Cybercrime and cloud computing. A game theoretic network model
Florian Bartholomae ()
Managerial and Decision Economics, 2018, vol. 39, issue 3, 297-305
Abstract:
In this paper, a network model is developed in which three players—a profit†maximizing provider of cloud computing services, its consumers, and a hacker—sequentially choose their strategies. Several scenarios with different levels of data security and public prosecution of the hacker are analyzed. Especially for the case when no security measurements are available, a firm's strategy to limit the network size in order to render hacking unattractive is discussed in detail. Finally, policy implications are given implying better international cooperation of the law enforcement authorities.
Date: 2018
References: Add references at CitEc
Citations: View citations in EconPapers (2)
Downloads: (external link)
https://doi.org/10.1002/mde.2904
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:wly:mgtdec:v:39:y:2018:i:3:p:297-305
Access Statistics for this article
Managerial and Decision Economics is currently edited by Antony Dnes
More articles in Managerial and Decision Economics from John Wiley & Sons, Ltd.
Bibliographic data for series maintained by Wiley Content Delivery ().