A crucial part of a cyber-criminal’s job is to balance the risks and rewards of his every action. For example, an expert spammer will tune a bot’s email-sending rate to achieve a good throughput with an acceptable risk of being detected. Then, such a cyber-criminal has to choose how to launder the money he made with spamming, and he will have to consider many options (money mules, Bitcoin, etc.) that will offer different returns and risks. Although understanding these trade-offs and coming as close as possible to their optimum is what discriminates winners and losers in the cyber-crime world, there has been little study on this matter, as setting up a large-scale study to study how cyber-criminals deal with these risk-reward trade-offs is c...
Online hacker communities are meeting spots for aspiring and seasoned cybercriminals where they enga...
When undertaking cybersecurity risk assessments, it is important to be able to assign numeric values...
Cyber-security has recently become a topic of interest in behavioral economics, following nascent aw...
This research examines the impact of probable and guaranteed monetary gains and losses on users\u27 ...
The objective of this research is to examine users’ cybersecurity behavior in monetary gain and loss...
A bug bounty program, also known as a Vulnerability Research Program (VRP), is a form of crowdsourci...
Cyber crime is rising at an unprecedented rate. Organisations are spending more than ever combating ...
Individual decision making in computer security risk plays a critical role in successful information...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
With various views being posed on cybersecurity, this paper examines the proposition that cybersecur...
Risk transfer plays an increasing role in information security risk management as organisations purc...
This study investigates the e ects of incentive and deterrence strategies that might turn a security...
In the field of cybersecurity, the top-level management make use of metrics to decide if the organiz...
This study investigates the effects of incentive and deterrence strategies that might turn a securit...
This study examines users\u27 risk-taking behavior in software downloads. We are interested in quant...
Online hacker communities are meeting spots for aspiring and seasoned cybercriminals where they enga...
When undertaking cybersecurity risk assessments, it is important to be able to assign numeric values...
Cyber-security has recently become a topic of interest in behavioral economics, following nascent aw...
This research examines the impact of probable and guaranteed monetary gains and losses on users\u27 ...
The objective of this research is to examine users’ cybersecurity behavior in monetary gain and loss...
A bug bounty program, also known as a Vulnerability Research Program (VRP), is a form of crowdsourci...
Cyber crime is rising at an unprecedented rate. Organisations are spending more than ever combating ...
Individual decision making in computer security risk plays a critical role in successful information...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
With various views being posed on cybersecurity, this paper examines the proposition that cybersecur...
Risk transfer plays an increasing role in information security risk management as organisations purc...
This study investigates the e ects of incentive and deterrence strategies that might turn a security...
In the field of cybersecurity, the top-level management make use of metrics to decide if the organiz...
This study investigates the effects of incentive and deterrence strategies that might turn a securit...
This study examines users\u27 risk-taking behavior in software downloads. We are interested in quant...
Online hacker communities are meeting spots for aspiring and seasoned cybercriminals where they enga...
When undertaking cybersecurity risk assessments, it is important to be able to assign numeric values...
Cyber-security has recently become a topic of interest in behavioral economics, following nascent aw...