Economics of Information Security
暂无分享,去创建一个
[1] Arthur Twining Hadley,et al. Railroad Transportation: Its History and Its Laws , 2006 .
[2] Adam Kilgarriff,et al. of the European Chapter of the Association for Computational Linguistics , 2006 .
[3] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[4] Martin C. Libicki. The Mesh and The Net: Speculations on Armed Conflict in a Time of Free Silicon , 2004 .
[5] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[6] Michael Gurski,et al. P3P and Privacy: An update for the Privacy Community , 2004 .
[7] Ross J. Anderson. Cryptography and competition policy: issues with 'trusted computing' , 2003, PODC '03.
[8] Judee K. Burgoon,et al. A Longitudinal Analysis of Language Behavior of Deception in E-mail , 2003, ISI.
[9] Jay F. Nunamaker,et al. Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection , 2003, ISI.
[10] Jay F. Nunamaker,et al. Training Professionals to Detect Deception , 2003, ISI.
[11] Michael D. Smith,et al. How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks , 2003, Financial Cryptography.
[12] Roger Dingledine,et al. On the Economics of Anonymity , 2003, Financial Cryptography.
[13] H. Varian,et al. Conditioning Prices on Purchase History , 2005 .
[14] Benjamin D. Brunk. Understanding the Privacy Space , 2002, First Monday.
[15] Paul Resnick,et al. The value of reputation on eBay: A controlled experiment , 2002 .
[16] David R. Karger,et al. Haystack: A Platform for Creating, Organizing and Visualizing Information Using RDF , 2002, Semantic Web Workshop.
[17] Curtis R. Taylor. Private Demands and Demands for Privacy: Dynamic Pricing and the Market for Customer Information , 2002 .
[18] F. Capra. The hidden connections : integrating the biological, cognitive, and social dimensions of life into a science of sustainability , 2002 .
[19] J. Stiglitz. The market for 'lemons': quality uncertainty and the market mechanism , 2002 .
[20] T. Yamagishi,et al. Improving the Lemons Market with a Reputation System : An Experimental Study of Internet Auctioning , 2002 .
[21] Pontus Johansson,et al. User Modeling in Dialog Systems , 2002 .
[22] Kai Lung Hui,et al. Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.
[23] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[24] John C. Munson,et al. Watcher: the missing piece of the security puzzle , 2001, Seventeenth Annual Computer Security Applications Conference.
[25] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[26] Chrysanthos Dellarocas,et al. Building Trust On-Line: The Design of Reliable Reputation Reporting : Mechanisms for Online Trading Communities , 2001 .
[27] Lawrence A. Gordon,et al. Using information security as a response to competitor analysis systems , 2001, CACM.
[28] Karen M. Cornetto,et al. Identity and illusion on the Internet : interpersonal deception and detection in interactive Internet environments , 2001 .
[29] E. Friedman,et al. The Social Cost of Cheap Pseudonyms , 2001 .
[30] Sergei Nirenburg,et al. Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.
[31] Daniel J. Barrett,et al. SSH, The Secure Shell: The Definitive Guide , 2001 .
[32] Mark A. Lemley. Rational Ignorance at the Patent Office , 2001 .
[33] H. V. Jagadish,et al. Information warfare and security , 1998, SGMD.
[34] Lawrence Lessig. The Future of Ideas , 2001 .
[35] Yougu Yuan,et al. Web Spoofing 2001 , 2001 .
[36] Clifford A. Lynch,et al. When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web , 2001, J. Assoc. Inf. Sci. Technol..
[37] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[38] Catherine A. Meadows,et al. A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..
[39] Pamela Samuelson,et al. Privacy as intellectual property , 2000 .
[40] Pankaj Rohatgi,et al. Can Pseudonymity Really Guarantee Privacy? , 2000, USENIX Security Symposium.
[41] Jacob O. Wobbrock,et al. Put your best face forward: anthropomorphic agents, e-commerce consumers, and the law , 2000, AGENTS '00.
[42] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[43] J. Bradford DeLong,et al. Speculative Microeconomics for Tomorrow's Economy , 2000, First Monday.
[44] Deborah A. Frincke,et al. Balancing cooperation and risk in intrusion detection , 2000, TSEC.
[45] Alistair Kelman,et al. Database Nation: The Death of Privacy in the 21st Century , 2000, J. Inf. Law Technol..
[46] Michael M. May,et al. How much is enough? A risk management approach to computer security , 2000 .
[47] R. Sandhu,et al. The ARBAC97 model for role-based administration of roles , 1999, TSEC.
[48] Keith Buzzard,et al. Computer security - What should you spend your money on? , 1999, Comput. Secur..
[49] Amory B. Lovins,et al. Natural Capitalism: Creating the Next Industrial Revolution , 1999 .
[50] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[51] Eugene H. Spafford,et al. Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities , 1999, J. Comput. Secur..
[52] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[53] Stefano Scoglio,et al. Transforming Privacy: A Transpersonal Philosophy of Rights , 1998 .
[54] Thomas Finne,et al. A conceptual framework for information security management , 1998, Comput. Secur..
[55] Hal R. Varian,et al. Information rules - a strategic guide to the network economy , 1999 .
[56] Hal R. Varian,et al. How to Build an Economic Model in Your Spare Time , 1997 .
[57] Alberto Trombetta,et al. Optimal Comparison Strategies in Ulam's Searching Game with Two Errors , 1997, Theor. Comput. Sci..
[58] Peter C. Fishburn,et al. Fixed fee versus unit pricing for information goods: competition, equilibria, and price wars , 1997, First Monday.
[59] Lee W. McKnight,et al. Information security for Internet commerce , 1997 .
[60] K. Corts,et al. On the competitive effects of price-matching policies , 1997 .
[61] David I. Laibson,et al. Golden Eggs and Hyperbolic Discounting , 1997 .
[62] Dan S. Wallach,et al. Web Spoofing: An Internet Con Game , 1997 .
[63] R. Weber,et al. Information systems planning: a model and empirical tests , 1996 .
[64] Dorothy E. Denning,et al. A taxonomy for key escrow encryption systems , 1996, CACM.
[65] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[66] Kenneth C. Laudon,et al. Markets and privacy , 1993, CACM.
[67] Andrew M. Odlyzko,et al. The bumpy road of Electronic Commerce , 1996, WebNet.
[68] Douglas Biber,et al. Dimensions of Register Variation: A Cross-Linguistic Comparison , 1995 .
[69] Dinesh Batra,et al. Accessibility, security, and accuracy in statistical databases: the case for the multiplicative fixed data perturbation approach , 1995 .
[70] E. E. Zajac,et al. Political Economy of Fairness , 1995 .
[71] Stephen Coate,et al. Altruism, the Samaritan's Dilemma, and Government Transfer Policy , 1995 .
[72] Gustavus J. Simmons,et al. Cryptanalysis and protocol failures , 1994, CACM.
[73] Jussi Karlgren,et al. Recognizing Text Genres With Simple Metrics Using Discriminant Analysis , 1994, COLING.
[74] C. Shapiro,et al. Systems Competition and Network Effects , 1994 .
[75] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[76] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[77] Jonathan K. Millen,et al. A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[78] William A. Stewart,et al. The Language Scientist As Expert in the Legal Setting: Issues in Forensic Linguistics , 1990 .
[79] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[80] R. Fazio. Multiple Processes by which Attitudes Guide Behavior: The Mode Model as an Integrative Framework , 1990 .
[81] L. Kerschberg. Letter from the editor , 2017, IEEE Data Eng. Bull..
[82] K. Mani Chandy,et al. Parallel program design - a foundation , 1988 .
[83] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[84] John Burrows,et al. Word-Patterns and Story-Shapes: The Statistical Analysis of Narrative Style , 1987 .
[85] D. Biber. Spoken and Written Textual Dimensions in English: Resolving the Contradictory Findings , 1986 .
[86] Simon R. Wiseman,et al. A Secure Capability Computer System , 1986, 1986 IEEE Symposium on Security and Privacy.
[87] George Norman. The Economics of Price Discrimination , 1985 .
[88] Carl E. Landwehr,et al. A security model for military message systems , 1984, TOCS.
[89] Elaine Rich,et al. Users are Individuals: Individualizing User Models , 1999, Int. J. Man Mach. Stud..
[90] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[91] G. Stigler. An Introduction to Privacy in Economics and Politics , 1980, The Journal of Legal Studies.
[92] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[93] G. Kolko. Railroads and Regulation, 1877-1916 , 1967 .
[94] Alfred D. Chandler,et al. The railroads : the nation's first big business : sources and readings , 1965 .
[95] S. Fienberg,et al. Inference and Disputed Authorship: The Federalist , 1966 .
[96] E. Goffman. Stigma; Notes On The Management Of Spoiled Identity , 1964 .
[97] L. Festinger,et al. Cognitive consequences of forced compliance. , 2011, Journal of abnormal psychology.
[98] R. Allen,et al. Economic theory , 2018, Integrative Governance.
[99] L. Festinger. A Theory of Cognitive Dissonance , 1957 .
[100] D. P. Locklin,et al. Economics of Transportation. , 1936 .