Crimeware-as-a-service—A survey of commoditized crimeware in the underground market
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ijcip.2013.01.002
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Steigerwald, Douglas & Vigna, Giovanni & Kruegel, Christopher & Kemmerer, Richard & Abman, Ryan & Stone-Gross, Brett, 2011. "The Underground Economy of Fake Antivirus Software," University of California at Santa Barbara, Economics Working Paper Series qt7p07k0zr, Department of Economics, UC Santa Barbara.
- Susan W. Brenner, 2004. "U.S. Cybercrime Law: Defining Offenses," Information Systems Frontiers, Springer, vol. 6(2), pages 115-132, June.
- Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
- Anderson, David A., 2012. "The Cost of Crime," Foundations and Trends(R) in Microeconomics, now publishers, vol. 7(3), pages 209-265, September.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Gauguier, Jean-Jacques, 2009. "L’industrialisation de l’Open Source," Economics Thesis from University Paris Dauphine, Paris Dauphine University, number 123456789/4388 edited by Toledano, Joëlle.
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
Review of Economic Studies,
Oxford University Press, vol. 81(4), pages 1518-1542.
- S. Goyal & A. Vigier, 2013. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1327, Faculty of Economics, University of Cambridge.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Tyler MOORE & Richard CLAYTON, 2011. "The Impact of Public Information on Phishing Attack and Defense," Communications & Strategies, IDATE, Com&Strat dept., vol. 1(81), pages 45-68, 1st quart.
- Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
- Schmidt, Andreas, 2012. "At the boundaries of peer production: The organization of Internet security production in the cases of Estonia 2007 and Conficker," Telecommunications Policy, Elsevier, vol. 36(6), pages 451-461.
- Wickramasekera, Nyantara & Wright, Judy & Elsey, Helen & Murray, Jenni & Tubeuf, Sandy, 2015. "Cost of crime: A systematic review," Journal of Criminal Justice, Elsevier, vol. 43(3), pages 218-228.
- Moghaddam, M.R., 2003. "Improving Iran's Domestic Energy Basket," Other publications TiSEM 6af748d0-216c-4ca2-ac35-b, Tilburg University, School of Economics and Management.
- Lam, Wing Man Wynne, 2014. "Ex Ante and Ex Post Investments in Cybersecurity," TSE Working Papers 14-519, Toulouse School of Economics (TSE).
- Jacob Vogler, 2020. "Access to Healthcare and Criminal Behavior: Evidence from the ACA Medicaid Expansions," Journal of Policy Analysis and Management, John Wiley & Sons, Ltd., vol. 39(4), pages 1166-1213, September.
- Balafoutas, Loukas & García-Gallego, Aurora & Georgantzis, Nikolaos & Jaber-Lopez, Tarek & Mitrokostas, Evangelos, 2020.
"Rehabilitation and social behavior: Experiments in prison,"
Games and Economic Behavior, Elsevier, vol. 119(C), pages 148-171.
- Tarek Jaber-Lopez & Loukas Balafoutas & Aurora Garcia-Gallego & Nikolaos Georgantzis & Evangelos Mitrokostas, 2020. "Rehabilitation and social behavior: Experiments in prison," Post-Print hal-02975906, HAL.
- Rowland, Jill & Rice, Mason & Shenoi, Sujeet, 2014. "Whither cyberpower?," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(2), pages 124-137.
- Alex Raskolnikov, 2020. "Criminal Deterrence: A Review of the Missing Literature," Supreme Court Economic Review, University of Chicago Press, vol. 28(1), pages 1-59.
- Gubello, Michele, 2024. "Social trust and the support for universal basic income," European Journal of Political Economy, Elsevier, vol. 81(C).
- Malecki, Edward J., 2017. "Real people, virtual places, and the spaces in between," Socio-Economic Planning Sciences, Elsevier, vol. 58(C), pages 3-12.
- Schwemer, Sebastian Felix, 2020. "The regulation of abusive activity and content: a study of registries' terms of service," Internet Policy Review: Journal on Internet Regulation, Alexander von Humboldt Institute for Internet and Society (HIIG), Berlin, vol. 9(1), pages 1-22.
- Chen-Fu Chien & Chung-Jen Kuo & Chih-Min Yu, 2020. "Tool allocation to smooth work-in-process for cycle time reduction and an empirical study," Annals of Operations Research, Springer, vol. 290(1), pages 1009-1033, July.
- Huub Meijers, 2014.
"Does the internet generate economic growth, international trade, or both?,"
International Economics and Economic Policy, Springer, vol. 11(1), pages 137-163, February.
- Meijers, Huub, 2012. "Does the internet generate economic growth, international trade, or both?," MERIT Working Papers 2012-050, United Nations University - Maastricht Economic and Social Research Institute on Innovation and Technology (MERIT).
- Milena Dinkova & Ramy El-Dardiry & Bastiaan Overvest, 2020. "Cyber incidents, security measures and financial returns: Empirical evidence from Dutch firms," CPB Discussion Paper 411, CPB Netherlands Bureau for Economic Policy Analysis.
- Cerdeiro, Diego A. & Dziubiński, Marcin & Goyal, Sanjeev, 2017. "Individual security, contagion, and network design," Journal of Economic Theory, Elsevier, vol. 170(C), pages 182-226.
More about this item
Keywords
Cyber crime; Underground economy; Commoditized crimeware; Crimeware-as-a-service;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:6:y:2013:i:1:p:28-38. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.