Economics of Information Security
暂无分享,去创建一个
[1] L. J. Camp. Pricing Security , 2000 .
[2] Yacov Y. Haimes,et al. Are we forgetting the risks of information technology? , 2000, Computer.
[3] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[4] Lawrence A. Gordon,et al. Using information security as a response to competitor analysis systems , 2001, CACM.
[5] L. Camp,et al. Privacy-Enhancing Technologies for Internet Commerce , 2002 .
[6] P. Samuelson,et al. The Law and Economics of Reverse Engineering , 2002 .
[7] Lawrence A. Gordon,et al. An Economics Perspective on the Sharing of Information Related to Security Breaches: Concepts and Empirical Evidence , 2002 .
[8] Ross J. Anderson. Cryptography and competition policy: issues with 'trusted computing' , 2003, PODC '03.
[9] Andrew M. Odlyzko,et al. Privacy, economics, and price discrimination on the Internet , 2003, ICEC '03.
[10] A. Arora,et al. Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis , 2004 .
[11] Karthik N. Kannan,et al. An Economic Analysis of Market for Software Vulnerabilities , 2004 .
[12] A. Ozment,et al. Bug Auctions: Vulnerability Markets Reconsidered , 2004 .
[13] Paul F. Syverson,et al. What Price Privacy? - and why identity theft is about neither identity nor theft , 2004, Economics of Information Security.
[14] Hal R. Varian,et al. System Reliability and Free Riding , 2004, Economics of Information Security.
[15] R. Adkins. An Insurance Style Model for Determining the Appropriate Investment Level against Maximum Loss arising from an Information Security Breach , 2004 .
[16] Michael D. Smith,et al. Computer security strength and risk: a quantitative approach , 2004 .
[17] Huseyin Cavusoglu,et al. Economics of IT Security Management , 2004, Economics of Information Security.
[18] Mauro Sandrini,et al. We Want Security but We Hate It - The Foundations of security technoeconomics in the social worldfrom Control to Surveillance , 2004, Economics of Information Security.
[19] Stephen Lewis,et al. How Much is Stronger DRM Worth? , 2004, Economics of Information Security.
[20] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[21] Anindya Ghose,et al. The Economic Consequences of Sharing Security Information , 2004, Economics of Information Security.
[22] Stuart E. Schechter. Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.
[23] Rahul Telang,et al. Optimal Policy for Software Vulnerability Disclosure , 2005 .
[24] Peter E. Sand. The Privacy Value , 2005, WEIS.
[25] Faking It: Criminal Sanctions and the Cost of Computer Intrusions , 2005, WEIS.
[26] Lawrence A. Gordon,et al. Managing Cybersecurity Resources: A Cost-Benefit Analysis , 2005 .
[27] Michael P. Gallaher,et al. Could IPv6 Improve Network Security? And, If So, at What Cost? , 2005, WEIS.
[28] Eytan Adar,et al. Valuating Privacy , 2005, WEIS.
[29] Jens Grossklags,et al. User Choices and Regret: Understanding Users’ Decision Process About Consensually Acquired Spyware , 2006 .
[30] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[31] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.