-
1
-
-
84925838576
-
-
Anderson, R., 2001. Why information security is hard: An economic perspective. In: Proceedings of 17th Annual Computer Security Applications Conference, December.
-
-
-
-
4
-
-
0037599474
-
The economic cost of publicly announced information security breaches: empirical evidence from the stock market
-
Campbell K., Gordon L., Loeb M., and Zhou L. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security 11 3 (2003) 431-448
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.2
Loeb, M.3
Zhou, L.4
-
6
-
-
12244295760
-
-
Dalvi, N., Domingos, P., Mausam, M., Sanghai, S., Verma, D., 2004. Adversarial classification. In: Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining Table of Contents, Seattle, WA, USA, pp 99-108, ISBN:1-58113-888-9.
-
-
-
-
8
-
-
84906628863
-
-
Enders, W., Sandler, T., 2003. What do we know about the substitution effect in transnational terrorism? In: Silke, A., Ilardi, G. (Eds.), Researching Terrorism: Trends, Achievements, Failures, Frank Cass, Ilfords, UK.
-
-
-
-
9
-
-
0001094198
-
Information sharing in oligopoly
-
Gal-Or E. Information sharing in oligopoly. Econometrica 53 2 (1985) 329-343
-
(1985)
Econometrica
, vol.53
, Issue.2
, pp. 329-343
-
-
Gal-Or, E.1
-
10
-
-
33751202225
-
-
Gal-Or, E., Ghose, A., 2003. The economic consequences of sharing security information. In: Proceedings of the Second Workshop on Economics and Information Security, May 29-30, University of Maryland.
-
-
-
-
11
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or E., and Ghose A. The economic incentives for sharing security information. Information Systems Research 16 2 (2005) 186-208
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
12
-
-
0038223766
-
Using information security as a response to competitor analysis systems
-
Gordon L.A., and Loeb M. Using information security as a response to competitor analysis systems. Communications of the ACM 44 9 (2001) 70-75
-
(2001)
Communications of the ACM
, vol.44
, Issue.9
, pp. 70-75
-
-
Gordon, L.A.1
Loeb, M.2
-
14
-
-
33751256079
-
Expenditures on competitor analysis and information security: a managerial accounting perspective
-
Bhimani A. (Ed), Oxford University Press
-
Gordon L.A., and Loeb M. Expenditures on competitor analysis and information security: a managerial accounting perspective. In: Bhimani A. (Ed). Management Accounting in the New Economy (2003), Oxford University Press 95-111
-
(2003)
Management Accounting in the New Economy
, pp. 95-111
-
-
Gordon, L.A.1
Loeb, M.2
-
16
-
-
0036202354
-
Probabilistic risk analysis and game theory
-
Hausken K. Probabilistic risk analysis and game theory. Risk Analysis 22 1 (2002) 17-27
-
(2002)
Risk Analysis
, vol.22
, Issue.1
, pp. 17-27
-
-
Hausken, K.1
-
17
-
-
22544461899
-
Production and conflict models versus rent seeking models
-
Hausken K. Production and conflict models versus rent seeking models. Public Choice 123 (2005) 59-93
-
(2005)
Public Choice
, vol.123
, pp. 59-93
-
-
Hausken, K.1
-
18
-
-
33846138611
-
-
Hausken, K., 2006. Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers 8(5), in press.
-
-
-
-
19
-
-
0001685223
-
Conflict and rent-seeking success functions: ratio vs. difference models of relative success
-
Hirshleifer J. Conflict and rent-seeking success functions: ratio vs. difference models of relative success. Public Choice 63 (1989) 101-112
-
(1989)
Public Choice
, vol.63
, pp. 101-112
-
-
Hirshleifer, J.1
-
20
-
-
33751251487
-
-
Howard, J., 1997. Analysis of security incidents on the Internet. Unpublished Doctoral Dissertation, Carnegie Mellon University. Available from .
-
-
-
-
22
-
-
0001624735
-
Trade associations as information exchange mechanisms
-
Kirby A. Trade associations as information exchange mechanisms. RAND Journal of Economics 29 1 (1988) 138-146
-
(1988)
RAND Journal of Economics
, vol.29
, Issue.1
, pp. 138-146
-
-
Kirby, A.1
-
23
-
-
33750356596
-
A classification of computer security incidents based on reported attack data
-
Kjaerland M. A classification of computer security incidents based on reported attack data. Journal of Investigative Psychology and Offender Profiling 2 2 (2005) 105-120
-
(2005)
Journal of Investigative Psychology and Offender Profiling
, vol.2
, Issue.2
, pp. 105-120
-
-
Kjaerland, M.1
-
25
-
-
33751200746
-
-
Lakdawalla, D., Zanjani, G., 2002. Insurance, self-protection, and the economics of terrorism. RAND and NBER, Federal Reserve Bank of New York.
-
-
-
-
26
-
-
0001171605
-
Fulfilled expectations in cournot duopoly with information acquisition and release
-
Novshek W., and Sonnenschein H. Fulfilled expectations in cournot duopoly with information acquisition and release. Bell Journal of Economics 13 1 (1982) 214-218
-
(1982)
Bell Journal of Economics
, vol.13
, Issue.1
, pp. 214-218
-
-
Novshek, W.1
Sonnenschein, H.2
-
28
-
-
33751219674
-
-
Schechter, S., Smith, M., 2003. How much security is enough to stop a thief? In: Proceedings of the Financial Cryptography Conference, Guadeloupe, January.
-
-
-
-
29
-
-
30344486488
-
Defining the value of strategic security
-
Schenk M., and Schenk M. Defining the value of strategic security. Secure Business Quarterly 1 1 (2002) 1-6
-
(2002)
Secure Business Quarterly
, vol.1
, Issue.1
, pp. 1-6
-
-
Schenk, M.1
Schenk, M.2
-
30
-
-
84962992157
-
Exchange of cost information in oligopoly
-
Shapiro C. Exchange of cost information in oligopoly. Review of Economic Studies 53 3 (1986) 433-446
-
(1986)
Review of Economic Studies
, vol.53
, Issue.3
, pp. 433-446
-
-
Shapiro, C.1
-
31
-
-
0010913804
-
Conflict and attitudes toward risk
-
Skaperdas S. Conflict and attitudes toward risk. American Economic Review 81 (1991) 116-120
-
(1991)
American Economic Review
, vol.81
, pp. 116-120
-
-
Skaperdas, S.1
-
32
-
-
0030304298
-
Contest success functions
-
Skaperdas S. Contest success functions. Economic Theory 7 (1996) 283-290
-
(1996)
Economic Theory
, vol.7
, pp. 283-290
-
-
Skaperdas, S.1
-
33
-
-
33751229398
-
-
Tanaka, H., Matsuura, K., 2005. Vulnerability and effects of information security investment: a firm level empirical analysis of Japan. Presented May 26, 2005 at the University of Maryland Forum: "Financial Information Systems and Cyber Security: A Public Policy Perspective".
-
-
-
-
34
-
-
12144285368
-
Vulnerability and information security investment: an empirical analysis of E-local government in Japan
-
Tanaka H., Matsuura K., and Sudoh O. Vulnerability and information security investment: an empirical analysis of E-local government in Japan. Journal of Accounting and Public Policy 24 (2005) 37-59
-
(2005)
Journal of Accounting and Public Policy
, vol.24
, pp. 37-59
-
-
Tanaka, H.1
Matsuura, K.2
Sudoh, O.3
-
35
-
-
33751249134
-
-
Varian, H., 2002. System reliability and free riding. In: Proceedings of the First Workshop on Economics and Information Security, May 16-17, University of California, Berkeley.
-
-
-
-
36
-
-
0000534015
-
Trade association disclosure rules, incentives to share information, and welfare
-
Vives X. Trade association disclosure rules, incentives to share information, and welfare. RAND Journal of Economics 21 3 (1990) 409-430
-
(1990)
RAND Journal of Economics
, vol.21
, Issue.3
, pp. 409-430
-
-
Vives, X.1
-
37
-
-
21844512817
-
Information sharing in oligopoly: the truth-telling problem
-
Ziv A. Information sharing in oligopoly: the truth-telling problem. RAND Journal of Economics 24 3 (1993) 455-465
-
(1993)
RAND Journal of Economics
, vol.24
, Issue.3
, pp. 455-465
-
-
Ziv, A.1
|