Security Economics and European Policy

[1]  Elizabeth Macdonald,et al.  Unfair Terms in Consumer Contracts Regulations 1999 , 2010 .

[2]  W. S. Robinson,et al.  Ecological correlations and the behavior of individuals. , 1950, International journal of epidemiology.

[3]  J. Bauer,et al.  Economics of Malware: Security Decisions, Incentives and Externalities , 2008 .

[4]  Marc Lelarge,et al.  A New Perspective on Internet Security using Insurance , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[5]  Markus Jakobsson,et al.  Crimeware: Understanding New Attacks and Defenses , 2008 .

[6]  Chengyu Song,et al.  Studying Malicious Websites and the Underground Economy on the Chinese Web , 2008, WEIS.

[7]  Tyler Moore,et al.  Examining the impact of website take-down on phishing , 2007, eCrime '07.

[8]  Tyler Moore,et al.  Information Security Economics - and Beyond , 2007, DEON.

[9]  Wolter Lemstra,et al.  The Economics of Malware , 2007 .

[10]  David Rice,et al.  Geekonomics - The Real Cost of Insecure Software , 2007 .

[11]  Michael E. Lesk,et al.  The New Front Line: Estonia under Cyberassault , 2007, IEEE Security & Privacy.

[12]  Micah Schwalb Exploit Derivatives & National Security , 2007 .

[13]  Wei Zou,et al.  Characterizing the IRC-based Botnet Phenomenon , 2007 .

[14]  Stefan Savage,et al.  An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.

[15]  Zulfikar Ramzan,et al.  Phishing Attacks: Analyzing Trends in 2006 , 2007, CEAS.

[16]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[17]  Aaron Emigh The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond , 2006, J. Digit. Forensic Pract..

[18]  Rainer Böhme,et al.  A Comparison of Market Approaches to Software Vulnerability Disclosure , 2006, ETRICS.

[19]  William Yurcik,et al.  The Evolution of Cyberinsurance , 2006, ArXiv.

[20]  Emanuele Giovannetti,et al.  Spatial Dispersion of Peering Clusters in the European Internet , 2006 .

[21]  A. D’Ignazio,et al.  'Unfair' Discrimination in Two-Sided Peering? Evidence from Linx , 2006 .

[22]  J. West,et al.  The Economic Realities of Open Standards : Black , White and Many Shades of Gray Joel West , 2005 .

[23]  Emerging Economic Models for Vulnerability Research , 2006, WEIS.

[24]  Alessandro Acquisti,et al.  Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.

[25]  Rainer Böhme,et al.  Models and Measures for Correlation in Cyber-Insurance , 2006, WEIS.

[26]  Luke Georghiou,et al.  Innovation and Public Procurement. Review of Issues at Stake , 2005 .

[27]  Stefano Tarantola,et al.  Handbook on Constructing Composite Indicators: Methodology and User Guide , 2005 .

[28]  A. Arora,et al.  An Empirical Analysis of Vendor Response to Software Vulnerability Disclosure , 2005 .

[29]  Rahul Telang,et al.  Market for Software Vulnerabilities? Think Again , 2005, Manag. Sci..

[30]  Rahul Telang,et al.  Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical Investigation , 2005, WEIS.

[31]  Anindya Ghose,et al.  The Economic Incentives for Sharing Security Information , 2004, Inf. Syst. Res..

[32]  Rainer Böhme,et al.  Cyber-Insurance Revisited , 2005, WEIS.

[33]  Emanuele Giovannetti,et al.  Agglomeration in Internet Co-operation Peering Agreements , 2005 .

[34]  Srinivasan Raghunathan,et al.  Cyber Insurance and IT Security Investment: Impact of Interdependence Risk , 2005, WEIS.

[35]  Ramayya Krishnan,et al.  Software Diversity for Information Security , 2005, WEIS.

[36]  Andy Ozment,et al.  The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting , 2005, WEIS.

[37]  Ramayya Krishnan,et al.  An Empirical Analysis of Vendor Response to Disclosure Policy , 2005, WEIS.

[38]  Huseyin Cavusoglu,et al.  The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..

[39]  Anat Hovav,et al.  The Impact of Virus Attack Announcements on the Market Value of Firms , 2004, Inf. Secur. J. A Glob. Perspect..

[40]  J. Wolfers,et al.  Prediction Markets , 2003 .

[41]  Michael D. Smith,et al.  Computer security strength and risk: a quantitative approach , 2004 .

[42]  Paul F. Syverson,et al.  What Price Privacy? - and why identity theft is about neither identity nor theft , 2004, Economics of Information Security.

[43]  A. Ozment,et al.  Bug Auctions: Vulnerability Markets Reconsidered , 2004 .

[44]  Lawrence A. Gordon,et al.  Sharing Information on Computer Systems Security: An Economic Analysis , 2003 .

[45]  A. Hovav,et al.  The Impact of Denial‐of‐Service Attack Announcements on the Market Value of Firms , 2003 .

[46]  Dale A. Stirling,et al.  Information rules , 2003, SGMD.

[47]  Ashish Garg,et al.  Quantifying the financial impact of IT security breaches , 2003, Inf. Manag. Comput. Secur..

[48]  Lei Zhou,et al.  The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..

[49]  Lawrence A. Gordon,et al.  A framework for using insurance for cyber-risk management , 2003, Commun. ACM.

[50]  Progress Made , But Challenges Remain to Protect Federal Systems and the Nation ’ s Critical Infrastructures , 2003 .

[51]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[52]  Crispin Cowan,et al.  Timing the Application of Security Patches for Optimal Uptime , 2002, LISA.

[53]  Vernon J. Richardson,et al.  Assessing the risk in e-commerce , 2001, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[54]  C. Withers,et al.  Jurisdiction clauses and the Unfair Terms in Consumer Contracts Regulations , 2002 .

[55]  H. Varian,et al.  A STRATEGIC GUIDE TO THE NETWORK ECONOMY , 2002 .

[56]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[57]  Nicholas Bohm,et al.  Electronic Commerce: Who Carries the Risk of Fraud? , 2000, J. Inf. Law Technol..

[58]  Leif Hommen,et al.  Public Technology Procurement and Innovation Theory , 2000 .

[59]  Hal R. Varian,et al.  Information rules - a strategic guide to the network economy , 1999 .

[60]  Lynn Henderson,et al.  The unfair terms in consumer contracts regulations 1994 , 1995 .

[61]  Stephen P. D'Arcy,et al.  Catastrophe Futures: A Better Hedge for Insurers , 1992 .

[62]  M. Mcclendon,et al.  Acquiescence and Recency Response-Order Effects in Interview Surveys , 1991 .

[63]  Ewoud Hondius,et al.  Unfair Terms in Consumer Contracts , 1987 .

[64]  Norbert Reich,et al.  Product safety and product liability — An analysis of the EEC Council Directive of 25 July 1985 on the approximation of the laws, regulations, and administrative provisions of the Member States concerning liability for defective products , 1986 .

[65]  E. Fama EFFICIENT CAPITAL MARKETS: A REVIEW OF THEORY AND EMPIRICAL WORK* , 1970 .

[66]  Ralph Nader,et al.  Unsafe at Any Speed , 1965 .