-
1
-
-
3242812017
-
Privacy in electronic commerce and the economics of immediate gratification
-
New York, NY, May 2004
-
Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce (EC 2004), New York, NY, May 2004, pp. 21-29 (2004)
-
(2004)
Proceedings of the 5th ACM Conference on Electronic Commerce (EC 2004)
, pp. 21-29
-
-
Acquisti, A.1
-
2
-
-
14744275332
-
Privacy and rationality in individual decision making
-
Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1), 26-33 (2005)
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
3
-
-
14744280530
-
Conditioning prices on purchase history
-
Summer
-
Acquisti, A., Varian, H.: Conditioning prices on purchase history. Marketing Science 24(3), 367-381 (Summer 2005)
-
(2005)
Marketing Science
, vol.24
, Issue.3
, pp. 367-381
-
-
Acquisti, A.1
Varian, H.2
-
4
-
-
78049395695
-
Three case studies in quantitative information risk analysis
-
Pittsburgh, PA, September
-
Bashir, M., Christin, N.: Three case studies in quantitative information risk analysis. In: Proceedings of the CERT/SEI Making the Business Case for Software Assurance Workshop, Pittsburgh, PA, pp. 77-86 (September 2008)
-
(2008)
Proceedings of the CERT/SEI Making the Business Case for Software Assurance Workshop
, pp. 77-86
-
-
Bashir, M.1
Christin, N.2
-
5
-
-
33744944324
-
Introductions of invasive species: Failure of the weaker link
-
Burnett, K.: Introductions of invasive species: Failure of the weaker link. Agricultural and Resource Economics Review 35(1), 21-28 (2006)
-
(2006)
Agricultural and Resource Economics Review
, vol.35
, Issue.1
, pp. 21-28
-
-
Burnett, K.1
-
6
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell, K., Gordon, L., Loeb, M., Zhou, L.: The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security 11(3), 431-448 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.2
Loeb, M.3
Zhou, L.4
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84-90 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
8
-
-
79951914093
-
Dyke maintenance and other stories: Some neglected types of public goods
-
Cornes, R.: Dyke maintenance and other stories: Some neglected types of public goods. Quarterly Journal of Economics 108(1), 259-271 (1993)
-
(1993)
Quarterly Journal of Economics
, vol.108
, Issue.1
, pp. 259-271
-
-
Cornes, R.1
-
9
-
-
0003553457
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
January
-
Ferguson, P., Senie, D.: Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing, RFC 2267 (January 1998)
-
(1998)
RFC 2267
-
-
Ferguson, P.1
Senie, D.2
-
10
-
-
74049097109
-
On non-cooperative location privacy: A game-theoretic analysis
-
Chicago, IL, November
-
Freudiger, J., Manshaei, M., Hubaux, J.-P., Parkes, D.: On non-cooperative location privacy: A game-theoretic analysis. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, IL, p. 324-337 (November 2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009)
, pp. 324-337
-
-
Freudiger, J.1
Manshaei, M.2
Hubaux, J.-P.3
Parkes, D.4
-
11
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Information Systems Research 16(2), 186-208 (2005)
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
12
-
-
0344899914
-
Sharing information on computer systems security: An economic analysis
-
Gordon, L. A., Loeb, M., Lucyshyn, W.: Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy 22(6), 461-485 (2003)
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, Issue.6
, pp. 461-485
-
-
Gordon, L.A.1
Loeb, M.2
Lucyshyn, W.3
-
13
-
-
85076444426
-
Predicted and observed behavior in the weakest-link security game
-
San Francisco, CA April
-
Grossklags, J., Christin, N., Chuang, J.: Predicted and observed behavior in the weakest-link security game. In: Proceedings of the 2008 USENIX Workshop on Usability, Privacy and Security (UPSEC 2008), San Francisco, CA (April 2008)
-
(2008)
Proceedings of the 2008 USENIX Workshop on Usability, Privacy and Security (UPSEC 2008)
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
14
-
-
57349198694
-
Secure or insure? A game-theoretic analysis of information security games
-
Beijing, China, April
-
Grossklags, J., Christin, N., Chuang, J.: Secure or insure? A game-theoretic analysis of information security games. In: Proceedings of the 2008 World Wide Web Conference (WWW 2008), Beijing, China, pp. 209-218 (April 2008)
-
(2008)
Proceedings of the 2008 World Wide Web Conference (WWW 2008)
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
15
-
-
67249156597
-
Security and insurance management in networks with heterogeneous agents
-
Chicago, IL, July
-
Grossklags, J., Christin, N., Chuang, J.: Security and insurance management in networks with heterogeneous agents. In: Proceedings of the 9th ACM Conference on Electronic Commerce (EC 2008), Chicago, IL, pp. 160-169 (July 2008)
-
(2008)
Proceedings of the 9th ACM Conference on Electronic Commerce (EC 2008)
, pp. 160-169
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
16
-
-
81755168896
-
The price of uncertainty in security games
-
London, UK June
-
Grossklags, J., Johnson, B., Christin, N.: The price of uncertainty in security games. In: Proceedings (online) of the Eighth Workshop on the Economics of Information Security (WEIS), London, UK (June 2009)
-
(2009)
Proceedings (online) of the Eighth Workshop on the Economics of Information Security (WEIS)
-
-
Grossklags, J.1
Johnson, B.2
Christin, N.3
-
17
-
-
78049385069
-
When information improves information security
-
Canary Islands, Spain January
-
Grossklags, J., Johnson, B., Christin, N.: When information improves information security. In: Proceedings of the 2010 Financial Cryptography Conference (FC 2010), Canary Islands, Spain (January 2010)
-
(2010)
Proceedings of the 2010 Financial Cryptography Conference (FC 2010)
-
-
Grossklags, J.1
Johnson, B.2
Christin, N.3
-
18
-
-
0000071449
-
From weakest-link to best-shot: The voluntary provision of public goods
-
Hirshleifer, J.: From weakest-link to best-shot: The voluntary provision of public goods. Public Choice 41(3), 371-386 (1983)
-
(1983)
Public Choice
, vol.41
, Issue.3
, pp. 371-386
-
-
Hirshleifer, J.1
-
19
-
-
0000125532
-
Prospect theory: An analysis of decision under risk
-
Kahneman, D., Tversky, A.: Prospect theory: An analysis of decision under risk. Econometrica XLVII, 263-291 (1979)
-
(1979)
Econometrica
, vol.47
, pp. 263-291
-
-
Kahneman, D.1
Tversky, A.2
-
20
-
-
84924375780
-
Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
-
Boston, MA, May
-
Kandula, S., Katabi, D., Jacob, M., Berger, A.: Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In: Proceedings of the 2nd USENIX Symposium on Networked Systems Design & Implementation (NSDI 2005), Boston, MA, pp. 287-300 (May 2005)
-
(2005)
Proceedings of the 2nd USENIX Symposium on Networked Systems Design & Implementation (NSDI 2005)
, pp. 287-300
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
21
-
-
85020616309
-
Network externalities, competition, and compatibility
-
Katz, M., Shapiro, C.: Network externalities, competition, and compatibility. American Economic Review 75(3), 424-440 (1985)
-
(1985)
American Economic Review
, vol.75
, Issue.3
, pp. 424-440
-
-
Katz, M.1
Shapiro, C.2
-
22
-
-
0000620127
-
Rules of thumb versus dynamic programming
-
Lettau, M., Uhlig, H.: Rules of thumb versus dynamic programming. American Economic Review 89(1), 148-174 (1999)
-
(1999)
American Economic Review
, vol.89
, Issue.1
, pp. 148-174
-
-
Lettau, M.1
Uhlig, H.2
-
23
-
-
60649107168
-
A Bayesian game approach for intrusion detection in wireless ad hoc networks
-
page Article
-
Liu, Y., Comaniciu, C., Man, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceedings of the Workshop on Game Theory for Communications and Networks, page Article No. 4 (2006)
-
(2006)
Proceedings of the Workshop on Game Theory for Communications and Networks
, Issue.4
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
24
-
-
70349294321
-
Alliances and negotiations: An incomplete information example
-
Manzini, P., Mariotti, M.: Alliances and negotiations: An incomplete information example. Review of Economic Design 13(3), 195-203 (2009)
-
(2009)
Review of Economic Design
, vol.13
, Issue.3
, pp. 195-203
-
-
Manzini, P.1
Mariotti, M.2
-
25
-
-
33646433706
-
Testing social theories in computer-mediated communication through gaming and simulation
-
Noy, A., Raban, D., Ravid, G.: Testing social theories in computer-mediated communication through gaming and simulation. Simulation & Gaming 37(2), 174-194 (2006)
-
(2006)
Simulation & Gaming
, vol.37
, Issue.2
, pp. 174-194
-
-
Noy, A.1
Raban, D.2
Ravid, G.3
-
27
-
-
84899919065
-
Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games
-
Estoril, Portugal, May
-
Paruchuri, P., Pearce, J., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), Estoril, Portugal, pp. 895-902 (May 2008)
-
(2008)
Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008)
, pp. 895-902
-
-
Paruchuri, P.1
Pearce, J.2
Marecki, J.3
Tambe, M.4
Ordonez, F.5
Kraus, S.6
-
28
-
-
0036264347
-
A perspective on psychology and economics
-
Rabin, M.: A perspective on psychology and economics. European Economic Review 46 (4-5), 657-685 (2002)
-
(2002)
European Economic Review
, vol.46
, Issue.4-5
, pp. 657-685
-
-
Rabin, M.1
-
29
-
-
0002569430
-
Characterizing effective trading strategies: Insights from a computerized double auction tournament
-
Rust, J., Miller, J., Palmer, R.: Characterizing effective trading strategies: Insights from a computerized double auction tournament. Journal of Economic Dynamics and Control 18(1), 61-96 (1994)
-
(1994)
Journal of Economic Dynamics and Control
, vol.18
, Issue.1
, pp. 61-96
-
-
Rust, J.1
Miller, J.2
Palmer, R.3
-
30
-
-
36849073159
-
Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for Phish
-
Pittsburgh, PA, July 2007
-
Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L., Hong, J., Nunge, E.: Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for Phish. In: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS 2007), Pittsburgh, PA, July 2007, pp. 88-99 (2007)
-
(2007)
Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS 2007)
, pp. 88-99
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.5
Hong, J.6
Nunge, E.7
-
32
-
-
1542401733
-
An Introduction to Privacy in Economics and Politics
-
Stigler, G.: An Introduction to Privacy in Economics and Politics. The Journal of Legal Studies 4(9), 623-644 (1980)
-
(1980)
The Journal of Legal Studies
, vol.4
, Issue.9
, pp. 623-644
-
-
Stigler, G.1
-
33
-
-
34547100991
-
An empirical analysis of the impact of software vulnerability announcements on firm stock price
-
Telang, R., Wattal, S.: An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering 33(8), 544-557 (2007)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.8
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
-
34
-
-
0000470297
-
Tacit coordination games, strategic uncertainty, and coordination failure
-
Van Huyck, J., Battallio, R., Beil, R.: Tacit coordination games, strategic uncertainty, and coordination failure. American Economic Review 80(1), 234-248 (1990)
-
(1990)
American Economic Review
, vol.80
, Issue.1
, pp. 234-248
-
-
Van Huyck, J.1
Battallio, R.2
Beil, R.3
-
35
-
-
33750482906
-
System reliability and free riding
-
Camp, L. J., Lewis, S. eds., Kluwer Academic Publishers, Dordrecht
-
Varian, H. R.: System reliability and free riding. In: Camp, L. J., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12, pp. 1-15. Kluwer Academic Publishers, Dordrecht (2004)
-
(2004)
Economics of Information Security. Advances in Information Security
, vol.12
, pp. 1-15
-
-
Varian, H.R.1
-
36
-
-
24144443188
-
Revealed preferences in intertemporal decision making
-
von Auer, L.: Revealed preferences in intertemporal decision making. Theory and Decision 56(3), 269-290 (2004)
-
(2004)
Theory and Decision
, vol.56
, Issue.3
, pp. 269-290
-
-
Von Auer, L.1
-
37
-
-
0035273387
-
Designing the market game for a trading agent competition
-
Wellman, M., Wurman, P., O'Malley, K., Bangera, R., Lin, S., Reeves, D., Walsh, W.: Designing the market game for a trading agent competition. IEEE Internet Computing 5(2), 43-51 (2001)
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.2
, pp. 43-51
-
-
Wellman, M.1
Wurman, P.2
O'Malley, K.3
Bangera, R.4
Lin, S.5
Reeves, D.6
Walsh, W.7
-
38
-
-
0041908334
-
Group size and the private supply of a best-shot public good
-
Xu, X.: Group size and the private supply of a best-shot public good. European Journal of Political Economy 17(4), 897-904 (2001)
-
(2001)
European Journal of Political Economy
, vol.17
, Issue.4
, pp. 897-904
-
-
Xu, X.1
|