory: A Healthcare Peer-to-Peer EMR Storage Network v1.1. [online] Available at: ​https://www.patientory.com/wp-content/uploads/2017/04/Patientory_Whitepaper-1.pdf​ [Accessed 19.04.2019]. Mehlum, H., Moene, K., & Torvik, R. (2006). Institutions and the resource curse. The Economic Journal, 116, pp. 1–20. Melo A. M. (2016) Crisis and Integrity in Brazil. Journal of Democracy, Volume 27, Number 2, April 2016, pp. 50-65 (Article) Menezes A. J., van Oorschot P. C. and Vanstone S. A. (1996). "Handbook of Applied Cryptography”, CRC Press. [Accessed 05.05.2019] Available at: ​http://cacr.uwaterloo.ca/hac/ Milne R. & Winter D. (2018) "Danske: anatomy of a money laundering scandal", Financial Times [online] Available at: https://www.ft.com/content/519ad6ae-bcd8-11e8-94b2-17176fbf93f5​ [Accessed 14.05.2019] Miller M. H. (1992) Financial Innovation: Achievements and Prospects, J. APPLIED CORP. FIN., Winter 1992 at 4, 6 n.6.. Monero (2019) MONERO Private Digital Currency. [online] Available at: ​https://www.getmonero.org​ [read 09.06.2019] Mulder L., Dijk E. V., Cremer D. D and Wilke H. A. M (2006) "Undermining Trust and Cooperation: The Paradox of Sanctioning System in Social Dilemmas”. Journal of Experimental Social Psychology 42 pp. 147-162. Mundell R. (2002), The Birth of Coinage. [online] Available at: https://academiccommons.columbia.edu/catalog/ac:114141 [Accessed 14.05.2019]. Nakamoto S. (2008). "Bitcoin A Peer-to-Peer Electronic Cash System.” [online] Available at: h​ ttps://Bitcoin.org/Bitcoin.pdf​ [Accessed March 6, 2019]. New York Times (2018) "Ex-President 'Lula' of Brazil Surrenders to Serve 12-Year Jail Term". [online] Available at: https://www.nytimes.com/2018/04/07/world/americas/brazil-lula-surrenders-luiz-inacio-lula-da-silva-.html​ [Accessed 20.05.2019] North D. (1990) "Institutions, Institutional Change and Economic Performance.” Cambridge University Press, Cambridge Nxt (2014). Nxt whitepaper, created by the Nxt community. [online] Available at: h​ ttps://nxtwiki.org/wiki/Whitepaper:Nxt​ [Accessed 03.03.2019] OECD (2002), Foreign Direct Investment for Development- Maximising Benefits, Minimising Costs, OECD Secretariat. Oliver D Hart (1988) "Incomplete contracts and the theory of the firm,” Journal of Law, Economics, and Organization 4 : 119, 123. Obermayer B and Obermaier F. (2016) THE PANAMA PAPERS Breaking the Story of How the Rich & Powerful Hide Their Money. Oneworld Publications, London. OpenLaw (2017) "Introducing OpenLaw", [online] Available at: ​https://media.consensys.net/introducing-openlaw-7a2ea410138b​ [Accessed 12.05.2019] Orre A. & Mathisen H. W (2008) Corruption in fragile states. The Danish Institute for International Studies. [online] Available at: https://www.cmi.no/publications/file/3235-corruption-in-fragile-states.pdf​ [accessed 20.05.2019] O'Sullivan A. & Sheffrin S. (2003). Economics: Principles in action. Upper Saddle River, New Jersey: Pearson Prentice Hall. pp. 246. 69 Ouchi, W, "A Conceptual Framework for the Design of Organization Control Mechanisms," Management Sci., 25 (September 1979), pp. 833-848. Oxforddictionaries.com (2005). Definition of cryptocurrency in English. [online] Available at: https://en.oxforddictionaries.com/definition/cryptocurrency​ [Accessed 14.05.2019]. Oxforddictionaries.com (2019) Definition of contract in English. [online] Available at: ​https://en.oxforddictionaries.com/definition/contract [Accessed 08.06.2019]. Pagano M. Volpin P (2008) ‘Securitization, Transparency and Liquidity’, CEPR Discussion Paper No DP7105 Paul A. (2018) Binance Moving to Malta. Coin Central [online] Available at: ​https://coincentral.com/binance-moving-to-malta/​ [read 29.05.2019] Pereira da Silva, J., (1990). Ana lise Financeira das Empresas. Editora Atlas, São Paulo. , pp. 30—31 ́ Plato (348 BC) The Laws, Book 11, §23, Contracts. Popov S. (2016). A Probabilistic Analysis of the Nxt Forging Algorithm. Ledger Journal. 1: 69–83. ISSN 2379-5980. doi:10.5195/LEDGER.2016.46. [Accessed 03.03.2019]. Pratt, J.W., Zeckhauser, R. (Eds.), 1985. Principals and Agents. The Structure of Business. Harvard Business School Press, Boston, MA. PWC (2017) Doing Deals in Brazil. Razavi M., Iverson L. (2006) Grounded theory of information sharing behavior in a personal learning space, Proceedings of the ACM CSCW '06 Conference on Computer Supported Cooperative Work, pp. 459-468. Redman J. (2017) After the Boss Calls Bitcoin a 'Fraud' — JP Morgan Buys the Dip. [online] Available at: https://news.Bitcoin.com/after-the-boss-calls-Bitcoin-a-fraud-jp-morgan-buys-the-dip/​ [read 06.06.2019] Reid K., (2013) Banknotes and Their Vindication in Eighteenth-Century Scotland. David Fox and Wolfgang Ernst (eds), Money in the Western Legal Tradition (Oxford University Press, 2014, Forthcoming); Edinburgh School of Law Research Paper No. 2013/19. Available at SSRN: https://ssrn.com/abstract=2260952​ or ​http://dx.doi.org/10.2139/ssrn.2260952 Reinikka, R., & Svensoon, J. (2005). Fighting corruption to improve schooling: Evidence from a newspaper campaign in Uganda. Journal of the European Economic Association, 2(2–3), 1–9. Reutzel B. (2016) "BNP Paribas Works With Blockchain Startup to Open Source Law" [online] Available at: https://www.coindesk.com/commonaccord-legal-smart-contracts-prove-beneficial-one-bank-veritcal​ [Accessed: 12.05.2019] Rizzo P. (2016) "How Barclays Used R3’s Tech to Build a Smart Contracts Prototype." Coindesk. [online] Available at: https://www.coindesk.com/barclays-smart-contracts-templates-demo-r3-corda​ [Accessed 12.05.2019] Roberts J. J. (2017) "Companies Can Put Shareholders on a Blockchain Starting Today", Fortune [online] Available at: http://fortune.com/2017/08/03/blockchain-shareholders-law/​ [Accessed 11.05.2019] Robinson, J. A., Torvik, R., & Verdier, T. (2006). Political foundations of the resource curse. Journal of Development Economics, 79, 447– 468. Ross S. (1973). ‘The economic theory of agency: the principal’s problem’. American Economic Review, 63,134-9. Ross, M.L., (2001). Does Oil Hinder Democracy? World politics, 53(03), pp.325–361. Schlegelmilch S. J. and Mendel D. S (2019) U.S. SECURITIES AND EXCHANGE COMMISSION, UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK. Case 1:19-cv-05244 [online] Available at: https://www.sec.gov/litigation/complaints/2019/comp-pr2019-87.pdf​ [read 08.06.2019] Sitkin, S. (1987) Secrecy in organizations: The limits of legitimate information control Working paper. University of Texas, Austin. Silva, A.H.C. & Cardozo, J.S.S. (2012) ‘Teoria dos Escândalos Corporativos: Uma Análise Comparativa de Casos Brasileiros e Norte-americanos’, Revista de Contabilidade do Mestrado em Ciências Contábeis da UERJ, jan./abr, Vol. 17, No. 1, pp.105–108, Rio de Janeiro. Silvia C. and Colauto R. D. (2016) Voluntary disclosure in the context of convergence with International Accounting Standards in Brazil. Review of Business Management, [S.l.], v.18, n.62, pp. 658-677.. ISSN 1983-0807 70 Socolofsky T. and Kale C. (1991) A TCP/IP Tutorial. [online] Available at: h​ ttps://tools.ietf.org/html/rfc1180​ [read 10.06.2019] Stallings, W. (1990). Cryptography and Network Security: Principles and Practice. Prentice Hall. p. 165. ISBN 9780138690175. Swan, M. (2015). Blockchain: Blueprint for a New Economy. O'Reilly Media, Inc. Szabo N. (1996) "Smart Contracts: Building Blocks for Digital Markets" [online] Available at: www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html [Accessed 05.05.2019] Szabo N. (1997) "Formalizing and Securing Relationships on Public Networks," [online] Available at: https://journals.uic.edu/ojs/index.php/fm/article/view/548​ [Accessed 05.05.2019] Shankman, N.A.(1999), "Reforming the debate between agency theory and stakeholder’s theories of the firm.” Journal of Business Ethics, Vol. 19, p. 319-334. Smith A. (1937) The Wealth of Nations, Cannan Edition. Modern Library, New York 1937 pp. 70 Sohail, M., and Cavill, S. (2008). "Accountability to prevent corruption in construction projects.” J. Constr. Eng. Manage., 10.1061/(ASCE)0733-9364(2008)134:9(729), 729–738. Stacher D. (2018) Regulation of Initial Coin Offering (ICO). Chair of Economic Theory Universität Basel. [online] Available at: https://wwz.unibas.ch/fileadmin/user_upload/wwz/00_Professuren/Berentsen_Wirtschaftstheorie/Lecture_Material/Master_s_Thesis/Completed_ Master_s_Theses/Master_Thesis_David_Stacher.pdf​ [read 03.06.2019] Stank, T., Crum, M. & Arango, M. (1999) Benefits of inter-firm coordination in food industry supply chains. Journal of Business Logistics, 20(2), pp. 21-41. SATIS Group (2018) Cryptoasset Market Coverage Initiation: Network Creation. [online] Available at: https://research.bloomberg.com/pub/res/d28giW28tf6G7T_Wr77aU0gDgFQ​ [read 05.06.2019] Stiglitz, J. E. (1999), "On Liberty, the Right to Know and Public Disclosure: The Role of Transparency in Public Life”, Oxford Amnesty Lecture. Suphachalasai, S. (2005). Bureaucratic corruption and mass media. Environmental economy and policy research discussion paper series. Cambridge: University of Cambridge. Tapscott D. & Tapscott A. (2016). Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World. New York: Penguin Random House LLC. Takashi D. (2018) IBM and Maersk launch blockchain to reduce shipping time and costs. [online] https://venturebeat.com/2018/08/09/ibm-and-maersk-launch-blockchain-to-reduce-shipping-time-and-costs/​ [read 08.06.2019] The Royal Mint (2019) Legal Tender Guidelines. [online] Available at: https://www.royalmint.com/aboutus/policies-and-guidelines/legal-tender-guidelines​ [read 28.05.2019] The World Bank and the United Nations Office of Drugs and Crimes (UNODC) (2010) Stolen Asset Recovery: Toward a Global Architecture for Asset Recovery [online] Available at: ​https://star.worldbank.org/sites/star/files/GlobalArchitectureFinalwithCover.pdf​ [Accessed 20.05.2019] Tietje Cf. C. and Lehmann M. (2010) ‘The Role and Prospects of International Law in Financial Regulation and Supervision’ 13:3 Journal of International Economic Law 663, pp. 665. Towill, D. (1997) The seamless supply chain: the predator’s strategic advantage. International Journal of Technology Management, 13(1), pp. 37-56. Trachtman Cf. J.(2010) ‘The International law of Financial Crisis: Spillovers, Subsidiarity, Fragmentation and Cooperation’ 13:3 Journal of International Economic Law 719, pp. 729 Transparency International (2007) "Corruption risk analysis in Southern Africa,” [online] Available at: http://www.transparency.org/news_room/in_focus/2007/nis_africa​ [Accessed 03.02.2019] Tobin A. & Reed D. (2017) "The Inevitable Rise of Self-Sovereign Identity,” Sovrin Foundation. https://sovrin.org/wp-content/uploads/2017/06/The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf​ [Accessed 04.05.2019] Tufano P. (1989) ‘Financial Innovation and First Mover Advantages’. 25th Journal of Financial Economics pp. 213. 71 Tufano P. (2003), ‘Financial Innovation’ in G. Constantinides; M. Harris; and R. Stulz (eds), The Handbook of the Economics of Finance, Volume 1A: Corporate Finance (Elsevier). Uport (2017) "First official registration of a Zug citizen on Ethereum". https://medium.com/uport/first-official-registration-of-a-zug-citizen-on-ethereum-3554b5c2c238​ [Accessed 04.05.2019] US Congress (2019) "H.R.528 - Blockchain Regulatory Certainty Act," 116th Congress, [online] Available at https://www.congress.gov/bill/116th-congress/house-bill/528/all-actions?q=%7B"search"%3A%5B"Hr+528"%5D%7D&s=1&r=1​ [Accessed 12.05.2019 Vermont general assembly (2018) "The Vermont Statutes Online”, [online] Available at: https://legislature.vermont.gov/statutes/section/12/081/01913​ [Accessed 11.05.2019] Valkenburgh P. V. (2017) "Congress should create a blockchain technology safe harbor. Luckily they already figured it out in the '90s." Coin Center. [online] Available at: https://coincenter.org/entry/congress-should-create-a-blockchain-technology-safe-harbor-luckily-they-already-figured-it-out-in-the-90s​ [Accessed 12.05.2019] Valkenburgh P. V. (2019) FinCEN’s new cryptocurrency guidance matches Coin Center recommendations. Coin Center [online] Available at: https://coincenter.org/entry/fincen-s-new-cryptocurrency-guidance-matches-coin-center-recommendations​ [read 29.05.2019] von Hayek, F. (1977). Denationalization of Money: An Analysis of the Theory and Practice of Concurrent Currencies. London: Institute of Economic Affairs . Vee, C., and Skitmore, M. (2003). "Professional ethics in the construction industry.” Eng. Constr. Archit. Manage., 10(2), 117–127. Vishwanath, T. and D. Kaufmann (1999), Towards Transparency in Finance and Governance, World Bank. Wallace, W.A., (1980) The Economic Role of the Audit in Free and Regulated Markets, Graduate School of Management, University of Rochester, NY. Werbach K. (2016). Trust, But Verify: Why the Blockchain Needs the Law. 33 Berkeley Tech. L.J. 489 [online] Available at: http://ssrn.com/abstract=2844409​ [Accessed 21.03.2019] Werbach K. & Cornell N. (2017) "Contracts Ex Machina,” Duke Law Journal 67(2). Werbach K. (2018) The Blockchain and the New Architecture of Trust (Information Policy). The MIT Press. White Fc. L. (1997) ‘Technological Change, Financial Innovation, and Financial Regulation in the U.S.: The Challenges for Public Policy’, May pp. 27. Wilson, R. (1968) On the theory of syndicates. Econometrico, 36. 119-132. Wong A. (2016). The Untold Story Behind Saudi Arabia’s 41-Year U.S. Debt Secret. [online] Available at: https://www.bloomberg.com/news/features/2016-05-30/the-untold-story-behind-saudi-arabia-s-41-year-u-s-debt-secret​ [Accessed 14.05.2019]. Wirdum V. A. (2017). A Bitcoin Beginner’s Guide to Surviving a Coin-Split. [online] Available at: https://Bitcoinmagazine.com/articles/beginners-guide-surviving-coin-split/​ [Accessed 12.03.2019]. Zcash (2019) Zcash is a privacy-protecting, digital currency built on strong science. [online] Available at: h​ ttps://z.cash​ [read 09.06.2019] Zheng, Zibin, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. (2017). "An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends.” In IEEE International Congress on Big Data (BigData Congress), 557–64. Honolulu, HI, USA: IEEE. https://doi.org/10.1109/BigDataCongress.2017.85​. 72