Difference between revisions of "Economics of Malware: Security Decisions, Incentives and Externalities"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 3: Line 3:
  
 
==Full Citation==
 
==Full Citation==
 
''Bluebook Style''
 
  
 
Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf  ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX'']
 
Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf  ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX'']
 
  
 
==Categorization==
 
==Categorization==

Revision as of 22:10, 2 June 2010

Full Title of Reference

Economics of Malware: Security Decisions, Incentives and Externalities

Full Citation

Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities Web BibTeX

Categorization

Issues: Economics of Cybersecurity

Key Words

See the article itself for any key words as a starting point

Synopsis

This could be an abstract from the article.

Additional Notes and Highlights

* Outline key points of interest