-
1
-
-
34250015784
-
Embedding Information Security Into the Organization
-
M.E. Johnson and E. Goetz, "Embedding Information Security Into the Organization," IEEE Security and Privacy, vol. 5, no. 3, 2007, pp. 16-24.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.3
, pp. 16-24
-
-
Johnson, M.E.1
Goetz, E.2
-
2
-
-
34249986346
-
I'll Buy That! Cybersecurity in the Internet Marketplace
-
S.L. Pfleeger, M. Libicki, and M. Webber, "I'll Buy That! Cybersecurity in the Internet Marketplace," IEEE Security and Privacy, vol. 5, no. 3, 2007, pp. 25-31.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.3
, pp. 25-31
-
-
Pfleeger, S.L.1
Libicki, M.2
Webber, M.3
-
3
-
-
84925838576
-
Proc. 17th Ann. Computer Security Applications Conf
-
Assoc. for Economic Service
-
R. Anderson, "Why Information Security Is Hard - An Economic Perspective," Proc. 17th Ann. Computer Security Applications Conf. Assoc. for Economic Service, 2001, pp. 358-365.
-
(2001)
, pp. 358-365
-
-
Anderson, R.1
-
4
-
-
39449125173
-
-
Oct. 2004
-
A. Arora, J.P. Caulkins, and R. Telang, "Sell First, Fix Later: Impact of Patching on Software Quality," Oct. 2004, http://ssrn.com/ abstract=670285.
-
Sell First, Fix Later: Impact of Patching on Software Quality
-
-
Arora, A.1
Caulkins, J.P.2
Telang, R.3
-
6
-
-
0037599474
-
The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market
-
Mar
-
K. Campbell et al., "The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market," J. Computer Security, Mar. 2003, pp. 431-448.
-
(2003)
J. Computer Security
, pp. 431-448
-
-
Campbell, K.1
-
7
-
-
77952004683
-
Impact of Software Vulnerability Announcements on the Market Value of Software Vendors: An Empirical Investigation
-
paper presented at
-
R. Telang and S. Wattal, "Impact of Software Vulnerability Announcements on the Market Value of Software Vendors: An Empirical Investigation," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, www.infosecon.net/workshop/pdf/ telang_wattal.pdf.
-
(2005)
4th Ann. Workshop Economics of Information Security (WEIS 05)
-
-
Telang, R.1
Wattal, S.2
-
8
-
-
67650336989
-
The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting
-
paper presented at
-
A. Ozment, "The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, www.infosecon.net/workshop/pdf/10.pdf.
-
(2005)
4th Ann. Workshop Economics of Information Security (WEIS 05)
-
-
Ozment, A.1
-
9
-
-
39449093273
-
Is Finding Security Holes a Good Idea? paper presented at 3rd Ann
-
E. Rescorla, "Is Finding Security Holes a Good Idea?" paper presented at 3rd Ann. Workshop Economics of Information Security (WEIS 04), 2004, www.dtc.umn.edu/weis2004/rescorla.pdf.
-
(2004)
Workshop Economics of Information Security (WEIS 04)
-
-
Rescorla, E.1
-
10
-
-
0038811652
-
Full Disclosure and the Window of Exposure
-
15 Sept. 2000
-
B. Schneier, "Full Disclosure and the Window of Exposure," Crypto-gram Newsletter, 15 Sept. 2000, www.schneier.com/ crypto-gram-0009.html.
-
Crypto-gram Newsletter
-
-
Schneier, B.1
-
11
-
-
0344899914
-
Sharing Information on Computer Systems: An Economic Analysis
-
L.A. Gordon, M.P. Loeb, and W. Lucyshyn, "Sharing Information on Computer Systems: An Economic Analysis," J. Accounting and Public Policy, vol. 22, no. 6, 2003, pp. 461-485.
-
(2003)
J. Accounting and Public Policy
, vol.22
, Issue.6
, pp. 461-485
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
-
12
-
-
30344462995
-
The Economic Incentives for Sharing Security Information
-
E. Gal-Or and A. Ghose, "The Economic Incentives for Sharing Security Information," Information Systems Research, vol. 16, no. 2, 2005, pp. 186-208.
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
13
-
-
39449117271
-
-
R. Anderson, Unsettling Parallels between Security and the Environment, paper presented at the Workshop Economics of Information Security (WEIS), 2002, www2.sims.berkeley.edu/resources/affiliates/ workshops/econsecurity/econws/37.txt.
-
R. Anderson, "Unsettling Parallels between Security and the Environment," paper presented at the Workshop Economics of Information Security (WEIS), 2002, www2.sims.berkeley.edu/resources/affiliates/ workshops/econsecurity/econws/37.txt.
-
-
-
-
14
-
-
39449107930
-
-
S. Schechter, Computer Security Strength and Risk: A Quantitative Approach, doctoral dissertation, Division of Eng. and Applied Science, Harvard Univ., 2004.
-
S. Schechter, "Computer Security Strength and Risk: A Quantitative Approach," doctoral dissertation, Division of Eng. and Applied Science, Harvard Univ., 2004.
-
-
-
-
16
-
-
20944441343
-
Market for Software Vulnerabilities? Think Again
-
K. Kannan and R. Telang, "Market for Software Vulnerabilities? Think Again," Management Science, vol. 51, no. 5, 2005, pp. 726-740.
-
(2005)
Management Science
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
17
-
-
32644482367
-
Avoiding Liability: An Alternative Route to More Secure Products
-
paper presented at
-
A. Shostack, "Avoiding Liability: An Alternative Route to More Secure Products," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, www.infosecon.net/workshop/pdf/ 44.pdf.
-
(2005)
4th Ann. Workshop Economics of Information Security (WEIS 05)
-
-
Shostack, A.1
-
18
-
-
84900406382
-
CyberInsurance as a Market-Based Solution to the Problem of Cybersecurity - A Case Study
-
paper presented at
-
J. Kesan, R. Majuca, and W. Yurcik, "CyberInsurance as a Market-Based Solution to the Problem of Cybersecurity - A Case Study," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, http://infosecon.net/workshop/pdf/42.pdf.
-
(2005)
4th Ann. Workshop Economics of Information Security (WEIS 05)
-
-
Kesan, J.1
Majuca, R.2
Yurcik, W.3
-
19
-
-
34250009730
-
Cyberinsurance in IT Security Management
-
W.S. Baer and A. Parkinson, "Cyberinsurance in IT Security Management," IEEE Security and Privacy, vol. 5, no. 3, 2007, pp. 50-56.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.3
, pp. 50-56
-
-
Baer, W.S.1
Parkinson, A.2
-
20
-
-
4944234006
-
Return on Information Security Investments: Myths versus Realities
-
L. Gordon and M. Loeb, "Return on Information Security Investments: Myths versus Realities," Strategic Finance, vol. 84, no. 5, 2002, pp. 26-31.
-
(2002)
Strategic Finance
, vol.84
, Issue.5
, pp. 26-31
-
-
Gordon, L.1
Loeb, M.2
-
21
-
-
7444242205
-
The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers
-
H. Cavusoglu, B. Mishra, and S. Raghunathan, "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers," Int'l J. Electronic Commerce, vol. 9, no. 1, 2004, p. 70-104.
-
(2004)
Int'l J. Electronic Commerce
, vol.9
, Issue.1
, pp. 70-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
22
-
-
19544371722
-
A Management Perspective on Risk of Security Threats to Information Systems
-
F. Farahmand et al., "A Management Perspective on Risk of Security Threats to Information Systems," Information Technology and Management, vol. 6, nos. 2-3, 2005, pp. 203-225.
-
(2005)
Information Technology and Management
, vol.6
, Issue.2-3
, pp. 203-225
-
-
Farahmand, F.1
-
23
-
-
32644481396
-
Quantitatively Differentiating System Security
-
paper presented at
-
S. Schechter, "Quantitatively Differentiating System Security," paper presented at 1st Workshop Economics of Information Security, 2002, www2.sims.berkeley.edu/resources/affiliates/workshops/ econsecurity/econws/31.pdf.
-
(2002)
1st Workshop Economics of Information Security
-
-
Schechter, S.1
-
24
-
-
33750950152
-
Evaluating Information Security Investments from Attackers Perspective: The Return-on-Attack
-
paper presented at
-
M. Cremonini and P. Martini, "Evaluating Information Security Investments from Attackers Perspective: The Return-on-Attack," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005; www.infosecon.net/workshop/pdf/23.pdf.
-
(2005)
4th Ann. Workshop Economics of Information Security (WEIS 05)
-
-
Cremonini, M.1
Martini, P.2
-
25
-
-
4243121902
-
A Framework for Using Insurance for Cyber-Risk Management
-
L. Gordon, M. Loeb, and S. Tashfeen, "A Framework for Using Insurance for Cyber-Risk Management," Comm. ACM, vol. 46, no. 3, 2003, pp. 81-85.
-
(2003)
Comm. ACM
, vol.46
, Issue.3
, pp. 81-85
-
-
Gordon, L.1
Loeb, M.2
Tashfeen, S.3
-
26
-
-
13444274614
-
Evaluating Information Security Investments Using the Analytical Hierarchy Process
-
L. Gordon and M. Loeb, "Evaluating Information Security Investments Using the Analytical Hierarchy Process," Comm. ACM, vol. 48, no. 2, 2005, pp. 78-83.
-
(2005)
Comm. ACM
, vol.48
, Issue.2
, pp. 78-83
-
-
Gordon, L.1
Loeb, M.2
-
28
-
-
34147094836
-
Analyzing the Risks of Information Security Investments with Monte-Carlo Simulations
-
paper presented at
-
J. Conrad, "Analyzing the Risks of Information Security Investments with Monte-Carlo Simulations," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, http://infosecon.net/ workshop/pdf/13.pdf.
-
(2005)
4th Ann. Workshop Economics of Information Security (WEIS 05)
-
-
Conrad, J.1
-
30
-
-
32644477861
-
Assessing Damages of Information Security Incidents and Selecting Control Measures: A Case Study Approach
-
paper presented at
-
F. Farahmand et al., "Assessing Damages of Information Security Incidents and Selecting Control Measures: A Case Study Approach," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, www.infosecon.net/workshop/pdf/39.pdf.
-
(2005)
4th Ann. Workshop Economics of Information Security (WEIS 05)
-
-
Farahmand, F.1
-
31
-
-
4243109556
-
A Model for Evaluating: IT Security Investments
-
H. Cavusoglu, B. Mishra, and S. Raghunathan, "A Model for Evaluating: IT Security Investments," Comm. ACM, vol. 47, no. 7, 2004, pp. 87-92.
-
(2004)
Comm. ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
32
-
-
67649666107
-
A Framework for Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision Making
-
paper presented at
-
R. Rue, S.L. Pfleeger, and D. Ortiz, "A Framework for Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision Making," paper presented at 2007 Workshop Economics of Information Security (WEIS 07), 2007, http://weis07.infosecon.net/ papers/76.pdf.
-
(2007)
2007 Workshop Economics of Information Security (WEIS 07)
-
-
Rue, R.1
Pfleeger, S.L.2
Ortiz, D.3
|