-
1
-
-
32644486255
-
Computer Security: It's the Economics, Stupid
-
WEIS
-
B. Schneier, "Computer Security: It's the Economics, Stupid," Workshop on the Economics of Information Security (WEIS), 2002; www2.sims.berkeley.edu/resources/affiliates/workshops/econsecurity/econws/18. doc.
-
(2002)
Workshop on the Economics of Information Security
-
-
Schneier, B.1
-
3
-
-
34249994635
-
-
Univ. of Ill. Law and Economics working paper no. 2, July
-
J. Kesan et al., "The Economic Case for Cyberinsurance," Univ. of Ill. Law and Economics working paper no. 2, July 2004; http://law.bepress. com/uiuclwps/papers/art2/.
-
(2004)
The Economic Case for Cyberinsurance
-
-
Kesan, J.1
-
4
-
-
84900406382
-
Cyber-Insurance as a Market-Based Solution to the Problem of Cybersecurity
-
WEIS
-
J. Kesan et al., "Cyber-Insurance as a Market-Based Solution to the Problem of Cybersecurity," Workshop on the Economics of Information Security (WEIS), 2005; http://infosecon.net/workshop/pdf/42.pdf.
-
(2005)
Workshop on the Economics of Information Security
-
-
Kesan, J.1
-
5
-
-
34249987969
-
-
D. Duffy, Safety at a Premium, CSO, Dec. 2002; www. csoonline.com/read/120902/safety.html.
-
D. Duffy, "Safety at a Premium," CSO, Dec. 2002; www. csoonline.com/read/120902/safety.html.
-
-
-
-
6
-
-
34249996018
-
CyberRisk Market Survey 2006
-
June
-
R.S. Betterley, "CyberRisk Market Survey 2006," The Betterley Report, June 2006; www.betterley.com/products.html.
-
(2006)
The Betterley Report
-
-
Betterley, R.S.1
-
8
-
-
33847149105
-
-
Ernst & Young, Nov
-
Global Information Security Survey 2005, Ernst & Young, Nov. 2005; www.ey.com/global/download.nsf/Inter national/ Global_Information_Security_Survey_2005/ $file/ EY_Global_Information_Security_survey_2005.pdf.
-
(2005)
Global Information Security Survey 2005
-
-
-
9
-
-
34249993829
-
-
R.P. Majuca, W. Yurcik, and J.P. Kesan, The Evolution of Cyberinsurance, ACM Computing Research Repository (CoRR), tech. report cs.CR/0601020, Jan. 2006; www.projects.ncassr.org/econsec/ cyberinsuranceTR06.pdf.
-
R.P. Majuca, W. Yurcik, and J.P. Kesan, "The Evolution of Cyberinsurance," ACM Computing Research Repository (CoRR), tech. report cs.CR/0601020, Jan. 2006; www.projects.ncassr.org/econsec/ cyberinsuranceTR06.pdf.
-
-
-
-
10
-
-
34249999217
-
Cyber Insecurity: The Cost of Monopoly, Computer and Comm
-
D. Geer, Cyber Insecurity: The Cost of Monopoly, Computer and Comm. Industry Assoc., 2003; www.ccianet.org/papers/cyberinsecurity.pdf.
-
(2003)
Industry Assoc
-
-
Geer, D.1
-
12
-
-
0010275259
-
Interdependent Security: The Case of Identical Agents
-
working paper no. 8871, Nat'l Bureau of Economic Research
-
H. Kunreuther and G. Heal, "Interdependent Security: The Case of Identical Agents," working paper no. 8871, Nat'l Bureau of Economic Research, 2002.
-
(2002)
-
-
Kunreuther, H.1
Heal, G.2
-
16
-
-
34249977072
-
The World Catastrophe Reinsurance Market
-
Aug
-
G. Carpenter, "The World Catastrophe Reinsurance Market," Guy Carpenter & Co., Aug. 2006; www.guycarp.com/portal/extranet/insights/ reports.html?vid=22.
-
(2006)
Guy Carpenter & Co
-
-
Carpenter, G.1
-
17
-
-
34249988548
-
Cyber Insurance Update
-
Dec
-
H. Oellrich, "Cyber Insurance Update," The CIP Report, Dec. 2003; http://cipp.gmu.edu/archive/cip_report_2.6.
-
(2003)
The CIP Report
-
-
Oellrich, H.1
-
18
-
-
34249995479
-
-
US Dept. of Homeland Security, The Nat'l Strategy to Secure Cyberspace, Feb. 2003; www.whitehouse.gov/pcipb/cyberspace_srtategy.pdf.
-
US Dept. of Homeland Security, The Nat'l Strategy to Secure Cyberspace, Feb. 2003; www.whitehouse.gov/pcipb/cyberspace_srtategy.pdf.
-
-
-
-
19
-
-
34250029000
-
Liability for Net Vandalism Should Rest with Those That Can Best Manage the Risk,
-
1 June, section C, p
-
H.R. Varian, "Liability for Net Vandalism Should Rest with Those That Can Best Manage the Risk," The New York Times, 1 June 2000, section C, p. 2; www.ischool.berkeley.edu/~hal/people/hal/NYTimes/2000-06-01. html.
-
(2000)
The New York Times
, pp. 2
-
-
Varian, H.R.1
-
20
-
-
34250006261
-
Should Vulnerability Be Actionable? Improving Critical Infrastructure Computer Security with Trade Practices Law
-
J. Winn, "Should Vulnerability Be Actionable? Improving Critical Infrastructure Computer Security with Trade Practices Law," George Mason Univ. Critical Infrastructure Protection Project Papers Vol. II, 2004; www.law.washington.edu/Faculty/Winn/Publications/Should_Vukierability.pdf.
-
(2004)
George Mason Univ. Critical Infrastructure Protection Project Papers
, vol.2
-
-
Winn, J.1
|