Do data breach disclosure laws reduce identity theft?: Do Data Breach Disclosure Laws Reduce Identity Theft?
暂无分享,去创建一个
[1] Philip J. Cook,et al. Public Safety Through Private Action: An Economic Assessment of Bids, Locks, and Citizen Cooperation , 2010 .
[2] William Roberds,et al. Data Breaches and Identity Theft , 2008, WEIS.
[3] Joseph Simitian. UCB Security Breach Notification Symposium March 6, 2009: How a Bill Becomes a Law, Really , 2009 .
[4] Rahul Telang,et al. An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price , 2007, IEEE Transactions on Software Engineering.
[5] C. Hoofnagle. Identity Theft: Making the Known Unknowns Known , 2007 .
[6] D. Weil,et al. Full disclosure : the perils and promise of transparency , 2007 .
[7] P. Schwartz,et al. Notification of Data Security Breaches , 2006 .
[8] Bruce H. Kobayashi. An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods , 2006, Supreme Court Economic Review.
[9] Alessandro Acquisti,et al. Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.
[10] Bradford S. Jones,et al. Beyond Logit and Probit: Cox Duration Models of Single, Repeating, and Competing Events for State Policy Adoption , 2005, State Politics & Policy Quarterly.
[11] Huseyin Cavusoglu,et al. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..
[12] Hashem Dezhbakhsh,et al. The Deterrent Effect of Capital Punishment: Evidence from a "Judicial Experiment" , 2006 .
[13] R. Gittings,et al. Getting off Death Row: Commuted Sentences and the Deterrent Effect of Capital Punishment* , 2003, The Journal of Law and Economics.
[14] Lei Zhou,et al. The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..
[15] Laura Dugan,et al. Identifying Unit-Dependency and Time-Specificity in Longitudinal Analysis: A Graphical Methodology , 2002 .
[16] G. Jin,et al. The Effect of Information on Product Quality: Evidence from Restaurant Hygiene Grade Cards , 2002 .
[17] E. Duflo,et al. How Much Should We Trust Differences-in-Differences Estimates? , 2001 .
[18] Alan D. Mathios,et al. The Impact of Mandatory Disclosure Laws on Product Choices: An Analysis of the Salad Dressing Market* , 2000, The Journal of Law and Economics.
[19] Dan A. Black,et al. Do Right‐To‐Carry Laws Deter Violent Crime? , 1998, The Journal of Legal Studies.
[20] Steven D. Levitt,et al. Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack , 1997 .
[21] David B. Mustard,et al. Crime, Deterrence, and Right‐to‐Carry Concealed Handguns , 1997, The Journal of Legal Studies.
[22] Steven Shavell,et al. Individual Precautions to Prevent Theft: Private Versus Socially Optimalbehavior , 1990 .
[23] Charles D. Kolstad,et al. Ex Post Liability for Harm vs. Ex Ante Safety Regulation: Substitutes or Complements? , 1990 .
[24] Philip J. Cook,et al. The Demand and Supply of Criminal Opportunities , 1986, Crime and Justice.
[25] Steven Shavell,et al. A MODEL OF THE OPTIMAL USE OF LIABILITY AND SAFETY REGULATION , 1984 .
[26] Albert D. Biderman,et al. On Exploring the "Dark Figure" of Crime , 1967 .