Author:
Li Xiaofan,Whinston Andrew B.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference17 articles.
1. August, T., Dao, D., & Niculescu, M. F. (2019). Economics of ransomware attacks. Available at SSRN: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3351416. Accessed 22 November 2019.
2. Banks, J. S. (2000). Buying supermajorities in finite legislatures. American Political Science Review, 94(3), 677–681.
3. Bell, S. (2001). The role of the state and the hierarchy of money. Cambridge Journal of Economics, 25(2), 149–163.
4. Benjamin, V., Valacich, J. S., & Chen, H. (2019). DICE-E: A framework for conducting Darknet identification, collection, evaluation with ethics. MIS Quarterly, 43(1), 1–22.
5. Brunnermeier, M. K., & Niepelt, D. (2019). On the equivalence of private and public money. National Bureau of Economic Research no. w25877.
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献