-
1
-
-
75149142201
-
Nudging privacy: The behavioral economics of personal information
-
Acquisti, A.: Nudging privacy: The behavioral economics of personal information. IEEE Security & Privacy 7(6), 82-85 (2009)
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.6
, pp. 82-85
-
-
Acquisti, A.1
-
2
-
-
14744275332
-
Privacy and rationality in individual decision making
-
DOI 10.1109/MSP.2005.22
-
Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1), 26-33 (2005) (Pubitemid 40325579)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
4
-
-
77954729064
-
Security economics and European policy
-
Anderson, R., Böhme, R., Clayton, R., Moore, T.: Security economics and European policy. In: Proceedings of WEIS 2008, Hanover, USA (June 2008)
-
Proceedings of WEIS 2008, Hanover, USA (June 2008)
-
-
Anderson, R.1
Böhme, R.2
Clayton, R.3
Moore, T.4
-
5
-
-
70350755630
-
Why IT managers don't go for cyberinsurance products
-
Bandyopadhyay, T., Mookerjee, V., Rao, R.: Why IT managers don't go for cyberinsurance products. Communications of the ACM 52(11), 68-73 (2009)
-
(2009)
Communications of the ACM
, vol.52
, Issue.11
, pp. 68-73
-
-
Bandyopadhyay, T.1
Mookerjee, V.2
Rao, R.3
-
6
-
-
2342598277
-
Computer security impaired by legitimate users
-
Besnard, D., Arief, B.: Computer security impaired by legitimate users. Computers & Security 23(3), 253-264 (2004)
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
8
-
-
7744243126
-
Tussle in cyberspace: Defining tomorrow's Internet
-
August
-
Clark, D., Wroclawski, J., Sollins, K., Braden, R.: Tussle in cyberspace: Defining tomorrow's Internet. In: Proc. of ACM SIGCOMM 2002, Pittsburgh, PA, pp. 347-356 (August 2002)
-
(2002)
Proc. of ACM SIGCOMM 2002, Pittsburgh, PA
, pp. 347-356
-
-
Clark, D.1
Wroclawski, J.2
Sollins, K.3
Braden, R.4
-
9
-
-
84904818569
-
Using early results from the 'spamHINTS' project to estimate an ISP Abuse Team's task
-
Clayton, R.: Using early results from the 'spamHINTS' project to estimate an ISP Abuse Team's task. In: Proc. of CEAS 2006, Mountain View, CA (July 2006)
-
Proc. of CEAS 2006, Mountain View, CA (July 2006)
-
-
Clayton, R.1
-
10
-
-
84876357755
-
How to lease the Internet in your spare time
-
Feamster, N., Gao, L., Rexford, J.: How to lease the Internet in your spare time. ACM SIGCOMM Computer Communications Review 37(1), 61-64 (2007)
-
(2007)
ACM SIGCOMM Computer Communications Review
, vol.37
, Issue.1
, pp. 61-64
-
-
Feamster, N.1
Gao, L.2
Rexford, J.3
-
11
-
-
70350389209
-
Blue versus red: Towards a model of distributed security attacks
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg February
-
Fultz, N., Grossklags, J.: Blue versus red: Towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167-183. Springer, Heidelberg (February 2009)
-
(2009)
LNCS
, vol.5628
, pp. 167-183
-
-
Fultz, N.1
Grossklags, J.2
-
12
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Information Systems Research 16(2), 186-208 (2005)
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
13
-
-
77954698536
-
Cyber insurance
-
Geers, J., Goobic, J. (eds.): Cyber insurance. The CIP Report 6(3), 1-11 (2007)
-
(2007)
The CIP Report
, vol.6
, Issue.3
, pp. 1-11
-
-
Geers, J.1
Goobic, J.2
-
14
-
-
77954736558
-
P2P, The gorilla in the cable
-
Gerber, A., Houle, J., Nguyen, H., Roughan, M., Sen, S.: P2P, The gorilla in the cable. In: NCTA 2003 National Show, Chicago, IL (June 2003)
-
NCTA 2003 National Show, Chicago, IL (June 2003)
-
-
Gerber, A.1
Houle, J.2
Nguyen, H.3
Roughan, M.4
Sen, S.5
-
15
-
-
0005542095
-
Ten little treasures of game theory and ten intuitive contradictions
-
Goeree, J., Holt, C.: Ten little treasures of game theory and ten intuitive contradictions. American Economic Review 91(5), 1402-1422 (2001) (Pubitemid 33594707)
-
(2001)
American Economic Review
, vol.91
, Issue.5
, pp. 1402-1422
-
-
Goeree, J.K.1
Holt, C.A.2
-
16
-
-
57349198694
-
Secure or insure? A game-theoretic analysis of information security games
-
April
-
Grossklags, J., Christin, N., Chuang, J.: Secure or insure? A game-theoretic analysis of information security games. In: Proceedings of the 2008 World Wide Web Conference (WWW 2008), Beijing, China, pp. 209-218 (April 2008)
-
(2008)
Proceedings of the 2008 World Wide Web Conference (WWW 2008), Beijing, China
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
17
-
-
67249156597
-
Security and insurance management in networks with heterogeneous agents
-
July
-
Grossklags, J., Christin, N., Chuang, J.: Security and insurance management in networks with heterogeneous agents. In: Proceedings of the 9th ACM Conference on Electronic Commerce (EC 2008), Chicago, IL, pp. 160-169 (July 2008)
-
(2008)
Proceedings of the 9th ACM Conference on Electronic Commerce (EC 2008), Chicago, IL
, pp. 160-169
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
18
-
-
77954707500
-
When information improves information security
-
Grossklags, J., Johnson, B., Christin, N.: When information improves information security. In: Proceedings of the 2010 Financial Cryptography Conference (FC 2010), Canary Islands, Spain (January 2010)
-
Proceedings of the 2010 Financial Cryptography Conference (FC 2010), Canary Islands, Spain (January 2010)
-
-
Grossklags, J.1
Johnson, B.2
Christin, N.3
-
19
-
-
77954748613
-
Nudge: Intermediaries' role in interdependent network security
-
Grossklags, J., Radosavac, S., Cárdenas, A., Chuang, J.: Nudge: Intermediaries' role in interdependent network security. In: Proceedings of the 25th Symposium on Applied Computing (SAC), Sierre, Switzerland (March 2010)
-
Proceedings of the 25th Symposium on Applied Computing (SAC), Sierre, Switzerland (March 2010)
-
-
Grossklags, J.1
Radosavac, S.2
Cárdenas, A.3
Chuang, J.4
-
20
-
-
34848845794
-
Solving coordination failure with "all-or-none" group-level incentives
-
Hamman, J., Rick, S., Weber, R.: Solving coordination failure with "all-or-none" group-level incentives. Experimental Economics 10(3), 285-303 (2007)
-
(2007)
Experimental Economics
, vol.10
, Issue.3
, pp. 285-303
-
-
Hamman, J.1
Rick, S.2
Weber, R.3
-
27
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M.: A conceptual foundation for organizational information security awareness. Information Management & Computer Security 8(1), 31-41 (2000)
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
28
-
-
84903035283
-
-
Yale University Press, New Haven
-
Thaler, R., Sunstein, C.: Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale University Press, New Haven (2008)
-
(2008)
Nudge: Improving Decisions about Health, Wealth, and Happiness
-
-
Thaler, R.1
Sunstein, C.2
-
29
-
-
84860603040
-
Implementing and testing a virus throttle
-
August
-
Twycross, J., Williamson, M.: Implementing and testing a virus throttle. In: Proc. of the 12th USENIX Security Symposium, Washington, DC, pp. 285-294 (August 2003)
-
(2003)
Proc. of the 12th USENIX Security Symposium, Washington, DC
, pp. 285-294
-
-
Twycross, J.1
Williamson, M.2
-
30
-
-
75749141441
-
Economics of malware: Security decisions, incentives and externalities
-
May
-
van Eeten, M., Bauer, J.M.: Economics of malware: Security decisions, incentives and externalities. In: STI Working Paper (May 2008)
-
(2008)
STI Working Paper
-
-
Van Eeten, M.1
Bauer, J.M.2
-
31
-
-
0000470297
-
Tacit coordination games, strategic uncertainty, and coordination failure
-
Van Huyck, J., Battallio, R., Beil, R.: Tacit coordination games, strategic uncertainty, and coordination failure. American Economic Review, 80(1):234-248 (1990)
-
(1990)
American Economic Review
, vol.80
, Issue.1
, pp. 234-248
-
-
Van Huyck, J.1
Battallio, R.2
Beil, R.3
-
32
-
-
0344792106
-
Managing online security risks
-
June
-
Varian, H.: Managing online security risks. New York Times (June 2000)
-
(2000)
New York Times
-
-
Varian, H.1
-
33
-
-
33750482906
-
System reliability and free riding
-
Camp, L., Lewis, S. (eds.) Kluwer, Dordrecht
-
Varian, H.: System reliability and free riding. In: Camp, L., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12, pp. 1-15. Kluwer, Dordrecht (2004)
-
(2004)
Economics of Information Security. Advances in Information Security
, vol.12
, pp. 1-15
-
-
Varian, H.1
-
34
-
-
21244475556
-
Service level agreements on IP networks
-
Verma, D.: Service level agreements on IP networks. Proceedings of the IEEE 92(9), 1382-1388 (2004)
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.9
, pp. 1382-1388
-
-
Verma, D.1
-
35
-
-
77954702800
-
BT abandons Phorm: Not looking good for ad tech
-
July
-
Williams, C.: BT abandons Phorm: Not looking good for ad tech. The Register (July 2009)
-
(2009)
The Register
-
-
Williams, C.1
|