Full article: Hacker Definitions in Information Systems Research

Holt, Leukfeldt 12 HoltTJ, LeukfeldtR, van de WeijerS . An examination of motivation and routine activity theory to account for cyberattacks against Dutch …Holt, Leukfeldt 12 HoltTJ, LeukfeldtR, van de WeijerS . An examination of motivation and routine activity theory to account for cyberattacks against Dutch …Read More