Difference between revisions of "Economics of Malware: Security Decisions, Incentives and Externalities"

From Cybersecurity Wiki
Jump to: navigation, search
(Full Citation)
(Full Citation)
Line 4: Line 4:
 
==Full Citation==
 
==Full Citation==
  
Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf  ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX'']
+
Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities, STI Working Paper, 2008/1, Information and Communication Technologies, Organisation de Coopération et de Développement Économiques (OECD). [http://cyber.law.harvard.edu/cybersecurity/www.oecd.org/dataoecd/53/17/40722462.pdf  ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=vanEeten_Bauer:2008&f=wikibiblio.bib ''BibTeX'']
  
 
==Categorization==
 
==Categorization==

Revision as of 09:22, 8 June 2010

Full Title of Reference

Economics of Malware: Security Decisions, Incentives and Externalities

Full Citation

Michel J. G. van Eeten and Johannes M. Bauer (2008): Economics of Malware: Security Decisions, Incentives and Externalities, STI Working Paper, 2008/1, Information and Communication Technologies, Organisation de Coopération et de Développement Économiques (OECD). Web BibTeX

Categorization

Issues: Economics of Cybersecurity

Key Words

See the article itself for any key words as a starting point

Synopsis

This could be an abstract from the article.

Additional Notes and Highlights

* Outline key points of interest