Security Economics and European Policy
暂无分享,去创建一个
Tyler Moore | Ross J. Anderson | Rainer Böhme | Richard Clayton | T. Moore | Rainer Böhme | R. Clayton
[1] Elizabeth Macdonald,et al. Unfair Terms in Consumer Contracts Regulations 1999 , 2010 .
[2] W. S. Robinson,et al. Ecological correlations and the behavior of individuals. , 1950, International journal of epidemiology.
[3] J. Bauer,et al. Economics of Malware: Security Decisions, Incentives and Externalities , 2008 .
[4] Marc Lelarge,et al. A New Perspective on Internet Security using Insurance , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[5] Markus Jakobsson,et al. Crimeware: Understanding New Attacks and Defenses , 2008 .
[6] Chengyu Song,et al. Studying Malicious Websites and the Underground Economy on the Chinese Web , 2008, WEIS.
[7] Tyler Moore,et al. Examining the impact of website take-down on phishing , 2007, eCrime '07.
[8] Tyler Moore,et al. Information Security Economics - and Beyond , 2007, DEON.
[9] Wolter Lemstra,et al. The Economics of Malware , 2007 .
[10] David Rice,et al. Geekonomics - The Real Cost of Insecure Software , 2007 .
[11] Michael E. Lesk,et al. The New Front Line: Estonia under Cyberassault , 2007, IEEE Security & Privacy.
[12] Micah Schwalb. Exploit Derivatives & National Security , 2007 .
[13] Wei Zou,et al. Characterizing the IRC-based Botnet Phenomenon , 2007 .
[14] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[15] Zulfikar Ramzan,et al. Phishing Attacks: Analyzing Trends in 2006 , 2007, CEAS.
[16] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[17] Aaron Emigh. The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond , 2006, J. Digit. Forensic Pract..
[18] Rainer Böhme,et al. A Comparison of Market Approaches to Software Vulnerability Disclosure , 2006, ETRICS.
[19] William Yurcik,et al. The Evolution of Cyberinsurance , 2006, ArXiv.
[20] Emanuele Giovannetti,et al. Spatial Dispersion of Peering Clusters in the European Internet , 2006 .
[21] A. D’Ignazio,et al. 'Unfair' Discrimination in Two-Sided Peering? Evidence from Linx , 2006 .
[22] J. West,et al. The Economic Realities of Open Standards : Black , White and Many Shades of Gray Joel West , 2005 .
[23] Emerging Economic Models for Vulnerability Research , 2006, WEIS.
[24] Alessandro Acquisti,et al. Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.
[25] Rainer Böhme,et al. Models and Measures for Correlation in Cyber-Insurance , 2006, WEIS.
[26] Luke Georghiou,et al. Innovation and Public Procurement. Review of Issues at Stake , 2005 .
[27] Stefano Tarantola,et al. Handbook on Constructing Composite Indicators: Methodology and User Guide , 2005 .
[28] A. Arora,et al. An Empirical Analysis of Vendor Response to Software Vulnerability Disclosure , 2005 .
[29] Rahul Telang,et al. Market for Software Vulnerabilities? Think Again , 2005, Manag. Sci..
[30] Rahul Telang,et al. Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical Investigation , 2005, WEIS.
[31] Anindya Ghose,et al. The Economic Incentives for Sharing Security Information , 2004, Inf. Syst. Res..
[32] Rainer Böhme,et al. Cyber-Insurance Revisited , 2005, WEIS.
[33] Emanuele Giovannetti,et al. Agglomeration in Internet Co-operation Peering Agreements , 2005 .
[34] Srinivasan Raghunathan,et al. Cyber Insurance and IT Security Investment: Impact of Interdependence Risk , 2005, WEIS.
[35] Ramayya Krishnan,et al. Software Diversity for Information Security , 2005, WEIS.
[36] Andy Ozment,et al. The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting , 2005, WEIS.
[37] Ramayya Krishnan,et al. An Empirical Analysis of Vendor Response to Disclosure Policy , 2005, WEIS.
[38] Huseyin Cavusoglu,et al. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..
[39] Anat Hovav,et al. The Impact of Virus Attack Announcements on the Market Value of Firms , 2004, Inf. Secur. J. A Glob. Perspect..
[40] J. Wolfers,et al. Prediction Markets , 2003 .
[41] Michael D. Smith,et al. Computer security strength and risk: a quantitative approach , 2004 .
[42] Paul F. Syverson,et al. What Price Privacy? - and why identity theft is about neither identity nor theft , 2004, Economics of Information Security.
[43] A. Ozment,et al. Bug Auctions: Vulnerability Markets Reconsidered , 2004 .
[44] Lawrence A. Gordon,et al. Sharing Information on Computer Systems Security: An Economic Analysis , 2003 .
[45] A. Hovav,et al. The Impact of Denial‐of‐Service Attack Announcements on the Market Value of Firms , 2003 .
[46] Dale A. Stirling,et al. Information rules , 2003, SGMD.
[47] Ashish Garg,et al. Quantifying the financial impact of IT security breaches , 2003, Inf. Manag. Comput. Secur..
[48] Lei Zhou,et al. The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..
[49] Lawrence A. Gordon,et al. A framework for using insurance for cyber-risk management , 2003, Commun. ACM.
[50] Progress Made , But Challenges Remain to Protect Federal Systems and the Nation ’ s Critical Infrastructures , 2003 .
[51] H. Kunreuther,et al. Interdependent Security , 2003 .
[52] Crispin Cowan,et al. Timing the Application of Security Patches for Optimal Uptime , 2002, LISA.
[53] Vernon J. Richardson,et al. Assessing the risk in e-commerce , 2001, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[54] C. Withers,et al. Jurisdiction clauses and the Unfair Terms in Consumer Contracts Regulations , 2002 .
[55] H. Varian,et al. A STRATEGIC GUIDE TO THE NETWORK ECONOMY , 2002 .
[56] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[57] Nicholas Bohm,et al. Electronic Commerce: Who Carries the Risk of Fraud? , 2000, J. Inf. Law Technol..
[58] Leif Hommen,et al. Public Technology Procurement and Innovation Theory , 2000 .
[59] Hal R. Varian,et al. Information rules - a strategic guide to the network economy , 1999 .
[60] Lynn Henderson,et al. The unfair terms in consumer contracts regulations 1994 , 1995 .
[61] Stephen P. D'Arcy,et al. Catastrophe Futures: A Better Hedge for Insurers , 1992 .
[62] M. Mcclendon,et al. Acquiescence and Recency Response-Order Effects in Interview Surveys , 1991 .
[63] Ewoud Hondius,et al. Unfair Terms in Consumer Contracts , 1987 .
[64] Norbert Reich,et al. Product safety and product liability — An analysis of the EEC Council Directive of 25 July 1985 on the approximation of the laws, regulations, and administrative provisions of the Member States concerning liability for defective products , 1986 .
[65] E. Fama. EFFICIENT CAPITAL MARKETS: A REVIEW OF THEORY AND EMPIRICAL WORK* , 1970 .
[66] Ralph Nader,et al. Unsafe at Any Speed , 1965 .