Interpretation of the hacker industry chain model: How to end the era of data "running naked"?