Special Section Introduction: Ubiquitous IT and Digital Vulnerabilities