A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is
Existing cybercrime research in the information systems (IS) field has focused on a subset of corporate incidents (e.g., fraud, hacking intrusions), and emphasized solutions designed to repel attacks or to minimize their aftermath (e.g., barrier technologies, enhanced security procedures). This focused, defensive, and pragmatic posture is valuable and necessary as an immediate triage response, to "stop the bleeding" and provide protection from imminent harm. However, the extant work has notdoi:10.1109/hicss.2010.417 dblp:conf/hicss/Neufeld10 fatcat:mzywomn7grby5ax2dphfzix3ei