The Impact of Public Information on Phishing Attack and Defense
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Moore, Tyler, 2010. "The economics of cybersecurity: Principles and policy options," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 103-117.
- Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Gauguier, Jean-Jacques, 2009. "L’industrialisation de l’Open Source," Economics Thesis from University Paris Dauphine, Paris Dauphine University, number 123456789/4388 edited by Toledano, Joëlle.
- Gonzalez-Jimenez, David & Capozza, Francesco & Dirkmaat, Thomas & van de Veer, Evelien & van Druten, Amber & Baillon, Aurélien, 2025.
"Falling and failing (to learn): Evidence from a nation-wide cybersecurity field experiment with SMEs,"
Journal of Economic Behavior & Organization, Elsevier, vol. 230(C).
- David Gonzalez-Jimenez & Francesco Capozza & Thomas Dirkmaat & Evelien van de Veer & Amber van Druten & Aurélien Baillon, 2025. "Falling and failing (to learn) : Evidence from a nation-wide cybersecurity field experiment with SMEs," Post-Print hal-04875787, HAL.
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
Review of Economic Studies,
Oxford University Press, vol. 81(4), pages 1518-1542.
- S. Goyal & A. Vigier, 2013. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1327, Faculty of Economics, University of Cambridge.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
- Alexander A. Ganin & Phuoc Quach & Mahesh Panwar & Zachary A. Collier & Jeffrey M. Keisler & Dayton Marchese & Igor Linkov, 2020. "Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management," Risk Analysis, John Wiley & Sons, vol. 40(1), pages 183-199, January.
- Schmidt, Andreas, 2012. "At the boundaries of peer production: The organization of Internet security production in the cases of Estonia 2007 and Conficker," Telecommunications Policy, Elsevier, vol. 36(6), pages 451-461.
- Lam, Wing Man Wynne, 2014. "Ex Ante and Ex Post Investments in Cybersecurity," TSE Working Papers 14-519, Toulouse School of Economics (TSE).
- Yugang He, 2024. "China’s digital shadows: unveiling the economic toll of cybercrime," Humanities and Social Sciences Communications, Palgrave Macmillan, vol. 11(1), pages 1-10, December.
- Mezei, Péter & Verteș-Olteanu, Andreea, 2020. "Editorial: From trust in the system to trust in the content," Internet Policy Review: Journal on Internet Regulation, Alexander von Humboldt Institute for Internet and Society (HIIG), Berlin, vol. 9(4), pages 1-28.
- Moritz-C. Schlegel & Claudia Koch & Mona Mirtsch & Andrea Harrer, 2021. "Smart Products Enable Smart Regulations—Optimal Durability Requirements Facilitated by the IoT," Sustainability, MDPI, vol. 13(8), pages 1-14, April.
- Rowland, Jill & Rice, Mason & Shenoi, Sujeet, 2014. "Whither cyberpower?," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(2), pages 124-137.
- Gubello, Michele, 2024. "Social trust and the support for universal basic income," European Journal of Political Economy, Elsevier, vol. 81(C).
- Malecki, Edward J., 2017. "Real people, virtual places, and the spaces in between," Socio-Economic Planning Sciences, Elsevier, vol. 58(C), pages 3-12.
- Richard J. Sullivan, 2014. "Controlling security risk and fraud in payment systems," Economic Review, Federal Reserve Bank of Kansas City, issue Q III, pages 5-36.
- Md. Hamid Uddin & Md. Hakim Ali & Mohammad Kabir Hassan, 2020. "Cybersecurity hazards and financial system vulnerability: a synthesis of literature," Risk Management, Palgrave Macmillan, vol. 22(4), pages 239-309, December.
- repec:bcp:journl:v:9:y:2025:i:11:p:3056-3069 is not listed on IDEAS
- Schwemer, Sebastian Felix, 2020. "The regulation of abusive activity and content: a study of registries' terms of service," Internet Policy Review: Journal on Internet Regulation, Alexander von Humboldt Institute for Internet and Society (HIIG), Berlin, vol. 9(1), pages 1-22.
- Dirk Wrede & Tino Stegen & Johann-Matthias Schulenburg, 2020. "Affirmative and silent cyber coverage in traditional insurance policies: Qualitative content analysis of selected insurance products from the German insurance market," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 45(4), pages 657-689, October.
- Sood, Aditya K. & Enbody, Richard J., 2013. "Crimeware-as-a-service—A survey of commoditized crimeware in the underground market," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6(1), pages 28-38.
- Milena Dinkova & Ramy El-Dardiry & Bastiaan Overvest, 2020. "Cyber incidents, security measures and financial returns: Empirical evidence from Dutch firms," CPB Discussion Paper 411, CPB Netherlands Bureau for Economic Policy Analysis.
More about this item
Keywords
; ; ; ;JEL classification:
- K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law
- L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:idt:journl:cs8102. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: BLAVIER Thomas The email address of this maintainer does not seem to be valid anymore. Please ask BLAVIER Thomas to update the entry or send us the correct address (email available below). General contact details of provider: https://edirc.repec.org/data/idatefr.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.
Printed from https://ideas.repec.org/a/idt/journl/cs8102.html