M. H. Goldhaber, The attention economy and the Net, First Monday, vol.2, issue.4, 1997.
DOI : 10.5210/fm.v2i4.519

A. Mladenow, C. Bauer, and C. Strauss, Social Crowd Integration in New Product Development: Crowdsourcing Communities Nourish the Open Innovation Paradigm, Global Journal of Flexible Systems Management, vol.78, issue.4, pp.77-86, 2014.
DOI : 10.1007/s40171-013-0053-6

A. Mladenow, N. Kryvinska, and C. Strauss, Towards cloud-centric service environments, Journal of Service Science Research, vol.43, issue.2/3, pp.213-234, 2012.
DOI : 10.1007/s12927-012-0009-y

A. Ghose and S. Yang, An Empirical Analysis of Search Engine Advertising: Sponsored Search in Electronic Markets, Management Science, vol.55, issue.10, pp.1605-1622, 2009.
DOI : 10.1287/mnsc.1090.1054

A. Goldfarb and C. Tucker, Search Engine Advertising: Channel Substitution When Pricing Ads to Context, Management Science, vol.57, issue.3, pp.458-470, 2011.
DOI : 10.1287/mnsc.1100.1287

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.468.8017

A. N. Langville and C. D. Meyer, Google's PageRank and beyond: the science of search engine rankings, 2011.
DOI : 10.1515/9781400830329

Z. Xiang and B. Pan, Travel queries on cities in the United States: Implications for search engine marketing for tourist destinations, Tourism Management, vol.32, issue.1, pp.88-97, 2011.
DOI : 10.1016/j.tourman.2009.12.004

B. Kitts, J. Y. Zhang, G. Wu, W. Brandi, J. Beasley et al., Click Fraud Detection: Adversarial Pattern Recognition over 5??Years at Microsoft, Real World Data Mining Applications, pp.181-201, 2015.
DOI : 10.1007/978-3-319-07812-0_10

N. Immorlica, K. Jain, M. Mahdian, and K. Talwar, Click Fraud Resistant Methods for Learning Click-Through Rates, Internet and Network Economics, pp.34-35, 2005.
DOI : 10.1007/11600930_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.3488

K. C. Wilbur and Y. Zhu, Click Fraud, Marketing Science, vol.28, issue.2, pp.293-308, 2009.
DOI : 10.1287/mksc.1080.0397

H. Haddadi, Fighting online click-fraud using bluff ads, ACM SIGCOMM Computer Communication Review, vol.40, issue.2, pp.21-25, 2010.
DOI : 10.1145/1764873.1764877

URL : http://arxiv.org/abs/1002.2353

B. Liu, S. Nath, R. Govindan, and J. Liu, DECAF: detecting and characterizing ad fraud in mobile apps, Proc. of NSDI, 2014.

. Statista, statista.com/statistics/248059/biggest-challenages-in- search-marketing-worldwide, 2015.

C. Strauss, Informatik-Sicherheitsmanagement: eine Herausforderung für die Unternehmensführung, 1991.
DOI : 10.1007/978-3-322-94696-6

C. Strauss and C. Stummer, MULTIOBJECTIVE DECISION SUPPORT IN IT-RISK MANAGEMENT, International Journal of Information Technology & Decision Making, vol.01, issue.02, pp.251-268, 2002.
DOI : 10.1142/S0219622002000154

E. Kiesling, A. Ekelhart, B. Grill, C. Stummer, and C. Strauss, Multi-objective evolutionary optimization of computation-intensive simulations: The case of security control selection, Proceedings of the 11th Metaheuristics International Conference, p.forthcoming, 2015.

M. Blogs, AdWords Hackers ? What a Nightmare, https://moz.com/ugc/adwords-hackers-what-a-nightmare, 2015.

A. Web, abestweb.com/forums/showthread.php?113490- Google-AdAWords-account-hijacked, 2015.

S. Engine-roundtable, Google AdWords Account Hacked: False Ads & False Charges, https://www.seroundtable.com/archives/017946, 2015.