Economics of Malware: Security Decisions, Incentives and Externalities: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 3: Line 3:


==Full Citation==
==Full Citation==
''Bluebook Style''


Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf  ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX'']
Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf  ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX'']


==Categorization==
==Categorization==

Revision as of 18:10, 2 June 2010

Full Title of Reference

Economics of Malware: Security Decisions, Incentives and Externalities

Full Citation

Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities Web BibTeX

Categorization

Issues: Economics of Cybersecurity

Key Words

See the article itself for any key words as a starting point

Synopsis

This could be an abstract from the article.

Additional Notes and Highlights

* Outline key points of interest