The Impact of Public Information on Phishing Attack and Defense
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Moore, Tyler, 2010. "The economics of cybersecurity: Principles and policy options," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 103-117.
- Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Gauguier, Jean-Jacques, 2009. "L’industrialisation de l’Open Source," Economics Thesis from University Paris Dauphine, Paris Dauphine University, number 123456789/4388 edited by Toledano, Joëlle.
- Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
- Seo-Young Cho, 2016. "A crime 2.0 - cybercrime, e-talent, and institutions," MAGKS Papers on Economics 201608, Philipps-Universität Marburg, Faculty of Business Administration and Economics, Department of Economics (Volkswirtschaftliche Abteilung).
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
Review of Economic Studies,
Oxford University Press, vol. 81(4), pages 1518-1542.
- S. Goyal & A. Vigier, 2013. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1327, Faculty of Economics, University of Cambridge.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019.
"The attack and defense of weakest-link networks,"
Public Choice, Springer, vol. 179(3), pages 175-194, June.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
- Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2017. "The Attack and Defense of Weakest-Link Networks," Working Papers 17-19, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
- Dan Kovenock J. & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," CESifo Working Paper Series 3211, CESifo.
- Cloos, Janis & Mohr, Svenja, 2022. "Acceptance of data sharing in smartphone apps from key industries of the digital transformation: A representative population survey for Germany," Technological Forecasting and Social Change, Elsevier, vol. 176(C).
- Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
- Alexander A. Ganin & Phuoc Quach & Mahesh Panwar & Zachary A. Collier & Jeffrey M. Keisler & Dayton Marchese & Igor Linkov, 2020. "Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management," Risk Analysis, John Wiley & Sons, vol. 40(1), pages 183-199, January.
- Schmidt, Andreas, 2012. "At the boundaries of peer production: The organization of Internet security production in the cases of Estonia 2007 and Conficker," Telecommunications Policy, Elsevier, vol. 36(6), pages 451-461.
- Rajan, Rishabh & Rana, Nripendra P. & Parameswar, Nakul & Dhir, Sanjay & Sushil, & Dwivedi, Yogesh K., 2021. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management," Technological Forecasting and Social Change, Elsevier, vol. 170(C).
- Andjelka Kelic & Zachary A. Collier & Christopher Brown & Walter E. Beyeler & Alexander V. Outkin & Vanessa N. Vargas & Mark A. Ehlen & Christopher Judson & Ali Zaidi & Billy Leung & Igor Linkov, 2013. "Decision framework for evaluating the macroeconomic risks and policy impacts of cyber attacks," Environment Systems and Decisions, Springer, vol. 33(4), pages 544-560, December.
- Giacomo Battiston & Gianmarco Daniele & Marco Le Moglie & Paolo Pinotti, 2022.
"Fueling Organized Crime: The Mexican War on Drugs and Oil Thefts,"
"Marco Fanno" Working Papers
0286, Dipartimento di Scienze Economiche "Marco Fanno".
- Giacomo Battiston & Gianmarco Daniele & Marco Le Moglie & Paolo Pinotti, 2022. "Fueling Organized Crime: The Mexican War on Drugs and Oil Thefts," CESifo Working Paper Series 9521, CESifo.
- Giacomo Battiston & Gianmarco Daniele & Marco Le Moglie & Paolo Pinotti, 2022. "Fueling Organized Crime: The Mexican War on Drugs and Oil Thefts," BAFFI CAREFIN Working Papers 22171, BAFFI CAREFIN, Centre for Applied Research on International Markets Banking Finance and Regulation, Universita' Bocconi, Milano, Italy.
- Battiston, Giacomo & Daniele, Gianmarco & Le Moglie, Marco & Pinotti, Paolo, 2022. "Fueling Organized Crime: The Mexican War on Drugs and Oil Thefts," CEPR Discussion Papers 16914, C.E.P.R. Discussion Papers.
- Lam, Wing Man Wynne, 2014. "Ex Ante and Ex Post Investments in Cybersecurity," TSE Working Papers 14-519, Toulouse School of Economics (TSE).
- Ahnert, Toni & Brolley, Michael & Cimon, David & Riordan, Ryan, 2022.
"Cyber Risk and Security Investment,"
CEPR Discussion Papers
17403, C.E.P.R. Discussion Papers.
- Toni Ahnert & Michael Brolley & David Cimon & Ryan Riordan, 2022. "Cyber Risk and Security Investment," Staff Working Papers 22-32, Bank of Canada.
- Galbraith, John W. & Iuliani, Luca, 2019. "Measures of robustness for networked critical infrastructure: An empirical comparison on four electrical grids," International Journal of Critical Infrastructure Protection, Elsevier, vol. 27(C).
- Milena Dinkova & Ramy El-Dardiry & Bastiaan Overvest, 2020. "Cyber incidents, security measures and financial returns: Empirical evidence from Dutch firms," CPB Discussion Paper 411.rdf, CPB Netherlands Bureau for Economic Policy Analysis.
- Mezei, Péter & Verteș-Olteanu, Andreea, 2020. "Editorial: From trust in the system to trust in the content," Internet Policy Review: Journal on Internet Regulation, Alexander von Humboldt Institute for Internet and Society (HIIG), Berlin, vol. 9(4), pages 1-28.
- Reurink, Arjan, 2016. "Financial fraud: A literature review," MPIfG Discussion Paper 16/5, Max Planck Institute for the Study of Societies.
More about this item
Keywords
security economics; online crime; phishing; transparency;All these keywords.
JEL classification:
- K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law
- L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:idt:journl:cs8102. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: BLAVIER Thomas (email available below). General contact details of provider: https://edirc.repec.org/data/idatefr.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.