Showing 1 - 10 of 1,008
Persistent link: https://www.econbiz.de/10011540189
Persistent link: https://www.econbiz.de/10011754562
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are...
Persistent link: https://www.econbiz.de/10011708862
Persistent link: https://www.econbiz.de/10011920732
Persistent link: https://www.econbiz.de/10011969011
Persistent link: https://www.econbiz.de/10003956641
Persistent link: https://www.econbiz.de/10008650943
Persistent link: https://www.econbiz.de/10014327291
Malicious activity in cyberspace comprises numerous forms, often resulting in significant consequences for the victims. According to the actual circumstances, a number of measures can be considered in response to such cases. In order to bring the perpetrators to justice, it is necessary to...
Persistent link: https://www.econbiz.de/10012956690
Persistent link: https://www.econbiz.de/10012395557