-
1
-
-
69049100825
-
-
Cambridge, MA: Forrester Research Inc. Available at. Accessed on November 1, 2007.
-
Kark K, Penn J, Atwood C, Albornoz J. The State of Information Security Spending. Cambridge, MA : Forrester Research Inc., 2006. Available at http://www.forrester.com/Research/Document/Excerpt/0,7211,40317,00.html, Accessed on November 1, 2007.
-
(2006)
The State of Information Security Spending
-
-
Kark, K.1
Penn, J.2
Atwood, C.3
Albornoz, J.4
-
2
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell K, Gordon L, Loeb M, Zhou L. The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security, 2003 11 (3 431 448.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.2
Loeb, M.3
Zhou, L.4
-
3
-
-
7444242205
-
The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers
-
Cavusoglu H, Mishra B, Raghunathan S. The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce, 2004 9 (1 70 104.
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 70-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
4
-
-
33646410453
-
The medium-term effects of unavailability
-
Goldfarb A. The medium-term effects of unavailability. Quantitative Marketing and Economics, 2006 4 (2 143 171.
-
(2006)
Quantitative Marketing and Economics
, vol.4
, Issue.2
, pp. 143-171
-
-
Goldfarb, A.1
-
5
-
-
79751480868
-
Is there a cost to privacy breaches? An event study
-
Available at Accessed December 21, 2007.
-
Acquisti A, Friedman A, Telang R. Is there a cost to privacy breaches? An event study. Fifth Workshop on the Economics of Information Security, Cambridge, UK, 2006. Available at http://weis2006.econinfosec.org/docs/40.pdf, Accessed December 21, 2007.
-
Fifth Workshop on the Economics of Information Security, Cambridge, UK, 2006
-
-
Acquisti, A.1
Friedman, A.2
Telang, R.3
-
6
-
-
33748439950
-
A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property
-
Andrijcic E, Horowitz B. A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property. Risk Analysis, 2006 26 (4 907 923.
-
(2006)
Risk Analysis
, vol.26
, Issue.4
, pp. 907-923
-
-
Andrijcic, E.1
Horowitz, B.2
-
7
-
-
69049101727
-
Do data breach disclosure laws reduce identity theft
-
Romanosky S, Telang R, Acquisti A. Do data breach disclosure laws reduce identity theft WEIS 2008 - Seventh Workshop on Economics of Information Security, Hanover, NH, June 25-28 2008.
-
WEIS 2008 - Seventh Workshop on Economics of Information Security, Hanover, NH, June 25-28 2008
-
-
Romanosky, S.1
Telang, R.2
Acquisti, A.3
-
8
-
-
69049117800
-
Why do denial of service attacks reduce future visits? Switching costs vs. changing preferences
-
Available at
-
Goldfarb A. Why do denial of service attacks reduce future visits? Switching costs vs. changing preferences. Fourth Workshop on the Economics of Information Security, 2005, Cambridge, MA. Available at http://infosecon.net/ workshop/pdf/6.pdf.
-
Fourth Workshop on the Economics of Information Security, 2005, Cambridge, MA
-
-
Goldfarb, A.1
-
9
-
-
0001369142
-
Tests of equality between sets of coefficients in two linear regressions
-
Chow GC. Tests of equality between sets of coefficients in two linear regressions. Econometrica, 1960 28 : 591 605.
-
(1960)
Econometrica
, vol.28
, pp. 591-605
-
-
Chow, G.C.1
-
10
-
-
0036740307
-
Measuring switching costs and their determinants in Internet enabled businesses: A study of the online brokerage industry
-
Chen P, Hitt L. Measuring switching costs and their determinants in Internet enabled businesses: A study of the online brokerage industry. Information Systems Research, 2002 13 (3 255 276.
-
(2002)
Information Systems Research
, vol.13
, Issue.3
, pp. 255-276
-
-
Chen, P.1
Hitt, L.2
-
11
-
-
69049098623
-
Reliable, usable signaling to defeat masquerade attacks
-
Available at Accessed December 21, 2007.
-
Camp LJ. Reliable, usable signaling to defeat masquerade attacks. Fifth Workshop on the Economics of Information Security, 2006, Cambridge, UK. Available at http://weis2006.econinfosec.org/docs/48.pdf, Accessed December 21, 2007.
-
Fifth Workshop on the Economics of Information Security, 2006, Cambridge, UK
-
-
Camp, L.J.1
-
12
-
-
23844467407
-
How valuable is a good reputation? A sample selection model of Internet auctions
-
Livingston J. How valuable is a good reputation? A sample selection model of Internet auctions. Review of Economics and Statistics, 2005 87 (3 453 465.
-
(2005)
Review of Economics and Statistics
, vol.87
, Issue.3
, pp. 453-465
-
-
Livingston, J.1
-
14
-
-
0034392520
-
A Bayesian time series model of multiple structural changes in level, trend, and variance
-
Wang J, Zivot E. A Bayesian time series model of multiple structural changes in level, trend, and variance. Journal of Business and Economic Statistics, 2000 18 (3 374 386.
-
(2000)
Journal of Business and Economic Statistics
, vol.18
, Issue.3
, pp. 374-386
-
-
Wang, J.1
Zivot, E.2
-
15
-
-
33847378251
-
Estimating the number of change points via Schwarz' criterion
-
Yao Y-C. Estimating the number of change points via Schwarz' criterion. Statistics and Probability Letters, 1988 6 : 181 189.
-
(1988)
Statistics and Probability Letters
, vol.6
, pp. 181-189
-
-
Yao, Y.-C.1
|