Showing 1 - 2 of 2
This article has three goals. First, the authors review the available data on the phenomenon of cyber-extortion - the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. Second, the authors investigate why...
Persistent link: https://www.econbiz.de/10014053535
Persistent link: https://www.econbiz.de/10014307000