Ausgebummelt – Wege des Handels aus der Spass- und Sinnkrise
In: Gottlieb Duttweiler Institute Research Paper No. 4652567
71 Ergebnisse
Sortierung:
In: Gottlieb Duttweiler Institute Research Paper No. 4652567
SSRN
In: Gottlieb Duttweiler Institute Research Paper No. 4652552
SSRN
In: Gottlieb Duttweiler Institute Research Paper No. 4611648
SSRN
In: Gottlieb Duttweiler Institute Research Paper No. 4612365
SSRN
In: Gottlieb Duttweiler Institute Research Paper No. 4612378
SSRN
In: Gottlieb Duttweiler Institute Research Paper No. 4610271
SSRN
In: Information economics and policy, Band 59, S. 100973
ISSN: 0167-6245
In: Forthcoming, Daphne R. Raban & Julia Włodarczyk (eds.) The Elgar Companion to Information Economics. Cheltenham, UK and Northampton, MA: Edward Elgar.
SSRN
In: Prado, T. S., & Bauer, J. M. (2022). Big Tech Platform Acquisitions of Start-ups and Venture Capital Funding for Innovation. Information Economics and Policy, 100973. https://doi.org/10.1016/j.infoecopol.2022.100973
SSRN
In: Prado, T. S., & Bauer, J. M. (2021). Improving broadband policy design using market data: A general framework and an application to Brazil. Telecommunications Policy, 45(4), 102111.
SSRN
In: Quello Center Working Paper
SSRN
Working paper
In: Journal of contingencies and crisis management, Band 17, Heft 4, S. 221-232
ISSN: 1468-5973
Somewhere around 10% of all machines connected to the Internet are thought to be infected with malicious software. This has allowed the emergence of so‐called 'botnets'– networks of sometimes millions of infected machines that are remotely controlled by malicious actors. Botnets are mostly used for criminal purposes, but they also enable large‐scale failures that might even reach disastrous proportions. We explain the rise of botnets as the outcome of the incentive structures of market players and present new empirical evidence on these incentives. The resulting externalities require some form of voluntary or government‐led collective action. Our findings have implications for the controversial debate on the appropriate policy measures, where two perspectives on cybersecurity fight for dominance: national security and law enforcement.
World Affairs Online
In: Quello Center Working Paper
SSRN
Working paper