%0 Journal Article %J Technology Innovation Management Review %D 2016 %T Examining the Modes Malware Suppliers Use to Provide Goods and Services %A Tony Bailetti %A Mahmoud Gad %K agents %K customers %K cybercrime %K cybersecurity %K malware %K modes %K multisided platform %K suppliers %X Malware suppliers use various modes to provide goods and services to customers. By mode, we mean “the way” the malware supplier chooses to function. These modes increase monetization opportunities and enable many security breaches worldwide. A theoretically sound framework that can be used to examine the various modes that malware suppliers use to produce and sell malware is needed. We apply a general model specified recently by Hagiu and Wright to study five modes that malware suppliers use to deliver goods and services to their customers. The framework presented in this article can be used to predict the mode in which a malware supplier will function; to study which types of malware suppliers, agents, and customers are attracted to each mode; to discover new modes; and to better understand the threat a malware supplier presents. %B Technology Innovation Management Review %I Talent First Network %C Ottawa %V 6 %P 21-27 %8 02/2016 %G eng %U http://timreview.ca/article/965 %N 2 %1 Carleton University Tony Bailetti is an Associate Professor in the Sprott School of Business and the Department of Systems and Computer Engineering at Carleton University, Ottawa, Canada. Professor Bailetti is the Director of Carleton University's Technology Innovation Management (TIM) program. His research, teaching, and community contributions support technology entrepreneurship, regional economic development, and international co-innovation. %2 VENUS Cybersecurity Corporation Mahmoud M. Gad is a Research Associate at VENUS Cybersecurity. He holds a PhD in Electrical and Computer Engineering from the University of Ottawa in Canada and an MSc in Electrical and Computer Engineering from the University of Maryland in College Park, United States. His research interests include cybercrime markets, machine learning for intrusion detection, analysis of large-scale networks, and cognitive radio networks. %R http://doi.org/10.22215/timreview/965