The economics of cybersecurity: Principles and policy options
暂无分享,去创建一个
[1] A. Acquisti,et al. Privacy Costs and Personal Data Protection: Economic and Legal Perspectives , 2009 .
[2] Alessandro Acquisti,et al. Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.
[3] A. Felix,et al. FEDERAL RESERVE BANK OF KANSAS CITY , 1999 .
[4] Hal R. Varian,et al. System Reliability and Free Riding , 2004, Economics of Information Security.
[5] Wolter Lemstra,et al. The Economics of Malware , 2007 .
[6] Tyler Moore,et al. The Impact of Incentives on Notice and Take-down , 2008, WEIS.
[7] Tyler Moore,et al. The consequence of non-cooperation in the fight against phishing , 2008, 2008 eCrime Researchers Summit.
[8] L. Jean Camp,et al. Pricing Security - A Market in Vulnerabilities , 2004, Economics of Information Security.
[9] Mark MacCarthy. What Internet Intermediaries Are Doing About Liability and Why It Matters , 2009 .
[10] Benjamin Edelman,et al. Adverse selection in online "trust" certifications , 2009, WEIS.
[11] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[12] Tyler Moore,et al. Security Economics and European Policy , 2008, WEIS.
[13] Rainer Böhme,et al. Modeling Cyber-Insurance: Towards a Unifying Framework , 2010, WEIS.
[14] Shameek Konar,et al. Information As Regulation: The Effect of Community Right to Know Laws on Toxic Emissions , 1997 .
[15] Steven Shavell,et al. A MODEL OF THE OPTIMAL USE OF LIABILITY AND SAFETY REGULATION , 1984 .
[16] Richard J. Sullivan. The Benefits of Collecting and Reporting Payment Fraud Statistics for the United States , 2009 .
[17] Francesco Parisi,et al. The Law and Economics of Cybersecurity , 2005 .
[18] Charles D. Kolstad,et al. Ex Post Liability for Harm vs. Ex Ante Safety Regulation: Substitutes or Complements? , 1990 .
[19] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[20] Stephen J. Lukasik,et al. Deterring CyberAttacks : Informing Strategies and Developing Options for U . S . Policy Committee on Deterring Cyberattacks : Informing Strategies and Developing Options , 2010 .
[21] Douglas A. Barnes. Deworming the Internet , 2004 .
[22] Michael Freeman,et al. Cyber Security: Are Economic Incentives Adequate? , 2007, Critical Infrastructure Protection.
[23] Tyler Moore,et al. Examining the impact of website take-down on phishing , 2007, eCrime '07.
[24] J. Bauer,et al. Economics of Malware: Security Decisions, Incentives and Externalities , 2008 .
[25] Rainer Böhme,et al. Models and Measures for Correlation in Cyber-Insurance , 2006, WEIS.
[26] Ross J. Anderson,et al. The snooping dragon: social-malware surveillance of the Tibetan movement , 2009 .
[27] Steven J. Murdoch,et al. Thinking Inside the Box: System-Level Failures of Tamper Proofing , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[28] Alessandro Acquisti,et al. Do Data Breaches Disclosure Laws Reduce Identity Theft? , 2010, WEIS.
[29] Eric A. Posner,et al. Holding Internet Service Providers Accountable , 2006, Supreme Court Economic Review.
[30] H. Kunreuther,et al. Interdependent Security , 2003 .
[31] M. Eric Johnson,et al. Managing Information Risk and the Economics of Security , 2008, Managing Information Risk and the Economics of Security.
[32] Tridib Bandyopadhyay,et al. Why IT managers don't go for cyber-insurance products , 2009, Commun. ACM.
[33] Richard Clayton,et al. Might Governments Clean-Up Malware? , 2011, WEIS.
[34] Mark MacCarthy. Information Security Policy in the U.S. Retail Payments Industry , 2010, WEIS.
[35] Giornalismo. The Sunday Times , 2012 .
[36] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[37] Sujeet Shenoi,et al. Critical infrastructure protection , 2007 .