Economics of Malware: Security Decisions, Incentives and Externalities: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
 
(2 intermediate revisions by 2 users not shown)
Line 4: Line 4:
==Full Citation==
==Full Citation==


''Bluebook Style''
Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities. STI Working Paper, 2008/1, Information and Communication Technologies, Organisation de Coopération et de Développement Économiques (OECD). [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf  ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX'']
 
Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf  ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX'']
 


==Categorization==
==Categorization==

Latest revision as of 10:22, 8 June 2010

Full Title of Reference

Economics of Malware: Security Decisions, Incentives and Externalities

Full Citation

Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities. STI Working Paper, 2008/1, Information and Communication Technologies, Organisation de Coopération et de Développement Économiques (OECD). Web BibTeX

Categorization

Issues: Economics of Cybersecurity

Key Words

See the article itself for any key words as a starting point

Synopsis

This could be an abstract from the article.

Additional Notes and Highlights

* Outline key points of interest