-
3
-
-
24344436426
-
The blaster worm: Then and
-
Jul
-
M. Bailey, E. Cooke, F. Jahanian, D. Watson, and J. Nazario, "The blaster worm: Then and now." IEEE Security and Privacy, vol. 3, no. 4, pp. 26-31, Jul. 2005; http://dx.doi.org/10.1109/MSP.2005.106.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Watson, D.4
Nazario, J.5
-
5
-
-
0242665376
-
Information security is information risk management
-
New York, NY: ACM
-
B. Blakley, E. McDermott, and D. Geer, "Information security is information risk management," in Proc. 2001 Workshop on New Security Paradigms. New York, NY: ACM, 2001, pp. 97-104.
-
(2001)
Proc. 2001 Workshop on New Security Paradigms
, pp. 97-104
-
-
Blakley, B.1
McDermott, E.2
Geer, D.3
-
6
-
-
33746595082
-
Pricing security
-
Boston, MA, Oct. 24-26
-
L.J. Camp and C. Wolfram, "Pricing security," in Proc. CERT Information Survivability Workshop (Boston, MA), Oct. 24-26, 2000, pp. 31-39.
-
(2000)
Proc. CERT Information Survivability Workshop
, pp. 31-39
-
-
Camp, L.J.1
Wolfram, C.2
-
8
-
-
25444455106
-
-
L.J. Camp and S. Lewis, Eds, Boston, MA: Kluwer
-
L.J. Camp and S. Lewis, Eds., The Economics of Information Security Boston, MA: Kluwer, 2004.
-
(2004)
The Economics of Information Security
-
-
-
9
-
-
70350222455
-
-
S. Cass, Listening in, IEEE Spectrum (Special Report on Intelligence and Technology), 40, no. 4, pp. 32-37, 1995.
-
S. Cass, "Listening in," IEEE Spectrum (Special Report on Intelligence and Technology), vol. 40, no. 4, pp. 32-37, 1995.
-
-
-
-
10
-
-
70350224354
-
Cyberplagues
-
Boston, MA: Addison-Wesley, ch 10, pp
-
D. Denning, "Cyberplagues," in Information Warfare and Security. Boston, MA: Addison-Wesley, 1998, ch 10, pp. 269-282.
-
(1998)
Information Warfare and Security
, pp. 269-282
-
-
Denning, D.1
-
12
-
-
84900482702
-
Security in the wild
-
P. Dourish, R. Grinter, J. Delgado de la Flor, and M. Joseph, "Security in the wild," Personal and Ubiquitous Computing, vol. 8, no. 6, pp. 391-401, 2004.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.2
Delgado de la Flor, J.3
Joseph, M.4
-
13
-
-
37749050847
-
-
St. Paul, MN: Stories Press
-
S. Freeman and J. Bleifuss, Was the 2004 Presidential Election Stolen?: Exit Polls, Election Fraud, and the Official Count. St. Paul, MN: Stories Press, 2006.
-
(2006)
Was the 2004 Presidential Election Stolen?: Exit Polls, Election Fraud, and the Official Count
-
-
Freeman, S.1
Bleifuss, J.2
-
14
-
-
29244472469
-
The user non-acceptance paradigm: INFOSEC's dirty little secret
-
Nova Scotia, Canada, Sept. 20-23
-
S.J. Greenwald, K.G. Olthoff, V. Raskin, and W. Ruch, "The user non-acceptance paradigm: INFOSEC's dirty little secret," in Proc. 2004 Workshop on New Security Paradigms (Nova Scotia, Canada), Sept. 20-23, 2004.
-
(2004)
Proc. 2004 Workshop on New Security Paradigms
-
-
Greenwald, S.J.1
Olthoff, K.G.2
Raskin, V.3
Ruch, W.4
-
15
-
-
70350218014
-
Mothers of fallen NW Indiana soldiers mourn as toll passes 1000
-
Staff writer, Sept. 8
-
Staff writer, "Mothers of fallen NW Indiana soldiers mourn as toll passes 1000," Bloomington Herald-Tribune, Sept. 8, 2004, pp. A1.
-
(2004)
Bloomington Herald-Tribune
-
-
-
16
-
-
0023912965
-
Mental models in risk assessment: Informing people about drugs
-
H. Jungermann, H. Schutz, and M. Thuring, "Mental models in risk assessment: Informing people about drugs," Risk Analysis, vol. 8, no. 1, pp. 147-155, 1998.
-
(1998)
Risk Analysis
, vol.8
, Issue.1
, pp. 147-155
-
-
Jungermann, H.1
Schutz, H.2
Thuring, M.3
-
17
-
-
0003768818
-
-
Cambridge, U.K, Cambridge Univ. Press
-
D. Kahneman, P. Slovic, and A. Tversky, Judgment Under Uncertainty Cambridge, U.K.: Cambridge Univ. Press, 2001.
-
(2001)
Judgment Under Uncertainty
-
-
Kahneman, D.1
Slovic, P.2
Tversky, A.3
-
18
-
-
70350224227
-
Computer networks as biological systems
-
May
-
R. Kephart and W. Chess, "Computer networks as biological systems," IEEE Spectrum, May 1993.
-
(1993)
IEEE Spectrum
-
-
Kephart, R.1
Chess, W.2
-
19
-
-
0003750452
-
-
Cambridge, U.K, Cambridge Univ. Press
-
M.G. Morgan, B. Fischhoff, A. Bostrom, and C.J. Atman, Risk Communication: A Mental Models Approach. Cambridge, U.K.: Cambridge Univ. Press, 2001.
-
(2001)
Risk Communication: A Mental Models Approach
-
-
Morgan, M.G.1
Fischhoff, B.2
Bostrom, A.3
Atman, C.J.4
-
21
-
-
1642369179
-
-
Pew Internet & American Life Project, accessed Nov. 2005
-
Pew Internet & American Life Project, "Fear of Online Crime," 2001; http://www.pewinternet.org/PPF /r/32/report_display.asp, accessed Nov. 2005.
-
(2001)
Fear of Online Crime
-
-
-
22
-
-
2942678174
-
-
Pew Internet & American Life Project, accessed Nov. 2005
-
Pew Internet & American Life Project, "America's Online Pursuits," 2003; http://www.pewinternet.org /PPF/r/106/report_display.asp, accessed Nov. 2005.
-
(2003)
America's Online Pursuits
-
-
-
23
-
-
31144461818
-
Where computer security meets national security
-
June
-
H. Nissenbaum, "Where computer security meets national security," Ethics and Information Technology, vol. 7, no. 2, pp. 61-73, June 2005.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.2
, pp. 61-73
-
-
Nissenbaum, H.1
-
24
-
-
2442679963
-
-
New York, NY: Copernicus
-
B. Schneier, Beyond Fear. New York, NY: Copernicus, 2003.
-
(2003)
Beyond Fear
-
-
Schneier, B.1
-
25
-
-
70350229029
-
Melissa was 'a colossal mistake' says author
-
May 2, 2002;
-
M. Smith, "Melissa was 'a colossal mistake' says author," Sophos: Anti Virus for Business, May 2, 2002; http://www.sophos.com/virusinfo /articles/melissa2.html.
-
Sophos: Anti Virus for Business
-
-
Smith, M.1
-
26
-
-
0003605887
-
-
New York, NY: Pocket Books
-
C. Stoll, Cuckoo's Egg. New York, NY: Pocket Books, 1990.
-
(1990)
Cuckoo's Egg
-
-
Stoll, C.1
-
27
-
-
84986561725
-
Hacking and cybercrime
-
Kennesaw, GA, Oct. 08, New York, NY: ACM, pp
-
N.B. Sukhai, "Hacking and cybercrime," in Proc. 1st Ann. Conf. Information Security Curriculum Development (Kennesaw, GA), Oct. 08, 2004. New York, NY: ACM, pp. 128-132.
-
(2004)
Proc. 1st Ann. Conf. Information Security Curriculum Development
, pp. 128-132
-
-
Sukhai, N.B.1
-
28
-
-
34147122389
-
The paradoxical value of privacy
-
J.L. Camp and S. Lewis, Eds. Boston, MA: Kluwer
-
P. Syverson and A. Shostack, "The paradoxical value of privacy," in The Economics of Information Security, J.L. Camp and S. Lewis, Eds. Boston, MA: Kluwer, 2004.
-
(2004)
The Economics of Information Security
-
-
Syverson, P.1
Shostack, A.2
-
29
-
-
33750482906
-
System reliability and free riding
-
J.L. Camp and S. Lewis, Eds. Boston, MA: Kluwer
-
H. Varian, "System reliability and free riding," in The Economics of Information Security, J.L. Camp and S. Lewis, Eds. Boston, MA: Kluwer, 2002.
-
(2002)
The Economics of Information Security
-
-
Varian, H.1
-
30
-
-
70350226076
-
Anatomy of an attack: A race against time
-
May 19
-
V. Tuesday, "Anatomy of an attack: A race against time," Computerworld, vol. 35, no. 12, p. 57, May 19, 2001.
-
(2001)
Computerworld
, vol.35
, Issue.12
, pp. 57
-
-
Tuesday, V.1
-
31
-
-
0016264378
-
Judgment under uncertainty: Heuristics and biases
-
A. Tversky and D. Kahneman, "Judgment under uncertainty: Heuristics and biases," Science, vol. 185, pp. 1124-1131, 1974.
-
(1974)
Science
, vol.185
, pp. 1124-1131
-
-
Tversky, A.1
Kahneman, D.2
-
32
-
-
33745847757
-
Belief in the law of small numbers
-
A. Tversky and D. Kahneman, "Belief in the law of small numbers," Psychological Bulletin, vol. 76, pp. 105-110, 1971.
-
(1971)
Psychological Bulletin
, vol.76
, pp. 105-110
-
-
Tversky, A.1
Kahneman, D.2
-
33
-
-
0019392722
-
The framing of decisions and the psychology of choice
-
A. Tversky and D. Kahneman, "The framing of decisions and the psychology of choice," Science, vol. 211, no. 4481, pp. 453-8, 1981.
-
(1981)
Science
, vol.211
, Issue.4481
, pp. 453-458
-
-
Tversky, A.1
Kahneman, D.2
|