首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Cybercrime and cloud computing. A game theoretic network model
Authors:Florian Bartholomae
Institution:School of Economics and Management, Bundeswehr University Munich, Neubiberg, Germany
Abstract:In this paper, a network model is developed in which three players—a profit‐maximizing provider of cloud computing services, its consumers, and a hacker—sequentially choose their strategies. Several scenarios with different levels of data security and public prosecution of the hacker are analyzed. Especially for the case when no security measurements are available, a firm's strategy to limit the network size in order to render hacking unattractive is discussed in detail. Finally, policy implications are given implying better international cooperation of the law enforcement authorities.
Keywords:
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号