Economics of Malware: Difference between revisions
Jump to navigation
Jump to search
(New page: ==Full Title of Reference== Economics of Malware: Security Decisions, Incentives and Externalities ==Full Citation== Michel J. G. van Eeten and Johannes M. Bauer, OECD, Economics of Malw...) |
|||
Line 4: | Line 4: | ||
==Full Citation== | ==Full Citation== | ||
Michel J. G. van Eeten and Johannes M. Bauer, OECD, Economics of Malware: Security Decisions, Incentives and Externalities (2008).[http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf ''Web''] | Michel J. G. van Eeten and Johannes M. Bauer, OECD, Economics of Malware: Security Decisions, Incentives and Externalities (2008). [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf ''Web''] | ||
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX''] | [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX''] |
Revision as of 10:36, 4 June 2010
Full Title of Reference
Economics of Malware: Security Decisions, Incentives and Externalities
Full Citation
Michel J. G. van Eeten and Johannes M. Bauer, OECD, Economics of Malware: Security Decisions, Incentives and Externalities (2008). Web
Categorization
Issues: Economics of Cybersecurity
Key Words
See the article itself for any key words as a starting point
Synopsis
This could be an abstract from the article.
Additional Notes and Highlights
* Outline key points of interest