Acemoglu, D., Malekian, A., Ozdaglar, A., 2013. Network Security and Contagion. MIT Working Paper.
Anderson, R., Clayton, R., Moore, T., The economics of online crime. J. Econ. Perspectives 23:3 (2009), 3–20.
Anderson, R., Moore, T., Information security: where computer science, economics and psychology meet. Phil. Trans. 367:1898 (2009), 2717–2727.
August, T., Tunca, T., Network software security and user incentives. Manage. Sci. 52:11 (2006), 1703–1720.
August, T., Tunca, T., Who should be responsible for software security? A comparative analysis of liability policies in network environments. Manage. Sci. 57:5 (2011), 934–959.
Bayus, B., Jain, S., Rao, A., Truth or consequences: an analysis of vaporware and new product announcements. J. Market. Res. 38:1 (2001), 3–13.
Belleflamme, P., Peitz, M., Marketing tools for experience goods. Industrial Organization: Markets and Strategies, 2010, Cambridge University Press, 309–330.
Böhme, R., Security metrics and security investment models. Echizen, I., Kunihiro, N., Sasaki, R., (eds.) Advances in Information and Computer Security Lecture Notes in Computer Science, 2010, Springer Berlin Heidelberg, 10–24.
Brown, J., Toward an economic theory of liability. J. Legal Stud. 2:2 (1973), 323–349.
Choi, J., Fershtman, C., Gandal, N., Network security: vulnerabilities and disclosure policy. J. Ind. Econ. 58:4 (2010), 868–894.
Cooper, R., Ross, T., Product warranties and double moral Hazard. RAND J. Econ. 16:1 (1985), 103–113.
Daughety, A., Reinganum, J., Product safety: liability, R&D and signaling. Am. Econ. Rev. 85:5 (1995), 1187–1206.
Daughety, A., Reinganum, J., Markets, torts and social inefficiency. RAND J. Econ. 37:2 (2006), 300–323.
Daughety, A., Reinganum, J., Cumulative harm, products liability, and bilateral care. Am. Law Econ. Rev. 15:2 (2013), 409–442.
Daughety, A., Reinganum, J., Economic analysis of products liability: theory. Arlen, J., (eds.) Research Handbook on the Economics of Torts, 2013, Edward Elgar Publishing Ltd., 69–96.
Gordon, L., Loeb, M., The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5:4 (2002), 438–457.
Goyal, S., Hiedari, H., Kearns, M., Competitive contagion in networks. Games Econ. Behav., 2014, forthcoming.
Haan, M., Vaporware as a means of entry deterrence. J. Ind. Econ. 51:3 (2003), 345–358.
Kolstad, C., Ulen, T., Johnson, G., Ex post liability for harm vs. ex ante safety regulation: substitutes or complements?. Am. Econ. Rev. 80:4 (1990), 888–901.
Polinsky, A., Shavell, S., Mandatory versus voluntary disclosure of product risks. J. Law. Econ. Organ. 28:2 (2010), 360–379.
Riordan, M., 2014. Economic Incentives for Security. Powerpoint Slides presented at Cybercriminality Seminar at Toulouse School of Economics on 4 June.
Schneier, B., 2007. Information Security and Externalities. Available at http://bit.ly/1MkAZo3 (accessed 20 October, 2016).
Shavell, S., Strict liability versus negligence. J. Legal Stud. 9:1 (1980), 1–25.
Shavell, S., A model of the optimal use of liability and safety regulation. RAND J. Econ. 15:2 (1984), 271–280.
Shavell, S., Liability for accidents. The New Palgrave Dictionary of Economics, 2008 Available at http://www.law.harvard.edu/faculty/shavell/pdf/124_liability.pdf (accessed 26 October, 2014).
Symantec, 2016. Internet Security Threat Report. Available at https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf (accessed 6 September, 2016).
Varian, H., 2004. System Reliability and Free Riding. Available at http://people.ischool.berkeley.edu/~hal/Papers/2004/reliability (accessed 1 December, 2013).