-
1
-
-
82955190605
-
An analysis of underground forums
-
M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. Voelker, "An analysis of underground forums," in Proceedings of the 2011 SIGCOMM Conference on Internet Measurement. ACM, 2011, pp. 71-80.
-
(2011)
Proceedings of the 2011 SIGCOMM Conference on Internet Measurement. ACM
, pp. 71-80
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.5
-
2
-
-
0347504731
-
The struggle to govern the commons
-
T. Dietz, E. Ostrom, and P. C. Stern, "The struggle to govern the commons," Science, vol. 302, no. 5652, pp. 1907-1912, 2003.
-
(2003)
Science
, vol.302
, Issue.5652
, pp. 1907-1912
-
-
Dietz, T.1
Ostrom, E.2
Stern, P.C.3
-
3
-
-
75749102614
-
The economics of online crime
-
T. Moore, R. Clayton, and R. Anderson, "The economics of online crime," The Journal of Economic Perspectives, vol. 23, no. 3, pp. 3-20, 2009.
-
(2009)
The Journal of Economic Perspectives
, vol.23
, Issue.3
, pp. 3-20
-
-
Moore, T.1
Clayton, R.2
Anderson, R.3
-
5
-
-
84979188687
-
The nature of the firm
-
R. H. Coase, "The nature of the firm," Economica, vol. 4, no. 16, pp. 386-405, 1937.
-
(1937)
Economica
, vol.4
, Issue.16
, pp. 386-405
-
-
Coase, R.H.1
-
6
-
-
70350423437
-
The underground economy priceless
-
R. Thomas and J. Martin, "The underground economy priceless," USENIX; login, vol. 31, no. 6, pp. 7-16, 2006.
-
(2006)
USENIX; Login
, vol.31
, Issue.6
, pp. 7-16
-
-
Thomas, R.1
Martin, J.2
-
7
-
-
0003375133
-
Law enforcement, malfeasance, and compensation of enforcers
-
G. S. Becker and G. J. Stigler, "Law enforcement, malfeasance, and compensation of enforcers," The Journal of Legal Studies, vol. 3, no. 1, pp. 1-18, 1974.
-
(1974)
The Journal of Legal Studies
, vol.3
, Issue.1
, pp. 1-18
-
-
Becker, G.S.1
Stigler, G.J.2
-
8
-
-
70149106104
-
Spamalytics an empirical analysis of spam marketing conversion
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage, "Spamalytics an empirical analysis of spam marketing conversion," Communications of the ACM, vol. 52, no. 9, pp. 99-107, 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.9
, pp. 99-107
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
9
-
-
0033537737
-
Revisiting the commons local lessons, global challenges
-
E. Ostrom, J. Burger, C. B. Field, R. B. Norgaard, and D. Policansky, "Revisiting the commons local lessons, global challenges," Science, vol. 284, no. 5412, pp. 278-282, 1999.
-
(1999)
Science
, vol.284
, Issue.5412
, pp. 278-282
-
-
Ostrom, E.1
Burger, J.2
Field, C.B.3
Norgaard, R.B.4
Policansky, D.5
-
10
-
-
3843110280
-
Heterogeneity, group size and collective action the role of institutions in forest management
-
A. R. Poteete and E. Ostrom, "Heterogeneity, group size and collective action The role of institutions in forest management," Development and change, vol. 35, no. 3, pp. 435-461, 2004.
-
(2004)
Development and Change
, vol.35
, Issue.3
, pp. 435-461
-
-
Poteete, A.R.1
Ostrom, E.2
-
11
-
-
33750440197
-
The economics of information security
-
R. Anderson and T. Moore, "The economics of information security," Science, vol. 314, no. 5799, pp. 610-613, 2006.
-
(2006)
Science
, vol.314
, Issue.5799
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
12
-
-
77951201601
-
Policing cybercrimes situating the public police in networks of security within cyberspace
-
D. S. Wall, "Policing cybercrimes Situating the public police in networks of security within cyberspace," Police Practice and Research, vol. 8, no. 2, pp. 183-205, 2007.
-
(2007)
Police Practice and Research
, vol.8
, Issue.2
, pp. 183-205
-
-
Wall, D.S.1
-
13
-
-
77249147860
-
The iterated weakest link
-
R. B̈ohme and T. Moore, "The iterated weakest link," Security &Privacy, IEEE, vol. 8, no. 1, pp. 53-55, 2010.
-
(2010)
Security &Privacy, IEEE
, vol.8
, Issue.1
, pp. 53-55
-
-
Bohme, R.1
Moore, T.2
-
14
-
-
84881095404
-
Measuring the cost of cybercrime
-
Springer,.
-
R. Anderson, C. Barton, R. B̈ohme, R. Clayton, M. van Eeten, M. Levi, T. Moore, and S. Savage, "Measuring the cost of cybercrime," in Proceedings of the Workshop on the Economics of Information Security. Springer, 2012.
-
(2012)
Proceedings of the Workshop on the Economics of Information Security
-
-
Anderson, R.1
Barton, C.2
Bohme, R.3
Clayton, R.4
Van Eeten, M.5
Levi, M.6
Moore, T.7
Savage, S.8
-
16
-
-
70350357344
-
Learning more about the underground economy a case-study of keyloggers and dropzones
-
T. Holz, M. Engelberth, and F. Freiling, "Learning more about the underground economy A case-study of keyloggers and dropzones," Computer Security-ESORICS 2009, pp. 1-18, 2009.
-
(2009)
Computer Security-ESORICS 2009
, pp. 1-18
-
-
Holz, T.1
Engelberth, M.2
Freiling, F.3
-
17
-
-
84858388200
-
What's love got to do with it? Exploring online dating scams and identity fraud
-
A. Rege, "What's love got to do with it? exploring online dating scams and identity fraud," International Journal of Cyber Criminology, vol. 3, no. 2, pp. 494-512, 2009.
-
(2009)
International Journal of Cyber Criminology
, vol.3
, Issue.2
, pp. 494-512
-
-
Rege, A.1
-
18
-
-
78650083240
-
Lexical feature based phishing url detection using online learning
-
A. Blum, B. Wardman, T. Solorio, and G. Warner, "Lexical feature based phishing url detection using online learning," in Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security. ACM, 2010, pp. 54-60.
-
(2010)
Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security. ACM
, pp. 54-60
-
-
Blum, A.1
Wardman, B.2
Solorio, T.3
Warner, G.4
-
19
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, "Semantics-aware malware detection," in Symposium on Security and Privacy. IEEE, 2005, pp. 32-46.
-
(2005)
Symposium on Security and Privacy. IEEE
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
20
-
-
85077712186
-
Combating click fraud via premium clicks
-
A. Juels, S. Stamm, and M. Jakobsson, "Combating click fraud via premium clicks," in Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium. USENIX Association, 2007, pp. 1-10.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium. USENIX Association
, pp. 1-10
-
-
Juels, A.1
Stamm, S.2
Jakobsson, M.3
-
21
-
-
84858718563
-
Phishing crime that pays
-
P. J. Nero, B. Wardman, H. Copes, and G. Warner, "Phishing Crime that pays," in eCrime Researchers Summit. IEEE, 2011, pp. 1-10.
-
(2011)
ECrime Researchers Summit. IEEE
, pp. 1-10
-
-
Nero, P.J.1
Wardman, B.2
Copes, H.3
Warner, G.4
-
22
-
-
63349088117
-
The deterrent and displacement effects of information security enforcement International evidence
-
I. P. Png, C.-Y. Wang, and Q.-H. Wang, "The deterrent and displacement effects of information security enforcement International evidence," Journal of Management Information Systems, vol. 25, no. 2, pp. 125-144, 2008.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 125-144
-
-
Png, I.P.1
Wang, C.-Y.2
Wang, Q.-H.3
-
23
-
-
84858717363
-
The smuggling theory approach to organized digital crime
-
V. Garg, N. Husted, and J. Camp, "The smuggling theory approach to organized digital crime," in eCrime Researchers Summit. IEEE, 2011, pp. 1-7.
-
(2011)
ECrime Researchers Summit. IEEE
, pp. 1-7
-
-
Garg, V.1
Husted, N.2
Camp, J.3
-
24
-
-
85064176806
-
Measuring pay-per-install the commoditization of malware distribution
-
ser. SEC'11. Berkeley, CA, USA USENIX Association
-
J. Caballero, C. Grier, C. Kreibich, and V. Paxson, "Measuring pay-per-install the commoditization of malware distribution," in Proceedings of the 20th USENIX conference on Security, ser. SEC'11. Berkeley, CA, USA USENIX Association, 2011, pp. 13-13. [Online]. Available http //dl.acm.org/citation.cfm?id=2028067.2028080
-
(2011)
Proceedings of the 20th USENIX Conference on Security
, pp. 13-13
-
-
Caballero, J.1
Grier, C.2
Kreibich, C.3
Paxson, V.4
-
25
-
-
85044796608
-
Economics and criminal enterprise
-
T. C. Schelling, "Economics and criminal enterprise," Public Interest, vol. 7, 1967.
-
(1967)
Public Interest
, vol.7
-
-
Schelling, T.C.1
-
26
-
-
0002991859
-
When does organized crime pay? a transaction cost analysis
-
A. R. Dick, "When does organized crime pay? a transaction cost analysis," International Review of Law and Economics, vol. 15, 1995.
-
(1995)
International Review of Law and Economics
, vol.15
-
-
Dick, A.R.1
-
27
-
-
0242685828
-
Coase's penguin, or, linux and the nature of the firm
-
Y. Benkler, "Coase's penguin, or, linux and the nature of the firm," The Yale Law Journal, vol. 112, no. 3, 2002.
-
(2002)
The Yale Law Journal
, vol.112
, Issue.3
-
-
Benkler, Y.1
-
28
-
-
80053230872
-
Reconceptualizing the role of security user
-
L. J. Camp, "Reconceptualizing the role of security user," Daedalus, vol. 140, no. 4, pp. 93-107, 2011.
-
(2011)
Daedalus
, vol.140
, Issue.4
, pp. 93-107
-
-
Camp, L.J.1
-
29
-
-
34547219342
-
Comment virtual neighborhood watch open source software and community policing against cybercrime
-
B. R. Jones, "Comment Virtual neighborhood watch Open source software and community policing against cybercrime," The Journal of Criminal Law and Criminology, pp. 601-629, 2007.
-
(2007)
The Journal of Criminal Law and Criminology
, pp. 601-629
-
-
Jones, B.R.1
-
30
-
-
33847396961
-
Private enforcement of cybercrime on the electronic frontier
-
M. L. Rustad, "Private enforcement of cybercrime on the electronic frontier," S. Cal. Interdisc. LJ, vol. 11, p. 63, 2001.
-
(2001)
S. Cal. Interdisc. LJ
, vol.11
, pp. 63
-
-
Rustad, M.L.1
-
31
-
-
84872311732
-
Uppity civilians and cybervigilantes the role of the general public in policing cybercrime
-
L. Huey, J. Nhan, and R. Broll, "uppity civilians and cybervigilantes The role of the general public in policing cybercrime," Criminology and Criminal Justice, vol. 13, no. 1, pp. 81-97, 2013.
-
(2013)
Criminology and Criminal Justice
, vol.13
, Issue.1
, pp. 81-97
-
-
Huey, L.1
Nhan, J.2
Broll, R.3
-
33
-
-
84871990023
-
Pools, clubs and security designing for a party not a person
-
Z. Dong, V. Garg, L. J. Camp, and A. Kapadia, "Pools, clubs and security designing for a party not a person," in Proceedings of the 2012 workshop on New security paradigms. ACM, 2012, pp. 77-86.
-
(2012)
Proceedings of the 2012 Workshop on New Security Paradigms. ACM
, pp. 77-86
-
-
Dong, Z.1
Garg, V.2
Camp, L.J.3
Kapadia, A.4
-
34
-
-
84886993953
-
Peer produced privacy protection
-
V. Garg, S. Patil, A. Kapadia, and L. J. Camp, "Peer produced privacy protection," in International Symposium on Technology and Society. IEEE, 2013.
-
(2013)
International Symposium on Technology and Society. IEEE
-
-
Garg, V.1
Patil, S.2
Kapadia, A.3
Camp, L.J.4
-
36
-
-
77954936505
-
Routine online activity and internet fraud targeting extending the generality of routine activity theory
-
T. C. Pratt, K. Holtfreter, and M. D. Reisig, "Routine online activity and internet fraud targeting Extending the generality of routine activity theory," Journal of Research in Crime and Delinquency, vol. 47, no. 3, pp. 267-296, 2010.
-
(2010)
Journal of Research in Crime and Delinquency
, vol.47
, Issue.3
, pp. 267-296
-
-
Pratt, T.C.1
Holtfreter, K.2
Reisig, M.D.3
-
39
-
-
80051960199
-
Click trajectories end-to-end analysis of the spam value chain
-
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. F́elegyh́azi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu et al., "Click trajectories End-to-end analysis of the spam value chain," in Symposium on Security and Privacy. IEEE, 2011, pp. 431-446.
-
(2011)
Symposium on Security and Privacy. IEEE
, pp. 431-446
-
-
Levchenko, K.1
Pitsillidis, A.2
Chachra, N.3
Enright, B.4
F́elegyh́ azi, M.5
Grier, C.6
Halvorson, T.7
Kanich, C.8
Kreibich, C.9
Liu, H.10
-
40
-
-
0014413249
-
The tragedy of the commons
-
H. Garrett, "The tragedy of the commons," Science, vol. 162, no. 3859, pp. 1243-1248, 1968.
-
(1968)
Science
, vol.162
, Issue.3859
, pp. 1243-1248
-
-
Garrett, H.1
-
42
-
-
77956240814
-
Botnet economics uncertainty matters
-
Springer
-
Z. Li, Q. Liao, and A. Striegel, "Botnet economics uncertainty matters," in Managing Information Risk and the Economics of Security. Springer, 2009, pp. 245-267.
-
(2009)
Managing Information Risk and the Economics of Security
, pp. 245-267
-
-
Li, Z.1
Liao, Q.2
Striegel, A.3
-
43
-
-
18244392161
-
Economic small-world behavior in weighted networks
-
V. Latora and M. Marchiori, "Economic small-world behavior in weighted networks," The European Physical Journal BCondensed Matter and Complex Systems, vol. 32, no. 2, pp. 249-263, 2003.
-
(2003)
The European Physical Journal BCondensed Matter and Complex Systems
, vol.32
, Issue.2
, pp. 249-263
-
-
Latora, V.1
Marchiori, M.2
-
44
-
-
77956527513
-
The small-world effect the influence of macrolevel properties of developer collaboration networks on opensource project success
-
P. V. Singh, "The small-world effect The influence of macrolevel properties of developer collaboration networks on opensource project success," ACM Transactions Software Engineering Methodology, vol. 20, no. 2, pp. 61-627, 2010.
-
(2010)
ACM Transactions Software Engineering Methodology
, vol.20
, Issue.2
, pp. 61-627
-
-
Singh, P.V.1
-
45
-
-
21344461300
-
Collaboration and creativity the small world problem
-
B. Uzzi and J. Spiro, "Collaboration and creativity The small world problem," American Journal of Sociology, vol. 111, no. 2, pp. 447-504, 2005.
-
(2005)
American Journal of Sociology
, vol.111
, Issue.2
, pp. 447-504
-
-
Uzzi, B.1
Spiro, J.2
-
46
-
-
0032482432
-
Collective dynamics of smallworldnetworks
-
D. J. Watts and S. H. Strogatz, "Collective dynamics of smallworldnetworks," nature, vol. 393, no. 6684, pp. 440-442, 1998.
-
(1998)
Nature
, vol.393
, Issue.6684
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
|