-
1
-
-
79751480868
-
Is there a cost to privacy breaches? An event study
-
Paper presented at the, Cambridge, UK, June 26-28
-
Acquisti, A.; Friedman, A.; and Telang, R. Is there a cost to privacy breaches? An event study. Paper presented at the Fifth Workshop on the Economics of Information Security (WEIS), Cambridge, UK, June 26-28, 2006.
-
(2006)
Fifth Workshop on the Economics of Information Security (WEIS)
-
-
Acquisti, A.1
Friedman, A.2
Telang, R.3
-
2
-
-
34548276969
-
Event studies with a contaminated estimation period
-
Aktas, N.; de Bodt, E.; and Cousin, J.G. Event studies with a contaminated estimation period. Journal of Corporate Finance, 13, 1 (2007), 129-145.
-
(2007)
Journal of Corporate Finance
, vol.13
, Issue.1
, pp. 129-145
-
-
Aktas, N.1
de Bodt, E.2
Cousin, J.G.3
-
3
-
-
33846183559
-
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
-
Arora, A.; Nandkumar, A.; and Telang, R. Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Information Systems Frontier, 8, 5 (2006), 350-362.
-
(2006)
Information Systems Frontier
, vol.8
, Issue.5
, pp. 350-362
-
-
Arora, A.1
Nandkumar, A.2
Telang, R.3
-
4
-
-
0000787258
-
Crime and punishment: An economic approach
-
March-April
-
Becker, G. Crime and punishment: An economic approach. Journal of Political Economy, 76, 2 (March-April 1968), 169-217.
-
(1968)
Journal of Political Economy
, vol.76
, Issue.2
, pp. 169-217
-
-
Becker, G.1
-
5
-
-
0344895869
-
How much should we trust differences-indifferences estimations?
-
February
-
Bertrand, M.; Duflo, E.; and Mullainathan, S. How much should we trust differences-indifferences estimations? Quarterly Journal of Economics, 119, 1 (February 2004), 249-275.
-
(2004)
Quarterly Journal of Economics
, vol.119
, Issue.1
, pp. 249-275
-
-
Bertrand, M.1
Duflo, E.2
Mullainathan, S.3
-
6
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell, K.; Gordon, L.A.; Loeb, M.P.; and Zhou, L. The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security, 11, 3 (2003), 431-448.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
7
-
-
7444242205
-
The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers
-
Fall
-
Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce, 9, 1 (Fall 2004), 70-104.
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 70-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
8
-
-
51449090151
-
-
Working paper, Michigan State University, East Lansing, July
-
Choi, J.P.; Fershtman, C.; and Gandal, N. Internet security, vulnerability disclosure, and software provision. Working paper, Michigan State University, East Lansing, July 2006.
-
(2006)
Internet security, vulnerability disclosure, and software provision
-
-
Choi, J.P.1
Fershtman, C.2
Gandal, N.3
-
9
-
-
66549093193
-
-
DoD hacker sentenced to 21 months hard Time. Information Week (May 12, 2005).
-
DoD hacker sentenced to 21 months hard Time. Information Week (May 12, 2005).
-
-
-
-
10
-
-
34248356423
-
Inference with difference-in-differences and other panel data
-
Donald, S.G., and Lang, K. Inference with difference-in-differences and other panel data. Review of Economics and Statistics, 89, 2 (2007), 221-233.
-
(2007)
Review of Economics and Statistics
, vol.89
, Issue.2
, pp. 221-233
-
-
Donald, S.G.1
Lang, K.2
-
11
-
-
0001884696
-
The adjustment of stock prices to new information
-
Fama, E.F.; Fisher, L.; Jensen, M.C.; and Roll, R. The adjustment of stock prices to new information. International Economic Review, 10, 1 (1969), 1-21.
-
(1969)
International Economic Review
, vol.10
, Issue.1
, pp. 1-21
-
-
Fama, E.F.1
Fisher, L.2
Jensen, M.C.3
Roll, R.4
-
12
-
-
34547101651
-
The economics of crime
-
O. Ashenfelter and D.E. Card eds, Amsterdam: Elsevier
-
Freeman, R.B. The economics of crime. In O. Ashenfelter and D.E. Card (eds.), Handbook of Labor Economics, volume 3C. Amsterdam: Elsevier, 1999, pp. 3529-3571.
-
(1999)
Handbook of Labor Economics
, vol.3 C
, pp. 3529-3571
-
-
Freeman, R.B.1
-
13
-
-
10344224249
-
Exact interpretation of dummy variables in semilogarithmic equations
-
Garderen, K.J.V., and Shah, C. Exact interpretation of dummy variables in semilogarithmic equations. Econometrics Journal, 5, 1 (2002), 149-159.
-
(2002)
Econometrics Journal
, vol.5
, Issue.1
, pp. 149-159
-
-
Garderen, K.J.V.1
Shah, C.2
-
14
-
-
34848844983
-
-
Working paper 10706, National Bureau of Economic Research, Cambridge, MA, August
-
Heal, G., and Kunreuther, H. Interdependent security: A general model. Working paper 10706, National Bureau of Economic Research, Cambridge, MA, August 2004.
-
(2004)
Interdependent security: A general model
-
-
Heal, G.1
Kunreuther, H.2
-
15
-
-
0042855099
-
A sociology of hackers
-
Jordan, T., and Taylor, P. A sociology of hackers. Sociological Review, 46, 4 (1998), 757-780.
-
(1998)
Sociological Review
, vol.46
, Issue.4
, pp. 757-780
-
-
Jordan, T.1
Taylor, P.2
-
16
-
-
20944441343
-
Market for software vulnerabilities? Think again
-
Kannan, K., and Telang, R. Market for software vulnerabilities? Think again. Management Science, 51, 5 (2005), 726-740.
-
(2005)
Management Science
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
17
-
-
0001379680
-
Estimation with correctly interpreted dummy variables in semilogarithmic equations
-
Kennedy, RE. Estimation with correctly interpreted dummy variables in semilogarithmic equations. American Economic Review, 71, 4 (1981), 801.
-
(1981)
American Economic Review
, vol.71
, Issue.4
, pp. 801
-
-
Kennedy, R.E.1
-
18
-
-
0001777622
-
Private security: Deterrent or diversion?
-
Koo, H.W., and Png, I.P.L. Private security: Deterrent or diversion? International Review of Law and Economics, 14, 1 (1994), 87-101.
-
(1994)
International Review of Law and Economics
, vol.14
, Issue.1
, pp. 87-101
-
-
Koo, H.W.1
Png, I.P.L.2
-
19
-
-
33244491931
-
The simple economics of cybercrimes
-
January-February
-
Kshetri, N. The simple economics of cybercrimes. IEEE Security & Privacy, 4, 1 (January-February 2006), 33-39.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.1
, pp. 33-39
-
-
Kshetri, N.1
-
20
-
-
0037786763
-
Interdependent security
-
Kunreuther, H., and Heal, G. Interdependent security. Journal of Risk and Uncertainty, 26, 2-3(2003), 231-249.
-
(2003)
Journal of Risk and Uncertainty
, vol.26
, Issue.2-3
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
21
-
-
53149087702
-
-
Working paper no. W11491, National Bureau of Economic Research, Cambridge, MA, July
-
Lee, D., and McCrary, J. Crime, punishment, and myopia. Working paper no. W11491, National Bureau of Economic Research, Cambridge, MA, July 2005.
-
(2005)
Crime, punishment, and myopia
-
-
Lee, D.1
McCrary, J.2
-
22
-
-
0011765591
-
Event studies in economics and finance
-
Mackinlay, A.R. Event studies in economics and finance. Journal of Economic Literature, 35, 1 (1997), 13-39.
-
(1997)
Journal of Economic Literature
, vol.35
, Issue.1
, pp. 13-39
-
-
Mackinlay, A.R.1
-
23
-
-
51049107864
-
CVSS: A complete guide to the common vulnerability scoring system version 2.0
-
June 2007, available at
-
Mell, P.; Scarfone, K.; and Romansky, S. CVSS: A complete guide to the common vulnerability scoring system version 2.0. First.org (June 2007) (available at www.first.org/cvss/cvss-guide.html).
-
First.org
-
-
Mell, P.1
Scarfone, K.2
Romansky, S.3
-
24
-
-
51449089236
-
Hackers, users, information security: Welfare analysis
-
Paper presented at the, Cambridge, UK, June 26-28
-
Png, I.P.L.; Tang, C.Q.; and Wang, Q.H. Hackers, users, information security: Welfare analysis. Paper presented at the Fifth Workshop on the Economics of Information Security (WEIS), Cambridge, UK, June 26-28, 2006.
-
(2006)
Fifth Workshop on the Economics of Information Security (WEIS)
-
-
Png, I.P.L.1
Tang, C.Q.2
Wang, Q.H.3
-
25
-
-
0001861227
-
The economic theory of public enforcement of law
-
March
-
Polinsky, A.M., and Shavell, S. The economic theory of public enforcement of law. Journal of Economic Literature, 38, 1 (March 2000), 45-77.
-
(2000)
Journal of Economic Literature
, vol.38
, Issue.1
, pp. 45-77
-
-
Polinsky, A.M.1
Shavell, S.2
-
26
-
-
0039923085
-
Identifying the effect of unemployment on crime
-
April
-
Raphael, S., and Winter-Ebmer, R. Identifying the effect of unemployment on crime. Journal of Law and Economics, 44, 1 (April 2001), 259-284.
-
(2001)
Journal of Law and Economics
, vol.44
, Issue.1
, pp. 259-284
-
-
Raphael, S.1
Winter-Ebmer, R.2
-
27
-
-
84868958764
-
New citadel of cybercrime
-
October 20, available at
-
Romania: New citadel of cybercrime. CBS News (October 20, 2003) (available at www.cbsnews.com/stories/2003/10/20/tech/main578965.shtml).
-
(2003)
CBS News
-
-
Romania1
-
28
-
-
66549097534
-
-
Symantec Internet security threat report: Trends for January 05-June 05, VIII. Symantec, Cupertino, CA, September 2005 (available at http://eval.symantec.com/mktginfo/enterprise/white-papers/ent-whitepaper- symantec-internet-security-threat-report-viii.pdf).
-
Symantec Internet security threat report: Trends for January 05-June 05, vol. VIII. Symantec, Cupertino, CA, September 2005 (available at http://eval.symantec.com/mktginfo/enterprise/white-papers/ent-whitepaper- symantec-internet-security-threat-report-viii.pdf).
-
-
-
-
29
-
-
66549100814
-
-
Symantec Internet security threat report: Trends for July-December 06, XI. Symantec, Cupertino, CA, March 2007 (available at http://eval.symantec. com/mktginfo/enterprise/white-papers/ent-whitepaper-internet-security-threat- report-xi-03-2007.en-us.pdf).
-
Symantec Internet security threat report: Trends for July-December 06, vol. XI. Symantec, Cupertino, CA, March 2007 (available at http://eval.symantec. com/mktginfo/enterprise/white-papers/ent-whitepaper-internet-security-threat- report-xi-03-2007.en-us.pdf).
-
-
-
|