Economics of Information Security

[1]  Arthur Twining Hadley,et al.  Railroad Transportation: Its History and Its Laws , 2006 .

[2]  Adam Kilgarriff,et al.  of the European Chapter of the Association for Computational Linguistics , 2006 .

[3]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[4]  Martin C. Libicki The Mesh and The Net: Speculations on Armed Conflict in a Time of Free Silicon , 2004 .

[5]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.

[6]  Michael Gurski,et al.  P3P and Privacy: An update for the Privacy Community , 2004 .

[7]  Ross J. Anderson Cryptography and competition policy: issues with 'trusted computing' , 2003, PODC '03.

[8]  Judee K. Burgoon,et al.  A Longitudinal Analysis of Language Behavior of Deception in E-mail , 2003, ISI.

[9]  Jay F. Nunamaker,et al.  Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection , 2003, ISI.

[10]  Jay F. Nunamaker,et al.  Training Professionals to Detect Deception , 2003, ISI.

[11]  Michael D. Smith,et al.  How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks , 2003, Financial Cryptography.

[12]  Roger Dingledine,et al.  On the Economics of Anonymity , 2003, Financial Cryptography.

[13]  H. Varian,et al.  Conditioning Prices on Purchase History , 2005 .

[14]  Benjamin D. Brunk Understanding the Privacy Space , 2002, First Monday.

[15]  Paul Resnick,et al.  The value of reputation on eBay: A controlled experiment , 2002 .

[16]  David R. Karger,et al.  Haystack: A Platform for Creating, Organizing and Visualizing Information Using RDF , 2002, Semantic Web Workshop.

[17]  Curtis R. Taylor Private Demands and Demands for Privacy: Dynamic Pricing and the Market for Customer Information , 2002 .

[18]  F. Capra The hidden connections : integrating the biological, cognitive, and social dimensions of life into a science of sustainability , 2002 .

[19]  J. Stiglitz The market for 'lemons': quality uncertainty and the market mechanism , 2002 .

[20]  T. Yamagishi,et al.  Improving the Lemons Market with a Reputation System : An Experimental Study of Internet Auctioning , 2002 .

[21]  Pontus Johansson,et al.  User Modeling in Dialog Systems , 2002 .

[22]  Kai Lung Hui,et al.  Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.

[23]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[24]  John C. Munson,et al.  Watcher: the missing piece of the security puzzle , 2001, Seventeenth Annual Computer Security Applications Conference.

[25]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[26]  Chrysanthos Dellarocas,et al.  Building Trust On-Line: The Design of Reliable Reputation Reporting : Mechanisms for Online Trading Communities , 2001 .

[27]  Lawrence A. Gordon,et al.  Using information security as a response to competitor analysis systems , 2001, CACM.

[28]  Karen M. Cornetto,et al.  Identity and illusion on the Internet : interpersonal deception and detection in interactive Internet environments , 2001 .

[29]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[30]  Sergei Nirenburg,et al.  Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.

[31]  Daniel J. Barrett,et al.  SSH, The Secure Shell: The Definitive Guide , 2001 .

[32]  Mark A. Lemley Rational Ignorance at the Patent Office , 2001 .

[33]  H. V. Jagadish,et al.  Information warfare and security , 1998, SGMD.

[34]  Lawrence Lessig The Future of Ideas , 2001 .

[35]  Yougu Yuan,et al.  Web Spoofing 2001 , 2001 .

[36]  Clifford A. Lynch,et al.  When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web , 2001, J. Assoc. Inf. Sci. Technol..

[37]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[38]  Catherine A. Meadows,et al.  A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..

[39]  Pamela Samuelson,et al.  Privacy as intellectual property , 2000 .

[40]  Pankaj Rohatgi,et al.  Can Pseudonymity Really Guarantee Privacy? , 2000, USENIX Security Symposium.

[41]  Jacob O. Wobbrock,et al.  Put your best face forward: anthropomorphic agents, e-commerce consumers, and the law , 2000, AGENTS '00.

[42]  Ravi S. Sandhu,et al.  Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.

[43]  J. Bradford DeLong,et al.  Speculative Microeconomics for Tomorrow's Economy , 2000, First Monday.

[44]  Deborah A. Frincke,et al.  Balancing cooperation and risk in intrusion detection , 2000, TSEC.

[45]  Alistair Kelman,et al.  Database Nation: The Death of Privacy in the 21st Century , 2000, J. Inf. Law Technol..

[46]  Michael M. May,et al.  How much is enough? A risk management approach to computer security , 2000 .

[47]  R. Sandhu,et al.  The ARBAC97 model for role-based administration of roles , 1999, TSEC.

[48]  Keith Buzzard,et al.  Computer security - What should you spend your money on? , 1999, Comput. Secur..

[49]  Amory B. Lovins,et al.  Natural Capitalism: Creating the Next Industrial Revolution , 1999 .

[50]  Giovanni Vigna,et al.  NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..

[51]  Eugene H. Spafford,et al.  Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities , 1999, J. Comput. Secur..

[52]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[53]  Stefano Scoglio,et al.  Transforming Privacy: A Transpersonal Philosophy of Rights , 1998 .

[54]  Thomas Finne,et al.  A conceptual framework for information security management , 1998, Comput. Secur..

[55]  Hal R. Varian,et al.  Information rules - a strategic guide to the network economy , 1999 .

[56]  Hal R. Varian,et al.  How to Build an Economic Model in Your Spare Time , 1997 .

[57]  Alberto Trombetta,et al.  Optimal Comparison Strategies in Ulam's Searching Game with Two Errors , 1997, Theor. Comput. Sci..

[58]  Peter C. Fishburn,et al.  Fixed fee versus unit pricing for information goods: competition, equilibria, and price wars , 1997, First Monday.

[59]  Lee W. McKnight,et al.  Information security for Internet commerce , 1997 .

[60]  K. Corts,et al.  On the competitive effects of price-matching policies , 1997 .

[61]  David I. Laibson,et al.  Golden Eggs and Hyperbolic Discounting , 1997 .

[62]  Dan S. Wallach,et al.  Web Spoofing: An Internet Con Game , 1997 .

[63]  R. Weber,et al.  Information systems planning: a model and empirical tests , 1996 .

[64]  Dorothy E. Denning,et al.  A taxonomy for key escrow encryption systems , 1996, CACM.

[65]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[66]  Kenneth C. Laudon,et al.  Markets and privacy , 1993, CACM.

[67]  Andrew M. Odlyzko,et al.  The bumpy road of Electronic Commerce , 1996, WebNet.

[68]  Douglas Biber,et al.  Dimensions of Register Variation: A Cross-Linguistic Comparison , 1995 .

[69]  Dinesh Batra,et al.  Accessibility, security, and accuracy in statistical databases: the case for the multiplicative fixed data perturbation approach , 1995 .

[70]  E. E. Zajac,et al.  Political Economy of Fairness , 1995 .

[71]  Stephen Coate,et al.  Altruism, the Samaritan's Dilemma, and Government Transfer Policy , 1995 .

[72]  Gustavus J. Simmons,et al.  Cryptanalysis and protocol failures , 1994, CACM.

[73]  Jussi Karlgren,et al.  Recognizing Text Genres With Simple Metrics Using Discriminant Analysis , 1994, COLING.

[74]  C. Shapiro,et al.  Systems Competition and Network Effects , 1994 .

[75]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[76]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[77]  Jonathan K. Millen,et al.  A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[78]  William A. Stewart,et al.  The Language Scientist As Expert in the Legal Setting: Issues in Forensic Linguistics , 1990 .

[79]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[80]  R. Fazio Multiple Processes by which Attitudes Guide Behavior: The Mode Model as an Integrative Framework , 1990 .

[81]  L. Kerschberg Letter from the editor , 2017, IEEE Data Eng. Bull..

[82]  K. Mani Chandy,et al.  Parallel program design - a foundation , 1988 .

[83]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[84]  John Burrows,et al.  Word-Patterns and Story-Shapes: The Statistical Analysis of Narrative Style , 1987 .

[85]  D. Biber Spoken and Written Textual Dimensions in English: Resolving the Contradictory Findings , 1986 .

[86]  Simon R. Wiseman,et al.  A Secure Capability Computer System , 1986, 1986 IEEE Symposium on Security and Privacy.

[87]  George Norman The Economics of Price Discrimination , 1985 .

[88]  Carl E. Landwehr,et al.  A security model for military message systems , 1984, TOCS.

[89]  Elaine Rich,et al.  Users are Individuals: Individualizing User Models , 1999, Int. J. Man Mach. Stud..

[90]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[91]  G. Stigler An Introduction to Privacy in Economics and Politics , 1980, The Journal of Legal Studies.

[92]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[93]  G. Kolko Railroads and Regulation, 1877-1916 , 1967 .

[94]  Alfred D. Chandler,et al.  The railroads : the nation's first big business : sources and readings , 1965 .

[95]  S. Fienberg,et al.  Inference and Disputed Authorship: The Federalist , 1966 .

[96]  E. Goffman Stigma; Notes On The Management Of Spoiled Identity , 1964 .

[97]  L. Festinger,et al.  Cognitive consequences of forced compliance. , 2011, Journal of abnormal psychology.

[98]  R. Allen,et al.  Economic theory , 2018, Integrative Governance.

[99]  L. Festinger A Theory of Cognitive Dissonance , 1957 .

[100]  D. P. Locklin,et al.  Economics of Transportation. , 1936 .