메뉴 건너뛰기




Volumn , Issue , 2008, Pages 66-80

Security decision-making among interdependent organizations

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SECURITY; OVERALL BENEFIT; WEB SITES;

EID: 51749097143     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2008.25     Document Type: Conference Paper
Times cited : (58)

References (26)
  • 1
    • 51749116452 scopus 로고    scopus 로고
    • Anti-phishing working group
    • Anti-phishing working group. http://www.antiphishing.org.
  • 2
    • 51749122136 scopus 로고    scopus 로고
    • Email service provider coalition
    • Email service provider coalition. http://senderid.espcoalition.org/.
  • 5
    • 0019529857 scopus 로고
    • Solution of nonsymmetric linear complementarity problems by iterative methods
    • Jan
    • B. Ahn. Solution of nonsymmetric linear complementarity problems by iterative methods. Journal of Optimization Theory and Applications, 33:175-185, Jan 1981.
    • (1981) Journal of Optimization Theory and Applications , vol.33 , pp. 175-185
    • Ahn, B.1
  • 6
    • 51749089935 scopus 로고    scopus 로고
    • Anderson and Tyler Moore. Information security economics - and beyond
    • Technical report
    • Ross Anderson and Tyler Moore. Information security economics - and beyond. Technical report, 2007.
    • (2007)
    • Ross1
  • 8
    • 51749105369 scopus 로고    scopus 로고
    • Nicholas Bambos Benjamin Yolken, R. Ann Miura-Ko. Equilibria and free riding in linear influence networks. 2007.
    • Nicholas Bambos Benjamin Yolken, R. Ann Miura-Ko. Equilibria and free riding in linear influence networks. 2007.
  • 15
    • 85009779538 scopus 로고    scopus 로고
    • The theory of learning in games
    • Working Paper Archive 624, UCLA Department of Economics, December
    • Drew Fudenberg and David K. Levine. The theory of learning in games. Levine's Working Paper Archive 624, UCLA Department of Economics, December 1996.
    • (1996) Levine's
    • Fudenberg, D.1    Levine, D.K.2
  • 18
    • 0004236492 scopus 로고    scopus 로고
    • 3rd ed, Johns Hopkins University Press, Baltimore, MD, USA
    • Gene H. Golub and Charles F. Van Loan. Matrix computations (3rd ed.). Johns Hopkins University Press, Baltimore, MD, USA, 1996.
    • (1996) Matrix computations
    • Golub, G.H.1    Van Loan, C.F.2
  • 19
    • 0141915846 scopus 로고    scopus 로고
    • NBER Working Papers 9885, National Bureau of Economic Research, Inc, August, available at
    • Geoffrey Heal and Howard Kunreuther. You only die once: Managing discrete interdependent risks. NBER Working Papers 9885, National Bureau of Economic Research, Inc, August 2003. available at http://ideas.repec. Org/p/nbr/nberwo/9885.html.
    • (2003) You only die once: Managing discrete interdependent risks
    • Heal, G.1    Kunreuther, H.2
  • 20
    • 51749089242 scopus 로고    scopus 로고
    • Microsoft. Sender id. http://www.microsoft.com/mscorp/safety/ technologies/senderid/default.mspx.
    • Microsoft. Sender id
  • 21
    • 51749087619 scopus 로고    scopus 로고
    • Microsoft. Sender id framework: Protecting brands and enhancing detection of spam, phishing, and zero-day exploits, 2007. http://download. microsoft.com/download/A/6/9/A69ECA9D-6168-467E-9BEE-88358B9ED595/ Sender_ID_White_Paper.pdfx.
    • Microsoft. Sender id framework: Protecting brands and enhancing detection of spam, phishing, and zero-day exploits, 2007. http://download. microsoft.com/download/A/6/9/A69ECA9D-6168-467E-9BEE-88358B9ED595/ Sender_ID_White_Paper.pdfx.
  • 22
    • 33749807798 scopus 로고
    • Multi-sweep asynchronous parallel successive overrelaxation for the nonsymmetric linear complementarity problem
    • T. Shiau R. DeLoene, O. Mangasarian. Multi-sweep asynchronous parallel successive overrelaxation for the nonsymmetric linear complementarity problem. Annals of Operations Research, 22:43-54, 1990.
    • (1990) Annals of Operations Research , vol.22 , pp. 43-54
    • Shiau, T.1    DeLoene, R.2    Mangasarian, O.3
  • 26
    • 51749101644 scopus 로고    scopus 로고
    • Ken Y-N. How to hack a quarter of all Japanese web user accounts, 2006. http: //whatjapanthinks.com/2006/08/08/how-to-hack-a-quarter-of-all-Japanese- web-users-accounts/.
    • Ken Y-N. How to hack a quarter of all Japanese web user accounts, 2006. http: //whatjapanthinks.com/2006/08/08/how-to-hack-a-quarter-of-all-Japanese- web-users-accounts/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.