@article {965, title = {Examining the Modes Malware Suppliers Use to Provide Goods and Services}, journal = {Technology Innovation Management Review}, volume = {6}, year = {2016}, month = {02/2016}, pages = {21-27}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Malware suppliers use various modes to provide goods and services to customers. By mode, we mean {\textquotedblleft}the way{\textquotedblright} the malware supplier chooses to function. These modes increase monetization opportunities and enable many security breaches worldwide. A theoretically sound framework that can be used to examine the various modes that malware suppliers use to produce and sell malware is needed. We apply a general model specified recently by Hagiu and Wright to study five modes that malware suppliers use to deliver goods and services to their customers. The framework presented in this article can be used to predict the mode in which a malware supplier will function; to study which types of malware suppliers, agents, and customers are attracted to each mode; to discover new modes; and to better understand the threat a malware supplier presents.}, keywords = {agents, customers, cybercrime, cybersecurity, malware, modes, multisided platform, suppliers}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/965}, url = {http://timreview.ca/article/965}, author = {Tony Bailetti and Mahmoud Gad} }