Ethical decision making and information technology: an introduction with cases
Ethical decision making and information technology: an introduction with cases
Guest Editors' Introduction: Economics of Information Security
IEEE Security and Privacy
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Hacking into the Minds of Hackers
Information Systems Management
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Journal of Management Information Systems
Positive externality, increasing returns, and the rise in cybercrimes
Communications of the ACM - Finding the Fun in Computer Science Education
Cybersecurity: Stakeholder incentives, externalities, and policy options
Telecommunications Policy
SkyNET: a 3G-enabled mobile attack drone and stealth botmaster
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
From Young Hackers to Crackers
International Journal of Technology and Human Interaction
URL Manipulation and the Slippery Slope: The Case of the Harvard 119 Revisited
International Journal of Interdisciplinary Telecommunications and Networking
A social dimensional cyber threat model with formal concept analysis and fact-proposition inference
International Journal of Information and Computer Security
Hi-index | 0.00 |
Cybercrimes are becoming increasingly pervasive and sophisticated, and can have more severe economic impact than many conventional crimes. Technology and skill intensiveness, a high degree of globalization, and their newness make cybercrimes structurally different. The characteristics of cybercriminals, cybercrime victims, and law enforcement agencies have a reinforcing effect on each other, leading to a vicious circle of cybercrime. The author builds on key elements of this circle to assess a hacker's cost-benefit calculus, and suggests possible mechanisms for combating cybercrime.