[1]
K. Hausken, “A STRATEGIC ANALYSIS OF INFORMATION SHARING AMONG CYBER HACKERS”, JISTEM J. Inf. Syst. Technol. Manag. (Online), vol. 12, no. 2, pp. 245-270, Aug. 2015.