A review of the ecosystem concept—Towards coherent ecosystem design

M Tsujimoto, Y Kajikawa, J Tomita… - … forecasting and social …, 2018 - Elsevier
The ecosystem concept is of increasing significance in the field of the management of
technology and innovation. This paper provides an overview of 90 previous studies using …

Cyber-dependent crimes: An interdisciplinary review

D Maimon, ER Louderback - Annual Review of Criminology, 2019 - annualreviews.org
Online crime has increased in severity and frequency over the past two decades. However,
although several scientific disciplines have commonly employed criminological theories to …

Combating advanced persistent threats: From network event correlation to incident detection

I Friedberg, F Skopik, G Settanni, R Fiedler - Computers & Security, 2015 - Elsevier
An advanced persistent threat (also known as APT) is a deliberately slow-moving
cyberattack that is applied to quietly compromise interconnected information systems without …

Strategy and organisational cybersecurity: a knowledge-problem perspective

MP Sallos, A Garcia-Perez, D Bedford… - Journal of Intellectual …, 2019 - emerald.com
Purpose The purpose of this paper is to frame organisational cybersecurity through a
strategic lens, as a function of an interplay of pragmatism, inference, holism and adaptation …

Value capture in business ecosystems for municipal solid waste management: Comparison between two local environments

T Peltola, L Aarikka-Stenroos, E Viana… - Journal of cleaner …, 2016 - Elsevier
The increasing amount of global waste reflects the social, environmental, and economic
trajectories of the local environment. This study addresses this multifaceted problem that …

Online black-markets: An investigation of a digital infrastructure in the dark

P Spagnoletti, F Ceci, B Bygstad - Information Systems Frontiers, 2022 - Springer
This paper investigates the functioning of Online Black-Markets (OBMs), ie a digital
infrastructure operating in the Dark Net that enables the exchange of illegal goods such as …

Historical evolutions of cybercrime: From computer crime to cybercrime

KS Choi, CS Lee, ER Louderback - The Palgrave handbook of …, 2020 - Springer
This chapter aims to examine cybercrime viz-à-viz technological developments by
identifying key research studies in the field and crime resulting from technological changes …

Understanding pet scams: A case study of advance fee and non-delivery fraud using victims' accounts

JM Whittaker, M Button - Australian & New Zealand Journal …, 2020 - journals.sagepub.com
Advance fee and non-delivery frauds have become very common with the growing
preference for online shopping and the new opportunities this brings for online offenders …

Economic geographies of the illegal: the multiscalar production of cybercrime

T Hall, B Sanders, M Bah, O King, E Wigley - Trends in Organized Crime, 2021 - Springer
Economic geographers have traditionally been reluctant to extend their analysis to illicit and
illegal markets despite their being significant in their global economic extent and displaying …

[图书][B] The internet as second action space

A Kellerman - 2014 - taylorfrancis.com
One of the most significant and important advancements in information and communication
technology over the past 20 years is the introduction and expansion of the Internet. Now …