Economics of Malware: Security Decisions, Incentives and Externalities: Difference between revisions
Jump to navigation
Jump to search
Line 4: | Line 4: | ||
==Full Citation== | ==Full Citation== | ||
Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities | Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities. STI Working Paper, 2008/1, Information and Communication Technologies, Organisation de Coopération et de Développement Économiques (OECD). [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX''] | ||
==Categorization== | ==Categorization== |
Latest revision as of 10:22, 8 June 2010
Full Title of Reference
Economics of Malware: Security Decisions, Incentives and Externalities
Full Citation
Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities. STI Working Paper, 2008/1, Information and Communication Technologies, Organisation de Coopération et de Développement Économiques (OECD). Web BibTeX
Categorization
Issues: Economics of Cybersecurity
Key Words
See the article itself for any key words as a starting point
Synopsis
This could be an abstract from the article.
Additional Notes and Highlights
* Outline key points of interest