<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Mitigating the Risks of Whistleblowing An Approach Using Distributed System Technologies</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ali Habbabeh</string-name>
          <email>ali.habbabeh@fhnw.ch</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Petra Maria Asprion</string-name>
          <email>petra.asprion@fhnw.ch</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bettina Schneider</string-name>
          <email>bettina.schneider@fhnw.ch</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Applied Sciences Northwestern Switzerland</institution>
          ,
          <addr-line>Basel</addr-line>
          ,
          <country country="CH">Switzerland</country>
        </aff>
      </contrib-group>
      <fpage>47</fpage>
      <lpage>58</lpage>
      <abstract>
        <p>Whistleblowing is an effective tool to fight corruption and expose wrongdoing in governments and corporations. Insiders who are willing to report misconduct, called whistleblowers, often seek to reach a recipient who can disseminate the relevant information to the public. However, whistleblowers often face many challenges to protect themselves from retaliation when using the existing (centralized) whistleblowing platforms. This study discusses several associated risks of whistleblowing when communicating with third parties using webforms of newspapers, trusted organizations like WikiLeaks, or whistleblowing software like GlobaLeaks or SecureDrop. Then, this study proposes an outlook to a solution using decentralized systems to mitigate these risks using Blockchain, Smart Contracts, Distributed File Synchronization and Sharing (DFSS), and Distributed Domain Name Systems (DDNS).</p>
      </abstract>
      <kwd-group>
        <kwd>Whistleblowing</kwd>
        <kwd>Blockchain</kwd>
        <kwd>Smart Contracts</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>By all indications, the topic of whistleblowing has been gaining extensive media
attention since the financial crisis in 2008, which ignited a crackdown on the corruption of
institutions [1]. However, some whistleblowers have also become discouraged by the
negative association with the term [2], although numerous studies show that
whistleblowers have often revealed misconduct of public interest [3]. Therefore, researchers
like [3] argue that we - the community of citizens - must protect whistleblowers.
Additionally, some researchers, such as [1], claim that, although not perfect, we should
reward whistleblowers financially to incentivize them to speak out to fight corruption [1].
Despite that, many European countries, for example Germany or Switzerland, do not
offer monetary rewards or even sufficient protection for whistleblowers. Recently, the
Swiss parliament rejected a bill, for the second time, to provide whistleblowers with
protection, which many Swiss whistleblowers were longing for, especially after some
lost their jobs and others were sentenced to prison [4].</p>
      <p>As a baseline, this study investigates the existing (online) whistleblowing platforms.
In particular, it analyzes their security risks on whistleblowers’ anonymity. As main
contribution, this study suggests improvements that tackle the challenge of protecting
the identity of whistleblowers and rewarding them at the same time while being
anonymous. To achieve the goal of protecting and rewarding whistleblowers without
revealing their identity, newer distributed systems technologies such as Blockchain, Smart
Contracts, Distributed File Synchronization and Sharing (DFSS), and Distributed
Domain Name Systems (DDNS) are investigated.</p>
      <p>As methodological framework, the Design Science Research (DSR) approach by [5]
was followed. Widely applied in Information Systems research, DSR aims at generating
an artifact to accomplish the goal of solving a problem efficiently and effectively [6].
The framework ensures a strong relationship between the research work, the
environment and the knowledge base. To gather and investigate the existing knowledge, a
literature review on whistleblowing was conducted applying the criteria suggested by [6].
First, keywords such as ‘risks of whistleblowing’, ‘problems of whistleblowing’, or
‘safe whistleblowing’ were used. In a second step, further keywords e.g.,
‘whistleblowing technologies’, ‘platforms for whistleblowing’, or ‘whistleblowing’ combined with
‘newspapers’ enabled identification of existing platforms. Academic literature
(peerreviewed journals, books) were in focus, enriched by grey literature.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Whistleblowing</title>
      <p>Whistleblowing is an action of a former or current member/group of members of an
organization who discloses information concerning illegal or immoral conduct of its
employers to other entities that are able to act on this information [7]. Although widely
accepted and cited in many papers, some academics regard this definition to be
problematic, as it takes into account both internal and external disclosure of information of
being a whistleblowing activity [8]. For instance, [9] considers an information leak as
whistleblowing only when it is leaked to external parties, such as the media or
government officials [9]. By contrast, [7] argue that internal whistleblowing could be a good
measure to correct the wrongdoing within an organization and leading to upper
management dealing with the illegal/immoral activity without disclosing this to the public.
This study considers whistleblowing to consist of five technically essential steps
referred to as ‘whistleblowing process’ [8-10]:</p>
      <p>I. A whistleblower reports misconduct anonymously.</p>
      <p>II. Then, a medium of whistleblowing receives the report.</p>
      <p>III. Later an interested party receives the report.</p>
      <p>IV. Afterward, a channel of communication between the whistleblower
and the interested party is facilitated.</p>
      <p>V. Finally, a payment service for the whistleblower is enabled while the
whistleblower still being anonymous.
2.1</p>
      <sec id="sec-2-1">
        <title>Existing Whistleblowing Platforms</title>
        <p>In this section, we review the existing most widely known whistleblowing platforms.
Even though hotlines, case management software, and emails can be used as solutions,
we will only consider platforms that (try to) preserve, the whistleblower’s privacy from
a technical perspective. For that reason, we look at:
1) Client/Server web forms. Use case: Local newspapers in Switzerland.
2) Well-known whistleblowing organizations. Use case: WikiLeaks.
3) Whistleblowing open-source software. Use cases: SecureDrop and GlobaLeaks.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Use Case 1: Whistleblowing through Web Forms</title>
        <p>One way to ‘blow the whistle’ is to contact a journalist of a local newspaper and
communicate information about the witnessed wrongdoing. Some newspapers, depending
on the budget and interest, offer a website ‘as a service’ for whistleblowers to contact
them while others do not. Many Swiss local newspapers rely on contact forms to receive
tips and offer no clear way to communicate with them other than that. For example, in
Switzerland, eleven local newspapers were examined or contacted to investigate their
whistleblowing tips-receiving process (see Table 1). None of the investigated
newspapers had a sufficiently secure method. Instead, newspapers offer a web form − usually
a named contact form − that can be used for any communication purpose.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Whistleblowing Method</title>
      <p>Community: https://www.20min.ch/community/leser_reporter/
People can upload photos or videos with a limited short message
No method was found.
contact form: https://abo.tagesanzeiger.ch/tamstorefront/contact
contacts found: https://www.watson.ch/u/impressum
contacts found:
https://www.lematin.ch/services/divers/Impressum/story/24227737
contact form: https://abo.bazonline.ch/tamstorefront/contact
contact form: https://www.letemps.ch/contact
contact form: https://www.swissinfo.ch/contact/ger/42718408
contact form: https://abo.bernerzeitung.ch/tamstorefront/contact
2.3</p>
      <sec id="sec-3-1">
        <title>Use Case 2: Whistleblowing Organizations: WikiLeaks</title>
        <p>
          WikiLeaks is an international non-profit organization publishing classified
documents provided by whistleblowers to their platform [10]. WikiLe
          <xref ref-type="bibr" rid="ref24">aks was founded in
2006</xref>
          and caught the attention the next year when it released the manuals of
Guantanamo’s corrections officers’ manuals. Although WikiLeaks started as an international
organization that collaborated with whistleblowers worldwide, over time it shifted its
focus to the United States only [11].
2.4
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Use Case 3: Whistleblowing Software: SecureDrop and GlobaLeaks</title>
        <p>Currently, two well-known open-source software projects to support whistleblowing
exist: GlobaLeaks [12] and SecureDrop [13]. SecureDrop is an application
organizations can choose and install to receive documents from anonymous sources over the
internet [14]. SecureDrop’s development started in 2013 under the name DeadDrop in
the period when WikiLeaks file submission software was down [14]. It was later
renamed to SecureDrop after the ‘Freedom of the Press Foundation’ took over the
management [15]. Unlike SecureDrop, GlobaLeaks enables non-tech-savvies to set up a
secure whistleblowing system, which is considered by some researchers to be more
user-friendly compared to SecureDrop and simpler in terms of architecture (e.g., [16]).
GlobaLeaks has many instances that operate separately. Thus, it is not centralized in
the sense that every node has its own documents, and taking down one node does not
affect the others [17].
3</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Risks of Whistleblowing</title>
      <p>This section discusses the risks whistleblowers face when leaking information via
existing whistleblowing platforms. The risks were identified by means of a systematic
literature review described in section 1. Collected results were evaluated as
recommended by [6], and lead to a categorization summarized in Table 2.</p>
    </sec>
    <sec id="sec-5">
      <title>Risk</title>
      <p>R1: Anonymity of</p>
      <p>Whistleblowers
R2: Integrity of</p>
      <p>Information
R3: Confidentiality
of Disclosures
R4: Availability
of Service
Other Risks:</p>
    </sec>
    <sec id="sec-6">
      <title>Description</title>
      <p>Whistleblowers’ identity can be revealed through several methods,
which can lead to retaliation against them.</p>
      <p>Disclosures of whistleblowers can be altered, which can lead to
false information being published.</p>
      <p>Hackers can eavesdrop on the communication between
whistleblowers and receivers like journalists.</p>
      <p>A platform can be out of service due to a DDoS attack on its
servers, which prevents whistleblowers from using it.</p>
      <p>Usability, the authenticity of the information, plausible deniability
of whistleblowers.
3.1</p>
      <sec id="sec-6-1">
        <title>R1: Anonymity of Whistleblowers</title>
        <p>Anonymity is defined as an assurance that a subject’s identity cannot be inferred
from exposed data [18]. Even though there exist cases, where whistleblowers open up
to the public, revealing identity is generally not desirable. Stiff reprisal and retaliation
from the accused wrongdoers could be the consequences making anonymity a vital
requirement.</p>
      </sec>
      <sec id="sec-6-2">
        <title>Anonymity when using web forms: Newspapers</title>
        <p>As described in section 2.2, most investigated newspapers offer email channel,
submission forms, or similar web services for whistleblowers to contact them. Most of
these online services are part of a client/server architecture entailing several anonymity
risks. Examples are WebRTC (IP) leak, DNS leak [19], unauthorized eavesdropping
[20], or IP spoofing [21]. The nature of these risks is discussed extensively in the
literature (e.g., [22]). Another aspect is revealing the communication between
whistleblowers and the journalist from the intended newspaper. If this communication takes place
using an email service, the security of this communication depends on the safety of the
email server. According to an interview with an investigative journalist, most
journalists use mobile applications such as Signal or WhatsApp to communicate with
whistleblowers. These apps incorporate end-to-end encryption but require the whistleblower’s
phone number, which could lead to subject identification [23].</p>
      </sec>
      <sec id="sec-6-3">
        <title>Anonymity in whistleblowing organizations: WikiLeaks</title>
        <p>WikiLeaks offers an onion address to its users and accepts leaks only through their
onion address, which means users are forced to use a so-called Tor browser [24]. The
problem of onion addresses is that they are not readable by humans. Consequently,
users usually access wikileaks.org to get a copy of the onion address. This step presents
them with the risk of being identified in case anonymization measures such as Tor are
not used. WikiLeaks does not encrypt the files whistleblowers submit on the client-side,
but claims the data encryption to happen on server-side. Yet since the WikiLeaks
platform is not open-source, it is not possible to confirm the encryption. A malicious
observer out of the whistleblower network, the service provider, could potentially
eavesdrop on the whistleblower and access the data before it reaches the server
(eavesdropping attack) [25]. Moreover, whistleblowers must trust the WikiLeaks server admins to
handle their files with specific care to ensure the anonymity of their identity. This means
some sort of a trust level is required in the WikiLeaks setup.</p>
      </sec>
      <sec id="sec-6-4">
        <title>The anonymity of Whistleblowing software: SecureDrop &amp; GlobaLeaks</title>
        <p>Both solutions offer server-side encryption only, which protects the data from a
potential breach but not from a possible malicious system administrator [26], [27].
SecureDrop can be considered to offer superior anonymity due to its secure methods in
handling whistleblowing cases, in which journalists are required to decrypt files using
a machine that is not connected to the internet [14].
3.2</p>
      </sec>
      <sec id="sec-6-5">
        <title>R2: Integrity of Information</title>
        <p>Information integrity is the assurance that information has not been altered
throughout its whole lifecycle by an unauthorized party [28]. In a whistleblowing context, this
means that the disclosures of whistleblowers do not get modified without their
knowledge and acceptance [23]. Integrity can be compromised by attacks such as
Salami, Data diddling, Man-in-the-middle, or Session hijacking attacks [29].</p>
      </sec>
      <sec id="sec-6-6">
        <title>Integrity when using web forms: Newspapers</title>
        <p>In the surveyed newspapers (see Table 1), usage of HyperText Transfer Protocol
Secure (HTTPs) − an extension and more secure version of the older HyperText
Transfer Protocol (HTTP) − was observed to be the common case [30]. This way, in theory,
the information whistleblowers provide by submitting online forms can be preserved
and stored unaltered, assuming none of the previously mentioned attacks are executed.</p>
      </sec>
      <sec id="sec-6-7">
        <title>Integrity in whistleblowing organizations: WikiLeaks</title>
        <p>WikiLeaks employs Tor for its submission form. According to [31], the file-upload
system applied by WikiLeaks protects the submission of whistleblowers from any
network eavesdropping [31]. However, [32] argues that there is no way for readers to
assure that the materials released by WikiLeaks are unaltered. According to [32], readers
could nevertheless trust the platform. This claim is based on actions taken by WikiLeaks
in the past when they refused to delete sensitive data of whistleblowers’ disclosures.</p>
      </sec>
      <sec id="sec-6-8">
        <title>Integrity of whistleblowing software: SecureDrop &amp; GlobaLeaks</title>
        <p>Similar to WikiLeaks, both software employ Tor and HTTPs to receive disclosures
from whistleblowers [33]. Nevertheless, according to SecureDrop’s documentation
[33], assumptions are made to guarantee safety. As an example it is stated: “The admin
and the journalist act reasonably and in good faith.” [33]. This claim is hard to ensure.
3.3</p>
      </sec>
      <sec id="sec-6-9">
        <title>R3: Confidentiality of Disclosures</title>
        <p>Confidentiality in a data context is an attribute that means information must not be
made available or disclosed to unauthorized or unintentional parties in a readable
format [34]. According to [35], if information confidentiality concerns are low, this
information is considered public or unthreatening if revealed beyond the intended audience.
Regarding whistleblowing, the disclosures, and the communication messages between
whistleblowers and third parties, i.e., the potential publishers, must be confidential in
order to avoid exposure of identity information.</p>
      </sec>
      <sec id="sec-6-10">
        <title>Confidentiality when using web forms: Newspapers</title>
        <p>When whistleblowers submit documents to a newspaper using a web form, the
confidentiality property can be violated in case the system admin, as an example, reads the
content of the submission. Even though it is safe to assume that whistleblowers are
aiming at making their information public, and therefore do not have confidentiality
requirements for their submission [23], some disclosures require a specific publisher to
gain access to the information first. However, if a web form is used to transmit the leak,
confidentiality could be jeopardized in case of successful attacks, such as the
Man-inthe-middle, packet sniffing, or password attack [36].</p>
      </sec>
      <sec id="sec-6-11">
        <title>Confidentiality in whistleblowing organizations: WikiLeaks</title>
        <p>Whistleblowers submitting disclosures to WikiLeaks have to expect that all of their
journalists get access to the transmitted data [37]. A whistleblower cannot declare to
which employee of WikiLeaks the case is assigned. Consequently, it is assumed that
whistleblowers are indifferent to whom handles that case inside WikiLeaks organization
since they technically lose ownership of the case when they hand it in. Therefore, the
confidentiality property is solely dependent on the reliability of the submission system
that WikiLeaks offer.</p>
      </sec>
      <sec id="sec-6-12">
        <title>The Confidentiality of Whistleblowing software: SecureDrop &amp; GlobaLeaks</title>
        <p>As a means to ensure confidentiality, SecureDrop recommends, but not enforces, the
Tails operation system for any hardware journalists use to connect to the SecureDrop
server [33]. The Airgrapped Area by contrast applies the use of Tails to secure the
decryption process of submissions that were encrypted on the server-side. Moreover,
whistleblowers can communicate with the recipients using the same protocol [33].
Thus, it can be considered that SecureDrop guarantees that the transmitted data, both
submissions, and communications, are only read by the party with which the
whistleblower intended to communicate. The backend solution of GlobaLeaks enables the
whistleblowers to communicate with the recipients of their submission using
comments, which are visible to all parties in that context, i.e., both the whistleblower and
the recipients [38]. The interaction and communication of the whistleblowers can take
place anonymously thanks to the Tor service that GlobaLeaks employs.
3.4</p>
      </sec>
      <sec id="sec-6-13">
        <title>R4: Availability of Service</title>
        <p>Availability is “the degree to which a system, subsystem or equipment is in a
specified operable and committable state at the start of a mission when the mission is called
for a random time” [39]. In other words, unavailability is the probability of the inability
of a user to access specific data or resources. Since whistleblowing can be
time-sensitive, platforms must be available at any time.</p>
      </sec>
      <sec id="sec-6-14">
        <title>Availability when using web forms: use case Newspapers</title>
        <p>The availability of a webform is connected to the availability of the underlying
infrastructure. One of the most well-known attacks on the availability of a website is a
Denial-of-Service (DoS) or the more threatening version of it, the Distributed DoS
attack (DDoS) [40]. In general, large, well-known newspapers utilizing client/server
architecture might be appealing targets for attackers.</p>
      </sec>
      <sec id="sec-6-15">
        <title>Availability in whistleblowing organizations: WikiLeaks</title>
        <p>
          WikiLeaks has a long history of DDos attacks. The first documented attack wa
          <xref ref-type="bibr" rid="ref21">s in
November 2010</xref>
          [41], followed by another one in De
          <xref ref-type="bibr" rid="ref47">cember 2010</xref>
          when Anonymous
hacktivists attacked WikiLeaks using a DDos attack [42]. Lat
          <xref ref-type="bibr" rid="ref50">er in 2012</xref>
          , WikiLeaks
suffered from multiple DDos attacks that lasted at some point up to four days [43].
        </p>
      </sec>
      <sec id="sec-6-16">
        <title>The Availability of Whistleblowing software: SecureDrop &amp; GlobaLeaks</title>
        <p>In their documentation, GlobaLeaks states that the software has resiliency to avoid
application and database DoS [26]. GlobaLeaks achieves that by putting limits on the
automation of operation and enforcing human interaction [26]. However, some of these
measures are browser-based, which means that browser-independent attacks can still
compromise availability. For example, in their audit security audit, [44] found that
uploading a large file is prevented only from the browser side, and no mechanisms were
found to stop attacks that are browser-independent. In the most recent security impact
assessment of SecureDrop conducted by a third party, no significant threats were found
regarding availability [45]. However, SecureDrop states that an attacker could
generally compromise the availability of a server by uploading a large number of documents
using different identities [33].
4</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Potential Mitigation Solution</title>
      <p>One potential improvement to the existing whistleblowing platforms would be
integrating distributed systems technologies such as Blockchain and Smart Contracts. Their
specific characteristics can help to overcome the risks of whistleblowing mentioned in
Table 2. For example, Blockchain offers an immutable decentralized ledger stored on
several nodes [46]. This can be utilized to prevent government censorship. The
decentralized architecture allows for eliminating the need for a governing third party, which
implies an unbiased administration of the software running on top of a Blockchain [47].
Moreover, due to its distributed architecture, Blockchain technology can prevent DDos
attacks [48]. In addition, Blockchain addresses are pseudonymous, which means that
users’ accounts are not linked to their personally identifying information by nature [49].
The pseudonymous addresses can be employed to provide whistleblowers with the
required privacy. To enable users to interact with the Blockchain, Smart Contracts are to
be deployed to facilitate the communication and transactions between whistleblowers
and other parties like journalists. The code of Smart Contracts in Ethereum is public by
nature and, depending on its purpose, can facilitate buying and selling activities using
cryptocurrencies, which are digital currencies that use encryption to regulate fund
transactions [50]. Cryptocurrencies can be employed to enable rewarding whistleblowers
without revealing their identities.</p>
      <p>Front End</p>
      <p>Whistled
Encrypted Communication</p>
      <p>Blockchain domain
User</p>
      <p>Browser</p>
      <p>Public blockchain
Smart Smart Smart
contract contract contract</p>
      <p>Figure 1 illustrates a high-level decentralized landscape of our suggested solution
named Whistled. To enable whistleblowers to interact with Smart Contracts familiarly,
a frontend and website are needed. A domain is necessary to host this website.
However, accessing the frontend using a traditional domain name bought from a domain
provider can compromise the decentralization of the whistleblowing platform. This is
a risk since a domain provider can take down any domain when requested by an
authority [51]. Therefore, a decentralized domain name, also known as a Blockchain
domain, is recommended to control the frontend of the Whistled platform. The content of
a Blockchain domain resides on a decentralized file system known as IPFS, which is a
DFSS. IPFS is a peer-to-peer network that offers redundancy and, just like Blockchain,
is decentralized [52]. Thus, the content that whistleblowers provide, and the content of
the frontend of the platform will be stored on IPFS to prevent censorship and improve
the continuity factor of the platform. Although leaks are published, the files submitted
by whistleblowers will be encrypted, making them unreadable for unauthorized parties.
5</p>
    </sec>
    <sec id="sec-8">
      <title>Conclusion</title>
      <p>This study has investigated improving the whistleblowing process by employing a
combination of distributed system technologies. Multiple risks of whistleblowing
platforms − WikiLeaks, SecureDrop, GlobaLeaks − and of newspapers’ whistleblowing
offerings were identified and analyzed. These risks include compromising the
anonymity of whistleblowers and, in the least, the integrity, confidentiality, availability of
information provided. To mitigate these risks, a decentralized platform has been
suggested, in which Smart Contracts, Blockchain domains, and file sharing and
synchronization play a role to prevent censorship, increase privacy, and guarantee continuity.</p>
      <p>To realize the prototype based on Blockchain technology and Smart Contracts, a
detailed architecture must be created based on technology selections, where the
prototype elements are divided into business logic and frontend realization. Blockchain
wallets can be used as a zero-knowledge identification tool to anonymize whistleblowers
and transfer tokens between them and third parties. In addition, Smart Contracts can
enable the implementation of the derived use cases such as submitting, viewing,
receiving of whistleblowers’ cases, and rewarding whistleblowers by transferring tokens to
them when needed.
[14]
[15]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>B.</given-names>
            <surname>McLannahan</surname>
          </string-name>
          , “
          <article-title>Best way to encourage whistleblowers? Reward them | Financial Times</article-title>
          ,”
          <year>2019</year>
          . https://www.ft.com/content/cac4c994-3f24
          <string-name>
            <surname>-</surname>
          </string-name>
          11e9
          <string-name>
            <surname>-</surname>
          </string-name>
          9bee
          <article-title>-efab61506f44 (accessed Sep</article-title>
          .
          <volume>05</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>T.</given-names>
            <surname>Miethe</surname>
          </string-name>
          , Whistleblowing at work:
          <article-title>Tough choices in exposing fraud, waste, and abuse on the job</article-title>
          .
          <source>Routledge</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>W.</given-names>
            <surname>Vandekerckhove</surname>
          </string-name>
          ,
          <article-title>Whistleblowing and organizational social responsibility: A global assessment</article-title>
          .
          <source>Routledge</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>SDA</surname>
          </string-name>
          , “
          <article-title>Parlament lässt Whistleblower im Ungewissen</article-title>
          ,”
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [16] [21] https://www.nau.ch/politik/bundeshaus/parlament-lasst
          <article-title>-whistleblower-im-ungewissen65673189?fbclid=IwAR0OGgrVTiI4-wmhbDpZ0t2- AWJE87uM4jbgjf8b9h5800GAM3WUOxfg4f0 (accessed Sep</article-title>
          .
          <volume>03</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Hevner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. T.</given-names>
            <surname>March</surname>
          </string-name>
          , J. Park, and S. Ram, “
          <source>Design Science in Information Systems Research,” Des. Sci. IS Res. MIS Q.</source>
          , vol.
          <volume>28</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>105</lpage>
          ,
          <year>2004</year>
          , Accessed: May 15,
          <year>2018</year>
          . [Online]. Available: https://pdfs.semanticscholar.org/fa72/91f2073cb6fdbdd7c2213bf6d776d0ab411c.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Saunders</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Lewis</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Thornhill</surname>
          </string-name>
          ,
          <source>Research Methods for Business Students- 7th Edition</source>
          .
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Near</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Miceli</surname>
          </string-name>
          , “
          <article-title>Organizational Dissidence: The Case of WhistleBlowing*</article-title>
          ,”
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Ethics</surname>
          </string-name>
          , no.
          <issue>4</issue>
          ,
          <issue>1999</issue>
          , Accessed: Oct.
          <volume>26</volume>
          ,
          <year>2019</year>
          . [Online]. Available: https://link.springer.com/content/pdf/10.1023%2FA%
          <fpage>3A1006028417000</fpage>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Manag. Rev.</surname>
          </string-name>
          , vol.
          <volume>7</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>403</fpage>
          -
          <lpage>412</lpage>
          ,
          <year>1982</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>WikiLeaks</surname>
          </string-name>
          , “WikiLeaks: What is WikiLeaks,
          <source>” 03 November</source>
          <year>2015</year>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          https://wikileaks.org/What-is-WikiLeaks.
          <source>html (accessed Aug</source>
          .
          <volume>30</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>T. E.</given-names>
            <surname>Times</surname>
          </string-name>
          , “
          <article-title>Controversy strikes - Five things to know about WikiLeaks</article-title>
          ,”
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          https://economictimes.indiatimes.com/news/international/world-news/
          <article-title>five-things-toknow-about-wikileaks/controversy-strikes/slideshow/68832511.cms (accessed Nov.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>GlobaLeaks</surname>
          </string-name>
          , “
          <article-title>GlobaLeaks | The OpenSource Whistleblowing Software</article-title>
          .” https://www.globaleaks.org/ (accessed Apr.
          <volume>04</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>SecureDrop</surname>
          </string-name>
          , “
          <article-title>Share and accept documents securely - SecureDrop</article-title>
          .” https://securedrop.org/ (accessed Sep.
          <volume>04</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Berret</surname>
          </string-name>
          , “Guide to SecureDrop,”
          <year>2016</year>
          , doi: 10.7916/D84178B2.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Ssteele</surname>
          </string-name>
          , “Tor At The Heart: SecureDrop,”
          <year>2016</year>
          . https://blog.torproject.org/tor-heartsecuredrop
          <source>(accessed Apr</source>
          .
          <volume>04</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>I.</given-names>
            <surname>Zakia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Fatahillah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. R.</given-names>
            <surname>Syambas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Setiawati</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Mubarok</surname>
          </string-name>
          , “
          <article-title>Aspiration and complaint system: From literature survey to implementation</article-title>
          ,”
          <source>in 2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Thiel</surname>
          </string-name>
          , JULIAN ASSANGE 
          <article-title>: founder of wikileaks</article-title>
          .
          <source>[Place of publication not identified]: CAVENDISH SQUARE</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Motahari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. G.</given-names>
            <surname>Ziavras</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Jones</surname>
          </string-name>
          , “
          <article-title>Online anonymity protection in computermediated communication</article-title>
          ,
          <source>” IEEE Trans. Inf</source>
          . Forensics Secur., vol.
          <volume>5</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>570</fpage>
          -
          <lpage>580</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Hochstadt</surname>
          </string-name>
          , “
          <article-title>What's the difference between a MAC address and</article-title>
          IP address?,”
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>G. S.</given-names>
            <surname>Miliefsky</surname>
          </string-name>
          , “
          <article-title>System and method for detecting, alerting and blocking data leakage, eavesdropping and spyware</article-title>
          .” Google Patents, May
          <volume>22</volume>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Yaar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Perrig</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Song</surname>
          </string-name>
          , “StackPi:
          <article-title>New packet marking and filtering mechanisms for DDoS and IP spoofing defense</article-title>
          ,
          <source>” IEEE J. Sel. Areas Commun.</source>
          , vol.
          <volume>24</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>1853</fpage>
          -
          <lpage>1863</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <given-names>N.</given-names>
            <surname>Ketcha</surname>
          </string-name>
          , “Financial Institution Letters Risks Involving Client/Server Computer Systems,”
          <year>2011</year>
          . Accessed: Apr.
          <volume>18</volume>
          ,
          <year>2020</year>
          . [Online]. Available: https://ithandbook.ffiec.gov/media/resources/3406/fdi-fil-
          <volume>82</volume>
          -96- risks_involv_client_server_comp_sys.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Hassan</surname>
          </string-name>
          , “
          <article-title>Personal Interview with an Investigative Journalist M. Hassan</article-title>
          ,”
          <year>2020</year>
          , [Online]. Available: https://arij18.arij.net/speakers/majdolin-hasan/.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <surname>WikiLeaks</surname>
          </string-name>
          , “WikiLeaks.” https://wikileaks.org/ (accessed Mar.
          <volume>26</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <surname>S. K. Das</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Kant</surname>
            , and
            <given-names>N. Zhang,</given-names>
          </string-name>
          <article-title>Handbook on securing cyber-physical critical infrastructure</article-title>
          .
          <source>Elsevier</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <surname>GlobaLeaks</surname>
          </string-name>
          , “
          <article-title>Application security - GlobaLeaks 4 documentation</article-title>
          ,”
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          https://docs.globaleaks.org/en/devel/security/ApplicationSecurity.html?highlight=DOS #
          <article-title>dos-resiliency-approach (accessed May 09,</article-title>
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Jain</surname>
          </string-name>
          , “
          <article-title>Strategy to avoid data integrity issues in pharmaceutical industry,” Pharma Innov</article-title>
          ., vol.
          <volume>6</volume>
          , no.
          <issue>2</issue>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>B</given-names>
          </string-name>
          , p.
          <fpage>110</fpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <string-name>
            <surname>M. S. Hossain</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Paul</surname>
            ,
            <given-names>M. H.</given-names>
          </string-name>
          <string-name>
            <surname>Islam</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Atiquzzaman</surname>
          </string-name>
          , “
          <article-title>Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks</article-title>
          .,
          <source>” Netw. Protoc. Algorithms</source>
          , vol.
          <volume>10</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>83</fpage>
          -
          <lpage>108</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Felt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Barnes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>King</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Palmer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Bentzel</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Tabriz</surname>
          </string-name>
          , “
          <article-title>Measuring {HTTPS} Adoption on the Web,” in 26th {USENIX} Security Symposium ({</article-title>
          <source>USENIX} Security 17)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>1323</fpage>
          -
          <lpage>1338</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Greenberg</surname>
          </string-name>
          , “
          <article-title>WikiLeaks Finally Brings Back Its Submission System for Your Secrets</article-title>
          | WIRED,”
          <year>2015</year>
          . https://www.wired.com/
          <year>2015</year>
          /05/wikileaks-finally
          <article-title>-brings-backsubmission-system-secrets/ (accessed Sep</article-title>
          .
          <volume>01</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Holland</surname>
          </string-name>
          , “What is WikiLeaks? - CNET,”
          <year>2017</year>
          . https://www.cnet.com/how-to/whatis-wikileaks/ (accessed Sep.
          <volume>20</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <string-name>
            <surname>SecureDrop</surname>
          </string-name>
          , “Overview - SecureDrop 1.2.2 documentation,”
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          https://docs.securedrop.org/en/latest/overview.html
          <source>(accessed Apr</source>
          .
          <volume>04</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Franzoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cárdenas</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Almazan</surname>
          </string-name>
          , “
          <article-title>Using Blockchain to Store Teachers' Certification in Basic Education in Mexico</article-title>
          ,” in
          <source>2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)</source>
          ,
          <year>2019</year>
          , vol.
          <volume>2161</volume>
          , pp.
          <fpage>217</fpage>
          -
          <lpage>218</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          University of Deleware, “
          <article-title>Managing data confidentiality</article-title>
          ,”
          <string-name>
            <surname>Secure</surname>
            <given-names>UD</given-names>
          </string-name>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          https://www1.udel.edu/security/data/confidentiality.html (accessed
          <year>Apr</year>
          .
          <volume>29</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          19, no.
          <issue>4</issue>
          , pp.
          <fpage>439</fpage>
          -
          <lpage>444</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <string-name>
            <surname>WikiLeaks</surname>
          </string-name>
          , “
          <article-title>how to send your submission to Wikileaks</article-title>
          .” https://warlogs.wikileaks.org/media/submissions.html (accessed
          <year>Sep</year>
          .
          <volume>02</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          <string-name>
            <surname>GlobaLeaks</surname>
          </string-name>
          , “Architecture · globaleaks/GlobaLeaks Wiki,”
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          https://github.com/globaleaks/GlobaLeaks/wiki/Architecture (accessed May 02,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Rajesh</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Chandrasekar</surname>
          </string-name>
          , “
          <article-title>Esteemed software patterns for banking system</article-title>
          ,
          <source>” Cluster Comput.</source>
          , vol.
          <volume>22</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>11087</fpage>
          -
          <lpage>11099</lpage>
          ,
          <year>2019</year>
          , [Online]. Available: https://link.springer.com/article/10.1007/s10586-017-1304-7.
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Douligeris</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Mitrokotsa</surname>
          </string-name>
          , “
          <article-title>DDoS attacks and defense mechanisms: classification and state-of-the-</article-title>
          <string-name>
            <surname>art</surname>
          </string-name>
          ,
          <source>” Comput. Networks</source>
          , vol.
          <volume>44</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>643</fpage>
          -
          <lpage>666</lpage>
          , Apr.
          <year>2004</year>
          , doi: 10.1016/J.COMNET.
          <year>2003</year>
          .
          <volume>10</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Arthur</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Halliday</surname>
          </string-name>
          , “
          <article-title>Wikileaks under attack: the definitive timeline</article-title>
          ,” Guard.,
          <year>2010</year>
          , Accessed: May 03,
          <year>2020</year>
          . [Online]. Available: https://www.theguardian.com/media/2010/dec/07/wikileaks-under
          <article-title>-attack-definitivetimeline.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          <string-name>
            <surname>BBC</surname>
          </string-name>
          , “
          <article-title>Anonymous hacktivists say Wikileaks war</article-title>
          to Continue,” http://www.bbc.co.uk/news/technology-11935539,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          https://www.bbc.com/news/technology-11935539
          <source>(accessed May 03</source>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          <string-name>
            <given-names>E.</given-names>
            <surname>Protalinski</surname>
          </string-name>
          , “
          <article-title>Wikileaks has been under DDoS attack for the last five days</article-title>
          | ZDNet,”
          <year>2012</year>
          . https://www.zdnet.com/article/wikileaks-has
          <article-title>-been-under-ddos-attack-for-thelast-five-days/ (accessed Sep</article-title>
          .
          <volume>20</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          <string-name>
            <given-names>N.</given-names>
            <surname>Wilcox</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wilcox-o</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Hopwood</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Bacon</surname>
          </string-name>
          , “Report of Security Audit of Cryptocat,”
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          <string-name>
            <surname>Open Technology</surname>
            <given-names>Fund</given-names>
          </string-name>
          , “
          <article-title>Third party audit of integrated SecureDrop Workstation completed</article-title>
          - SecureDrop,”
          <year>2019</year>
          . https://securedrop.org/news/third-party
          <article-title>-auditintegrated-securedrop-workstation-completed/ (accessed Sep</article-title>
          .
          <volume>09</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Leible</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schlager</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schubotz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Gipp</surname>
          </string-name>
          , “
          <article-title>A Review on Blockchain Technology and Blockchain Projects Fostering Open Science</article-title>
          ,” Frontiers in Blockchain , vol.
          <volume>2</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          p.
          <fpage>16</fpage>
          ,
          <year>2019</year>
          , [Online]. Available: https://www.frontiersin.org/article/10.3389/fbloc.
          <year>2019</year>
          .
          <volume>00016</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          <string-name>
            <given-names>L. W.</given-names>
            <surname>Cong</surname>
          </string-name>
          and
          <string-name>
            <given-names>Z.</given-names>
            <surname>He</surname>
          </string-name>
          , “
          <article-title>Blockchain disruption and smart contracts</article-title>
          ,
          <source>” Rev. Financ. Stud.</source>
          , vol.
          <volume>32</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>1754</fpage>
          -
          <lpage>1797</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Saied</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. E.</given-names>
            <surname>Overill</surname>
          </string-name>
          , and T. Radzik, “
          <article-title>Detection of known and unknown DDoS attacks using Artificial Neural Networks</article-title>
          ,” Neurocomputing, vol.
          <volume>172</volume>
          , pp.
          <fpage>385</fpage>
          -
          <lpage>393</lpage>
          , Jan.
          <year>2016</year>
          , doi: 10.1016/J.NEUCOM.
          <year>2015</year>
          .
          <volume>04</volume>
          .101.
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          <string-name>
            <given-names>T.</given-names>
            <surname>Liu</surname>
          </string-name>
          et al.,
          <article-title>“A New Bitcoin Address Association Method Using a Two-Level Learner Model</article-title>
          ,” in
          <source>International Conference on Algorithms and Architectures for Parallel Processing</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>349</fpage>
          -
          <lpage>364</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          <string-name>
            <surname>Sci.</surname>
          </string-name>
          , vol.
          <volume>12</volume>
          , no.
          <issue>9</issue>
          , pp.
          <fpage>2285</fpage>
          -
          <lpage>2288</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          <string-name>
            <given-names>Unstoppable</given-names>
            <surname>Domains</surname>
          </string-name>
          , “Unstoppable Domains,”
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          https://unstoppabledomains.com/ (accessed Mar.
          <volume>21</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          <string-name>
            <given-names>Protocol</given-names>
            <surname>Labs</surname>
          </string-name>
          , “What is IPFS?
          <string-name>
            <surname>- IPFS Documentation</surname>
          </string-name>
          ,”
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          https://docs.ipfs.io/introduction/overview/ (accessed Mar.
          <volume>15</volume>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>