Economics of Malware: Security Decisions, Incentives and Externalities: Difference between revisions
Jump to navigation
Jump to search
Line 3: | Line 3: | ||
==Full Citation== | ==Full Citation== | ||
Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX''] | Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX''] | ||
==Categorization== | ==Categorization== |
Revision as of 18:10, 2 June 2010
Full Title of Reference
Economics of Malware: Security Decisions, Incentives and Externalities
Full Citation
Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities Web BibTeX
Categorization
Issues: Economics of Cybersecurity
Key Words
See the article itself for any key words as a starting point
Synopsis
This could be an abstract from the article.
Additional Notes and Highlights
* Outline key points of interest