<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Adversarial Evolution: Competing dynamics and reactive institutional forms in financial services ecosystem</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Paolo</forename><surname>Spagnoletti</surname></persName>
							<email>pspagnoletti@luiss.it</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Information Systems</orgName>
								<orgName type="institution">University of Adger</orgName>
								<address>
									<settlement>Kristiansand</settlement>
									<country key="NO">Norway</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Department of Business and Management</orgName>
								<orgName type="institution">Luiss University</orgName>
								<address>
									<settlement>Rome</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Federica</forename><surname>Ceci</surname></persName>
							<email>f.ceci@unich.it</email>
							<affiliation key="aff2">
								<orgName type="department">Department of Economics and Management</orgName>
								<orgName type="institution">G. D&apos;Annunzio University</orgName>
								<address>
									<settlement>Pescara</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Salvi</surname></persName>
							<email>asalvi@luiss.it</email>
							<affiliation key="aff1">
								<orgName type="department">Department of Business and Management</orgName>
								<orgName type="institution">Luiss University</orgName>
								<address>
									<settlement>Rome</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="department">TASEC21 Post-conference proceedings</orgName>
								<address>
									<addrLine>April 07-09</addrLine>
									<postCode>2021</postCode>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Adversarial Evolution: Competing dynamics and reactive institutional forms in financial services ecosystem</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">767130306B835AC46F8D498D22D85A4D</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T20:07+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cybersecurity</term>
					<term>Cybercrime</term>
					<term>Ecosystems</term>
					<term>Financial Services</term>
					<term>Innovation</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this paper we conceptually illustrate the adversarial evolution of cybercrime and cybersecurity operations in financial services ecosystem. Building upon the concept of organizational morphing and ecosystem formation, we aim to reconstruct the parallel and conflict-driven evolution of the bright and dark side of financial services. Firstly, we identify five phases from the late 90s to the post-2015 period that show the paired configuration in the morphing of the two opposing sides. Secondly, we propose a conceptual model for digital ecosystems evolution based on the mutual influence of conflicting actors. This paper is a first foundational work towards a broader instantiation of generativity through adversarial evolution of digital ecosystems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Financial cybercrimes seek profit through misappropriation of value in the financial services ecosystem. Such misappropriation is carried out through the malicious use of digital technologies and it is substantiated into criminal activities such as ransomware and phishing <ref type="bibr" target="#b0">[1]</ref>, <ref type="bibr" target="#b1">[2]</ref>. Therefore, malicious actors master and exploit digital technologies as vectors misappropriation of value. These processes are continuously evolving and produce new forms of cybercrime at an extremely fast pace. This is the output of what some authors called outlaw innovation <ref type="bibr" target="#b2">[3]</ref>. As Huang et al <ref type="bibr" target="#b3">[4]</ref> puts it "to combat cybercrimes in an effective way, we not only need to develop technical solutions to protect against attacks but also need to understand the structure of the business of underground cybercrime and its development".</p><p>To fully appreciate the complexity of the dark -and criminal -side of financial ecosystems one should take into account the effects of such activity onto the "bright side" and vis-à-vis the opportunity it offers. Criminal activities in this domain have proliferated over the last decades, thanks to the diffusion of online banking and the widespread usage of electronic transfers of financial resources <ref type="bibr" target="#b4">[5]</ref>. To create a safeguard against these ever-mutating malicious actions, also the bright side have evolved, adopting a variety of tactics, techniques and procedures, both at operational and strategic level <ref type="bibr" target="#b5">[6]</ref>, <ref type="bibr" target="#b6">[7]</ref>. This brief contribution extends the studies over the link between the evolution of cybercrime and cybersecurity institutions in a digital service ecosystem, i.e., the financial sector. We build upon the observation that there is a linkage between innovations in the bright and in the dark side <ref type="bibr" target="#b2">[3]</ref> and we attempt to show how that produces "conflict-driven" evolution. We show how the reiterated contacts between the bright and dark side of an ecosystem results in observable changes in technical innovations and in the evolution of the institutional forms adopted by the actors. We therefore propose the two adversaries in financial services as drivers of organizational change, being their fate deeply intertwined and far from being independent from each other. In other words, "belligerents" need to keep a competitive edge over the adversaries accounting for variation in their counterparts.</p><p>Building upon the contribution by Rindova and Kotha <ref type="bibr" target="#b7">[8]</ref>, we conceptualize this reactive and adaptive behavior as a process of continuous morphing. The determinants of such process are both systemic conditions and results of events instantiated in the digital ecosystem, where actors operate and mutate to match the shifting market conditions. That is: (1) bright and dark actors use morphing to keep a competitive edge in their environment; (2) the effects of their competition for appropriation/misappropriation of value results in changes in the ecosystem as a whole. As regard to the first point, we look at the institutional forms in these opposing domains proposing that they can capture structural changes and responses <ref type="bibr" target="#b8">[9]</ref> of bright and dark actors modifying their value appropriation/misappropriation paths. We rely on an integrated view that suggests how the aforementioned tension (i.e. the conflicts between dark and bright actors) shapes the continuous morphing of institutional forms in digital ecosystems <ref type="bibr" target="#b9">[10]</ref>. Having observed that co-evolution, we argue that Cybercrime and Security Operations (SecOp) are conflicting rather than complementary practices, both playing a role in digital ecosystems formation and evolution. Thus, the mutual influence of dark and bright actors shapes organizational morphing in digital ecosystems and a structural morphing of the same environment whereby they compete. Therefore, we elaborate a two-fold research questions: How data, technologies and actor configurations co-evolve in digital ecosystem? How Cybercrime and SecOp influence financial service ecosystem formation? Firstly, we reconstruct and present the parallel and mutually influenced evolution of the bright and dark side. We accomplish that focusing on the practices of the two sides to highlight how competing actors -engaging in the same ecosystem -reactively adapt their value-creation paths taking an institutional form that aim to counter the practices of the adversaries and "exploit" evolving systemic features. Secondly, we elaborate a conceptual model to explain how Cybercrime and SecOp drive evolution and morphing in a digital service ecosystem. Finally, we present a brief illustrative case based on the financial services ecosystem. The case is built on a five-steps process from the late 90s to the post-2015 period.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Institutional forms and competition in digital service ecosystem</head><p>The digital service ecosystem is intended as the ensemble of "synergies and complementarities achieved between the activities, resources or outputs of several organizations" <ref type="bibr" target="#b9">[10]</ref>. A specific form of digital service ecosystem is represented by the financial service ecosystem, that includes among others: banks, financial institutions, and LEAs. The financial service ecosystem witness competing activities and organizing of two counterparts: "bright" actors -in the form of legitimate organizations operating in the environment -and "dark" actors -broadly defined as outlaw users <ref type="bibr" target="#b2">[3]</ref>. In this context, cybercriminals and SecOp constitute the "warring parties" of these two organizations. The tension between the two groups originates in colliding goals of appropriation and misappropriation of value, taking place in the environment in which they operate. In the security domain, few studies have been looking at the effect of deterrence generated by legislation and institutions <ref type="bibr" target="#b10">[11]</ref>. <ref type="bibr" target="#b11">Hui et al. (2017)</ref> estimate the effect of the Convention on Cybercrime on cyber-attack suggesting that -despite its merits -cybercriminals may adapt to these countermeasures and divert their attention to non-enforcing countries. This portrays dark actors as adaptable entities that can adjust their behaviors not only based on the feature of their environment, but also reacting to their "foes".</p><p>The open-ended nature of digital ecosystem, offers "dark" actors new opportunities to capture value through deception <ref type="bibr" target="#b12">[13]</ref> and to allocate their resources more fluidly <ref type="bibr" target="#b13">[14]</ref>. The growth of cyber threats shows that digital resources can serve as enabling tools for value misappropriation. Again, the process of misappropriation is hardly static: cybercriminals have been evolving over time at the individual levels and in their institutional forms. There has been a progressive professionalization of "hackers" <ref type="bibr" target="#b2">[3]</ref>: they departed from the original connotation of "modders" or "product hackers" which characterized the first wave of the phenomenon. Said evolution most likely depended in first place by the opportunities offered by the environment in which they operated. Yet, it became soon after a by-product of reactive behavior to opposing actors. In first place, resilience of criminal organizations carries over from "offline" instances crime <ref type="bibr" target="#b14">[15]</ref>. Secondly, studies on organizational forms of cybercrime -such as the ones on Online Black Markets (OBMs) -have shown a high level of resilience of these platforms vis-à-vis the intervention of LEAs <ref type="bibr" target="#b15">[16]</ref>. The dark side is in fact particularly able to adapt and overcome challenges by re-organizing benefitting from its "less institutionalized" nature. This feature is embodied by a continuous morphing of institutional forms and organizational arrangements of malicious actors <ref type="bibr" target="#b15">[16]</ref>.</p><p>The literature shows the birth, the evolution and the end of bright and dark actors organising under different perspectives, but to date few frameworks consider their interplay and the effect on value creation at ecosystem level. In this paper, we show a five stages model (Figure <ref type="figure" target="#fig_0">1</ref>) that depicts the coevolution of cybercrime and cybersecurity institutions in financial ecosystems. We illustrate the validity of the model by presenting in the bright side the EU-OF2CEN (European Union Online Fraud Cyber -Center Expert Network) case, a public-private partnership aimed at contrasting financial cybercrime. In the dark side, on the same timeframe, between 2010 and 2015, we observed the evolution of carding in Online Blackmarkets (OBMs). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Illustrative case: OF2CEN and OBMs</head><p>The EU-OF2CEN -launched in 2013 -is an online platform that collect in real time, through secure communication channels, reports from banks and police on suspicious transactions that take place on the Internet, analyze them and share all information with the aim of identifying and blocking illegal operations. The platform allows the detection and sharing, through a system of "early warning" of reports related to possible criminal activities in progress. The project was conceived by the Italian Police, managed by Polizia Postale Department and financed by the European Union. For financial institutions, the birth of such platform translates into a significant increase in the ability to assess bank movements and into the subsequent implementation of effective actions to prevent or contain fraud or money laundering <ref type="bibr" target="#b16">[17]</ref>. For Law Enforcement Agencies (LEAs), the aggregated analysis of the data collected can be used in structured investigative activities to enable more prompt attempts to recover from crime and facilitate the identification of responsible. The objectives of the platform are twofold: from a strategic viewpoint, the creation of a Public Private Partnership between Europol, LEAs and banks, favors the increase of common awareness about the modus operandi and criminal trends related</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Monthly 1day f2f meeting •IT sec Units •Bank association</head><p>Mailing list for anonymous p2p info sharing to financial cybercrimes, improving cooperation in the action of prevention and contrast; from an operational viewpoint, the sharing of relevant data allows to increase the ability to evaluate financial transactions carried out with the use of electronic tools, at national and international level. This facilitates concrete and timely actions to prevent and counter the recurrence of financial cybercrime. Therefore, in the OF2CEN we observe: (i) collaboration between IT security units and fraud management units; (ii) involvement of LEAs and information sharing between private and public actors; (iii) more capillary monitoring over transactions with prompter multi agency communications; (iv) refinement in shared data for anti-fraud.</p><p>As for the dark side, the timeframe between 2010 and 2015 embodies the raise and growth of OBMs. These platforms allowed for a series of low-risk, high-profit criminal activities (i.e. carding) that offered relatively easy value misappropriation paths for cyber-criminals in the financial ecosystem. These platforms encompass a wide variety of actors including hackers, site administrators, buyers, vendors and undercover LEA's agents. One of the main categories of digital goods pertaining the financial ecosystem listed in OBMs are credit cards details often referred to as "carding". It represents a major threat for businesses in all industrial sectors <ref type="bibr" target="#b17">[18]</ref>, <ref type="bibr" target="#b18">[19]</ref>. The phenomenon has evolved over time and OBMs enabled a series of incentives and technical solutions to make these activities low-risk and highrewarding.</p><p>Our analysis of offers published between 2011 and 2016 in the category "digital goods" of major OBMs, shows that credit card numbers are sold in a variety of ways and with many additional services. Most vendors offer services to check the validity of the cards and commit to replace them based on the checker's result. Other vendors offer packages that guarantee the credit and spending balance. Others sell credit cards templates and holograms. Half of the offers are related to guides and tutorials explaining how to steal credit card information and how to use stolen cards minimizing the risk of being detected. The trade of illegal goods is conducted through anonymous transactions and shipping, guaranteed by the use of Tor network. The offer includes the display of goods, customer rankings of vendors, payment system (cryptocurrencies such as Bitcoin), and escrow functions, similar to those available in conventional e-commerce websites, for secure exchange. To build trust, buyers are called to rate vendors. Trust is central for OBMs, as we can see from the buyer's guidelines reported in one OBM:</p><p>"First of all, all members are kindly asked to be honest regarding package, delivery, product quality and shipping conditions. This helps maintaining a trusted network, which is a major basis in hidden web marketplaces. Scammers are not tolerated and are quickly identified as such" (http://xsuee6v24g2q6phb.onion/ help accessed on Dec 03, 2018). Therefore, in the case of carding in OBMs referring to of our model we observe: (i) evolution of platforms to end to end services; (ii) collaboration and communication between an array of malicious actors: hackers, vendors, figureheads; (iii) more capillary and complex services and technological functionalities; (iv) refinement in data for financial fraud</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conceptual Model</head><p>A digital service ecosystem emerges around specific, value-reinforcing activities and resource complementarities <ref type="bibr" target="#b9">[10]</ref>. What we know from the literature on ecosystems<ref type="foot" target="#foot_1">2</ref> and morphing <ref type="bibr" target="#b7">[8]</ref> reconstruct an evolutionary pattern of digital ecosystem as driven by shifts in the market that lead actors to readjust their value-path. As shown in Figure <ref type="figure" target="#fig_1">2</ref>, actors tend to come together achieving specific and value-reinforcing complementarities <ref type="bibr" target="#b19">[20]</ref>. As time passes, external stimuli -e.g., in the form of technological changes -create a shift in market conditions within the ecosystem (marked with the dashed line). Therefore, actors will adjust their value-generating paths -which translates in new strategies and practices -leading to the emergence of new institutional forms. A new change in market conditions posits the need for further adjustments that occur within the digital service ecosystem, at that point new actors (e.g., A4) with a value driven interest in the ecosystem may join the digital service ecosystem. Conversely, actors whose value-generating paths do not align with the new shift in market condition may opt-out (e.g., A2). The limit of this model is that it only reflects changes as driven by systematic and exogenous changes but do not take into the account the interactions between conflicting members of the digital ecosystem. Here, we present a preliminary conceptual model able to grasp how conflicting dynamics can generate innovation within a digital ecosystem. These changes are therefore a by-product of a conflict-driven interaction between actors. As shown in Figure <ref type="figure" target="#fig_2">3</ref>, actors are pushed to adjust their value generating paths not only by exogenous shocks but also due to shifts in competitive conditions with their counterparts. In other words, competing for appropriation/misappropriation of value create a feedback that influences adjustment in value-driven paths resulting in adversarial institutional forms. We argue that the digital ecosystem will adjust accordingly to meet shift in market conditions and competitive conditions. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>In this brief contribution, we focus on one specific case of a digital ecosystem, the financial services ecosystem, to empirically analyze the co-evolution of institutional forms that emerge between conflicting actors (i.e., cybercriminals and legal actors). Firstly, we identified five phases of coevolution from the late 90s to the post-2015 period relying on secondary sources. From empirical observation, we proposed a the foundations of a conceptual model for digital ecosystems evolution based on the adversarial evolution. This contribution constitutes the first step towards a broader theoretical understanding of the generativity of opposing forces in digital ecosystem.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Co-evolution of institutional forms in bright and dark side of financial services ecosystems.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Market-driven changes in Digital Service Ecosystems and generation of new institutional forms over time.</figDesc><graphic coords="5,89.10,109.95,430.75,314.59" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Basic representation of Adversarial Evolution of a digital ecosystem -Evolution as a result of conflict driven interactions between Dark and Bright SecOps.</figDesc><graphic coords="6,124.93,72.00,359.35,246.83" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">•Bank association •LEA •Fraud mgt Units •IT sec Units Shared database and blacklist •LEA •Bank association •Fraud management Units •IT sec Units •Telco Internet Fraud Watchdog •IT sec Units •Fraud mgt Units •Bank association •Data Protection Officers •LEA •Telco CERTFin •IT sec Units •Fraud mgt Units •Bank association •LEA •Telco •Central Bank BBS and IRC •product hackers •game developers (modders) file sharing peer2peer •swarms •crackers Forums and anonymity •black hat •crackers •money launderers Online Blackmarkets and cryptocurrencies •vendors •buyers •hacktivists •mules Decentralized OBMs •APT •organized crime 2000-2005 &lt; 2000 2005-2010 2010-2015 &gt; 2015</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">See<ref type="bibr" target="#b9">[10]</ref> for an extensive review.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Incident-centered information security: Managing a strategic balance between prevention and response</title>
		<author>
			<persName><forename type="first">R</forename><surname>Baskerville</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Spagnoletti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kim</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.im.2013.11.004</idno>
	</analytic>
	<monogr>
		<title level="j">Inf. Manag</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="138" to="151" />
			<date type="published" when="2014-01">Jan. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Protecting a whale in a sea of phish</title>
		<author>
			<persName><forename type="first">D</forename><surname>Pienta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Thatcher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Johnston</surname></persName>
		</author>
		<idno type="DOI">10.1177/0268396220918594</idno>
	</analytic>
	<monogr>
		<title level="j">J. Inf. Technol</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="214" to="231" />
			<date type="published" when="2020-06">Jun. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Harnessing the hackers: The emergence and exploitation of Outlaw Innovation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Flowers</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.respol.2007.10.006</idno>
	</analytic>
	<monogr>
		<title level="j">Res. Policy</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="177" to="193" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Systematically Understanding the Cyber Attack Business: A Survey</title>
		<author>
			<persName><forename type="first">K</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Siegel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Madnick</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Comput. Surv</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1" to="36" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">R</forename><surname>Leukfeldt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lavorgna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">R</forename><surname>Kleemans</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10610-016-9332-z</idno>
	</analytic>
	<monogr>
		<title level="j">Eur. J. Crim. Policy Res</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="287" to="300" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building</title>
		<author>
			<persName><forename type="first">A</forename><surname>Calderaro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Craig</surname></persName>
		</author>
		<idno type="DOI">10.1080/01436597.2020.1729729</idno>
	</analytic>
	<monogr>
		<title level="j">Third World Q</title>
		<imprint>
			<biblScope unit="volume">0</biblScope>
			<biblScope unit="issue">0</biblScope>
			<biblScope unit="page" from="1" to="22" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">From information security to cyber security</title>
		<author>
			<persName><forename type="first">R</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Von</forename><surname>Solms</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Van Niekerk</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2013.04.004</idno>
	</analytic>
	<monogr>
		<title level="j">Comput. Secur</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="97" to="102" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Continuous &apos;Morphing&apos;: Competing through Dynamic Capabilities , Form and Function</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">P</forename><surname>Rindova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kotha</surname></persName>
		</author>
		<idno type="DOI">10.2307/3069400</idno>
	</analytic>
	<monogr>
		<title level="j">Acad. Manag. J</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1263" to="1280" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Understanding digital transformation: A review and a research agenda</title>
		<author>
			<persName><forename type="first">G</forename><surname>Vial</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jsis.2019.01.003</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Strategic Information Systems</title>
		<editor>B.V.</editor>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="118" to="144" />
			<date type="published" when="2019-01">Jun. 01, 2019</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Platforms as service ecosystems: Lessons from social media</title>
		<author>
			<persName><forename type="first">C</forename><surname>Alaimo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kallinikos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Valderrama</surname></persName>
		</author>
		<idno type="DOI">10.1177/0268396219881462</idno>
	</analytic>
	<monogr>
		<title level="j">J. Inf. Technol</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="25" to="48" />
			<date type="published" when="2019-10">Oct. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A comparative study of cyberattacks</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">H</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q.-H</forename><forename type="middle">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Ullrich</surname></persName>
		</author>
		<idno type="DOI">10.1145/2093548.2093568</idno>
	</analytic>
	<monogr>
		<title level="j">Commun. ACM</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="66" to="73" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks</title>
		<author>
			<persName><forename type="first">K</forename><surname>Hui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">H</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Wang</surname></persName>
		</author>
		<idno type="DOI">10.14208/eer.2013.03.02.005</idno>
	</analytic>
	<monogr>
		<title level="j">MIS Q</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="497" to="A508" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence</title>
		<author>
			<persName><forename type="first">S</forename><surname>Grazioli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">L</forename><surname>Jarvenpaa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Electron. Commer</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="93" to="118" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
	<note>Article</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Fraud and Innovation</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Stuart</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.1177/0001839220927350</idno>
	</analytic>
	<monogr>
		<title level="j">Adm. Sci. Q</title>
		<imprint>
			<biblScope unit="volume">66</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="267" to="297" />
			<date type="published" when="2020-06">Jun. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Network structure and resilience of Mafia syndicates</title>
		<author>
			<persName><forename type="first">S</forename><surname>Agreste</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Catanese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>De Meo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Ferrara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Fiumara</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ins.2016.02.027</idno>
	</analytic>
	<monogr>
		<title level="j">Inf. Sci. (Ny)</title>
		<imprint>
			<biblScope unit="volume">351</biblScope>
			<biblScope unit="page" from="30" to="47" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Evolution, Resilience and Organizational Morphing in Anonymous Online Marketplace</title>
		<author>
			<persName><forename type="first">F</forename><surname>Ceci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Prencipe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Spagnoletti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Acad. Manag. Glob. Proc</title>
		<imprint>
			<biblScope unit="page">62</biblScope>
			<date type="published" when="2018">2018. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Digital systems in High-Reliability Organizations: balancing mindfulness and mindlessness</title>
		<author>
			<persName><forename type="first">P</forename><surname>Spagnoletti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Salvi</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2789/paper21.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 6th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2020)</title>
				<meeting>the 6th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2020)</meeting>
		<imprint>
			<date type="published" when="2020">June 8-9, 2020, 2020</date>
			<biblScope unit="volume">0114</biblScope>
			<biblScope unit="page" from="155" to="161" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">The cybercrime ecosystem: Online innovation in the shadows?</title>
		<author>
			<persName><forename type="first">E</forename><surname>Kraemer-Mbula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Rush</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Technol. Forecast. Soc. Change</title>
		<imprint>
			<biblScope unit="volume">80</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="541" to="555" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">An investigation on the generative mechanisms of Dark Net markets</title>
		<author>
			<persName><forename type="first">P</forename><surname>Spagnoletti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ceci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Bygstad</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Towards a theory of ecosystems</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">G</forename><surname>Jacobides</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Cennamo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gawer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Strateg. Manag. J</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="2255" to="2276" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
