<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Cybersecurity Measures of the Digital Payment Ecosystem</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexander Olifirov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Krystina A. Makoveichuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergei Petrenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Saint Petersburg Electrotechnical University "LETI"</institution>
          ,
          <addr-line>5, Professor Popov Street, St. Petersburg, 197376</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>V.I. Vernadsky Crimean Federal University</institution>
          ,
          <addr-line>4, Akademika Vernadsky Avenue, Simferopol, 295007</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The article discusses the cybersecurity measures of digital payment ecosystems in modern conditions. It is shown that new instruments and work with digital national currencies supplement payment ecosystems. The cybersecurity of its platform and ecosystem has been identified as a major challenge in the implementation of the digital currency concept. Cybersecurity measures are classified: legal, technical, organizational, capacity-building, joint actions. The set of cybersecurity measures that need to be applied for the successful implementation of the digital ruble is highlighted: continuous monitoring and updating of the national cybersecurity strategy; creation and development of national and industry Computer Incident Response Teams; the use of a specialized software module of the Bank of Russia integrated with mobile applications of credit institutions; implementation of cryptographic protection of channels of user interaction with the infrastructure of the credit institution; generation and storage of a cryptographic key for a credit institution's client to access a digital wallet; conducting research by the central bank in the field of ensuring the offline regime in the transition to the digital ruble, providing access to the digital ruble platform based on the exchange of incident notifications, exchange of best practices, harmonization of minimum security measures within the framework of multilateral agreements on cybersecurity. It is proposed to form a budget and assess the feasibility of investments in cybersecurity, taking into account the definition of all risks, their quantitative measurement, and their prioritization.</p>
      </abstract>
      <kwd-group>
        <kwd>2 Digital ruble</kwd>
        <kwd>cybersecurity measures</kwd>
        <kwd>platform model</kwd>
        <kwd>digital payment ecosystem</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <sec id="sec-1-1">
        <title>Payments</title>
        <sec id="sec-1-1-1">
          <title>Google Pay </title>
        </sec>
        <sec id="sec-1-1-2">
          <title>Apple Pay </title>
        </sec>
        <sec id="sec-1-1-3">
          <title>Friend to friend pay </title>
        </sec>
        <sec id="sec-1-1-4">
          <title>Amazon pay </title>
        </sec>
        <sec id="sec-1-1-5">
          <title>Ant Financial </title>
        </sec>
        <sec id="sec-1-1-6">
          <title>WeChat Pay </title>
        </sec>
        <sec id="sec-1-1-7">
          <title>Apple Card </title>
        </sec>
        <sec id="sec-1-1-8">
          <title>Amazon lending </title>
        </sec>
        <sec id="sec-1-1-9">
          <title>Ant Financial </title>
        </sec>
        <sec id="sec-1-1-10">
          <title>WeBank   - Closed platform model</title>
          <p>3 https://www.cbr.ru/Content/Document/File/119960/Consultation_Paper_02042021.pdf
134
 - Open platform model</p>
          <p>VTB</p>
          <p>MTS
 - Closed platform model
 - Open platform model</p>
        </sec>
      </sec>
      <sec id="sec-1-2">
        <title>Payments</title>
        <sec id="sec-1-2-1">
          <title>SBER </title>
        </sec>
        <sec id="sec-1-2-2">
          <title>Yandex Pay </title>
        </sec>
        <sec id="sec-1-2-3">
          <title>Tinkoff </title>
        </sec>
        <sec id="sec-1-2-4">
          <title>Money.Mail.ru  VTB  MTS </title>
        </sec>
      </sec>
      <sec id="sec-1-3">
        <title>Finance</title>
        <sec id="sec-1-3-1">
          <title>SBER </title>
        </sec>
        <sec id="sec-1-3-2">
          <title>Yandex.plus bill </title>
        </sec>
        <sec id="sec-1-3-3">
          <title>Tinkoff </title>
          <p>VK Pay </p>
        </sec>
        <sec id="sec-1-3-4">
          <title>VTB  Meter square  MTS </title>
          <p>The introduction of the Bank of Russia Digital Ruble (RBDR)4 is a response to the challenges of
global technology companies, which, through their global presence, are uniquely positioned to offer
services in the area of global cross-border transactions. Today, the new major players in the financial
services market (Big Tech, also known as the Tech Giants) are the digital companies that dominate the
US information technology industry, namely Amazon, Apple, Google (Alphabet), Facebook, and
Microsoft.</p>
          <p>The proliferation of digital currencies offered by foreign companies will make Russian payments
dependent on technologies developed and regulated in other countries. At the same time, digital
currency as a new digital asset creates a new vulnerability to cyber-attack. In this regard, Russia, like
other states, in the transition to digital currency, has to do a lot of work to create the necessary technical
solutions to ensure the appropriate level of cybersecurity of the corresponding system.</p>
          <p>Therefore, it seems logical to consider what cybersecurity of a payment system can be when paying
with a digital ruble, based on possible models and mechanisms for implementing a digital currency, and
what cybersecurity measures can be applied.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Research methodology</title>
      <p>
        The sphere of cybersecurity is constantly changing, as threats, vulnerabilities, risks,
countermeasures in the internal and external environment are constantly changing [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. In this case,
for defining cybersecurity measures, a methodology is needed that would take into account these
changes and would meet the challenges of today.
      </p>
      <p>The work provided a critical review of the literature on the study conducted in areas of interest and
references to the Global Cybersecurity Index (GCI) and its methodology. This helped to define and
apply the following guidelines in this study.
4 Concept of the digital ruble. Bank of Russia. URL: http://www.consultant.ru/document/cons_doc_LAW_381918
1. Cybersecurity issues are addressed through a multidisciplinary and holistic approach in line
with the national concept of cybersecurity.
2. The structure of cybersecurity measures is based on five pillars: legal measures; technical
measures; institutional measures; capacity-building measures; and cooperation measures.
3. The implementation of the digital currency concept is based on the development of both the
national, and industry (financial and credit) Computer Emergency Response Team (CERT). The
Bank of Russia Computer Emergency Response Team (FinCERT) was established in 2015 to
consolidate financial and information security market participants in the fight against computer
crime.</p>
      <p>The study aims to help payments ecosystem actors identify threats and cybersecurity measures,
improve overall cyber-security, harmonize practices and promote a culture of cybersecurity in the
payments ecosystem, in the context of digitization.</p>
    </sec>
    <sec id="sec-3">
      <title>3. The main part of the research</title>
      <p>At the end of June 2021, the International Telecommunication Union (ITU) of the United Nations
published a new edition of the Cybersecurity Ranking of Countries. Russia ranked fifth with 98.06 out
of 100 possible (table 1).</p>
      <p>The structure of the cybersecurity index of Russia is shown in Figure 2.</p>
      <p>The rating showed that the number of countries with cybercrime legislation had increased. The
number of countries with a National Cyber Security Strategy has also increased. More than 50 percent
of States reported that they had set up “Computer Emergency Response Team”. This represents an
increase of 11 percent over 2018. In 2020, 64 percent of States reported that they had adopted national
cybersecurity strategies (58 percent in 2018), and more than 70 percent had conducted
awarenessraising campaigns (66 percent in 2018)5.</p>
      <p>To implement the concept of the digital ruble, it is necessary to create a new payment infrastructure,
integrated with the main one, allowing online and offline payments. Transactions with the digital ruble
can be carried out through special payment applications similar to Google Pay, Apple Pay, and other
similar services, or using remote banking services, mobile and online banks, using contactless payment
technology.</p>
      <p>Over the past two decades in Russia, the financial sector, as well as those companies that develop
ecosystems that use payment technologies, have done a great job of introducing a culture of cashless
payments. In recent years, according to literary sources, there has been an increase in the use of remote
channels of access to financial services and non-cash payments by the population. According to the
studied statistics, the share of non-cash payments by the population for goods and services in the total
volume of retail trade, catering, and paid services to the population increased from 39% in 2016 to 70%
in 2020. It is expected that the technology of using the national digital currency will be similar to the
existing technologies of payments based on mobile phones, making it understandable for users.</p>
      <p>Next, consider the conceptual two-tier retail model of the digital ruble shown in Fig. 1.</p>
      <p>So, at the first stage of the transition to the digital ruble, it is necessary to test the emission of the
digital ruble, transfers between individuals, and the interaction of the client, the bank, and the digital
ruble platform. At the second stage of the transition to digital currency, it is necessary to conduct tests
on payment for goods and services, on transferring non-cash money into digital rubles, and vice versa
5 https://www.cbr.ru/Collection/Collection/File/32122/Attack_2019-2020.pdf
digital rubles into non-cash funds. The new functionality, which is the most complex and has not yet
been fully studied in terms of implementation details, is offline calculations, that is, calculations in the
absence of Internet access. If the possibility of offline settlements in digital rubles is realized (when
implementing the government's plans to provide access to the Internet for every resident of the country
in every locality), it is planned to provide for some measures aimed at protecting the interests of users
(the possibility of restoring payments in case of loss of a device, limiting the number and total amount
of transactions that can be performed during a certain period, the introduction of a limit on the amount
of a single transaction).</p>
      <p>
        The main types of computer attacks in the sphere of credit and finance in 2019-2020 are presented
in materials prepared by the Bank of Russia Computer Emergency Response Team (FinCERT) of the
Information Security Department of the Bank of Russia. The Federal Service for Technical and Export
Control (FSTEC) has developed the Information Security Threat Assessment Methodology. These
materials can be used to create a cybersecurity system for the transition to digital currency. As the
analysis of literary sources on cyber-threats and cyberattacks, in general, has shown, the threats to the
digital ruble are the same as those to the clearing of bank accounts and cards, as well as the risks inherent
in the segment of cryptocurrencies [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15">10-15</xref>
        ]. The types of threats to cybersecurity in the digital payment
system when switching to the digital ruble are presented in Table 4.
1.Risk of unauthorized access to the digital ruble platform
2.Risk of Digital Ruble User Profile being stolen through
personal hacking
3.Risk of unauthorized access when using a credit
organization’s mobile application
1.Risk of integrity loss when signing transactions with the
digital ruble.
2.Risk of integrity loss in the case of digital ruble emissions.
      </p>
      <sec id="sec-3-1">
        <title>1.The risk of underperforming distributed ledger technology</title>
      </sec>
      <sec id="sec-3-2">
        <title>2.Risk of refusal to implement offline mode on the digital ruble</title>
        <p>platform</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.Unavailability of the infrastructure of trade and service enterprises and credit organizations, small and medium-sized enterprises</title>
        <p>
          Cybersecurity is a multi-disciplinary area, involving all sectors, industries, and stakeholders, both
vertically and horizontally [
          <xref ref-type="bibr" rid="ref16 ref17">16-23</xref>
          ]. The Multi-stakeholder Framework on Cybersecurity seeks to create
synergies between ongoing and future initiatives and focuses on the following five pillars, which form
the building blocks of a national cybersecurity culture (Table 5).
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>1.Federal Law 259-FZ, dated July 31, 2020, “On digital financial assets,</title>
        <p>digital currency and on amendments to certain legislative acts of the</p>
      </sec>
      <sec id="sec-3-5">
        <title>Russian Federation” (last edition).</title>
      </sec>
      <sec id="sec-3-6">
        <title>2.National standard (governmental standard) of the Russian</title>
      </sec>
      <sec id="sec-3-7">
        <title>Federation GOST R 57580.1-2017 “Security of financial (banking) operations. Protection of information of financial institutions. Basic composition of organizational and technical measures”.</title>
        <p>2. Technical measures
3. Organizational
measures</p>
      </sec>
      <sec id="sec-3-8">
        <title>4. Capacity</title>
        <p>development
measures</p>
      </sec>
      <sec id="sec-3-9">
        <title>5. Cooperative</title>
        <p>measures</p>
      </sec>
      <sec id="sec-3-10">
        <title>3.Bank of Russia Standard “Ensuring information security of</title>
        <p>organizations of the banking system of the Russian Federation.</p>
      </sec>
      <sec id="sec-3-11">
        <title>Collection and analysis of technical data in response to information</title>
        <p>security incidents during money transfers” STO BR IBBS-1.3-2016.</p>
      </sec>
      <sec id="sec-3-12">
        <title>4. Federal Law 115-FZ, dated Avg. 07, 2001, «On Prevention of</title>
      </sec>
      <sec id="sec-3-13">
        <title>Legalization (Laundering) of Proceeds from Crime and Financing of</title>
        <p>Terrorism»).
1.Technical measures of cybersecurity are presented in the form of
various electronic equipment and communication networks,
specialized software that performs protective functions (together with
other means of protecting information or independently). In addition,
cybersecurity measures are represented by systems for supporting
search and applied research in the field of new technologies that
ensure national security.
2.Cryptographic protection of user interaction channels with the
infrastructure of a credit institution (encryption) when using a mobile
application using cryptographic information protection tools, certified
by the FSB of Russia.</p>
      </sec>
      <sec id="sec-3-14">
        <title>3.Generation and storage of a cryptographic key for a credit</title>
        <p>institution's client to access a digital wallet</p>
      </sec>
      <sec id="sec-3-15">
        <title>4.Creating Computer Incident Response Teams (CIRTs) or Computer</title>
      </sec>
      <sec id="sec-3-16">
        <title>Emergency Response Teams (CERTs) or Computer Security Incident</title>
      </sec>
      <sec id="sec-3-17">
        <title>Response Teams (CSIRTs) allows you to respond to incidents at the national level with a centralized contact point.</title>
      </sec>
      <sec id="sec-3-18">
        <title>Organizational measures include the definition of cybersecurity goals</title>
        <p>and strategic plans, as well as the formal definition of institutional
roles, responsibilities, and responsibilities to ensure their
implementation. These measures are indispensable in supporting the
development and implementation of effective cybersecurity policies.
The Bank of Russia should establish general strategic goals and
objectives, as well as a comprehensive implementation and
measurement plan. National agencies should be present to implement
the strategy and evaluate the results. Without a national strategy,
governance model, and oversight body, efforts across sectors collide,
hampering efforts to achieve effective harmonization in cybersecurity
development.</p>
      </sec>
      <sec id="sec-3-19">
        <title>Public awareness measures, certification, and accreditation of</title>
        <p>cybersecurity professionals, cybersecurity training courses,
educational or academic programs, etc.). Measures to raise
awareness, knowledge, and know-how in all sectors, for systematic
and appropriate solutions and to promote the development of
qualified professionals.</p>
      </sec>
      <sec id="sec-3-20">
        <title>Ensuring cybersecurity on the digital ruble platform based on joint structures and networks for the exchange of information, exchange of notification of incidents, exchange of best practices within the framework of multilateral agreements on cybersecurity.</title>
        <p>Cybersecurity measures (technical, strategic planning, capacity building) are investigated in [24].</p>
        <p>Effective mechanisms and institutional structures at the national level are needed to reliably counter
cyber risks and incidents. Computer Incident Response Teams (CIRTs) or Computer Emergency
Response Teams (CERTs) or Computer Security Incident Response Teams (CSIRTs) enable countries
to respond to incidents at the national level through a centralized point of contact and facilitate rapid
and systematic action, allowing countries to learn from experience and build cyber resilience [24].</p>
        <p>The cybersecurity costs of introducing the digital ruble will not necessarily reduce risks. Most of the
funds will be spent on the introduction of new technologies that may be useless if you do not consider
how the tool will be used and what threats it will be aimed at. Cybersecurity budgeting should begin
with a thorough assessment of the threats, as well as the existing and potential risks associated with the
digital ruble. After identifying all these risks, quantifying them, and prioritizing them, the Central Bank
of the Russian Federation must determine a strategy to ensure cybersecurity. Only when all risks are
taken into account in the strategy and the means of their control are determined, the Central Bank will
be able to ensure proper effective and continuous management of cyber risks, and will be able to
correctly form the budget in the field of cybersecurity. Assessing the feasibility of investing in
cybersecurity can be performed using the guidelines presented to the US Agency for International
Development in May 2020.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions</title>
      <p>As a result of the research, the following main cybersecurity measures in the digital payments
ecosystem during the transition to the digital ruble have been identified.</p>
      <p>1. Continuous monitoring and updating of the national cybersecurity strategy with clear
implementation plans.
2. Continuation of the creation and development of national and sectoral CIRT.
3. Application of a specialized software module of the Bank of Russia integrated with mobile
applications of credit institutions.
4. Implementation of cryptographic protection of the channels of user interaction with the
infrastructure of the credit institution (encryption) when using the mobile application of the credit
institution with the use of cryptographic information protection tools, certified by the FSB (Federal
Security Service) of Russia.
5. Generation and storage of a cryptographic key for a credit institution's client to access a digital
wallet and sign orders for transactions with digital rubles.
6. Application of complex technological measures for information protection (logical control,
structural control, duplication control, authorship control); organization of control over the integrity
of "smart contracts".
7. Creation of digital rubles exclusively with the use of the issue key of the Bank of Russia. The
Bank of Russia issue key is registered in the specially designated Certifying Center of the Bank of
Russia (CC BR) for issues.
8. Conducting by the Central Bank of scientific research in the field of providing an offline regime
in the transition to digital ruble.
9. The introduction of the digital ruble in stages, which will allow banks and trade and service
enterprises, small and medium-sized enterprises to increase their potential and adapt their
infrastructure for settlements in the digital ruble.
10.Ensuring access to the digital ruble platform and business continuity based on information
exchange networks, exchange of incident notifications, exchange of best practices, harmonization
of minimum security measures within the framework of multilateral agreements on cybersecurity.
11.Budgeting and assessing the feasibility of investments in cybersecurity, taking into account the
identification of all risks, their quantitative measurement, and their prioritization.</p>
    </sec>
    <sec id="sec-5">
      <title>5. References</title>
      <p>[18] A. A. Petrenko, S. A. Petrenko, K. A. Makoveichuk, A. V. Olifirov, Methodological
recommendations for the cyber risks management, CEUR Workshop Proceedings, volume 2914,
(2021), pp. 234-247. URL: http://ceur-ws.org/Vol-2914/paper20.pdf.
[19] A. S. Petrenko, S. A. Petrenko, K. A. Makoveichuk, P. V. Chetyrbok, Protection model of PCS of
subway from attacks type «wanna cry», «petya» and «bad rabbit» IoT, Proceedings of the 2018
IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering,
ElConRus 2018, 2018-January, pp. 945-949. DOI: 10.1109/EIConRus.2018.8317245.
[20] Petrenko S. Cyber resilient platform for internet of things (IIoT/IoT)ed systems: survey of
architecture patterns. Voprosy kiberbezopasnosti [Cybersecurity issues]. 2021. N 2 (42). P. 81-91.</p>
      <p>DOI: 10.21681/2311-3456-2021-2-81-91.
[21] S. A. Petrenko, A. A. Petrenko, K. A. Makoveichuk, A. V. Olifirov, Development of a
CyberResistant Platform for the Internet of Things Based on Dynamic Control Technology. In: Singh
P.K., Veselov G., Vyatkin V., Pljonkin A., Dodero J.M., Kumar Y. (eds) Futuristic Trends in
Network and Communication Technologies. FTNCT 2020. Communications in Computer and
Information Science, volume 1395 (2021), pp. 144-154. Springer, Singapore. URL: DOI:
10.1007/978-981-16-1480-4_13.
[22] S. A. Petrenko, K. A. Makoveichuk, A. V. Olifirov, Concept of cyber immunity of industry 4.0,
CEUR Workshop Proceedings, volume 2603, (2019), pp. 93-99. URL:
http://ceur-ws.org/Vol2603/paper20.pdf.
[23] S. A. Petrenko, K. A. Makoveichuk, A. V. Olifirov, New Methods of the Cybersecurity Knowledge
Management Analytics. In: Sukhomlin V., Zubareva E. (eds) Convergent Cognitive Information
Technologies. Convergent 2018. Communications in Computer and Information Science, volume
1140 (2020), pp. 296-310. Springer, Cham. URL: DOI: 10.1007/978-3-030-37436-5_27.
[24] Petrenko S. La Administración de la Ciberseguridad. Industria 4.0. Publicado según la decisión del
consejo de redacción de la Universidad de Innopolis. Universidad de Oviedo, Universidad de
Innopolis. Oviedo, Asturias, 2019.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Benoît</given-names>
            <surname>Dupont</surname>
          </string-name>
          .
          <article-title>The cyber-resilience of financial institutions: significance and applicability</article-title>
          ,
          <source>Journal of Cybersecurity</source>
          , volume
          <volume>5</volume>
          , issue 1,
          <year>2019</year>
          , tyz013. DOI:
          <volume>10</volume>
          .1093/cybsec/tyz013.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E. G.</given-names>
            <surname>Xomenko</surname>
          </string-name>
          , E`lektronny`e platezhny`
          <article-title>e sistemy` v Rossii i v zarubezhny`x stranax [E. G. Khomenko, Electronic payment systems in Russia and in foreign countries] / Aktual`ny`e problemy` rossijskogo prava [Actual problems</article-title>
          of Russian law],
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .17803/1994-
          <fpage>1471</fpage>
          .
          <year>2019</year>
          .
          <volume>105</volume>
          .8.
          <fpage>159</fpage>
          -
          <lpage>164</lpage>
          . (In Russ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>H. C.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. H.</given-names>
            <surname>Hsi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. J.</given-names>
            <surname>Kuo</surname>
          </string-name>
          ,
          <article-title>Electronic payment systems: an analysis and comparison of types</article-title>
          , Technology in Society,
          <volume>24</volume>
          (
          <issue>3</issue>
          ) (
          <year>2002</year>
          ), pp.
          <fpage>331</fpage>
          -
          <lpage>347</lpage>
          . DOI:
          <volume>10</volume>
          .1016/s0160- 791x(
          <issue>02</issue>
          )
          <fpage>00012</fpage>
          -
          <lpage>x</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>K. S.</given-names>
            <surname>Staykova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Damsgaard</surname>
          </string-name>
          ,
          <article-title>Adoption of mobile payment platforms: managing reach and range</article-title>
          ,
          <source>Journal of Theoretical and Applied Electronic Commerce Research</source>
          ,
          <volume>11</volume>
          (
          <issue>3</issue>
          ) (
          <year>2016</year>
          ). DOI:
          <volume>10</volume>
          .4067/S0718- 18762016000300006.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Sivathanu</surname>
          </string-name>
          ,
          <article-title>Adoption of digital payment systems in the era of demonetization in India</article-title>
          ,
          <source>Journal of Science and Technology Policy Management</source>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          ) (
          <year>2019</year>
          ), pp.
          <fpage>143</fpage>
          -
          <lpage>171</lpage>
          . DOI:
          <volume>10</volume>
          .1108/jstpm07-2017-0033.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. U. J.</given-names>
            <surname>Raharja</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Muhyi</surname>
          </string-name>
          , T. Herawaty,
          <article-title>Digital payment as an enabler for business opportunities: A go-pay case study</article-title>
          ,
          <source>Review of Integrative Business and Economics Research</source>
          ,
          <volume>9</volume>
          (
          <issue>1</issue>
          ) (
          <year>2020</year>
          ), pp.
          <fpage>319</fpage>
          -
          <lpage>329</lpage>
          . URL: http://buscompress.com/uploads/3/4/9/8/34980536/riber_
          <fpage>9</fpage>
          -
          <lpage>s1</lpage>
          _
          <fpage>25</fpage>
          _
          <fpage>b19</fpage>
          -
          <lpage>102</lpage>
          _
          <fpage>319</fpage>
          -
          <lpage>329</lpage>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Wan</given-names>
            <surname>Rung Lin</surname>
          </string-name>
          ,
          <string-name>
            <surname>Chun-Yueh Lin</surname>
          </string-name>
          and
          <string-name>
            <surname>Yu-Heng</surname>
            <given-names>Ding</given-names>
          </string-name>
          ,
          <article-title>Factors Affecting the Behavioral Intention to Adopt Mobile Payment: An Empirical Study in Taiwan</article-title>
          , Mathematics,
          <volume>8</volume>
          (
          <issue>10</issue>
          ) (
          <year>2020</year>
          )
          <year>1851</year>
          . DOI:
          <volume>10</volume>
          .3390/math8101851.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V.L.</given-names>
          </string-name>
          <article-title>Statistics of Software Vulnerability Detection in Certification Testing</article-title>
          .
          <source>Journal of Physics: Conference Series</source>
          .
          <year>2018</year>
          . V. 1015. P. 042033. DOI :
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          -6596/1015/4/042033
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Probabilistic</given-names>
            <surname>Modeling</surname>
          </string-name>
          in System Engineering / By ed.
          <source>A. Kostogryzov - London: IntechOpen</source>
          ,
          <year>2018</year>
          . 278 p. DOI:
          <volume>10</volume>
          .5772/intechopen.71396.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Max</surname>
            <given-names>Boholm</given-names>
          </string-name>
          ,
          <article-title>Twenty-five years of cyber threats in the news: a study of Swedish newspaper coverage (1995-2019)</article-title>
          ,
          <source>Journal of Cybersecurity</source>
          , volume
          <volume>7</volume>
          , issue 1,
          <year>2021</year>
          , tyab016. URL: https://doi.org/10.1093/cybsec/tyab016.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Amir</surname>
            <given-names>Feder</given-names>
          </string-name>
          , Neil Gandal,
          <string-name>
            <given-names>J. T.</given-names>
            <surname>Hamrick</surname>
          </string-name>
          , Tyler Moore,
          <article-title>The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt</article-title>
          . Gox,
          <source>Journal of Cybersecurity</source>
          , volume
          <volume>3</volume>
          ,
          <string-name>
            <surname>issue</surname>
            <given-names>2</given-names>
          </string-name>
          ,
          <year>June 2017</year>
          , pp.
          <fpage>137</fpage>
          -
          <lpage>144</lpage>
          . DOI:
          <volume>10</volume>
          .1093/cybsec/tyx012.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Ioannis</surname>
            <given-names>Agrafiotis</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jason R. C. Nurse</surname>
          </string-name>
          , Michael Goldsmith, Sadie Creese,
          <string-name>
            <surname>David Upton</surname>
          </string-name>
          ,
          <article-title>A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate</article-title>
          ,
          <source>Journal of Cybersecurity</source>
          , volume
          <volume>4</volume>
          , issue 1,
          <year>2018</year>
          , tyy006. DOI:
          <volume>10</volume>
          .1093/cybsec/tyy006.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Aaron</surname>
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Brantly</surname>
          </string-name>
          ,
          <article-title>Risk and uncertainty can be analyzed in cyberspace</article-title>
          ,
          <source>Journal of Cybersecurity</source>
          , volume
          <volume>7</volume>
          , issue 1,
          <year>2021</year>
          , tyab001. DOI:
          <volume>10</volume>
          .1093/cybsec/tyab001.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>J.</given-names>
            <surname>Lusthaus</surname>
          </string-name>
          ,
          <article-title>Industry of Anonymity: Inside the Business of Cybercrime</article-title>
          , Cambridge: Harvard University Press,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>E.</given-names>
            <surname>Conrad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Misenar</surname>
          </string-name>
          , J. Feldman,
          <source>CISSP Study Guide, 3rd edition</source>
          , Boston: Syngress,
          <year>2015</year>
          , pages
          <fpage>622</fpage>
          . doi:
          <volume>10</volume>
          .1016/C2009-0-61065-5.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Olifirov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.A.</given-names>
            <surname>Makoveichuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.Y.</given-names>
            <surname>Zhytnyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.N.</given-names>
            <surname>Filimonenkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.A.</given-names>
            <surname>Petrenko</surname>
          </string-name>
          ,
          <article-title>Models of Processes for Governance of Enterprise IT and Personnel Training for Digital Economy</article-title>
          ,
          <source>Proceedings of 2018 17th Russian Scientific</source>
          and
          <article-title>Practical Conference on Planning and Teaching Engineering Staff for the Industrial and Economic Complex of the Region</article-title>
          ,
          <source>PTES</source>
          <year>2018</year>
          ,
          <volume>8604166</volume>
          , pp.
          <fpage>216</fpage>
          -
          <lpage>219</lpage>
          . doi:
          <volume>10</volume>
          .1109/PTES.
          <year>2018</year>
          .
          <volume>8604166</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Jonathan Z Bakdash</surname>
          </string-name>
          , Steve Hutchinson, Erin G Zaroukian, Laura R Marusich, Saravanan Thirumuruganathan, Charmaine Sample, Blaine Hoffman,
          <string-name>
            <surname>Gautam Das</surname>
          </string-name>
          ,
          <article-title>Malware in the future? Forecasting of analyst detection of cyber events</article-title>
          ,
          <source>Journal of Cybersecurity</source>
          , volume
          <volume>4</volume>
          , issue 1,
          <year>2018</year>
          , tyy007. URL: https://doi.org/10.1093/cybsec/tyy007.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>