-
1
-
-
84870158114
-
Is there a cost to privacy breaches? An event study
-
Paper presented at, Milwaukee, WI
-
Acquisti, Alessandro, Allan Friedman, and Rahul Telang. 2006. "Is There a Cost to Privacy Breaches? An Event Study." Paper presented at the International Conference on Information Systems (ICIS), Milwaukee, WI.
-
(2006)
The International Conference on Information Systems (ICIS)
-
-
Alessandro, A.1
Friedman, A.2
Telang, R.3
-
2
-
-
85005305538
-
The market for 'Lemons': Quality uncertainty and the market mechanism
-
Akerlof, George A. 1970. "The Market for 'Lemons': Quality Uncertainty and the Market Mechanism." Quarterly Journal of Economics, 84(3): 488-500.
-
(1970)
Quarterly Journal of Economics
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.A.1
-
5
-
-
33750440197
-
The economics of information security
-
Anderson, Ross, and Tyler Moore. 2006. "The Economics of Information Security." Science, 314(5799): 610-13
-
(2006)
Science
, vol.314
, Issue.5799
, pp. 610-613
-
-
Ross, A.1
Moore, T.2
-
6
-
-
75749107188
-
-
Anti-phishing Working Group Internet Policy Committee, An APWG Industry Advisory
-
Anti-phishing Working Group Internet Policy Committee. 2008. "Anti-Phishing Best Practices Recommendations for Registrars." An APWG Industry Advisory. http://www.antiphishing.org/reports/APWG-RegistrarBestPractices.pdf.
-
(2008)
Anti-Phishing Best Practices Recommendations for Registrars
-
-
-
7
-
-
75749101164
-
-
Press release, March 14, APACS (Association for payment clearing services)
-
APACS (Association for Payment Clearing Services). 2007. " Card Fraud Losses Continue to Fall."Press release, March 14. http://www.apacs.org.uk/media-centre/press/07-14-03.html.
-
(2007)
Card Fraud Losses Continue to Fall
-
-
-
8
-
-
70350363824
-
-
APACS (Association for Payment Clearing Services, Press release, September 25
-
APACS (Association for Payment Clearing Services). 2008. "APACS Announces Latest Fraud Figures" Press release, September 25. http://www.apacs.org.uk/APACSannounceslatestfraudfigures. htm.
-
(2008)
APACS Announces Latest Fraud Figures
-
-
-
9
-
-
0000787258
-
Crime and punishment: An economic approach
-
Becker, Gary. 1968. "Crime and Punishment: An Economic Approach." The Journal of Political Economy, 76(2): 169-217.
-
(1968)
The Journal of Political Economy
, vol.76
, Issue.2
, pp. 169-217
-
-
Gary, B.1
-
10
-
-
75749153418
-
-
Assembly Bill No. 700
-
California State Senate. 2002. "Assembly Bill No. 700." http://info.sen.ca.gov/pub/01-02/ bill/asm/ab-0651-0700/ab-700-bill-20020929-chaptered.pdf.
-
(2002)
California State Senate
-
-
-
11
-
-
32644462017
-
Pricing security: A market in vulnerabilities
-
ed. L. Jean Camp and Stephen Lewis, Boston: Kluwer Academic Publishers
-
Camp, L. Jean, and Catherine D. Wolfram. 2004. "Pricing Security: A Market in Vulnerabilities." In Economics of Information Security, Vol.12, Advances in Information Security, ed. L. Jean Camp and Stephen Lewis, 17-34. Boston: Kluwer Academic Publishers.
-
(2004)
Economics of Information Security, Advances in Information Security
, vol.12
, pp. 17-34
-
-
Jean, C.L.1
Wolfram, C.D.2
-
12
-
-
75749112290
-
-
Malware Report: The Economic Impact of Viruses, Spyware, Adware, Botnets, and other Malicious Code
-
Computer Economics. 2007. "Malware Report: The Economic Impact of Viruses, Spyware, Adware, Botnets, and other Malicious Code." http://www.computereconomics.com/page.cfm?name-Malware%20Report.
-
(2007)
Computer Economics
-
-
-
13
-
-
75749136642
-
Reinterpreting the disclosure debate for web infections
-
ed. M. Eric Johnson, New York: Springer
-
Day, Oliver, Brandon Palmen, and Rachel Greenstadt. 2008. "Reinterpreting the Disclosure Debate for Web Infections." In Managing Information Risk and the Economics of Security, ed. M. Eric Johnson, 179-197. New York: Springer.
-
(2008)
Managing Information Risk and the Economics of Security
, pp. 179-197
-
-
Oliver, D.1
Palmen, B.2
Greenstadt, R.3
-
14
-
-
0040006374
-
-
A Walk on the Dark Side, August 30
-
The Economist. 2007. "A Walk on the Dark Side." August 30.
-
(2007)
The Economist
-
-
-
15
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
CCS, ACM Press
-
Franklin, James, Adrian Perrig, Vern Paxon, and Stefan Savage. 2007. "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants." Proceedings of ACM Conference on Computer and Communications Security (CCS), 375-388. ACM Press.
-
(2007)
Proceedings of ACM Conference on Computer and Communications Security
, pp. 375-388
-
-
James, F.1
Perrig, A.2
Paxon, V.3
Savage, S.4
-
17
-
-
75749089369
-
T.J. Maxx parent company data theft is the worst ever
-
Greenemeier March 29
-
Greenemeier. 2007. "T.J. Maxx Parent Company Data The ftIs The Worst Ever." Information Week, March 29. http://www.informationweek.com/news/security/showArticle.jhtml?articleID-198701100.
-
(2007)
Information Week
-
-
-
18
-
-
0000071449
-
From weakest-link to Best-shot: The Voluntary Provision of Public Goods
-
Hirshleifer, Jack. 1983. "From Weakest-link to Best-shot: The Voluntary Provision of Public Goods." Public Choice, 41(3): 371-386.
-
(1983)
Public Choice
, vol.41
, Issue.3
, pp. 371-386
-
-
Jack, H.1
-
19
-
-
75749109529
-
House of lords science and technology committee
-
London: The Stationery Office
-
House of Lords Science and Technology Committee. 2007. Personal Internet Security, 5th Report of 2006-2007 London: The Stationery Office.
-
(2007)
Personal Internet Security, 5th Report of 2006-07
-
-
-
20
-
-
75749133885
-
-
Internet Corporation for Assigned Names and Numbers (ICANN, November 12
-
Internet Corporation for Assigned Names and Numbers (ICANN). 2008. "Termination of Registrar EstDomains to Go Ahead." November 12. http://www.icann.org/en/announcements/announcement-12nov08-en.htm.
-
(2008)
Termination of Registrar EstDomains to Go Ahead
-
-
-
21
-
-
75749095346
-
-
Half-yearly Report, July
-
Internet Watch Foundation. 2006. "Half-yearly Report." July. http://www.iwf.org.uk/documents/20060803-2006-bi-annual-report-v7-final4.p
-
(2006)
Internet Watch Foundation
-
-
-
22
-
-
70349272437
-
-
Spamalytics: An Empirical Analysis of Spam Marketing Conversion, ACM Press
-
Kanich, Chris, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. 2008. "Spamalytics: An Empirical Analysis of Spam Marketing Conversion." Proceedings of ACM Conference on Computer and Communications Security (CCS), 3-14. ACM Press.
-
(2008)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
, pp. 3-14
-
-
Chris, K.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Geoffrey, M.V.5
Paxson, V.6
Savage, S.7
-
23
-
-
75749097472
-
Money mules' help haul cyber criminals' loot
-
January 25
-
Krebs, Brian. 2008a. " 'Money Mules' Help Haul Cyber Criminals' Loot." Washington Post. January 25. http://www.washingtonpost.com/wp-dyn/content/story/2008/01/25/ST2008012501460.html.
-
(2008)
Washington Post
-
-
Brian, K.1
-
24
-
-
75749145220
-
Major source of online scams and spams knocked offline. Blog titled, Security Fix
-
November 11
-
Krebs, Brian. 2008b. "Major Source of Online Scams and Spams Knocked Offline." Blog titled "Security Fix." Washington Post, November 11. http://voices.washingtonpost.com/securityfix/2008/11/major-source-of-online-scams-a.html.
-
(2008)
Washington Post
-
-
Brian, K.1
-
25
-
-
75749092739
-
Estdomains: A sordid history and a storied CEO
-
September 8
-
Krebs, Brian. 2008c. "EstDomains: A Sordid History and a Storied CEO." Washington Post. September 8. http://voices.washingtonpost.com/securityfix/2008/09/estdomains-rfaut-sordid-history-an.html.
-
(2008)
Washington Post
-
-
Brian, K.1
-
26
-
-
34547969527
-
The new front line: Estonia under cyberassault
-
Lesk, Michael. 2007. "The New Front Line: Estonia under Cyberassault." IEEE Security and Privacy, 5(4): 76-79.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.4
, pp. 76-79
-
-
Michael, L.1
-
29
-
-
75749124803
-
The impact of incentives on notice and takedown
-
ed. M. Eric Johnson, New York: Springer
-
Moore, Tyler, and Richard Clayton. 2008a. "The Impact of Incentives on Notice and Takedown." In Managing Information Risk and the Economics of Security, ed. M. Eric Johnson, 199-223. New York: Springer.
-
(2008)
Managing Information Risk and the Economics of Security
, pp. 199-223
-
-
Tyler, M.1
Clayton, R.2
-
31
-
-
70350398962
-
Evil searching: Compromise and recompromise of internet hosts for phishing
-
Moore, Tyler, and Richard Clayton. 2009. "Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing." Lecture Notes in Computer Science, vol.5628, pp. 256-272
-
(2009)
Lecture Notes in Computer Science
, vol.5628
, pp. 256-272
-
-
Tyler, M.1
Clayton, R.2
-
32
-
-
70450266533
-
The myth of the superuser: Fear, risk and harm online
-
Ohm, Paul. 2008. "The Myth of the Superuser: Fear, Risk and Harm Online." UC Davis Law Review, 41(4): 1327-1402.
-
(2008)
UC Davis Law Review
, vol.41
, Issue.4
, pp. 1327-1402
-
-
Paul, O.1
-
36
-
-
80053650188
-
All your iFRAMEs Point to Us
-
USENIX Association
-
Provos, Niels, Panayiotis Mavrommatis, Moheeb Abu Rajab, and Fabian Monrose. 2008. "All Your iFRAMEs Point to Us." Proceedings of the 17th USENIX Security Symposium, 1-15. USENIX Association.
-
(2008)
Proceedings of the 17th USENIX Security Symposium
, pp. 1-15
-
-
Niels, P.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
37
-
-
75749152172
-
Do data breach disclosure laws reduce identity theft?
-
Paper presented at, Hanover, NH.Available at SSRN
-
Romanosky, Sasha, Rahul Telang, and Alessandro Acquisti. 2008. "Do Data Breach Disclosure Laws Reduce Identity Theft?" Paper presented at the 7th Workshop on the Economics of Information Security, Hanover, NH. Available at SSRN: http://ssrn.com/paper-1268926.
-
(2008)
The 7th Workshop on the Economics of Information Security
-
-
Sasha, R.1
Telang, R.2
Acquisti, A.3
-
40
-
-
75749146775
-
Symantec
-
Trends for July-December 07
-
Symantec. 2008. Symatec Global Internet Security Threat Report, Vol.13, Trends for July-December 07. http://eval.symantec.com/mktginfo/enterprise/white-papers/b-whitepaper-internet-security-threat-report-xiii-04-2008.en-us.pdf.
-
(2008)
Symatec Global Internet Security Threat Report
, vol.13
-
-
-
43
-
-
33750482906
-
System reliability and free riding
-
ed. L. Jean Camp and Stephen Lewis, Boston: Kluwer Academic Publishers
-
Varian, Hal. 2004. "System Reliability and Free Riding." In Economics of Information Security, Vol.12, Advances in Information Security, ed. L. Jean Camp and Stephen Lewis, 1-15. Boston: Kluwer Academic Publishers.
-
(2004)
Economics of Information Security, Advances in Information Security
, vol.12
, pp. 1-15
-
-
Hal, V.1
|