{"id":"https://openalex.org/W3117136819","doi":"https://doi.org/10.1093/cybsec/tyaa024","title":"Malware and market share: a comment on Arce","display_name":"Malware and market share: a comment on Arce","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3117136819","doi":"https://doi.org/10.1093/cybsec/tyaa024","mag":"3117136819"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaa024","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaa024","pdf_url":"https://academic.oup.com/cybersecurity/advance-article-pdf/doi/10.1093/cybsec/tyaa024/35113797/tyaa024.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/advance-article-pdf/doi/10.1093/cybsec/tyaa024/35113797/tyaa024.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040379497","display_name":"Marc Jegers","orcid":"https://orcid.org/0000-0003-2645-5436"},"institutions":[{"id":"https://openalex.org/I13469542","display_name":"Vrije Universiteit Brussel","ror":"https://ror.org/006e5kg04","country_code":"BE","type":"education","lineage":["https://openalex.org/I13469542"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Marc Jegers","raw_affiliation_strings":["Department of Applied Economics (APEC), Vrije Universiteit Brussel, Pleinlaan 2, Brussels, 1050, Belgium"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Applied Economics (APEC), Vrije Universiteit Brussel, Pleinlaan 2, Brussels, 1050, Belgium","institution_ids":["https://openalex.org/I13469542"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048433250","display_name":"Leo Van Hove","orcid":"https://orcid.org/0000-0001-7546-7746"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Leo Van Hove","raw_affiliation_strings":["Applied Economics"],"raw_orcid":"https://orcid.org/0000-0001-7546-7746","affiliations":[{"raw_affiliation_string":"Applied Economics","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048433250"],"corresponding_institution_ids":[],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":0.2243,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.70684543,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11437","display_name":"Digital Platforms and Economics","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11437","display_name":"Digital Platforms and Economics","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9778000116348267,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9747999906539917,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7719407081604004},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7322328090667725},{"id":"https://openalex.org/keywords/quadratic-growth","display_name":"Quadratic growth","score":0.5967216491699219},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5941898226737976},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5394722819328308},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.45266374945640564},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.41550880670547485}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7719407081604004},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7322328090667725},{"id":"https://openalex.org/C195956108","wikidata":"https://www.wikidata.org/wiki/Q7268362","display_name":"Quadratic growth","level":2,"score":0.5967216491699219},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5941898226737976},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5394722819328308},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.45266374945640564},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41550880670547485},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1093/cybsec/tyaa024","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaa024","pdf_url":"https://academic.oup.com/cybersecurity/advance-article-pdf/doi/10.1093/cybsec/tyaa024/35113797/tyaa024.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:vubissmart:VUBISSMART:2000:146833","is_oa":false,"landing_page_url":"https://academic.oup.com/cybersecurity/advance-article/doi/10.1093/cybsec/tyaa024/6047252?guestAccessKey=bd36d540-34ab-425c-86b7-4425def0ad95","pdf_url":null,"source":{"id":"https://openalex.org/S4306402573","display_name":"VUBIR (Vrije Universiteit Brussel)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I13469542","host_organization_name":"Vrije Universiteit Brussel","host_organization_lineage":["https://openalex.org/I13469542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"publishedVersion"},{"id":"pmh:oai:vubissmart:VUBISSMART:2000:146833","is_oa":false,"landing_page_url":"https://biblio.vub.ac.be/vubir/malware-and-market-share-a-comment-on-arce(27f8cc9a-6481-40f1-8acc-2c8ac0543042).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402573","display_name":"VUBIR (Vrije Universiteit Brussel)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I13469542","host_organization_name":"Vrije Universiteit Brussel","host_organization_lineage":["https://openalex.org/I13469542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"publishedVersion"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaa024","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaa024","pdf_url":"https://academic.oup.com/cybersecurity/advance-article-pdf/doi/10.1093/cybsec/tyaa024/35113797/tyaa024.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3117136819.pdf","grobid_xml":"https://content.openalex.org/works/W3117136819.grobid-xml"},"referenced_works_count":4,"referenced_works":["https://openalex.org/W2110986468","https://openalex.org/W2537121854","https://openalex.org/W2907585164","https://openalex.org/W3193540302"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W1982580243","https://openalex.org/W2183730421","https://openalex.org/W2551868243","https://openalex.org/W2084086280","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W2027198738","https://openalex.org/W2397767885","https://openalex.org/W3112956360"],"abstract_inverted_index":{"Abstract":[0],"Arce":[1,40],"(Malware":[2],"and":[3,17,31],"market":[4],"share.":[5],"J":[6],"Cybersecur":[7],"2018;4:tyy010)":[8],"presents":[9],"a":[10,52,56],"game-theoretic":[11],"model":[12],"in":[13,35],"which":[14],"users":[15],"select":[16],"hackers":[18],"target":[19],"one":[20],"of":[21,63],"two":[22],"IT":[23],"platforms":[24],"based":[25],"upon":[26],"the":[27,37,49,61],"platforms\u2019":[28],"network":[29,38,74],"benefits":[30],"security":[32],"levels.":[33],"Unfortunately,":[34],"modelling":[36],"benefits,":[39],"misinterprets":[41],"Metcalfe\u2019s":[42,66],"law.":[43],"In":[44],"particular,":[45],"he":[46],"assumes":[47],"that":[48,51,69],"utility":[50,70],"user":[53],"obtains":[54],"from":[55],"platform":[57],"increases":[58,71],"quadratically":[59],"with":[60,73],"number":[62],"users,":[64],"whereas":[65],"law":[67],"holds":[68],"linearly":[72],"size.":[75]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2026-05-14T08:36:36.166977","created_date":"2025-10-10T00:00:00"}
