{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T11:46:48Z","timestamp":1753876008357,"version":"3.41.2"},"reference-count":4,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2020,12,24]],"date-time":"2020-12-24T00:00:00Z","timestamp":1608768000000},"content-version":"vor","delay-in-days":358,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Arce (Malware and market share. J Cybersecur 2018;4:tyy010) presents a game-theoretic model in which users select and hackers target one of two IT platforms based upon the platforms\u2019 network benefits and security levels. Unfortunately, in modelling the network benefits, Arce misinterprets Metcalfe\u2019s law. In particular, he assumes that the utility that a user obtains from a platform increases quadratically with the number of users, whereas Metcalfe\u2019s law holds that utility increases linearly with network size.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaa024","type":"journal-article","created":{"date-parts":[[2020,12,24]],"date-time":"2020-12-24T17:32:53Z","timestamp":1608831173000},"source":"Crossref","is-referenced-by-count":1,"title":["Malware and market share: a comment on Arce"],"prefix":"10.1093","volume":"6","author":[{"given":"Marc","family":"Jegers","sequence":"first","affiliation":[{"name":"Department of Applied Economics (APEC), Vrije Universiteit Brussel, Pleinlaan 2, Brussels, 1050, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7546-7746","authenticated-orcid":false,"given":"Leo","family":"Van Hove","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2020,12,28]]},"reference":[{"key":"2020122805494227500_tyaa024-B1","doi-asserted-by":"crossref","first-page":"tyy010","DOI":"10.1093\/cybsec\/tyy010","article-title":"Malware and market share","volume":"4","author":"Arce","year":"2018","journal-title":"J Cybersecur"},{"key":"2020122805494227500_tyaa024-B2","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.2013.374","article-title":"Metcalfe\u2019s law after 40 years of the Ethernet","volume":"46","author":"Metcalfe","year":"2013","journal-title":"IEEE Comp"},{"key":"2020122805494227500_tyaa024-B3","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.infoecopol.2016.09.001","article-title":"Testing Metcalfe\u2019s law: pitfalls and possibilities","volume":"37","author":"Van Hove","year":"2016","journal-title":"Inf Econ Policy"},{"key":"2020122805494227500_tyaa024-B4","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.3755450","volume-title":"Malware, Network Benefits, and Metcalfe\u2019s Law","author":"Jegers","year":"2019"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/cybersecurity\/article-pdf\/6\/1\/tyaa024\/35198034\/tyaa024.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/cybersecurity\/article-pdf\/6\/1\/tyaa024\/35198034\/tyaa024.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T04:37:09Z","timestamp":1670560629000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaa024\/6047252"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":4,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1,1]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaa024","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2020]]},"published":{"date-parts":[[2020,1,1]]},"article-number":"tyaa024"}}