Hacking back: Optimal use of self-defense in cyberspace
Should the law permit hackback? How should the law on self-defense in cyberspace be designed? In this paper, we use game-theoretic analysis to develop criteria that determine whether police enforcement, litigation, or hackback is best, and under what circumstances. Our model suggests that the law sh...
Saved in:
Main Authors: | Majuca, Ruperto P., Kesan, Jay P. |
---|---|
Format: | text |
Published: |
Animo Repository
2009
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/faculty_research/7981 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Similar Items
-
Optimal hackback
by: Kesana, Jap P., et al.
Published: (2010) -
Cybercrimes and cyber-attack: Technological, economic, and law-based solutions
by: Kesan, Jay P., et al.
Published: (2005) -
Optimal solution to cybercrimes: Lessons from law and economics
by: Majuca, Ruperto P.
Published: (2014) -
Grandon.com got hacked
by: Mohammed, Taufeeq, et al.
Published: (2017) -
Handling cyberattacks
by: Lagua, Benel D.
Published: (2023)