My bibliography
Save this item
The Economics of Online Crime
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.
- Giacomo Battiston & Gianmarco Daniele & Marco Le Moglie & Paolo Pinotti, 2022.
"Fueling Organized Crime: The Mexican War on Drugs and Oil Thefts,"
"Marco Fanno" Working Papers
0286, Dipartimento di Scienze Economiche "Marco Fanno".
- Giacomo Battiston & Gianmarco Daniele & Marco Le Moglie & Paolo Pinotti, 2022. "Fueling Organized Crime: The Mexican War on Drugs and Oil Thefts," BAFFI CAREFIN Working Papers 22171, BAFFI CAREFIN, Centre for Applied Research on International Markets Banking Finance and Regulation, Universita' Bocconi, Milano, Italy.
- Battiston, Giacomo & Daniele, Gianmarco & Le Moglie, Marco & Pinotti, Paolo, 2022. "Fueling Organized Crime: The Mexican War on Drugs and Oil Thefts," CEPR Discussion Papers 16914, C.E.P.R. Discussion Papers.
- Giacomo Battiston & Gianmarco Daniele & Marco Le Moglie & Paolo Pinotti, 2022. "Fueling Organized Crime: The Mexican War on Drugs and Oil Thefts," CESifo Working Paper Series 9521, CESifo.
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
The Review of Economic Studies, Review of Economic Studies Ltd, vol. 81(4), pages 1518-1542.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- Huub Meijers, 2014.
"Does the internet generate economic growth, international trade, or both?,"
International Economics and Economic Policy, Springer, vol. 11(1), pages 137-163, February.
- Meijers, Huub, 2012. "Does the internet generate economic growth, international trade, or both?," MERIT Working Papers 2012-050, United Nations University - Maastricht Economic and Social Research Institute on Innovation and Technology (MERIT).
- Jian Pei, 2020. "A Survey on Data Pricing: from Economics to Data Science," Papers 2009.04462, arXiv.org, revised Nov 2020.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019.
"The attack and defense of weakest-link networks,"
Public Choice, Springer, vol. 179(3), pages 175-194, June.
- Dan Kovenock J. & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," CESifo Working Paper Series 3211, CESifo.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2017. "The Attack and Defense of Weakest-Link Networks," Working Papers 17-19, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
- Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
- Lam, Wing Man Wynne, 2014. "Ex Ante and Ex Post Investments in Cybersecurity," TSE Working Papers 14-519, Toulouse School of Economics (TSE).
- Martin Offei & Francis Kofi Andoh-Baidoo & Emmanuel W. Ayaburi & David Asamoah, 2022. "How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?," Information Systems Frontiers, Springer, vol. 24(2), pages 475-491, April.
- Reurink, Arjan, 2016. "Financial fraud: A literature review," MPIfG Discussion Paper 16/5, Max Planck Institute for the Study of Societies.
- Rowland, Jill & Rice, Mason & Shenoi, Sujeet, 2014. "Whither cyberpower?," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(2), pages 124-137.
- Friedrich Schneider, 2013. "The Financial Flows of Transnational Crime and Tax Fraud in OECD Countries," Public Finance Review, , vol. 41(5), pages 677-707, September.
- Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
- Seo-Young Cho, 2016. "A crime 2.0 - cybercrime, e-talent, and institutions," MAGKS Papers on Economics 201608, Philipps-Universität Marburg, Faculty of Business Administration and Economics, Department of Economics (Volkswirtschaftliche Abteilung).
- Milena Dinkova & Ramy El-Dardiry & Bastiaan Overvest, 2024. "Should firms invest more in cybersecurity?," Small Business Economics, Springer, vol. 63(1), pages 21-50, June.
- Hui, Kai-Lung & Zhou, Jiali, 2020. "The Economics of Hacking," MPRA Paper 102706, University Library of Munich, Germany.
- Lam, W., 2015. "Attack-Deterring and Damage-Control Investments in Cybersecurity," LIDAM Discussion Papers CORE 2015023, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
Review of Economic Studies,
Oxford University Press, vol. 81(4), pages 1518-1542.
- S. Goyal & A. Vigier, 2013. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1327, Faculty of Economics, University of Cambridge.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- Tyler MOORE & Richard CLAYTON, 2011. "The Impact of Public Information on Phishing Attack and Defense," Communications & Strategies, IDATE, Com&Strat dept., vol. 1(81), pages 45-68, 1st quart.
- Schwemer, Sebastian Felix, 2020. "The regulation of abusive activity and content: a study of registries' terms of service," Internet Policy Review: Journal on Internet Regulation, Alexander von Humboldt Institute for Internet and Society (HIIG), Berlin, vol. 9(1), pages 1-22.
- Gauguier, Jean-Jacques, 2009. "L’industrialisation de l’Open Source," Economics Thesis from University Paris Dauphine, Paris Dauphine University, number 123456789/4388 edited by Toledano, Joëlle.
- Schmidt, Andreas, 2012. "At the boundaries of peer production: The organization of Internet security production in the cases of Estonia 2007 and Conficker," Telecommunications Policy, Elsevier, vol. 36(6), pages 451-461.
- Gubello, Michele, 2024. "Social trust and the support for universal basic income," European Journal of Political Economy, Elsevier, vol. 81(C).
- Kox, Henk L.M., 2013. "Cybersecurity in the perspective of Internet traffic growth," MPRA Paper 47883, University Library of Munich, Germany.
- Malecki, Edward J., 2017. "Real people, virtual places, and the spaces in between," Socio-Economic Planning Sciences, Elsevier, vol. 58(C), pages 3-12.
- Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
- Sood, Aditya K. & Enbody, Richard J., 2013. "Crimeware-as-a-service—A survey of commoditized crimeware in the underground market," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6(1), pages 28-38.
- Milena Dinkova & Ramy El-Dardiry & Bastiaan Overvest, 2020. "Cyber incidents, security measures and financial returns: Empirical evidence from Dutch firms," CPB Discussion Paper 411, CPB Netherlands Bureau for Economic Policy Analysis.
- Cloos, Janis & Mohr, Svenja, 2022. "Acceptance of data sharing in smartphone apps from key industries of the digital transformation: A representative population survey for Germany," Technological Forecasting and Social Change, Elsevier, vol. 176(C).
- Zheng, Shilin & Duan, Yuwei & Ward, Michael R., 2019. "The effect of broadband internet on divorce in China," Technological Forecasting and Social Change, Elsevier, vol. 139(C), pages 99-114.
- Milena Dinkova & Ramy El-Dardiry & Bastiaan Overvest, 2020. "Cyber incidents, security measures and financial returns: Empirical evidence from Dutch firms," CPB Discussion Paper 411.rdf, CPB Netherlands Bureau for Economic Policy Analysis.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Cerdeiro, Diego A. & Dziubiński, Marcin & Goyal, Sanjeev, 2017. "Individual security, contagion, and network design," Journal of Economic Theory, Elsevier, vol. 170(C), pages 182-226.