메뉴 건너뛰기




Volumn 30, Issue 2, 2011, Pages 256-286

Do data breach disclosure laws reduce identity theft?

Author keywords

[No Author keywords available]

Indexed keywords


EID: 79952376649     PISSN: 02768739     EISSN: 15206688     Source Type: Journal    
DOI: 10.1002/pam.20567     Document Type: Article
Times cited : (172)

References (76)
  • 1
    • 79952411544 scopus 로고    scopus 로고
    • June, Is there a cost to privacy breaches? An event study. Paper presented at the Fifth Workshop on the Economics of Information Security, University of Cambridge, England.
    • Acquisti, A., Friedman, A., & Telang, R. (2006, June). Is there a cost to privacy breaches? An event study. Paper presented at the Fifth Workshop on the Economics of Information Security, University of Cambridge, England.
    • (2006)
    • Acquisti, A.1    Friedman, A.2    Telang, R.3
  • 2
    • 79952405840 scopus 로고    scopus 로고
    • Assessing data security: Preventing breaches and protecting sensitive information Hearing before the Committee on Financial Services, House of Representatives, 109th Congress.
    • Assessing data security: Preventing breaches and protecting sensitive information. (2005). Hearing before the Committee on Financial Services, House of Representatives, 109th Congress.
    • (2005)
  • 3
    • 0040679785 scopus 로고    scopus 로고
    • Measuring positive externalities from unobservable victim precautions: An empirical analysis of lojack
    • Ayres, I., & Levitt, S. (1998). Measuring positive externalities from unobservable victim precautions: An empirical analysis of lojack. Quarterly Journal of Economics, 113, 43-77.
    • (1998) Quarterly Journal of Economics , vol.113 , pp. 43-77
    • Ayres, I.1    Levitt, S.2
  • 4
    • 79952431012 scopus 로고    scopus 로고
    • Identity theft, 2004. Special Report NCJ 212213. Washington, DC: Bureau of Justice Statistics. Retrieved December 16, 2010, from April
    • Baum, K. (2006, April). Identity theft, 2004. Special Report NCJ 212213. Washington, DC: Bureau of Justice Statistics. Retrieved December 16, 2010, from.
    • (2006)
    • Baum, K.1
  • 5
    • 79952391851 scopus 로고    scopus 로고
    • Identity theft, 2005. Special Report, NCJ 219411. Washington, DC: Bureau of Justice Statistics. Retrieved December 16, 2010, from., November
    • Baum, K. (2007, November). Identity theft, 2005. Special Report, NCJ 219411. Washington, DC: Bureau of Justice Statistics. Retrieved December 16, 2010, from.
    • (2007)
    • Baum, K.1
  • 8
    • 0346098244 scopus 로고    scopus 로고
    • Do right-to-carry laws deter violent crime
    • Black, D., & Nagin, D. (1998). Do right-to-carry laws deter violent crime? Journal of Legal Studies, 27, 209-219.
    • (1998) Journal of Legal Studies , vol.27 , pp. 209-219
    • Black, D.1    Nagin, D.2
  • 9
    • 79952400782 scopus 로고    scopus 로고
    • Victims of ChoicePoint data breach didn't take advantage of free offers. Network World. Retrieved September 12, 2009, from April 10
    • Brodkin, J. (2007, April 10). Victims of ChoicePoint data breach didn't take advantage of free offers. Network World. Retrieved September 12, 2009, from.
    • (2007)
    • Brodkin, J.1
  • 10
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security, 11, 431-448.
    • (2003) Journal of Computer Security , vol.11 , pp. 431-448
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 11
    • 79952368031 scopus 로고    scopus 로고
    • Another notice isn't answer. USA Today. Retrieved October 15, 2009, from February 27
    • Cate, F. (2005, February 27). Another notice isn't answer. USA Today. Retrieved October 15, 2009, from.
    • (2005)
    • Cate, F.1
  • 12
    • 79952428295 scopus 로고    scopus 로고
    • Comparative approaches to security breaches. Paper presented at the symposium on Security Breach Notification Six Years Later: Lessons Learned about Identity Theft and Directions for the Future, Berkeley Center for Law and Technology, Berkeley, CA. Retrieved December 16, 2010, from., March
    • Cate, F. (2009, March). Comparative approaches to security breaches. Paper presented at the symposium on Security Breach Notification Six Years Later: Lessons Learned about Identity Theft and Directions for the Future, Berkeley Center for Law and Technology, Berkeley, CA. Retrieved December 16, 2010, from.
    • (2009)
    • Cate, F.1
  • 13
    • 7444242205 scopus 로고    scopus 로고
    • The effect of internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers
    • Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce, 9, 70-104.
    • (2004) International Journal of Electronic Commerce , vol.9 , pp. 70-104
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 14
    • 79952393444 scopus 로고    scopus 로고
    • The effects of "shall-issue" concealed-carry licensing laws: A literature review
    • Information brief, Minnesota House of Representatives Research Department, St. Paul, MN.
    • Cleary, J., & Shapiro, E. (1999). The effects of "shall-issue" concealed-carry licensing laws: A literature review. Information brief, Minnesota House of Representatives Research Department, St. Paul, MN.
    • (1999)
    • Cleary, J.1    Shapiro, E.2
  • 15
    • 0004442592 scopus 로고    scopus 로고
    • Empirical research on the deterrent effect of environmental monitoring and enforcement
    • Cohen, M. A. (2000). Empirical research on the deterrent effect of environmental monitoring and enforcement. Environmental Law Reporter, 30, 10245-10252.
    • (2000) Environmental Law Reporter , vol.30 , pp. 10245-10252
    • Cohen, M.A.1
  • 16
    • 0002771313 scopus 로고
    • The demand and supply of criminal opportunities
    • Cook, P. (1986). The demand and supply of criminal opportunities. Crime and Justice, 7, 1-27.
    • (1986) Crime and Justice , vol.7 , pp. 1-27
    • Cook, P.1
  • 17
    • 79952404120 scopus 로고    scopus 로고
    • Public safety through private action: An economic assessment of BIDs, locks, and citizen cooperation. NBER Reporter, 1, Conferences.
    • Cook, P., & MacDonald, J. (2010). Public safety through private action: An economic assessment of BIDs, locks, and citizen cooperation. NBER Reporter, 1, Conferences.
    • (2010)
    • Cook, P.1    Macdonald, J.2
  • 18
    • 79952376890 scopus 로고    scopus 로고
    • Data Breaches and Identity Theft Prepared statement of the Federal Trade Commission before the Committee on Commerce, Science, and Transportation, U.S. Senate, 109th Congress.
    • Data Breaches and Identity Theft. (2005). Prepared statement of the Federal Trade Commission before the Committee on Commerce, Science, and Transportation, U.S. Senate, 109th Congress.
    • (2005)
  • 19
    • 79952394655 scopus 로고    scopus 로고
    • The deterrent effect of capital punishment: Evidence from a "judicial experiment." American Law and Economics Association Annual Meetings. Retrieved December 20, 2010, from.
    • Dezhbakhsh, H., & Shepherd, J. (2004). The deterrent effect of capital punishment: Evidence from a "judicial experiment." American Law and Economics Association Annual Meetings. Retrieved December 20, 2010, from.
    • (2004)
    • Dezhbakhsh, H.1    Shepherd, J.2
  • 20
    • 10844266420 scopus 로고    scopus 로고
    • Guns, crime, and the impact of state right-to-carry laws
    • Donohue, J. (2004). Guns, crime, and the impact of state right-to-carry laws. Fordham Law Review 73, 632-652.
    • (2004) Fordham Law Review , vol.73 , pp. 632-652
    • Donohue, J.1
  • 21
    • 0141543041 scopus 로고    scopus 로고
    • Shooting down the "more guns, less crime" hypothesis
    • Donohue, J., & Ayres, I. (2003). Shooting down the "more guns, less crime" hypothesis. Stanford Law Review, 51, 1193-1312.
    • (2003) Stanford Law Review , vol.51 , pp. 1193-1312
    • Donohue, J.1    Ayres, I.2
  • 22
    • 0036292476 scopus 로고    scopus 로고
    • Identifying unit-dependency and time-specificity in longitudinal analysis: A graphical methodology
    • Dugan, L. (2002). Identifying unit-dependency and time-specificity in longitudinal analysis: A graphical methodology. Journal of Quantitative Criminology, 18, 213-237.
    • (2002) Journal of Quantitative Criminology , vol.18 , pp. 213-237
    • Dugan, L.1
  • 23
    • 4444355305 scopus 로고    scopus 로고
    • FTC identity theft survey report: 2003
    • Federal Trade Commission. Washington, DC: Federal Trade Commission and Synovate.
    • Federal Trade Commission. (2003). FTC identity theft survey report: 2003. Washington, DC: Federal Trade Commission and Synovate.
    • (2003)
  • 24
    • 39349087810 scopus 로고    scopus 로고
    • Consumer fraud and identity theft complaint data: January-December 2006
    • Federal Trade Commission. Washington, DC: Author.
    • Federal Trade Commission. (2007a). Consumer fraud and identity theft complaint data: January-December 2006. Washington, DC: Author.
    • (2007)
  • 25
    • 79952429463 scopus 로고    scopus 로고
    • FTC identity theft survey report: 2006
    • Federal Trade Commission. Washington, DC: Federal Trade Commission and Synovate.
    • Federal Trade Commission. (2007b). FTC identity theft survey report: 2006. Washington, DC: Federal Trade Commission and Synovate.
    • (2007)
  • 26
    • 84928277629 scopus 로고    scopus 로고
    • Full disclosure: The perils of and promise of transparency
    • Cambridge, MA: Cambridge University Press.
    • Fung, A., Graham, M., & Weil, D. (2007). Full disclosure: The perils of and promise of transparency. Cambridge, MA: Cambridge University Press.
    • (2007)
    • Fung, A.1    Graham, M.2    Weil, D.3
  • 27
    • 79952425381 scopus 로고    scopus 로고
    • Identity theft: How it happens, its impact on victims, and legislative solutions. Written testimony for the U.S. Senate Judiciary Subcommittee on Technology, Terrorism, and Government Information, 109th Congress.
    • Givens, B. (2000). Identity theft: How it happens, its impact on victims, and legislative solutions. Written testimony for the U.S. Senate Judiciary Subcommittee on Technology, Terrorism, and Government Information, 109th Congress.
    • (2000)
    • Givens, B.1
  • 28
    • 70349274744 scopus 로고    scopus 로고
    • Identity fraud trends and patterns: Building a data-based foundation for proactive enforcement
    • Utica, NY: Center for Identity Management and Information Protection (CIMIP), Utica College.
    • Gordon, G. R., Rebovich, D. J., Choo, K., & Gordon, J. B. (2007). Identity fraud trends and patterns: Building a data-based foundation for proactive enforcement. Utica, NY: Center for Identity Management and Information Protection (CIMIP), Utica College.
    • (2007)
    • Gordon, G.R.1    Rebovich, D.J.2    Choo, K.3    Gordon, J.B.4
  • 30
    • 79952384832 scopus 로고    scopus 로고
    • Data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown
    • Government Accountability Office. GAO publication GAO-07-737. Washington, DC: Author.
    • Government Accountability Office. (2007). Data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown. GAO publication GAO-07-737. Washington, DC: Author.
    • (2007)
  • 31
    • 79952432128 scopus 로고    scopus 로고
    • H.B. 732, 59th Legislature, State of Montana. (enacted). Retrieved December 16, 2010, from.
    • H.B. 732, 59th Legislature, State of Montana. (2005) (enacted). Retrieved December 16, 2010, from.
    • (2005)
  • 32
    • 67650362253 scopus 로고    scopus 로고
    • Identity theft: Making the known unknowns known
    • Hoofnagle, C. J. (2007). Identity theft: Making the known unknowns known. Harvard Journal of Law and Technology, 21, 97-122.
    • (2007) Harvard Journal of Law and Technology , vol.21 , pp. 97-122
    • Hoofnagle, C.J.1
  • 33
    • 79952372250 scopus 로고    scopus 로고
    • Identity Theft: Recent Developments Involving the Security of Sensitive Consumer Information Hearing before the Committee on Banking, Housing, and Urban Affairs, Senate, 109th Congress.
    • Identity Theft: Recent Developments Involving the Security of Sensitive Consumer Information. (2005). Hearing before the Committee on Banking, Housing, and Urban Affairs, Senate, 109th Congress.
    • (2005)
  • 34
    • 79952368400 scopus 로고    scopus 로고
    • Illinois House Transcript 94th General Assembly, Regular Session, 38th Legislative Day. April 12
    • Illinois House Transcript. (2005, April 12). 94th General Assembly, Regular Session, 38th Legislative Day.
    • (2005)
  • 35
    • 43949118852 scopus 로고    scopus 로고
    • Identity fraud survey report: 2006
    • Javelin Research. Pleasanton, CA: Author., January
    • Javelin Research. (2006, January). Identity fraud survey report: 2006. Pleasanton, CA: Author.
    • (2006)
  • 36
    • 84892221422 scopus 로고    scopus 로고
    • Identity fraud survey report: 2007
    • Javelin Research. Pleasanton, CA: Author., February
    • Javelin Research. (2007, February). Identity fraud survey report: 2007. Pleasanton, CA: Author.
    • (2007)
  • 37
    • 79551532513 scopus 로고    scopus 로고
    • 2010 Identity fraud survey report: Identity fraud continues to rise-new accounts fraud drives increase; consumer costs at an all time low
    • Javelin Research. Pleasanton, CA: Author., February
    • Javelin Research. (2010, February). 2010 Identity fraud survey report: Identity fraud continues to rise-new accounts fraud drives increase; consumer costs at an all time low. Pleasanton, CA: Author.
    • (2010)
  • 38
    • 0037677802 scopus 로고    scopus 로고
    • The effect of information on product quality: Evidence from restaurant hygiene grade cards
    • Jin, G. Z., & Leslie, P. (2003). The effect of information on product quality: Evidence from restaurant hygiene grade cards. Quarterly Journal of Economics, 118, 409-451.
    • (2003) Quarterly Journal of Economics , vol.118 , pp. 409-451
    • Jin, G.Z.1    Leslie, P.2
  • 39
    • 33745595609 scopus 로고    scopus 로고
    • Beyond logit and probit: Cox duration models of single, repeating, and competing events for state policy adoption
    • Jones, B. S., & Branton, R. P. (2005). Beyond logit and probit: Cox duration models of single, repeating, and competing events for state policy adoption. State Politics and Policy Quarterly, 5, 420-443.
    • (2005) State Politics and Policy Quarterly , vol.5 , pp. 420-443
    • Jones, B.S.1    Branton, R.P.2
  • 40
    • 79952369196 scopus 로고    scopus 로고
    • TJX reports soaring profits one year after breach disclosure. SC Magazine. Retrieved October 20, 2009, from., February 20
    • Kaplan, D. (2008, February 20). TJX reports soaring profits one year after breach disclosure. SC Magazine. Retrieved October 20, 2009, from.
    • (2008)
    • Kaplan, D.1
  • 41
    • 70249137560 scopus 로고    scopus 로고
    • The impact of information security breaches on financial performance of the breached firms: An empirical investigation
    • Ko, M., & Dorantes, C. (2006). The impact of information security breaches on financial performance of the breached firms: An empirical investigation. Journal of Information Technology Management, 17, 13-22.
    • (2006) Journal of Information Technology Management , vol.17 , pp. 13-22
    • Ko, M.1    Dorantes, C.2
  • 42
    • 79952365331 scopus 로고    scopus 로고
    • An economic analysis of the private and social costs of the provision of cybersecurity and other public security goods. George Mason University School of Law Working Papers Series.
    • Kobayashi, B. (2005). An economic analysis of the private and social costs of the provision of cybersecurity and other public security goods. George Mason University School of Law Working Papers Series.
    • (2005)
    • Kobayashi, B.1
  • 43
    • 0000274841 scopus 로고
    • Ex post liability for harm vs. ex ante safety regulation: Substitutes or complements
    • Kolstad, C., Ulen, T., & Johnson, G. (1990). Ex post liability for harm vs. ex ante safety regulation: Substitutes or complements? American Economic Review, 80, 888-901.
    • (1990) American Economic Review , vol.80 , pp. 888-901
    • Kolstad, C.1    Ulen, T.2    Johnson, G.3
  • 44
    • 79952407987 scopus 로고    scopus 로고
    • Slow down on data security legislation. Progress Snapshot 1.9
    • Washington, DC: Progress & Freedom Foundation.
    • Lenard, T. M., & Rubin, P. H. (2005). Slow down on data security legislation. Progress Snapshot 1.9. Washington, DC: Progress & Freedom Foundation.
    • (2005)
    • Lenard, T.M.1    Rubin, P.H.2
  • 45
    • 61449168597 scopus 로고    scopus 로고
    • Much ado about notification
    • Lenard, T. M., & Rubin, P. H. (2006). Much ado about notification. Regulation, 29, 44-50.
    • (2006) Regulation , vol.29 , pp. 44-50
    • Lenard, T.M.1    Rubin, P.H.2
  • 47
    • 0038954679 scopus 로고    scopus 로고
    • Crime, deterrence and the right-to-carry concealed handguns
    • Lott, J. R., Jr., & Mustard, D. B. (1997). Crime, deterrence and the right-to-carry concealed handguns. Journal of Legal Studies, 26, 1-68.
    • (1997) Journal of Legal Studies , vol.26 , pp. 1-68
    • Lott Jr, J.R.1    Mustard, D.B.2
  • 48
    • 0004235595 scopus 로고
    • Informational approaches to regulation
    • Cambridge, MA: MIT Press.
    • Magat, W. A., & Viscusi, W. K. (1992). Informational approaches to regulation. Cambridge, MA: MIT Press.
    • (1992)
    • Magat, W.A.1    Viscusi, W.K.2
  • 49
    • 0034353982 scopus 로고    scopus 로고
    • The impact of mandatory disclosure laws on product choices: An analysis of the salad dressing market
    • Mathios, A. (2000). The impact of mandatory disclosure laws on product choices: An analysis of the salad dressing market. Journal of Law and Economics, 43, 651-677.
    • (2000) Journal of Law and Economics , vol.43 , pp. 651-677
    • Mathios, A.1
  • 50
    • 79952393850 scopus 로고    scopus 로고
    • Michigan Senate Journal Regular Session No. 106.
    • Michigan Senate Journal. (2005). Regular Session No. 106.
    • (2005)
  • 51
    • 79952379162 scopus 로고    scopus 로고
    • Minnesota Commerce Committee Update. (2006, April 3). Minnesota Senate Committee on Commerce, Eighty-Fourth Legislature.
    • Minnesota Commerce Committee (2006) Update. (2006, April 3). Minnesota Senate Committee on Commerce, Eighty-Fourth Legislature.
    • (2006)
  • 52
    • 1342311439 scopus 로고    scopus 로고
    • Getting off death row: Commuted sentences and the deterrent effect of capital punishment
    • Mocan, H. N., & Gittings, K. (2003). Getting off death row: Commuted sentences and the deterrent effect of capital punishment. Journal of Law and Economics, 46, 453-478.
    • (2003) Journal of Law and Economics , vol.46 , pp. 453-478
    • Mocan, H.N.1    Gittings, K.2
  • 53
    • 79952381135 scopus 로고    scopus 로고
    • LexisNexis parent set to buy ChoicePoint. Washington Post. Retrieved November 1, 2009, from, February 22
    • Nakashima, E., & O'Harrow, R., Jr.. (2008, February 22). LexisNexis parent set to buy ChoicePoint. Washington Post. Retrieved November 1, 2009, from.
    • (2008)
    • Nakashima, E.1    O'Harrow Jr, R.2
  • 54
    • 79952422593 scopus 로고    scopus 로고
    • Learning the game: How the legislative process works
    • Washington, DC: National Conference of State Legislatures.
    • Neal, T. (2005). Learning the game: How the legislative process works. Washington, DC: National Conference of State Legislatures.
    • (2005)
    • Neal, T.1
  • 55
    • 79952423298 scopus 로고    scopus 로고
    • Personal Internet Security House of Lords, Science and Technology Committee, 5th Report of Session 2006-07, HL Paper 165-I.
    • Personal Internet Security. (2007). House of Lords, Science and Technology Committee, 5th Report of Session 2006-07, HL Paper 165-I.
    • (2007)
  • 56
    • 79952425380 scopus 로고    scopus 로고
    • National survey on data security breach notification
    • Ponemon Institute. Traverse City, MI: Author., September
    • Ponemon Institute. (2005, September). National survey on data security breach notification. Traverse City, MI: Author.
    • (2005)
  • 57
    • 78650708511 scopus 로고    scopus 로고
    • Consumers' report card on data breach notification
    • Ponemon Institute. Traverse City, MI: Author., March
    • Ponemon Institute. (2008, March). Consumers' report card on data breach notification. Traverse City, MI: Author.
    • (2008)
  • 58
    • 79952396360 scopus 로고    scopus 로고
    • Data breach laws make companies serious about security. Retrieved September 7, 2009, from., September 3
    • Ranger, S. (2007, September 3). Data breach laws make companies serious about security. Retrieved September 7, 2009, from.
    • (2007)
    • Ranger, S.1
  • 59
    • 55549118277 scopus 로고    scopus 로고
    • The role of deterrence in the formulation of criminal law rules: At its worst when doing its best
    • Robinson, P. H., & Darley, J. M., (2003). The role of deterrence in the formulation of criminal law rules: At its worst when doing its best. Georgetown Law Journal, 91, 949-1002.
    • (2003) Georgetown Law Journal , vol.91 , pp. 949-1002
    • Robinson, P.H.1    Darley, J.M.2
  • 61
    • 79952437669 scopus 로고    scopus 로고
    • Samuelson Law, Technology, amp; Public Policy Clinic Security breach notification laws: Views from chief security officers. Unpublished manuscript, University of California-Berkeley School of Law.
    • Samuelson Law, Technology, & Public Policy Clinic. (2007). Security breach notification laws: Views from chief security officers. Unpublished manuscript, University of California-Berkeley School of Law.
    • (2007)
  • 62
    • 79952395565 scopus 로고    scopus 로고
    • SB 1386: Bill analysis. Retrieved December 16, 2010, from.
    • Saskia, K. (2002). SB 1386: Bill analysis. Retrieved December 16, 2010, from.
    • (2002)
    • Saskia, K.1
  • 63
    • 79952380745 scopus 로고    scopus 로고
    • S.B. 2290 23d Legislature, State of Hawaii (enacted). Retrieved December 16, 2010, from.
    • S.B. 2290. (2006). 23d Legislature, State of Hawaii (enacted). Retrieved December 16, 2010, from.
    • (2006)
  • 64
    • 79952427945 scopus 로고    scopus 로고
    • Securing Consumers' Data: Options Following Security Breaches Hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, 109th Congress.
    • Securing Consumers' Data: Options Following Security Breaches. (2005). Hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, 109th Congress.
    • (2005)
  • 65
    • 79952369595 scopus 로고    scopus 로고
    • Securing Electronic Personal Data: Striking a Balance Between Privacy and Commercial and Governmental Use Hearing before the Committee on the Judiciary, Senate, 109th Congress.
    • Securing Electronic Personal Data: Striking a Balance Between Privacy and Commercial and Governmental Use. (2005). Hearing before the Committee on the Judiciary, Senate, 109th Congress.
    • (2005)
  • 66
    • 79952383341 scopus 로고    scopus 로고
    • Securities and Exchange Commission Part 248-Regulation s-p: Privacy of consumer financial information and safeguarding personal information; proposed rule. Retrieved November 11, 2008, from.
    • Securities and Exchange Commission. (2008). Part 248-Regulation s-p: Privacy of consumer financial information and safeguarding personal information; proposed rule. Retrieved November 11, 2008, from.
    • (2008)
  • 67
    • 33947536241 scopus 로고    scopus 로고
    • Notification of data security breaches
    • Schwartz, P., & Janger, E. (2007). Notification of data security breaches. Michigan Law Review, 105, 913-984.
    • (2007) Michigan Law Review , vol.105 , pp. 913-984
    • Schwartz, P.1    Janger, E.2
  • 68
    • 0000447575 scopus 로고
    • A model of the optimal use of liability and safety regulation
    • Shavell, S. (1984). A model of the optimal use of liability and safety regulation. RAND Journal of Economics, 15, 271-280.
    • (1984) RAND Journal of Economics , vol.15 , pp. 271-280
    • Shavell, S.1
  • 69
    • 0000941631 scopus 로고
    • Individual precautions to prevent theft: Private versus socially optimal behavior
    • Shavell, S. (1991). Individual precautions to prevent theft: Private versus socially optimal behavior. International Review of Law and Economics, 11, 123-132.
    • (1991) International Review of Law and Economics , vol.11 , pp. 123-132
    • Shavell, S.1
  • 70
    • 79952397143 scopus 로고    scopus 로고
    • How a bill becomes a law, really
    • Simitian, J. (2009a). How a bill becomes a law, really. Berkeley Technology Law Journal, 24, 1009-1017.
    • (2009) Berkeley Technology Law Journal , vol.24 , pp. 1009-1017
    • Simitian, J.1
  • 71
    • 79952365709 scopus 로고    scopus 로고
    • How a bill becomes a law, really. David Nelson Memorial Keynote Address at the symposium on Security Breach Notification Six Years Later: Lessons Learned about Identity Theft and Directions for the Future, Berkeley Center for Law & Technology, Berkeley, CA. Retrieved December 16, 2010, from, March
    • Simitian, J. (2009b, March). How a bill becomes a law, really. David Nelson Memorial Keynote Address at the symposium on Security Breach Notification Six Years Later: Lessons Learned about Identity Theft and Directions for the Future, Berkeley Center for Law & Technology, Berkeley, CA. Retrieved December 16, 2010, from.
    • (2009)
    • Simitian, J.1
  • 72
    • 0010134846 scopus 로고    scopus 로고
    • Understanding state constitutions
    • Princeton, NJ: Princeton University Press.
    • Tarr, G. A. (2000). Understanding state constitutions. Princeton, NJ: Princeton University Press.
    • (2000)
    • Tarr, G.A.1
  • 73
    • 34547100991 scopus 로고    scopus 로고
    • An empirical analysis of the impact of software vulnerability announcements on firm stock price
    • Telang, R., & Wattal, S. (2007). An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering, 33, 544-557.
    • (2007) IEEE Transactions on Software Engineering , vol.33 , pp. 544-557
    • Telang, R.1    Wattal, S.2
  • 74
    • 79952379161 scopus 로고    scopus 로고
    • ChoicePoint to pay $10M to settle breach-related lawsuit. Network World. Retrieved November 1, 2009, from, January 29
    • Vijayan, J. (2008, January 29). ChoicePoint to pay $10M to settle breach-related lawsuit. Network World. Retrieved November 1, 2009, from.
    • (2008)
    • Vijayan, J.1
  • 75
    • 0346225372 scopus 로고
    • The diffusion of innovations among the American states
    • Walker, J. (1969). The diffusion of innovations among the American states. American Political Science Review, 63, 880-899.
    • (1969) American Political Science Review , vol.63 , pp. 880-899
    • Walker, J.1
  • 76
    • 77950789542 scopus 로고    scopus 로고
    • Uses and abuses of empirical evidence in the death penalty debate
    • CEPR Discussion Paper No. 5493. London: CEPR.
    • Wolfers, J., & Donohue, J. J. (2006). Uses and abuses of empirical evidence in the death penalty debate. CEPR Discussion Paper No. 5493. London: CEPR.
    • (2006)
    • Wolfers, J.1    Donohue, J.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.