• Publications
  • Influence
Measuring the Cost of Cybercrime
TLDR
This chapter documents what we believe to be the first systematic study of the costs of cybercrime. Expand
  • 425
  • 23
  • PDF
THE STATE AND THE THREAT OF CASCADING FAILURE ACROSS CRITICAL INFRASTRUCTURES: THE IMPLICATIONS OF EMPIRICAL EVIDENCE FROM MEDIA INCIDENT REPORTS
The threat of cascading failures across critical infrastructures has been identified as a key challenge for governments. Cascading failure is seen as potentially catastrophic, extremely difficult toExpand
  • 99
  • 13
The Role of Internet Service Providers in Botnet Mitigation an Empirical Analysis Based on Spam Data
TLDR
A theoretical framework to explain the differences among ISPs and empirically tested some of these explanations. Expand
  • 99
  • 9
  • PDF
Where is the governance in Internet governance?
TLDR
The governance of the Internet provides one of the most important arenas in which new ideas regarding Internet studies can be applied and tested. Expand
  • 78
  • 7
Cybersecurity: Stakeholder incentives, externalities, and policy options
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducing their considerable costs has become a pressing issue. Although cybersecurity has strong publicExpand
  • 84
  • 5
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting
TLDR
We present an empirical analysis of the distribution of web security features and software patching practices in shared hosting providers, the influence of providers on these security practices, and their impact on web compromise rates. Expand
  • 23
  • 5
  • PDF
Recasting Intractable Policy Issues: The Wider Implications of The Netherlands Civil Aviation Controversy
The explosive growth of civil aviation is among the most difficult issues in transportation policy, and nowhere are the fundamental economic and environmental challenges it poses more apparent thanExpand
  • 115
  • 5
Empirical Findings on Critical Infrastructure Dependencies in Europe
TLDR
This paper draws on a hitherto untapped data source on infrastructure dependencies: a daily maintained database containing over 2375 serious incidents in different CI all over the world as reported by news media. Expand
  • 74
  • 4
  • PDF
Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup
TLDR
We present the first randomized controlled experiment into sender reputation and show that it improves cleanup rates for abuse reports. Expand
  • 34
  • 4
  • PDF
When Fiction Conveys Truth and Authority
Abstract Spatial planners give us fiction, while at the same time asking us to take them seriously. Perhaps even more surprising, they get much of the authority they claim. In the case of theExpand
  • 31
  • 4