Michel van Eeten

Delft University of Technology

Professor, Faculty of Technology, Policy and Management

PO Box 5015

Delft, 2600GA

Netherlands

SCHOLARLY PAPERS

16

DOWNLOADS
Rank 27,292

SSRN RANKINGS

Top 27,292

in Total Papers Downloads

1,872

SSRN CITATIONS
Rank 20,672

SSRN RANKINGS

Top 20,672

in Total Papers Citations

3

CROSSREF CITATIONS

40

Scholarly Papers (16)

1.

The Role of Internet Service Providers in Botnet Mitigation an Empirical Analysis Based on Spam Data

TPRC 2010
Number of pages: 31 Posted: 22 Jan 2012
Delft University of Technology, Michigan State University-Department of Media and Information, Delft University of Technology, affiliation not provided to SSRN and Trend Micro Incorporated
Downloads 403 (78,722)

Abstract:

Loading...

2.

Security Economics in the HTTPS Value Chain

Twelfth Workshop on the Economics of Information Security (WEIS 2013), Washington, D.C.
Number of pages: 36 Posted: 17 Jul 2016 Last Revised: 27 Jul 2016
Hadi Asghari, Michel van Eeten, Axel Arnbak and N.A.N.M. van Eijk
Delft University of Technology, Delft University of Technology, University of Amsterdam - Institute for Information Law (IViR) and affiliation not provided to SSRN
Downloads 311 (105,648)
Citation 14

Abstract:

Loading...

HTTPS, Cybersecurity, Internet Governance, Constitutional Values, E-Commerce, Value Chain Analysis, Security Economics, eSignatures Regulation, SSL, TLS, Digital Certificates, Certificate Authorities, GigaNet

3.

The Economics of Malware

TPRC 2007
Number of pages: 33 Posted: 13 Jul 2012
Delft University of Technology, Michigan State University-Department of Media and Information, Delft University of Technology - Faculty of Technology, Policy and Management and Nyenrode Business University
Downloads 222 (149,485)

Abstract:

Loading...

4.

Internet Measurements and Public Policy: Mind the Gap

Number of pages: 7 Posted: 17 Jul 2013
Hadi Asghari, Michel van Eeten and Milton Mueller
Delft University of Technology, Delft University of Technology and Georgia Institute of Technology
Downloads 164 (196,538)
Citation 2

Abstract:

Loading...

internet measurement, datasets, telecom policy, internet governance, multidisciplinary research, quantiative analysis, cybersecurity economics

Collectively Exercising the Right of Access: Individual Effort, Societal Effect

A final version of this paper has been published in Internet Policy Review with DOI: 10.14763/2018.3.927 please cite as: Mahieu, R. L. P. & Asghari, H. & van Eeten, M. (2018). Collectively exercising the right of access: individual effort, societal effect. Internet Policy Review, 7(3)
Number of pages: 21 Posted: 30 Jan 2018 Last Revised: 14 Nov 2018
Rene Mahieu, Hadi Asghari and Michel van Eeten
Vrije Universiteit Brussel (VUB), LSTS, Interdisciplinary Research Group on Law Science Technology & Society, Delft University of Technology and Delft University of Technology
Downloads 139 (225,940)
Citation 4

Abstract:

Loading...

Access Rights, Privacy Measurement, Data Protection Regulation

Collectively Exercising the Right of Access: Individual Effort, Societal Effect

Internet Policy Review, 7(3). DOI: 10.14763/2018.3.927
Number of pages: 22 Posted: 08 Aug 2018
Rene Mahieu, Hadi Asghari and Michel van Eeten
Vrije Universiteit Brussel (VUB), LSTS, Interdisciplinary Research Group on Law Science Technology & Society, Delft University of Technology and Delft University of Technology
Downloads 15 (617,341)

Abstract:

Loading...

Access rights, Privacy measurement, General Data Protection Regulation, Data governance

6.

Unraveling the Economic and Political Drivers of Deep Packet Inspection

GigaNet 7th Annual Symposium, November 5, 2012, Baku, Azerbaijan
Number of pages: 21 Posted: 17 Jul 2016 Last Revised: 27 Jul 2016
Hadi Asghari, Michel van Eeten and Milton Mueller
Delft University of Technology, Delft University of Technology and Georgia Institute of Technology
Downloads 154 (207,263)

Abstract:

Loading...

DPI, deep packet inspection, internet governance, telecom policy, privacy regulation, network security, surveillance, censorship, bandwidth management

7.

Security Collapse in the HTTPS Market

Com. of the ACM, Vol. 57(10), Oct. 2014, p. 47-55
Number of pages: 9 Posted: 14 Dec 2014
Axel Arnbak, Hadi Asghari, Michel van Eeten and N.A.N.M. van Eijk
University of Amsterdam - Institute for Information Law (IViR), Delft University of Technology, Delft University of Technology and affiliation not provided to SSRN
Downloads 124 (246,029)

Abstract:

Loading...

HTTPS, Privacy, Cybersecurity, Security Economics

8.

Securing Cyberspace: Realigning Economic Incentives in the ICT Value Net

Number of pages: 32 Posted: 13 Aug 2009
Johannes M. Bauer and Michel van Eeten
Michigan State University-Department of Media and Information and Delft University of Technology
Downloads 120 (252,206)
Citation 1

Abstract:

Loading...

Cybersecurity, cybercrime, security incentives, externalities, information security policy, regulation

9.

Reliability Against the Odds: The Lessons of Open Source Communities for Developing Reliable Software

Number of pages: 33 Posted: 13 Mar 2005
Delft University of Technology - Faculty of Technology, Policy and Management, Delft University of Technology - Faculty of Technology, Policy and Management and Delft University of Technology
Downloads 104 (279,222)

Abstract:

Loading...

Open source software, software reliability, High Reliability Theory (HRT)

10.

Where is the Governance in Internet Governance?

GigaNet: Global Internet Governance Academic Network, Annual Symposium 2009
Number of pages: 22 Posted: 13 Jul 2016
Michel van Eeten
Delft University of Technology
Downloads 71 (352,862)
Citation 1

Abstract:

Loading...

GigaNet

11.

Unravelling the Economic and Political Drivers of Deep Packet Inspection

GigaNet: Global Internet Governance Academic Network, Annual Symposium 2012
Number of pages: 21 Posted: 17 Jul 2016
Hadi Asghari, Michel van Eeten and Milton Mueller
Delft University of Technology, Delft University of Technology and Georgia Institute of Technology
Downloads 19 (569,192)
Citation 1

Abstract:

Loading...

GigaNet

12.

Systems that Should Have Failed: Critical Infrastructure Protection in an Institutionally Fragmented Environment

Journal of Contingencies and Crisis Management, Vol. 15, No. 1, pp. 18-29, March 2007
Number of pages: 12 Posted: 01 Mar 2007
Mark de Bruijne and Michel van Eeten
Delft University of Technology - Faculty of Technology, Policy and Management and Delft University of Technology
Downloads 13 (608,213)
Citation 1
  • Add to Cart

Abstract:

Loading...

13.

High Reliability and the Management of Critical Infrastructures

Journal of Contingencies and Crisis Management, Vol. 12, pp. 14-28, March 2004
Number of pages: 15 Posted: 13 Mar 2004
Paul R. Schulman, Emory Roe, Michel van Eeten and Mark de Bruijne
Mills College, Mills College, Delft University of Technology and Delft University of Technology - Faculty of Technology, Policy and Management
Downloads 11 (622,003)
  • Add to Cart

Abstract:

Loading...

14.

Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications

Journal of Contingencies and Crisis Management, Vol. 17, Issue 4, pp. 221-232, December 2009
Number of pages: 12 Posted: 24 Nov 2009
Michel van Eeten and Johannes M. Bauer
Delft University of Technology and Michigan State University-Department of Media and Information
Downloads 2 (689,169)
  • Add to Cart

Abstract:

Loading...

15.

Can Markets Deliver Privacy Enhanced Services on Scale?

Posted: 04 Apr 2016
Hadi Asghari, Seda F. Guerses, Rene Mahieu and Michel van Eeten
Delft University of Technology, KU Leuven, Vrije Universiteit Brussel (VUB), LSTS, Interdisciplinary Research Group on Law Science Technology & Society and Delft University of Technology

Abstract:

Loading...

privacy economics, privacy, regulation, privacy enhanced technology

16.

Invisible Trade-Offs of Public Values: Inside Dutch Railways

Public Money & Management, Vol. 28, Issue 3, pp. 147-152, June 2008
Posted: 08 May 2008
Bauke Steenhuisen and Michel van Eeten
affiliation not provided to SSRN and Delft University of Technology

Abstract:

Loading...