-
1
-
-
84954582192
-
With personal data in hand, thieves file early and often
-
Alvarez, L.: With personal data in hand, thieves file early and often. The New York Times. http://www.nytimes.com/2012/05/27/us/id-thieves-loot-tax-checks-filing-early-and-often. html (2012)
-
(2012)
The New York Times
-
-
Alvarez, L.1
-
2
-
-
67249120924
-
-
Anderson, R., Böhme, R., Clayton, R., Moore, T.: Security economics and the internal market. http://www.enisa.europa.eu/act/sr/reports/econ-sec/economics-sec (2008)
-
(2008)
Security economics and the internal market
-
-
Anderson, R.1
Böhme, R.2
Clayton, R.3
Moore, T.4
-
5
-
-
85064176806
-
Measuring pay-per-install: The commoditisation of malware distribution
-
USENIX Association
-
Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring pay-per-install: the commoditisation of malware distribution. In: Proceedings of the 20th USENIX Conference on Security, SEC’11, Berkeley. USENIX Association (2011)
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC’11, Berkeley
-
-
Caballero, J.1
Grier, C.2
Kreibich, C.3
Paxson, V.4
-
8
-
-
84908982263
-
State of the ‘net’ survey ’07
-
Consumers Union: State of the ‘net’ survey ’07. Consum. Rep. 9, 28-34 (2007)
-
(2007)
Consum. Rep
, vol.9
, pp. 28-34
-
-
Consumers Union1
-
14
-
-
67249093944
-
Evaluating a trial deployment of password re-use for phishing prevention
-
Cranor, L.F. (ed.), 4-5 Oct 2007. ACM
-
Florêncio, D., Herley, C.: Evaluating a trial deployment of password re-use for phishing prevention. In: Cranor, L.F. (ed.) Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit, Pittsburgh, vol. 269, pp. 26-36, 4-5 Oct 2007. ACM (2007)
-
(2007)
Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit, Pittsburgh
, vol.269
, pp. 26-36
-
-
Florêncio, D.1
Herley, C.2
-
16
-
-
84870267671
-
-
Foley, L., Barney, K., Foley, J., Leeii, J., Fergerson, J., Sarrel, M., Nelson, C., Frank, M.: Identity theft: the aftermath 2009. http://www.idtheftcenter.org/artman2/uploads/1/Aftermath_ 2009_20100520.pdf (2010)
-
(2010)
Identity theft: The aftermath 2009
-
-
Foley, L.1
Barney, K.2
Foley, J.3
Leeii, J.4
Fergerson, J.5
Sarrel, M.6
Nelson, C.7
Frank, M.8
-
19
-
-
84948114341
-
The German Anti-Botnet Advisory Center
-
13-15 Sept 2011, Brühl
-
Gözenoglu, M., Morawe, R.: The German Anti-Botnet Advisory Center. Presentation at ‘Internet Security Days’, 13-15 Sept 2011, Brühl. http://www.internet-security-days.com/templates/downloads/session-2011/110913_Goezenoglu_Morawe_ABBZ.pdf (2011)
-
(2011)
Internet Security Days
-
-
Gözenoglu, M.1
Morawe, R.2
-
20
-
-
77955014970
-
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
-
Herley, C., Florêncio, D.: Nobody sells gold for the price of silver: dishonesty, uncertainty and the underground economy. In: Proceedings (online) of theWorkshop on Economics of Information Security. http://research.microsoft.com/pubs/80034/nobodysellsgoldforthepriceofsilver. pdf (2009)
-
(2009)
Proceedings (online) of theWorkshop on Economics of Information Security
-
-
Herley, C.1
Florêncio, D.2
-
22
-
-
85025655153
-
Stopping the carousel: Missing trader fraud in the EU
-
House of Lords European Union Committee: Stopping the carousel: missing trader fraud in the EU. 20th Report of Session 2006-2007 (2007)
-
(2007)
20th Report of Session 2006-2007
-
-
-
23
-
-
84873633153
-
-
TNO report 34782
-
Huygen, A., Rutten, P., Huveneers, S., Limonard, S., Poort, J., Leenheer, J., Janssen, K., van Eijk, N., Helberger, N.: Ups and downs - economic and cultural effects of file sharing on music, film and games. TNO report 34782 http://www.ivir.nl/publicaties/vaneijk/Ups_And_ Downs_authorised_translation.pdf (2009)
-
(2009)
Ups and downs - economic and cultural effects of file sharing on music, film and games
-
-
Huygen, A.1
Rutten, P.2
Huveneers, S.3
Limonard, S.4
Poort, J.5
Leenheer, J.6
Janssen, K.7
van Eijk, N.8
Helberger, N.9
-
24
-
-
4644330550
-
Signal crimes and signal disorders: Notes on deviance as communicative action
-
Innes, M.: Signal crimes and signal disorders: notes on deviance as communicative action. Br. J. Sociol. 55, 335-355 (2004)
-
(2004)
Br. J. Sociol
, vol.55
, pp. 335-355
-
-
Innes, M.1
-
28
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: Proceedings of the ACM Conference on Computer and Communications Security, Alexandria (2008)
-
(2008)
Proceedings of the ACM Conference on Computer and Communications Security, Alexandria
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
29
-
-
85076490024
-
Show me the money: Characterizing spam-advertised revenue
-
Kanich, C., Weaver, N., McCoy, D., Halvorson, T., Kreibich, C., Levchenko, K., Paxson, V., Voelker, G.M., Savage, S.: Show me the money: characterizing spam-advertised revenue. In: Proceedings of the USENIX Security Symposium, San Francisco (2011)
-
(2011)
Proceedings of the USENIX Security Symposium, San Francisco
-
-
Kanich, C.1
Weaver, N.2
McCoy, D.3
Halvorson, T.4
Kreibich, C.5
Levchenko, K.6
Paxson, V.7
Voelker, G.M.8
Savage, S.9
-
33
-
-
4944242400
-
Buyer search costs and endogenous product design
-
Kuksov, D.: Buyer search costs and endogenous product design. Mark. Sci. 23(4), 490-499 (2004)
-
(2004)
Mark. Sci
, vol.23
, Issue.4
, pp. 490-499
-
-
Kuksov, D.1
-
34
-
-
84888088814
-
Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade
-
Leontiadis, N., Moore, T., Christin, N.: Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In: Proceedings of the USENIX Security, San Francisco (2011)
-
(2011)
Proceedings of the USENIX Security, San Francisco
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
35
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
Levchenko, K., Chachra, N., Enright, B., Felegyhazi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Pitsillidis, A., Weaver, N., Paxson, V., Voelker, G.M., Savage, S.: Click trajectories: end-to-end analysis of the spam value chain. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland (2011)
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy, Oakland
-
-
Levchenko, K.1
Chachra, N.2
Enright, B.3
Felegyhazi, M.4
Grier, C.5
Halvorson, T.6
Kanich, C.7
Kreibich, C.8
Liu, H.9
McCoy, D.10
Pitsillidis, A.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
36
-
-
84864789471
-
Social reactions to white-collar crimes and their relationship to economic crises
-
Deflem, M. (ed.), The JAI Press/Emerald, London/Bingley
-
Levi, M.: Social reactions to white-collar crimes and their relationship to economic crises. In: Deflem, M. (ed.) Economic Crisis and Crime, pp. 87-105. The JAI Press/Emerald, London/Bingley (2011)
-
(2011)
Economic Crisis and Crime
, pp. 87-105
-
-
Levi, M.1
-
37
-
-
52449086933
-
Measuring the impact of fraud in the UK: A conceptual and empirical journey
-
Levi, M., Burrows, J.: Measuring the impact of fraud in the UK: a conceptual and empirical journey. Br. J. Criminol. 48, 293-318 (2008)
-
(2008)
Br. J. Criminol
, vol.48
, pp. 293-318
-
-
Levi, M.1
Burrows, J.2
-
39
-
-
84886092418
-
Online vs. Offline Competition
-
Peitz, M., Waldfogel, J. (eds.), Oxford University Press, New York
-
Lieber, E., Syverson, C.: Online vs. Offline Competition. In: Peitz, M., Waldfogel, J. (eds.) The Oxford Handbook of the Digital Economy. Oxford University Press, New York (2012)
-
(2012)
The Oxford Handbook of the Digital Economy
-
-
Lieber, E.1
Syverson, C.2
-
40
-
-
85025709287
-
-
M86 Security Labs: Canadian pharmacy no longer king. http://www.m86security.com/labs/traceitem.asp?article=1316 (2010)
-
(2010)
Canadian pharmacy no longer king
-
-
-
41
-
-
84900789776
-
PharmaLeaks: Understanding the business of online pharmaceutical affiliate programs
-
McCoy, D., Pitsillidis, A., Jordan, G., Waver, N., Kreibich, C., Krebs, B., Voelker, G.M., Savage, S., Levchenko, K.: PharmaLeaks: understanding the business of online pharmaceutical affiliate programs. In: Proceedings of the USENIX Security Symposium, Bellevue (2012)
-
(2012)
Proceedings of the USENIX Security Symposium, Bellevue
-
-
McCoy, D.1
Pitsillidis, A.2
Jordan, G.3
Waver, N.4
Kreibich, C.5
Krebs, B.6
Voelker, G.M.7
Savage, S.8
Levchenko, K.9
-
44
-
-
77953898602
-
Examining the impact of website take-down on phishing
-
Cranor, L.F. (ed.), 4-5 Oct 2007. ACM
-
Moore, T., Clayton, R.: Examining the impact of website take-down on phishing. In: Cranor, L.F. (ed.) Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, Pittsburgh, vol. 269, pp. 1-13, 4-5 Oct 2007. ACM (2007)
-
(2007)
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, Pittsburgh
, vol.269
, pp. 1-13
-
-
Moore, T.1
Clayton, R.2
-
45
-
-
75749102614
-
The economics of online crime
-
Moore, T., Clayton, R., Anderson, R.: The economics of online crime. J. Econ. Perspect. 23(3), 3-20 (2009)
-
(2009)
J. Econ. Perspect
, vol.23
, Issue.3
, pp. 3-20
-
-
Moore, T.1
Clayton, R.2
Anderson, R.3
-
50
-
-
85025660618
-
Cyber security: Threats to the financial sector
-
Snow, G.: Cyber security: threats to the financial sector. Testimony before the House Financial Services Committee. http://financialservices.house.gov/UploadedFiles/091411snow. pdf (2011)
-
(2011)
Testimony before the House Financial Services Committee
-
-
Snow, G.1
-
52
-
-
84869407868
-
The underground economy of fake antivirus software
-
Stone-Gross, B., Abman, R., Kemmerer, R.A., Kruegel, C., Steigerwald, D.G., Vigna, G.: The underground economy of fake antivirus software. In: 10th Workshop on the Economics of Information Security, Fairfax (2011)
-
(2011)
10th Workshop on the Economics of Information Security, Fairfax
-
-
Stone-Gross, B.1
Abman, R.2
Kemmerer, R.A.3
Kruegel, C.4
Steigerwald, D.G.5
Vigna, G.6
-
54
-
-
84881107026
-
Overseas cyber-crimewave taking £600 million a year from the taxman
-
Taylor, J.: Overseas cyber-crimewave taking £600 million a year from the taxman. The Independent (2011). http://www.independent.co.uk/news/uk/crime/overseas-cybercrimewavetaking-600m-a-year-from-thetaxman-6271552.html
-
(2011)
The Independent
-
-
Taylor, J.1
-
55
-
-
75749141441
-
-
Tech. Rep. OECD STI Working Paper 2008/1, OECD, Paris
-
Van Eeten, M., Bauer, J.M.: Economics of malware: Security decisions, incentives and externalities. Tech. Rep. OECD STI Working Paper 2008/1, OECD, Paris. http://www.oecd. org/dataoecd/53/17/40722462.pdf (2008)
-
(2008)
Economics of malware: Security decisions, incentives and externalities
-
-
Van Eeten, M.1
Bauer, J.M.2
-
56
-
-
84880998910
-
-
Tech. Rep. s0 STI Working Paper 2010/5, OECD, Paris
-
Van Eeten, M., Bauer, J.M., Asghari, H., Tabatabaie, S.: The role of Internet service providers in Botnet mitigation: an empirical analysis based on spam data. Tech. Rep. s0 STI Working Paper 2010/5, OECD, Paris. http://www.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=DSTI/DOC(2010)5&docLanguage=En (2010)
-
(2010)
The role of Internet service providers in Botnet mitigation: An empirical analysis based on spam data
-
-
Van Eeten, M.1
Bauer, J.M.2
Asghari, H.3
Tabatabaie, S.4
-
57
-
-
84948071729
-
-
The Hague: Ministry of Economic Affairs
-
Van Eeten, M., Asghari, H., Bauer, J.M., Tabatabaie, S.: Internet service providers and Botnet Mitigation: a fact-finding study on the Dutch market. The Hague: Ministry of Economic Affairs. http://www.rijksoverheid.nl/documenten-en-publicaties/rapporten/2011/01/13/internet-service-providers-and-botnet-mitigation.html (2011)
-
(2011)
Internet service providers and Botnet Mitigation: A fact-finding study on the Dutch market
-
-
Van Eeten, M.1
Asghari, H.2
Bauer, J.M.3
Tabatabaie, S.4
-
59
-
-
84893435891
-
Is the Internet for porn? An insight into the online adult industry
-
Wondracek, G., Holz, T., Platzer, C., Kirda, E., Kruegel, C.: Is the Internet for porn? An insight into the online adult industry. In: Proceedings (online) of the 9th Workshop on Economics of Information Security, Cambridge http://weis2010.econinfosec.org/papers/session2/weis2010_ wondracek.pdf (2010)
-
(2010)
Proceedings (online) of the 9th Workshop on Economics of Information Security, Cambridge
-
-
Wondracek, G.1
Holz, T.2
Platzer, C.3
Kirda, E.4
Kruegel, C.5
|