[1]
“A STRATEGIC ANALYSIS OF INFORMATION SHARING AMONG CYBER HACKERS”, JISTEM J. Inf. Syst. Technol. Manag. (Online), vol. 12, no. 2, pp. 245–270, Aug. 2015, doi: 10.4301/S1807-17752015000200004.