Showing 1 - 10 of 12
Online gaming platforms are inevitably subject to system vulnerabilities such as bugs and loopholes. Some players may take advantages of these bugs to gain illegitimate benefits, being viewed as rule breakers to platforms. Online platforms face a dilemma between disciplining rule breakers with...
Persistent link: https://www.econbiz.de/10014094774
Persistent link: https://www.econbiz.de/10011880195
The mobile app market is one of the most successful software markets. As the platform grows rapidly, with millions of apps and billions of users, search costs are increasing tremendously. The challenge is how app developers can target the right users with their apps and how consumers can find...
Persistent link: https://www.econbiz.de/10012854815
This research methods article proposes a visual data analytics framework to enhance social media research using deep learning models. Drawing on the literature of information systems and marketing, complemented with data-driven methods, we propose a number of visual and textual content features...
Persistent link: https://www.econbiz.de/10012855206
Darknet markets have been increasingly used for the transaction of illegal products and services in the last decade. In particular, it is estimated that drugs make up two-thirds of darknet market transactions. The growth of illicit transactions on darknet markets have led enforcement agencies to...
Persistent link: https://www.econbiz.de/10012847355
Persistent link: https://www.econbiz.de/10012403975
Persistent link: https://www.econbiz.de/10012414487
Persistent link: https://www.econbiz.de/10012298131
This paper investigates how the awareness of a security vulnerability index affects firms’ security protection strategy and how the information awareness effect interacts with firm incentives and country-wide IT development level. The security index is constructed based on outgoing spams and...
Persistent link: https://www.econbiz.de/10014109294
Cyber-insecurity is a serious threat in the digital world. In the present paper, we argue that a suboptimal cybersecurity environment is partly due to organizations’ underinvestment and a lack of suitable policies. The motivation for this paper stems from a related policy question: how to...
Persistent link: https://www.econbiz.de/10014125645