-
1
-
-
84925838576
-
Why information security is hard - An economic perspective
-
IEEE Computer Society, Los Alamitos, CA
-
Anderson, R. J. 2001. Why information security is hard - An economic perspective. Proc. 17th Ann. Comput. Security Appl. Conf. IEEE Computer Society, Los Alamitos, CA, 358-365.
-
(2001)
Proc. 17th Ann. Comput. Security Appl. Conf.
, pp. 358-365
-
-
Anderson, R.J.1
-
3
-
-
33750695772
-
-
Working paper, Carnegie Mellon University, Pittsburgh, PA
-
Arora, A., R. Telang, H. Xu. 2005. Optimal policy for software vulnerability disclosure. Working paper, Carnegie Mellon University, Pittsburgh, PA.
-
(2005)
Optimal Policy for Software Vulnerability Disclosure
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
5
-
-
84860019483
-
Developing a patch and vulnerability management strategy
-
Retrieved March 2006
-
Bentley, A. 2005. Developing a patch and vulnerability management strategy. SC Magazine. Retrieved March 2006, http://www. scmagazine.com.
-
(2005)
SC Magazine
-
-
Bentley, A.1
-
6
-
-
33750686102
-
The patch problem: It's costing your business real dollars
-
Bloor, B. 2003. The patch problem: It's costing your business real dollars. Baroudi Bloor. http://www.baroudi.com/pdfs/patch. pdf.
-
(2003)
Baroudi Bloor
-
-
Bloor, B.1
-
9
-
-
33750689639
-
-
Working paper, University of British Columbia, Vancouver, Canada
-
Cavusoglu, H., H. Cavusoglu, J. Zhang. 2005. Security patch management: Share the burden or share the damage. Working paper, University of British Columbia, Vancouver, Canada.
-
(2005)
Security Patch Management: Share the Burden or Share the Damage
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Zhang, J.3
-
10
-
-
84860024872
-
CERT/CC statistics 1988-2003
-
Retrieved August 2004
-
CERT. 2004. CERT/CC Statistics 1988-2003. CERT Coordination Center. Retrieved August 2004, http://www.cert.org/stats.
-
(2004)
CERT Coordination Center
-
-
-
11
-
-
33750710835
-
Internet security, vulnerability disclosure, and software provision
-
Harvard University, Cambridge, MA
-
Choi, J. P., C. Fershtman, N. Gandal. 2005. Internet security, vulnerability disclosure, and software provision. Fourth Workshop on the Economics of Information Security, Harvard University, Cambridge, MA.
-
(2005)
Fourth Workshop on the Economics of Information Security
-
-
Choi, J.P.1
Fershtman, C.2
Gandal, N.3
-
12
-
-
33750695434
-
The cost impact of major virus attacks since 1995
-
Computer Economies. 2004. The cost impact of major virus attacks since 1995. (February).
-
(2004)
Computer Economies
, Issue.FEBRUARY
-
-
-
13
-
-
33750690799
-
What does a computer security breach really cost?
-
Applied Visions Inc., Northport, NY
-
D'Amico, A. D. 2000. What does a computer security breach really cost? Secure Decisions, Applied Visions Inc., Northport, NY.
-
(2000)
Secure Decisions
-
-
D'Amico, A.D.1
-
15
-
-
0031065891
-
Dynamic epidemiology and the market for vaccinations
-
Francis, P. J. 1997. Dynamic epidemiology and the market for vaccinations. J. Public Econom, 63(3) 383-406.
-
(1997)
J. Public Econom
, vol.63
, Issue.3
, pp. 383-406
-
-
Francis, P.J.1
-
16
-
-
33750722921
-
The cost of information security breaches
-
Ernst & Young, New York
-
Garg, A. 2003. The cost of information security breaches. CrossCur-rents. Ernst & Young, New York.
-
(2003)
CrossCurrents
-
-
Garg, A.1
-
17
-
-
84860026910
-
The economics of shared risk at the national scale
-
University of Minnesota, Minneapolis, MN
-
Geer, D. E. 2004. The economics of shared risk at the national scale. Third Annual Workshop on Economics and Information Security, University of Minnesota, Minneapolis, MN. Available at http://www.dtc.umn.edu/weis2004/weis- geer.pdf.
-
(2004)
Third Annual Workshop on Economics and Information Security
-
-
Geer, D.E.1
-
18
-
-
0030368092
-
Rational epidemics and their public control
-
Geoffard, P.-Y., T. Philipson. 1996. Rational epidemics and their public control. Internat. Econom. Rev, 37(3) 603-624.
-
(1996)
Internat. Econom. Rev
, vol.37
, Issue.3
, pp. 603-624
-
-
Geoffard, P.-Y.1
Philipson, T.2
-
19
-
-
0842317728
-
Births, recoveries, vaccinations and externalities
-
MIT Press, Cambridge, MA
-
Gersovitz, M. 2003. Births, recoveries, vaccinations and externalities. Economies for an Imperfect World: Essays in Honor of Joseph E. Stiglitz. MIT Press, Cambridge, MA, 469-483.
-
(2003)
Economies for An Imperfect World: Essays in Honor of Joseph E. Stiglitz
, pp. 469-483
-
-
Gersovitz, M.1
-
20
-
-
0842284567
-
The economical control of infectious diseases
-
Gersovitz, M., J. S. Hammer. 2004. The economical control of infectious diseases. Econom, J, 114(492) 1-27.
-
(2004)
Econom, J
, vol.114
, Issue.492
, pp. 1-27
-
-
Gersovitz, M.1
Hammer, J.S.2
-
21
-
-
14044260575
-
Tax/subsidy policies toward vector-borne infectious disease
-
Gersovitz, M., J. S. Hammer. 2005. Tax/subsidy policies toward vector-borne infectious disease. J. Public Econom. 89(4) 647-674.
-
(2005)
J. Public Econom.
, vol.89
, Issue.4
, pp. 647-674
-
-
Gersovitz, M.1
Hammer, J.S.2
-
22
-
-
0842274642
-
Cost optimization in the SIS model of infectious disease with treatment
-
Goldman, S. M., J. Lightwood. 2002. Cost optimization in the SIS model of infectious disease with treatment. Topics Econom. Anal. Policy 2(1) 1-22.
-
(2002)
Topics Econom. Anal. Policy
, vol.2
, Issue.1
, pp. 1-22
-
-
Goldman, S.M.1
Lightwood, J.2
-
23
-
-
84860028169
-
World internet usage and population statistics
-
Retrieved March 2004
-
Internet World Stats. 2004. World internet usage and population statistics. Retrieved March 2004, http://www.internetworldstats. com/stats.htm.
-
(2004)
Internet World Stats
-
-
-
25
-
-
84860034467
-
More regulation for the software industry?
-
Joyce, E. 2005. More regulation for the software industry? Enterprise IT Planet (February), http://www.enterpriseitplanet.com/security/news/article.php/ 3483876.
-
(2005)
Enterprise IT Planet
, Issue.FEBRUARY
-
-
Joyce, E.1
-
26
-
-
33750703309
-
-
Working paper, Social Science Research Center, Berlin, Germany
-
Kessing, S., R. Nuscheier. 2003. Monopoly pricing with negative network effects: The case of vaccines. Working paper, Social Science Research Center, Berlin, Germany.
-
(2003)
Monopoly Pricing with Negative Network Effects: the Case of Vaccines
-
-
Kessing, S.1
Nuscheier, R.2
-
27
-
-
0041115542
-
Integrating behavioral choice into epidemiological models of AIDS
-
Kremer, M. 1996. Integrating behavioral choice into epidemiological models of AIDS. Quart. J. Econom. 111(2) 549-573.
-
(1996)
Quart. J. Econom.
, vol.111
, Issue.2
, pp. 549-573
-
-
Kremer, M.1
-
28
-
-
33750716284
-
U.S. goals solicited on software security
-
Krim, J. 2004. U.S. goals solicited on software security. Washington-Post.com.
-
(2004)
Washington-Post.com
-
-
Krim, J.1
-
30
-
-
10444267314
-
Interdependent security: Implications for homeland security policy and other areas
-
The Brookings Institution, Washington, D.C.
-
Kunreuther, H., G. M. Heal, P. R. Orszag. 2002. Interdependent security: Implications for homeland security policy and other areas. Policy Brief 108, The Brookings Institution, Washington, D.C.
-
(2002)
Policy Brief
, vol.108
-
-
Kunreuther, H.1
Heal, G.M.2
Orszag, P.R.3
-
31
-
-
33750702296
-
Squashing the next worm
-
Lemos, R. 2003. Squashing the next worm. CNET News (August).
-
(2003)
CNET News
, Issue.AUGUST
-
-
Lemos, R.1
-
32
-
-
84860030283
-
Witty worm proves patching "not viable."
-
Lemos, R. 2004. Witty worm proves patching "not viable." CNET News (March).
-
(2004)
CNET News
, Issue.MARCH
-
-
Lemos, R.1
-
33
-
-
33750733390
-
Patching takes over IT for a day
-
Lemos, R. 2005. Patching takes over IT for a day. Techworld (January).
-
(2005)
Techworld
, Issue.JANUARY
-
-
Lemos, R.1
-
34
-
-
84860028459
-
EPA offers incentives to firms that adopt telecommuting in five U.S. metros
-
Leung, L. 2001. EPA offers incentives to firms that adopt telecommuting in five U.S. metros. Online Insider (May), http://www. conway.com/ssinsider/ incentive/ti0105.htm.
-
(2001)
Online Insider
, Issue.MAY
-
-
Leung, L.1
-
35
-
-
33750712169
-
Who's patching open source?
-
Maguire, J. 2004. Who's patching open source? Enterprise Linux IT (January).
-
(2004)
Enterprise Linux IT
, Issue.JANUARY
-
-
Maguire, J.1
-
36
-
-
84860016149
-
Can software patching be automated?
-
Messmer, E. 2004a. Can software patching be automated? Network World Fusion (May), http://www.nwfusion.com/weblogs/security/005182.html.
-
(2004)
Network World Fusion
, Issue.MAY
-
-
Messmer, E.1
-
37
-
-
84860028912
-
Sasser worm exposes patching failures
-
Messmer, E. 2004b. Sasser worm exposes patching failures. 'Network World Fusion (May), http://www.nwfusion.com/news/ 2004/0510sasser.html.
-
(2004)
Network World Fusion
, Issue.MAY
-
-
Messmer, E.1
-
38
-
-
84860019349
-
U.S. government calls for enforced patches
-
Middleton, J. 2001. U.S. government calls for enforced patches. VNUnet (December), http://www.vnunet.com/.
-
(2001)
VNUnet
, Issue.DECEMBER
-
-
Middleton, J.1
-
39
-
-
84860017722
-
Regulation, bad software, new threats fodder for Congress
-
Mimoso, M. 2003. Regulation, bad software, new threats fodder for Congress. Search Security (September), http://www. searchsecurity.com/.
-
(2003)
Search Security
, Issue.SEPTEMBER
-
-
Mimoso, M.1
-
40
-
-
0141762461
-
Code-red: A case study on the spread and victims of an Internet worm
-
Marseille, France
-
Moore, D., C. Shannon, J. Brown. 2002. Code-red: A case study on the spread and victims of an Internet worm. Proc. Second ACM SIGCOMM Internet Measurement Workshop, Marseille, France, 273-284.
-
(2002)
Proc. Second ACM SIGCOMM Internet Measurement Workshop
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
41
-
-
0242314805
-
-
Working paper, Berkeley, CA
-
Moore, D., V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver. 2003. The spread of the Sapphire/Slammmer worm. Working paper, Berkeley, CA.
-
(2003)
The Spread of the Sapphire/Slammmer Worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
43
-
-
84860020855
-
Network security tactics. Step-by-step guide: How to deploy a successful patch
-
Nicastro, F. 2005. Network security tactics. Step-by-step guide: How to deploy a successful patch. Searchsecurity (September), http://www. searchsecurity.techtarget.com/.
-
(2005)
Searchsecurity
, Issue.SEPTEMBER
-
-
Nicastro, F.1
-
44
-
-
33645402013
-
Emerging technology: Patch me if you can!
-
Schweitzer, D. 2003. Emerging technology: Patch me if you can! Network-Magazine (August), http://www.network-magazine. com/.
-
(2003)
Network-magazine
, Issue.AUGUST
-
-
Schweitzer, D.1
-
47
-
-
33750712168
-
-
Symantec. Symantec Corporation, Cupertino, CA
-
Symantec. 2004. Automating patch management. Symantec Corporation, Cupertino, CA.
-
(2004)
Automating Patch Management
-
-
-
48
-
-
3142720692
-
-
UK Department of Trade and Industry, London, UK
-
Timms, S., C. Potter, A. Beard. 2004. Information security breaches survey 2004. UK Department of Trade and Industry, London, UK.
-
(2004)
Information Security Breaches Survey 2004
-
-
Timms, S.1
Potter, C.2
Beard, A.3
-
49
-
-
84881301125
-
-
US-CERT 2004. U.S. Department of Homeland Security, Washington, D.C.
-
US-CERT 2004. US-CERT vulnerability notes database. U.S. Department of Homeland Security, Washington, D.C., http://www. kb.cert.org/vuls/.
-
US-CERT Vulnerability Notes Database
-
-
-
50
-
-
33750715221
-
-
Working paper, University of California, Berkeley, CA
-
Varian, H. 2004. System reliability and free riding. Working paper, University of California, Berkeley, CA.
-
(2004)
System Reliability and Free Riding
-
-
Varian, H.1
-
51
-
-
12244311689
-
A taxonomy of computer worms
-
ACM, Washington, D.C.
-
Weaver, N., V. Paxson, S. Staniford, R. Cunningham. 2003. A taxonomy of computer worms. Proc. 2003 ACM Workshop Rapid Malcode, ACM, Washington, D.C., 11-18.
-
(2003)
Proc. 2003 ACM Workshop Rapid Malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
52
-
-
33750696774
-
Attack takes down Yahoo for three hours
-
Williams, M. 2000. Attack takes down Yahoo for three hours. IDG News Service (February).
-
(2000)
IDG News Service
, Issue.FEBRUARY
-
-
Williams, M.1
|