-
1
-
-
84995590301
-
What can behavioral economics teach us about privacy?
-
Acquisti, A., Gritzalis, S., Di Vimercati, S., Lambrinoudakis, C. (eds.) Auerbach Publications, Boca Raton
-
Acquisti, A., Grossklags, J.: What can behavioral economics teach us about privacy? In: Acquisti, A., Gritzalis, S., Di Vimercati, S., Lambrinoudakis, C. (eds.) Digital Privacy: Theory, Technologies, and Practices, pp. 363-380. Auerbach Publications, Boca Raton (2007)
-
(2007)
Digital Privacy: Theory, Technologies, and Practices
, pp. 363-380
-
-
Acquisti, A.1
Grossklags, J.2
-
3
-
-
78049395695
-
Three case studies in quantitative information risk analysis
-
September
-
Bashir, M., Christin, N.: Three case studies in quantitative information risk analysis. In: Proceedings of the CERT/SEIMaking the Business Case for Software Assurance Workshop, Pittsburgh, PA, pp. 77-86 (September 2008)
-
(2008)
Proceedings of the CERT/SEIMaking the Business Case for Software Assurance Workshop, Pittsburgh, PA
, pp. 77-86
-
-
Bashir, M.1
Christin, N.2
-
4
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell, K., Gordon, L., Loeb, M., Zhou, L.: The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security 11(3), 431-448 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.2
Loeb, M.3
Zhou, L.4
-
5
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
October
-
Franklin, J., Paxson, V., Perrig, A., Savage, S.: An inquiry into the nature and causes of the wealth of internet miscreants. In: Proceedings of 14th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, pp. 375-388 (October 2007)
-
(2007)
Proceedings of 14th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
6
-
-
74049097109
-
On non-cooperative location privacy: A game-theoretic analysis
-
November
-
Freudiger, J., Manshaei, M., Hubaux, J.-P., Parkes, D.: On non-cooperative location privacy: A game-theoretic analysis. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, IL, pp. 324-337 (November 2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, IL
, pp. 324-337
-
-
Freudiger, J.1
Manshaei, M.2
Hubaux, J.-P.3
Parkes, D.4
-
7
-
-
70350389209
-
Blue versus red: Towards a model of distributed security attacks
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Fultz, N., Grossklags, J.: Blue versus red: Towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167-183. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 167-183
-
-
Fultz, N.1
Grossklags, J.2
-
8
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Information Systems Research 16(2), 186-208 (2005)
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
9
-
-
57349198694
-
Secure or insure? A game-theoretic analysis of information security games
-
April
-
Grossklags, J., Christin, N., Chuang, J.: Secure or insure? A game-theoretic analysis of information security games. In: Proceedings of the 2008 WorldWideWeb Conference (WWW 2008), Beijing, China, pp. 209-218 (April 2008)
-
(2008)
Proceedings of the 2008 WorldWideWeb Conference (WWW 2008), Beijing, China
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
10
-
-
67249156597
-
Security and insurance management in networks with heterogeneous agents
-
July
-
Grossklags, J., Christin, N., Chuang, J.: Security and insurance management in networks with heterogeneous agents. In: Proceedings of the 9th ACM Conference on Electronic Commerce (EC 2008), Chicago, IL, pp. 160-169 (July 2008)
-
(2008)
Proceedings of the 9th ACM Conference on Electronic Commerce (EC 2008), Chicago, IL
, pp. 160-169
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
11
-
-
70349977415
-
Uncertainty in the weakest-link security game
-
May
-
Grossklags, J., Johnson, B.: Uncertainty in the weakest-link security game. In: Proceedings of the International Conference on Game Theory for Networks (GameNets 2009), Istanbul, Turkey, pp. 673-682 (May 2009)
-
(2009)
Proceedings of the International Conference on Game Theory for Networks (GameNets 2009), Istanbul, Turkey
, pp. 673-682
-
-
Grossklags, J.1
Johnson, B.2
-
12
-
-
81755168896
-
The price of uncertainty in security games
-
Grossklags, J., Johnson, B., Christin, N.: The price of uncertainty in security games. In: Proceedings (online) of the Eighth Workshop on the Economics of Information Security (WEIS), London, UK (June 2009)
-
Proceedings (Online) of the Eighth Workshop on the Economics of Information Security (WEIS), London, UK (June 2009)
-
-
Grossklags, J.1
Johnson, B.2
Christin, N.3
-
13
-
-
77955321664
-
When information improves information security
-
January
-
Grossklags, J., Johnson, B., Christin, N.: When information improves information security. In: Proceedings of the 2010 Financial Cryptography Conference (FC 2010), Tenerife, Spain, pp. 416-423 (January 2010)
-
(2010)
Proceedings of the 2010 Financial Cryptography Conference (FC 2010), Tenerife, Spain
, pp. 416-423
-
-
Grossklags, J.1
Johnson, B.2
Christin, N.3
-
15
-
-
78650732970
-
-
Technical report, Columbia Business School & The Wharton School January
-
Heal, G., Kunreuther, H.: The vaccination game. Technical report, Columbia Business School & The Wharton School (January 2005)
-
(2005)
The Vaccination Game
-
-
Heal, G.1
Kunreuther, H.2
-
16
-
-
34848928398
-
Coordination of strategic responses to security threats: Laboratory evidence
-
Hess, R., Holt, C., Smith, A.: Coordination of strategic responses to security threats: Laboratory evidence. Experimental Economics 10(3), 235-250 (2007)
-
(2007)
Experimental Economics
, vol.10
, Issue.3
, pp. 235-250
-
-
Hess, R.1
Holt, C.2
Smith, A.3
-
17
-
-
84899006528
-
Algorithms for interdependent security games
-
Thrun, S., Saul, L., Schölkopf, B. (eds.) MIT Press, Cambridge
-
Kearns, M., Ortiz, L.: Algorithms for interdependent security games. In: Thrun, S., Saul, L., Schölkopf, B. (eds.) Advances in Neural Information Processing Systems, vol. 16, pp. 561-568. MIT Press, Cambridge (2004)
-
(2004)
Advances in Neural Information Processing Systems
, vol.16
, pp. 561-568
-
-
Kearns, M.1
Ortiz, L.2
-
19
-
-
61449258341
-
Detecting network-wide and router-specific misconfigurations through data mining
-
Le, F., Lee, S., Wong, T., Kim, H., Newcomb, D.: Detecting network-wide and router-specific misconfigurations through data mining. IEEE/ACM Trans. Netw. 17(1), 66-79 (2009)
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 66-79
-
-
Le, F.1
Lee, S.2
Wong, T.3
Kim, H.4
Newcomb, D.5
-
20
-
-
60649107168
-
A Bayesian game approach for intrusion detection in wireless ad hoc networks
-
Liu, Y., Comaniciu, C., Man, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceedings of theWorkshop on Game Theory for Communications and Networks, Pisa, Italy (October 2006)
-
Proceedings of TheWorkshop on Game Theory for Communications and Networks, Pisa, Italy (October 2006)
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
21
-
-
51749097143
-
Security decision-making among inter-dependent organizations
-
June
-
Miura-Ko, A., Yolken, B., Mitchell, J., Bambos, N.: Security decision-making among inter-dependent organizations. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), Pittsburgh, PA, pp. 66-80 (June 2008)
-
(2008)
Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), Pittsburgh, PA
, pp. 66-80
-
-
Miura-Ko, A.1
Yolken, B.2
Mitchell, J.3
Bambos, N.4
-
22
-
-
75749102614
-
The economics of online crime
-
Moore, T., Clayton, R., Anderson, R.: The economics of online crime. Journal of Economic Perspectives 23(3), 3-20 (2009)
-
(2009)
Journal of Economic Perspectives
, vol.23
, Issue.3
, pp. 3-20
-
-
Moore, T.1
Clayton, R.2
Anderson, R.3
-
23
-
-
84899919065
-
Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games
-
May
-
Paruchuri, P., Pearce, J., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games. In: Proceedings of the 7th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2008), Estoril, Portugal, pp. 895-902 (May 2008)
-
(2008)
Proceedings of the 7th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2008), Estoril, Portugal
, pp. 895-902
-
-
Paruchuri, P.1
Pearce, J.2
Marecki, J.3
Tambe, M.4
Ordonez, F.5
Kraus, S.6
-
24
-
-
34547100991
-
An empirical analysis of the impact of software vulnerability announcements on firm stock price
-
Telang, R., Wattal, S.: An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering 33(8), 544-557 (2007)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.8
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
-
25
-
-
33750482906
-
System reliability and free riding
-
Camp, L.J., Lewis, S. (eds.) Kluwer Academic Publishers, Dordrecht
-
Varian, H.R.: System reliability and free riding. In: Camp, L.J., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12, pp. 1-15. Kluwer Academic Publishers, Dordrecht (2004)
-
(2004)
Economics of Information Security. Advances in Information Security
, vol.12
, pp. 1-15
-
-
Varian, H.R.1
|