Proper work on the theory and research methods
Proper work on the theory and research methods
Ellis, R. & Yuan, S. (2022) Bounty Everything: Hackers and the Making of the Global Bug Marketplace. Data & Society. http://dx.doi.org/10.2139/ssrn.4009275
Malladi, S. S. & Subramanian H. C. (2020). Bug Bounty Programs for Cybersecurity: Practices, Issues, and Recommendations. IEEE Software, 37 (1), 31-39. https://doi.org/10.1109/MS.2018.2880508
Ruohonen, J., Hyrynsalmi, S., Hyrynsalmi, S. & Leppänen V. (2020). A mixed methods probe into the direct disclosure of software vulnerabilities. Computers in Human Behavior, 103, 161-173. Redirecting
Zhao, M., Laszka, A., & Grossklags, J. (2017). Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery. Journal of Information Policy, 7, 372–418.https://doi.org/10.5325/jinfopoli.7.2017.0372
Ahmed, A., & Lee, B. (2020). Organizational learning on bug bounty platforms. Americas Conference on Information Systems, Information Security and Privacy. 33. https://aisel.aisnet.org/amcis2020/info_security_privacy/info_security_privacy/33
Answer preview to proper work on the theory and research methods
APA
2095 words