<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Adversarial Evolution: Competing dynamics and reactive institutional forms in financial services ecosystem</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Paolo Spagnoletti</string-name>
          <email>pspagnoletti@luiss.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Federica Ceci</string-name>
          <email>f.ceci@unich.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrea Salvi</string-name>
          <email>asalvi@luiss.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Business and Management, Luiss University</institution>
          ,
          <addr-line>Rome</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Economics and Management, G. D'Annunzio University</institution>
          ,
          <addr-line>Pescara</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Information Systems, University of Adger</institution>
          ,
          <addr-line>Kristiansand</addr-line>
          ,
          <country country="NO">Norway</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In this paper we conceptually illustrate the adversarial evolution of cybercrime and cybersecurity operations in financial services ecosystem. Building upon the concept of organizational morphing and ecosystem formation, we aim to reconstruct the parallel and conflict-driven evolution of the bright and dark side of financial services. Firstly, we identify five phases from the late 90s to the post-2015 period that show the paired configuration in the morphing of the two opposing sides. Secondly, we propose a conceptual model for digital ecosystems evolution based on the mutual influence of conflicting actors. This paper is a first foundational work towards a broader instantiation of generativity through adversarial evolution of digital ecosystems.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Cybersecurity</kwd>
        <kwd>Cybercrime</kwd>
        <kwd>Ecosystems</kwd>
        <kwd>Financial Services</kwd>
        <kwd>Innovation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Financial cybercrimes seek profit through misappropriation of value in the financial services
ecosystem. Such misappropriation is carried out through the malicious use of digital technologies and
it is substantiated into criminal activities such as ransomware and phishing [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Therefore, malicious
actors master and exploit digital technologies as vectors misappropriation of value. These processes are
continuously evolving and produce new forms of cybercrime at an extremely fast pace. This is the
output of what some authors called outlaw innovation [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. As Huang et al [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] puts it “to combat
cybercrimes in an effective way, we not only need to develop technical solutions to protect against
attacks but also need to understand the structure of the business of underground cybercrime and its
development”.
      </p>
      <p>
        To fully appreciate the complexity of the dark – and criminal – side of financial ecosystems one
should take into account the effects of such activity onto the “bright side” and vis-à-vis the opportunity
it offers. Criminal activities in this domain have proliferated over the last decades, thanks to the
diffusion of online banking and the widespread usage of electronic transfers of financial resources [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
To create a safeguard against these ever-mutating malicious actions, also the bright side have evolved,
adopting a variety of tactics, techniques and procedures, both at operational and strategic level [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        This brief contribution extends the studies over the link between the evolution of cybercrime and
cybersecurity institutions in a digital service ecosystem, i.e., the financial sector. We build upon the
observation that there is a linkage between innovations in the bright and in the dark side [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and we
attempt to show how that produces “conflict-driven” evolution. We show how the reiterated contacts
between the bright and dark side of an ecosystem results in observable changes in technical innovations
and in the evolution of the institutional forms adopted by the actors. We therefore propose the two
adversaries in financial services as drivers of organizational change, being their fate deeply intertwined
and far from being independent from each other. In other words, “belligerents” need to keep a
competitive edge over the adversaries accounting for variation in their counterparts.
      </p>
      <p>
        Building upon the contribution by Rindova and Kotha [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], we conceptualize this reactive and
adaptive behavior as a process of continuous morphing. The determinants of such process are both
systemic conditions and results of events instantiated in the digital ecosystem, where actors operate and
mutate to match the shifting market conditions. That is: (1) bright and dark actors use morphing to keep
a competitive edge in their environment; (2) the effects of their competition for
appropriation/misappropriation of value results in changes in the ecosystem as a whole. As regard to
the first point, we look at the institutional forms in these opposing domains proposing that they can
capture structural changes and responses [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] of bright and dark actors modifying their value
appropriation/misappropriation paths. We rely on an integrated view that suggests how the
aforementioned tension (i.e. the conflicts between dark and bright actors) shapes the continuous
morphing of institutional forms in digital ecosystems [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Having observed that co-evolution, we argue
that Cybercrime and Security Operations (SecOp) are conflicting rather than complementary practices,
both playing a role in digital ecosystems formation and evolution. Thus, the mutual influence of dark
and bright actors shapes organizational morphing in digital ecosystems and a structural morphing of the
same environment whereby they compete. Therefore, we elaborate a two-fold research questions: How
data, technologies and actor configurations co-evolve in digital ecosystem? How Cybercrime and
SecOp influence financial service ecosystem formation?
      </p>
      <p>Firstly, we reconstruct and present the parallel and mutually influenced evolution of the bright and
dark side. We accomplish that focusing on the practices of the two sides to highlight how competing
actors - engaging in the same ecosystem – reactively adapt their value-creation paths taking an
institutional form that aim to counter the practices of the adversaries and “exploit” evolving systemic
features. Secondly, we elaborate a conceptual model to explain how Cybercrime and SecOp drive
evolution and morphing in a digital service ecosystem. Finally, we present a brief illustrative case based
on the financial services ecosystem. The case is built on a five-steps process from the late 90s to the
post-2015 period.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Institutional forms and competition in digital service ecosystem</title>
      <p>
        The digital service ecosystem is intended as the ensemble of “synergies and complementarities
achieved between the activities, resources or outputs of several organizations” [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. A specific form of
digital service ecosystem is represented by the financial service ecosystem, that includes among others:
banks, financial institutions, and LEAs. The financial service ecosystem witness competing activities
and organizing of two counterparts: “bright” actors - in the form of legitimate organizations operating
in the environment – and “dark” actors - broadly defined as outlaw users [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In this context,
cybercriminals and SecOp constitute the “warring parties” of these two organizations. The tension
between the two groups originates in colliding goals of appropriation and misappropriation of value,
taking place in the environment in which they operate. In the security domain, few studies have been
looking at the effect of deterrence generated by legislation and institutions [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Hui et al. (2017)
estimate the effect of the Convention on Cybercrime on cyber-attack suggesting that – despite its merits
– cybercriminals may adapt to these countermeasures and divert their attention to non-enforcing
countries. This portrays dark actors as adaptable entities that can adjust their behaviors not only based
on the feature of their environment, but also reacting to their “foes”.
      </p>
      <p>
        The open-ended nature of digital ecosystem, offers “dark” actors new opportunities to capture value
through deception [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and to allocate their resources more fluidly [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The growth of cyber threats
shows that digital resources can serve as enabling tools for value misappropriation. Again, the process
of misappropriation is hardly static: cybercriminals have been evolving over time at the individual
levels and in their institutional forms. There has been a progressive professionalization of “hackers”
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]: they departed from the original connotation of “modders” or “product hackers” which characterized
the first wave of the phenomenon. Said evolution most likely depended in first place by the
opportunities offered by the environment in which they operated. Yet, it became soon after a by-product
of reactive behavior to opposing actors. In first place, resilience of criminal organizations carries over
from “offline” instances crime [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Secondly, studies on organizational forms of cybercrime – such
as the ones on Online Black Markets (OBMs) – have shown a high level of resilience of these platforms
vis-à-vis the intervention of LEAs [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The dark side is in fact particularly able to adapt and overcome
challenges by re-organizing benefitting from its “less institutionalized” nature. This feature is embodied
by a continuous morphing of institutional forms and organizational arrangements of malicious actors
[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>The literature shows the birth, the evolution and the end of bright and dark actors organising under
different perspectives, but to date few frameworks consider their interplay and the effect on value
creation at ecosystem level. In this paper, we show a five stages model (Figure 1) that depicts the
coevolution of cybercrime and cybersecurity institutions in financial ecosystems. We illustrate the validity
of the model by presenting in the bright side the EU-OF2CEN (European Union Online Fraud Cyber
Center Expert Network) case, a public-private partnership aimed at contrasting financial cybercrime. In
the dark side, on the same timeframe, between 2010 and 2015, we observed the evolution of carding in
Online Blackmarkets (OBMs).</p>
      <p>Monthly 1day f2f
meeting
•IT sec Units
•Bank association</p>
      <p>&lt; 2000
BBS and IRC
•product hackers
•game developers
(modders)</p>
      <p>Mailing list for
anonymous p2p info
sharing
•Bank association
•LEA
•Fraud mgt Units
•IT sec Units</p>
    </sec>
    <sec id="sec-3">
      <title>3. Illustrative case: OF2CEN and OBMs</title>
      <p>
        The EU-OF2CEN – launched in 2013 - is an online platform that collect in real time, through secure
communication channels, reports from banks and police on suspicious transactions that take place on
the Internet, analyze them and share all information with the aim of identifying and blocking illegal
operations. The platform allows the detection and sharing, through a system of "early warning" of
reports related to possible criminal activities in progress. The project was conceived by the Italian
Police, managed by Polizia Postale Department and financed by the European Union. For financial
institutions, the birth of such platform translates into a significant increase in the ability to assess bank
movements and into the subsequent implementation of effective actions to prevent or contain fraud or
money laundering [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. For Law Enforcement Agencies (LEAs), the aggregated analysis of the data
collected can be used in structured investigative activities to enable more prompt attempts to recover
from crime and facilitate the identification of responsible. The objectives of the platform are twofold:
from a strategic viewpoint, the creation of a Public Private Partnership between Europol, LEAs and
banks, favors the increase of common awareness about the modus operandi and criminal trends related
to financial cybercrimes, improving cooperation in the action of prevention and contrast; from an
operational viewpoint, the sharing of relevant data allows to increase the ability to evaluate financial
transactions carried out with the use of electronic tools, at national and international level. This
facilitates concrete and timely actions to prevent and counter the recurrence of financial cybercrime.
Therefore, in the OF2CEN we observe: (i) collaboration between IT security units and fraud
management units; (ii) involvement of LEAs and information sharing between private and public actors;
(iii) more capillary monitoring over transactions with prompter multi agency communications; (iv)
refinement in shared data for anti-fraud.
      </p>
      <p>
        As for the dark side, the timeframe between 2010 and 2015 embodies the raise and growth of OBMs.
These platforms allowed for a series of low-risk, high-profit criminal activities (i.e. carding) that offered
relatively easy value misappropriation paths for cyber-criminals in the financial ecosystem. These
platforms encompass a wide variety of actors including hackers, site administrators, buyers, vendors
and undercover LEA’s agents. One of the main categories of digital goods pertaining the financial
ecosystem listed in OBMs are credit cards details often referred to as “carding”. It represents a major
threat for businesses in all industrial sectors [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. The phenomenon has evolved over time and
OBMs enabled a series of incentives and technical solutions to make these activities low-risk and
highrewarding.
      </p>
      <p>Our analysis of offers published between 2011 and 2016 in the category “digital goods” of major
OBMs, shows that credit card numbers are sold in a variety of ways and with many additional services.
Most vendors offer services to check the validity of the cards and commit to replace them based on the
checker’s result. Other vendors offer packages that guarantee the credit and spending balance. Others
sell credit cards templates and holograms. Half of the offers are related to guides and tutorials explaining
how to steal credit card information and how to use stolen cards minimizing the risk of being detected.
The trade of illegal goods is conducted through anonymous transactions and shipping, guaranteed by
the use of Tor network. The offer includes the display of goods, customer rankings of vendors, payment
system (cryptocurrencies such as Bitcoin), and escrow functions, similar to those available in
conventional e-commerce websites, for secure exchange. To build trust, buyers are called to rate
vendors. Trust is central for OBMs, as we can see from the buyer’s guidelines reported in one OBM:
“First of all, all members are kindly asked to be honest regarding package, delivery, product
quality and shipping conditions. This helps maintaining a trusted network, which is a major basis in
hidden web marketplaces. Scammers are not tolerated and are quickly identified as such”
(http://xsuee6v24g2q6phb.onion/ help accessed on Dec 03, 2018).</p>
      <p>Therefore, in the case of carding in OBMs referring to of our model we observe: (i) evolution of
platforms to end to end services; (ii) collaboration and communication between an array of malicious
actors: hackers, vendors, figureheads; (iii) more capillary and complex services and technological
functionalities; (iv) refinement in data for financial fraud</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conceptual Model</title>
      <p>
        A digital service ecosystem emerges around specific, value-reinforcing activities and resource
complementarities [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. What we know from the literature on ecosystems2 and morphing [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] reconstruct
an evolutionary pattern of digital ecosystem as driven by shifts in the market that lead actors to
readjust their value-path. As shown in Figure 2, actors tend to come together achieving specific and
value-reinforcing complementarities [20]. As time passes, external stimuli – e.g., in the form of
technological changes – create a shift in market conditions within the ecosystem (marked with the
dashed line). Therefore, actors will adjust their value-generating paths – which translates in new
strategies and practices - leading to the emergence of new institutional forms. A new change in market
conditions posits the need for further adjustments that occur within the digital service ecosystem, at that
2 See [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] for an extensive review.
point new actors (e.g., A4) with a value driven interest in the ecosystem may join the digital service
ecosystem. Conversely, actors whose value-generating paths do not align with the new shift in market
condition may opt-out (e.g., A2).
      </p>
      <p>The limit of this model is that it only reflects changes as driven by systematic and exogenous changes
but do not take into the account the interactions between conflicting members of the digital ecosystem.
Here, we present a preliminary conceptual model able to grasp how conflicting dynamics can generate
innovation within a digital ecosystem. These changes are therefore a by-product of a conflict-driven
interaction between actors. As shown in Figure 3, actors are pushed to adjust their value generating
paths not only by exogenous shocks but also due to shifts in competitive conditions with their
counterparts. In other words, competing for appropriation/misappropriation of value create a feedback
that influences adjustment in value-driven paths resulting in adversarial institutional forms. We argue
that the digital ecosystem will adjust accordingly to meet shift in market conditions and competitive
conditions.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>In this brief contribution, we focus on one specific case of a digital ecosystem, the financial services
ecosystem, to empirically analyze the co-evolution of institutional forms that emerge between
conflicting actors (i.e., cybercriminals and legal actors). Firstly, we identified five phases of
coevolution from the late 90s to the post-2015 period relying on secondary sources. From empirical
observation, we proposed a the foundations of a conceptual model for digital ecosystems evolution
based on the adversarial evolution. This contribution constitutes the first step towards a broader
theoretical understanding of the generativity of opposing forces in digital ecosystem.</p>
    </sec>
    <sec id="sec-6">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baskerville</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Spagnoletti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          , “
          <article-title>Incident-centered information security: Managing a strategic balance between prevention and response</article-title>
          ,” Inf. Manag., vol.
          <volume>51</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>138</fpage>
          -
          <lpage>151</lpage>
          , Jan.
          <year>2014</year>
          , doi: 10.1016/j.im.
          <year>2013</year>
          .
          <volume>11</volume>
          .004.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D.</given-names>
            <surname>Pienta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. B.</given-names>
            <surname>Thatcher</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Johnston</surname>
          </string-name>
          , “
          <article-title>Protecting a whale in a sea of phish,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Inf</surname>
          </string-name>
          . Technol., vol.
          <volume>35</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>214</fpage>
          -
          <lpage>231</lpage>
          , Jun.
          <year>2020</year>
          , doi: 10.1177/0268396220918594.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Flowers</surname>
          </string-name>
          , “
          <article-title>Harnessing the hackers: The emergence and exploitation of Outlaw Innovation,”</article-title>
          <source>Res. Policy</source>
          , vol.
          <volume>37</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>177</fpage>
          -
          <lpage>193</lpage>
          ,
          <year>2008</year>
          , doi: 10.1016/j.respol.
          <year>2007</year>
          .
          <volume>10</volume>
          .006.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>K.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Siegel</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Madnick</surname>
          </string-name>
          , “
          <article-title>Systematically Understanding the Cyber Attack Business: A Survey,” ACM Comput</article-title>
          . Surv., vol.
          <volume>51</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>36</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>E. R.</given-names>
            <surname>Leukfeldt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lavorgna</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E. R.</given-names>
            <surname>Kleemans</surname>
          </string-name>
          , “
          <article-title>Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime,”</article-title>
          <string-name>
            <given-names>Eur. J. Crim. Policy</given-names>
            <surname>Res</surname>
          </string-name>
          ., vol.
          <volume>23</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>287</fpage>
          -
          <lpage>300</lpage>
          ,
          <year>2017</year>
          , doi: 10.1007/s10610-016- 9332-z.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Calderaro</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Craig</surname>
          </string-name>
          , “
          <article-title>Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building</article-title>
          ,” Third World Q., vol.
          <volume>0</volume>
          , no.
          <issue>0</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          ,
          <year>2020</year>
          , doi: 10.1080/01436597.
          <year>2020</year>
          .
          <volume>1729729</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R. Von</given-names>
            <surname>Solms</surname>
          </string-name>
          and
          <string-name>
            <surname>J. Van Niekerk</surname>
          </string-name>
          , “
          <article-title>From information security to cyber security,” Comput</article-title>
          . Secur., vol.
          <volume>38</volume>
          , pp.
          <fpage>97</fpage>
          -
          <lpage>102</lpage>
          ,
          <year>2013</year>
          , doi: 10.1016/j.cose.
          <year>2013</year>
          .
          <volume>04</volume>
          .004.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V. P.</given-names>
            <surname>Rindova</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Kotha</surname>
          </string-name>
          , “Continuous 'Morphing':
          <article-title>Competing through Dynamic Capabilities , Form</article-title>
          and Function,” Acad. Manag. J., vol.
          <volume>44</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>1263</fpage>
          -
          <lpage>1280</lpage>
          ,
          <year>2001</year>
          , doi: 10.2307/3069400.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>Vial</surname>
          </string-name>
          , “
          <article-title>Understanding digital transformation: A review and a research agenda</article-title>
          ,
          <source>” Journal of Strategic Information Systems</source>
          , vol.
          <volume>28</volume>
          , no.
          <issue>2</issue>
          .
          <string-name>
            <surname>Elsevier</surname>
            <given-names>B.V.</given-names>
          </string-name>
          , pp.
          <fpage>118</fpage>
          -
          <lpage>144</lpage>
          , Jun.
          <volume>01</volume>
          ,
          <year>2019</year>
          , doi: 10.1016/j.jsis.
          <year>2019</year>
          .
          <volume>01</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Alaimo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kallinikos</surname>
          </string-name>
          , and E. Valderrama, “
          <article-title>Platforms as service ecosystems: Lessons from social media,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Inf</surname>
          </string-name>
          . Technol., vol.
          <volume>35</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>48</lpage>
          , Oct.
          <year>2019</year>
          , doi: 10.1177/0268396219881462.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.-H. H.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. B.</given-names>
            <surname>Ullrich</surname>
          </string-name>
          , “
          <article-title>A comparative study of cyberattacks,” Commun</article-title>
          . ACM, vol.
          <volume>55</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>73</lpage>
          ,
          <year>2012</year>
          , doi: 10.1145/2093548.2093568.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Hui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Kim</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Wang</surname>
          </string-name>
          , “
          <article-title>Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks,” MIS Q.</article-title>
          , vol.
          <volume>41</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>497</fpage>
          -
          <lpage>A11</lpage>
          ,
          <year>2017</year>
          , doi: 10.14208/eer.
          <year>2013</year>
          .
          <volume>03</volume>
          .02.005.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Grazioli</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. L.</given-names>
            <surname>Jarvenpaa</surname>
          </string-name>
          , “
          <article-title>Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence,”</article-title>
          <string-name>
            <given-names>Int. J.</given-names>
            <surname>Electron</surname>
          </string-name>
          . Commer., vol.
          <volume>7</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>93</fpage>
          -
          <lpage>118</lpage>
          ,
          <year>2003</year>
          , doi: Article.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Stuart</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          , “
          <article-title>Fraud and Innovation,”</article-title>
          <string-name>
            <surname>Adm. Sci. Q.</surname>
          </string-name>
          , vol.
          <volume>66</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>297</lpage>
          , Jun.
          <year>2020</year>
          , doi: 10.1177/0001839220927350.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Agreste</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Catanese</surname>
          </string-name>
          ,
          <string-name>
            <surname>P. De Meo</surname>
          </string-name>
          , E. Ferrara, and G. Fiumara, “
          <article-title>Network structure and resilience of Mafia syndicates,” Inf</article-title>
          . Sci. (Ny)., vol.
          <volume>351</volume>
          , pp.
          <fpage>30</fpage>
          -
          <lpage>47</lpage>
          ,
          <year>2016</year>
          , doi: 10.1016/j.ins.
          <year>2016</year>
          .
          <volume>02</volume>
          .027.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>F.</given-names>
            <surname>Ceci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Prencipe</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Spagnoletti</surname>
          </string-name>
          , “Evolution, Resilience and Organizational Morphing in Anonymous Online Marketplace,
          <source>” Acad. Manag. Glob. Proc., no. 2018</source>
          , p.
          <fpage>62</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P.</given-names>
            <surname>Spagnoletti</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Salvi</surname>
          </string-name>
          , “
          <article-title>Digital systems in High-Reliability Organizations: balancing mindfulness and mindlessness</article-title>
          ,”
          <source>in Proceedings of the 6th International Workshop on SocioTechnical Perspective in IS Development (STPIS</source>
          <year>2020</year>
          ), June 8-9,
          <year>2020</year>
          ,
          <year>2020</year>
          , vol.
          <volume>0114</volume>
          , no.
          <source>Stpis</source>
          , pp.
          <fpage>155</fpage>
          -
          <lpage>161</lpage>
          , [Online]. Available: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2789</volume>
          /paper21.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>E.</given-names>
            <surname>Kraemer-Mbula</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Tang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Rush</surname>
          </string-name>
          , “
          <article-title>The cybercrime ecosystem: Online innovation in the shadows?</article-title>
          ,
          <source>” Technol. Forecast. Soc. Change</source>
          , vol.
          <volume>80</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>541</fpage>
          -
          <lpage>555</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>P.</given-names>
            <surname>Spagnoletti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ceci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Bygstad</surname>
          </string-name>
          , “
          <article-title>An investigation on the generative mechanisms of Dark Net markets</article-title>
          ,”
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Manag. J.</surname>
          </string-name>
          , vol.
          <volume>39</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>2255</fpage>
          -
          <lpage>2276</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>