The Economics of Hacking
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Raphael, Steven & Winter-Ember, Rudolf, 2001.
"Identifying the Effect of Unemployment on Crime,"
Journal of Law and Economics, University of Chicago Press, vol. 44(1), pages 259-283, April.
- Raphael, Steven & WINTER-EBMER, RUDOLF, 1998. "Identifying the Effect of Unemployment on Crime," University of California at San Diego, Economics Working Paper Series qt5hb4h56g, Department of Economics, UC San Diego.
- Raphael, Steven & Winter-Ebmer, Rudolf, 1999. "Identifying the Effect of Unemployment on Crime," CEPR Discussion Papers 2129, C.E.P.R. Discussion Papers.
- Arunabha Mukhopadhyay & Samir Chatterjee & Kallol K. Bagchi & Peteer J. Kirs & Girja K. Shukla, 2019. "Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance," Information Systems Frontiers, Springer, vol. 21(5), pages 997-1018, October.
- Kai-Lung Hui & Ping Fan Ke & Yuxi Yao & Wei T. Yue, 2019. "Bilateral Liability-Based Contracts in Information Security Outsourcing," Information Systems Research, INFORMS, vol. 30(2), pages 411-429, June.
- Ashish Arora & Anand Nandkumar & Rahul Telang, 2006. "Does information security attack frequency increase with vulnerability disclosure? An empirical analysis," Information Systems Frontiers, Springer, vol. 8(5), pages 350-362, December.
- repec:eee:labchp:v:3:y:1999:i:pc:p:3529-3571 is not listed on IDEAS
- Amalia R. Miller & Catherine E. Tucker, 2011. "Encryption and the loss of patient data," Journal of Policy Analysis and Management, John Wiley & Sons, Ltd., vol. 30(3), pages 534-556, June.
- Polinsky, A. Mitchell & Shavell, Steven, 2007.
"The Theory of Public Enforcement of Law,"
Handbook of Law and Economics, in: A. Mitchell Polinsky & Steven Shavell (ed.), Handbook of Law and Economics, edition 1, volume 1, chapter 6, pages 403-454,
Elsevier.
- A. Mitchell Polinsky & Steven Shavell, 2005. "The Theory of Public Enforcement of Law," NBER Working Papers 11780, National Bureau of Economic Research, Inc.
- A. Mitchell Polinsky & Steven Shavell, 2005. "The Theory of Public Enforcement of Law," Discussion Papers 05-004, Stanford Institute for Economic Policy Research.
- Chul Ho Lee & Xianjun Geng & Srinivasan Raghunathan, 2013. "Contracting Information Security in the Presence of Double Moral Hazard," Information Systems Research, INFORMS, vol. 24(2), pages 295-311, June.
- Ian Ayres & Steven D. Levitt, 1998.
"Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack,"
The Quarterly Journal of Economics, Oxford University Press, vol. 113(1), pages 43-77.
- Ian Ayres & Steven D. Levitt, 1997. "Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack," NBER Working Papers 5928, National Bureau of Economic Research, Inc.
- George J. Stigler, 1974.
"The Optimum Enforcement of Laws,"
NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 55-67,
National Bureau of Economic Research, Inc.
- Stigler, George J, 1970. "The Optimum Enforcement of Laws," Journal of Political Economy, University of Chicago Press, vol. 78(3), pages 526-536, May-June.
- Sasha Romanosky & Rahul Telang & Alessandro Acquisti, 2011. "Do data breach disclosure laws reduce identity theft?," Journal of Policy Analysis and Management, John Wiley & Sons, Ltd., vol. 30(2), pages 256-286, March.
- Justin M. Rao & David H. Reiley, 2012. "The Economics of Spam," Journal of Economic Perspectives, American Economic Association, vol. 26(3), pages 87-110, Summer.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
- Sam Ransbotham & Sabyasachi Mitra, 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise," Information Systems Research, INFORMS, vol. 20(1), pages 121-139, March.
- Sabyasachi Mitra & Sam Ransbotham, 2015. "Information Disclosure and the Diffusion of Information Security Attacks," Information Systems Research, INFORMS, vol. 26(3), pages 565-584, September.
- Isaac Ehrlich, 1996. "Crime, Punishment, and the Market for Offenses," Journal of Economic Perspectives, American Economic Association, vol. 10(1), pages 43-67, Winter.
- George A. Akerlof, 1970. "The Market for "Lemons": Quality Uncertainty and the Market Mechanism," The Quarterly Journal of Economics, Oxford University Press, vol. 84(3), pages 488-500.
- Freeman, Richard B., 1999. "The economics of crime," Handbook of Labor Economics, in: O. Ashenfelter & D. Card (ed.), Handbook of Labor Economics, edition 1, volume 3, chapter 52, pages 3529-3571, Elsevier.
- Philip J. Cook & John MacDonald, 2011. "Public Safety through Private Action: an Economic Assessment of BIDS," Economic Journal, Royal Economic Society, vol. 121(552), pages 445-462, May.
- Tridib Bandyopadhyay & Vijay Mookerjee, 2019. "A model to analyze the challenge of using cyber insurance," Information Systems Frontiers, Springer, vol. 21(2), pages 301-325, April.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Isaac Ehrlich, 2010. "The Market Model of Crime: A Short Review and New Directions," Chapters, in: Bruce L. Benson & Paul R. Zimmerman (ed.), Handbook on the Economics of Crime, chapter 1, Edward Elgar Publishing.
- Qian Tang & Andrew B. Whinston, 2020. "Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐Experiment," Production and Operations Management, Production and Operations Management Society, vol. 29(2), pages 410-427, February.
- Milo Bianchi & Paolo Buonanno & Paolo Pinotti, 2012.
"Do Immigrants Cause Crime?,"
Journal of the European Economic Association, European Economic Association, vol. 10(6), pages 1318-1347, December.
- Milo Bianchi & Paolo Buonanno & Paolo Pinotti, 2008. "Do Immigrants Cause Crime?," Working Papers (-2012) 0801, University of Bergamo, Department of Economics.
- Milo Bianchi & Paolo Buonanno & Paolo Pinotti, 2012. "Do Immigrants Cause Crime?," Post-Print hal-01629746, HAL.
- Milo Bianchi & Paolo Buonanno & Paolo Pinotti, 2008. "Do immigrants cause crime?," Working Papers halshs-00586864, HAL.
- Milo Bianchi & Paolo Buonanno & Paolo Pinotti, 2012. "Do Immigrants Cause Crime?," Working Papers halshs-00670036, HAL.
- Milo Bianchi & Paolo Buonanno & Paolo Pinotti, 2008. "Do immigrants cause crime?," PSE Working Papers halshs-00586864, HAL.
- Bianchi, Milo & Buonanno, Paolo & Pinotti, Paolo, 2010. "Do Immigrants Cause Crime?," CEPREMAP Working Papers (Docweb) 1023, CEPREMAP.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, Open Access Journal, vol. 8(2), pages 1-23, May.
- Piopiunik, Marc & Ruhose, Jens, 2017.
"Immigration, regional conditions, and crime: Evidence from an allocation policy in Germany,"
European Economic Review, Elsevier, vol. 92(C), pages 258-282.
- Piopiunik, Marc & Ruhose, Jens, 2015. "Immigration, Regional Conditions, and Crime: Evidence from an Allocation Policy in Germany," Discussion Papers in Economics 24468, University of Munich, Department of Economics.
- Marc Piopiunik & Jens Ruhose, 2015. "Immigration, Regional Conditions, and Crime: Evidence from an Allocation Policy in Germany," CESifo Working Paper Series 5303, CESifo.
- Piopiunik, Marc & Ruhose, Jens, 2017. "Immigration, regional conditions, and crime: Evidence from an allocation policy in Germany," Munich Reprints in Economics 55045, University of Munich, Department of Economics.
- Piopiunik, Marc & Ruhose, Jens, 2015. "Immigration, Regional Conditions, and Crime: Evidence from an Allocation Policy in Germany," IZA Discussion Papers 8962, Institute of Labor Economics (IZA).
- Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
- Mongrain, Steeve & Roberts, Joanne, 2009.
"Plea bargaining with budgetary constraints,"
International Review of Law and Economics, Elsevier, vol. 29(1), pages 8-12, March.
- Steeve Mongrain & Joanne Roberts, 2007. "Plea Bargaining with Budgetary Constraints," Discussion Papers dp07-07, Department of Economics, Simon Fraser University.
- Denis Fougère & Francis Kramarz & Julien Pouget, 2009.
"Youth Unemployment and Crime in France,"
Journal of the European Economic Association, MIT Press, vol. 7(5), pages 909-938, September.
- Fougère, Denis & Kramarz, Francis & Pouget, Julien, 2006. "Youth Unemployment and Crime in France," CEPR Discussion Papers 5600, C.E.P.R. Discussion Papers.
- Fougère, Denis & Kramarz, Francis & Pouget, Julien, 2006. "Youth Unemployment and Crime in France," IZA Discussion Papers 2009, Institute of Labor Economics (IZA).
- Denis Fougère & Francis Kramarz & Julien Pouget, 2007. "Youth Unemployment and Crime in France," Working Papers 2007-33, Center for Research in Economics and Statistics.
- Paolo Buonanno, 2003. "The Socioeconomic Determinants of Crime. A Review of the Literature," Working Papers 63, University of Milano-Bicocca, Department of Economics, revised Nov 2003.
- Lam, Wing Man Wynne, 2014. "Ex Ante and Ex Post Investments in Cybersecurity," TSE Working Papers 14-519, Toulouse School of Economics (TSE).
- Salm, M. & Vollaard, B.A., 2014.
"Individual Perceptions of Local Crime Risk,"
Other publications TiSEM
7d0519da-c827-4f5d-9b0a-5, Tilburg University, School of Economics and Management.
- Salm, M. & Vollaard, B.A., 2014. "Individual Perceptions of Local Crime Risk," Discussion Paper 2014-044, Tilburg University, Tilburg Law and Economic Center.
- Salm, Martin & Vollaard, Ben, 2014. "Individual Perceptions of Local Crime Risk," IZA Discussion Papers 8677, Institute of Labor Economics (IZA).
- Salm, M. & Vollaard, B.A., 2014. "Individual Perceptions of Local Crime Risk," Other publications TiSEM 2d48eb1b-5ec6-497f-9da0-b, Tilburg University, School of Economics and Management.
- Salm, M. & Vollaard, B.A., 2014. "Individual Perceptions of Local Crime Risk," Discussion Paper 2014-072, Tilburg University, Center for Economic Research.
- Thomas A. Garrett & Lesli S. Ott, 2008. "City business cycles and crime," Working Papers 2008-026, Federal Reserve Bank of St. Louis.
- Ann Dryden Witte & Robert Witt, 2001. "What We Spend and What We Get: Public and Private Provision of Crime Prevention," NBER Working Papers 8204, National Bureau of Economic Research, Inc.
- Jens Ruhose, 2015. "Microeconometric Analyses on Economic Consequences of Selective Migration," ifo Beiträge zur Wirtschaftsforschung, ifo Institute - Leibniz Institute for Economic Research at the University of Munich, number 61, December.
- Bruno S. Frey, 2009. "Punishment - and beyond," CESifo Working Paper Series 2706, CESifo.
- Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.
- Bruno S. Frey, 2011.
"Punishment – and Beyond,"
Contemporary Economics, University of Economics and Human Sciences in Warsaw., vol. 5(2), June.
- Bruno S. Frey, 2009. "Punishment ? and beyond," CREMA Working Paper Series 2009-14, Center for Research in Economics, Management and the Arts (CREMA).
- Bruno S. Frey, 2009. "Punishment - and beyond," CESifo Working Paper Series 2706, CESifo.
- Aaron Chalfin & Benjamin Hansen & Jason Lerner & Lucie Parker, 2019. "Reducing Crime Through Environmental Design: Evidence from a Randomized Experiment of Street Lighting in New York City," NBER Working Papers 25798, National Bureau of Economic Research, Inc.
- GholamReza Keshavarz Haddad & Hamed Markazi Moghadam, 2011. "The socioeconomic and demographic determinants of crime in Iran (a regional panel study)," European Journal of Law and Economics, Springer, vol. 32(1), pages 99-114, August.
- Lam, W., 2015. "Attack-Deterring and Damage-Control Investments in Cybersecurity," LIDAM Discussion Papers CORE 2015023, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
More about this item
Keywords
hacker; hacking; cybercrime; supply; demand; law enforcement;All these keywords.
JEL classification:
- K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law
NEP fields
This paper has been announced in the following NEP Reports:- NEP-LAW-2020-10-19 (Law & Economics)
- NEP-LMA-2020-10-19 (Labor Markets - Supply, Demand, & Wages)
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pra:mprapa:102706. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Joachim Winter). General contact details of provider: https://edirc.repec.org/data/vfmunde.html .
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.