-
1
-
-
79952411544
-
-
June, Is there a cost to privacy breaches? An event study. Paper presented at the Fifth Workshop on the Economics of Information Security, University of Cambridge, England.
-
Acquisti, A., Friedman, A., & Telang, R. (2006, June). Is there a cost to privacy breaches? An event study. Paper presented at the Fifth Workshop on the Economics of Information Security, University of Cambridge, England.
-
(2006)
-
-
Acquisti, A.1
Friedman, A.2
Telang, R.3
-
2
-
-
79952405840
-
-
Assessing data security: Preventing breaches and protecting sensitive information Hearing before the Committee on Financial Services, House of Representatives, 109th Congress.
-
Assessing data security: Preventing breaches and protecting sensitive information. (2005). Hearing before the Committee on Financial Services, House of Representatives, 109th Congress.
-
(2005)
-
-
-
3
-
-
0040679785
-
Measuring positive externalities from unobservable victim precautions: An empirical analysis of lojack
-
Ayres, I., & Levitt, S. (1998). Measuring positive externalities from unobservable victim precautions: An empirical analysis of lojack. Quarterly Journal of Economics, 113, 43-77.
-
(1998)
Quarterly Journal of Economics
, vol.113
, pp. 43-77
-
-
Ayres, I.1
Levitt, S.2
-
4
-
-
79952431012
-
-
Identity theft, 2004. Special Report NCJ 212213. Washington, DC: Bureau of Justice Statistics. Retrieved December 16, 2010, from April
-
Baum, K. (2006, April). Identity theft, 2004. Special Report NCJ 212213. Washington, DC: Bureau of Justice Statistics. Retrieved December 16, 2010, from.
-
(2006)
-
-
Baum, K.1
-
5
-
-
79952391851
-
-
Identity theft, 2005. Special Report, NCJ 219411. Washington, DC: Bureau of Justice Statistics. Retrieved December 16, 2010, from., November
-
Baum, K. (2007, November). Identity theft, 2005. Special Report, NCJ 219411. Washington, DC: Bureau of Justice Statistics. Retrieved December 16, 2010, from.
-
(2007)
-
-
Baum, K.1
-
6
-
-
0344895869
-
How much should we trust differences-in-differences estimates
-
Bertrand, M., Duflo, E., & Mullainathan, S. (2004). How much should we trust differences-in-differences estimates? Quarterly Journal of Economics, 119, 249-275.
-
(2004)
Quarterly Journal of Economics
, vol.119
, pp. 249-275
-
-
Bertrand, M.1
Duflo, E.2
Mullainathan, S.3
-
7
-
-
0002239009
-
On exploring the "dark figure" of crime
-
Biderman, A. D., & Reiss, A. J., Jr. (1967). On exploring the "dark figure" of crime. Annals of the American Academy of Political and Social Science, 374, 1-15.
-
(1967)
Annals of the American Academy of Political and Social Science
, vol.374
, pp. 1-15
-
-
Biderman, A.D.1
Reiss Jr, A.J.2
-
8
-
-
0346098244
-
Do right-to-carry laws deter violent crime
-
Black, D., & Nagin, D. (1998). Do right-to-carry laws deter violent crime? Journal of Legal Studies, 27, 209-219.
-
(1998)
Journal of Legal Studies
, vol.27
, pp. 209-219
-
-
Black, D.1
Nagin, D.2
-
9
-
-
79952400782
-
-
Victims of ChoicePoint data breach didn't take advantage of free offers. Network World. Retrieved September 12, 2009, from April 10
-
Brodkin, J. (2007, April 10). Victims of ChoicePoint data breach didn't take advantage of free offers. Network World. Retrieved September 12, 2009, from.
-
(2007)
-
-
Brodkin, J.1
-
10
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security, 11, 431-448.
-
(2003)
Journal of Computer Security
, vol.11
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
11
-
-
79952368031
-
-
Another notice isn't answer. USA Today. Retrieved October 15, 2009, from February 27
-
Cate, F. (2005, February 27). Another notice isn't answer. USA Today. Retrieved October 15, 2009, from.
-
(2005)
-
-
Cate, F.1
-
12
-
-
79952428295
-
-
Comparative approaches to security breaches. Paper presented at the symposium on Security Breach Notification Six Years Later: Lessons Learned about Identity Theft and Directions for the Future, Berkeley Center for Law and Technology, Berkeley, CA. Retrieved December 16, 2010, from., March
-
Cate, F. (2009, March). Comparative approaches to security breaches. Paper presented at the symposium on Security Breach Notification Six Years Later: Lessons Learned about Identity Theft and Directions for the Future, Berkeley Center for Law and Technology, Berkeley, CA. Retrieved December 16, 2010, from.
-
(2009)
-
-
Cate, F.1
-
13
-
-
7444242205
-
The effect of internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers
-
Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce, 9, 70-104.
-
(2004)
International Journal of Electronic Commerce
, vol.9
, pp. 70-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
14
-
-
79952393444
-
The effects of "shall-issue" concealed-carry licensing laws: A literature review
-
Information brief, Minnesota House of Representatives Research Department, St. Paul, MN.
-
Cleary, J., & Shapiro, E. (1999). The effects of "shall-issue" concealed-carry licensing laws: A literature review. Information brief, Minnesota House of Representatives Research Department, St. Paul, MN.
-
(1999)
-
-
Cleary, J.1
Shapiro, E.2
-
15
-
-
0004442592
-
Empirical research on the deterrent effect of environmental monitoring and enforcement
-
Cohen, M. A. (2000). Empirical research on the deterrent effect of environmental monitoring and enforcement. Environmental Law Reporter, 30, 10245-10252.
-
(2000)
Environmental Law Reporter
, vol.30
, pp. 10245-10252
-
-
Cohen, M.A.1
-
16
-
-
0002771313
-
The demand and supply of criminal opportunities
-
Cook, P. (1986). The demand and supply of criminal opportunities. Crime and Justice, 7, 1-27.
-
(1986)
Crime and Justice
, vol.7
, pp. 1-27
-
-
Cook, P.1
-
17
-
-
79952404120
-
-
Public safety through private action: An economic assessment of BIDs, locks, and citizen cooperation. NBER Reporter, 1, Conferences.
-
Cook, P., & MacDonald, J. (2010). Public safety through private action: An economic assessment of BIDs, locks, and citizen cooperation. NBER Reporter, 1, Conferences.
-
(2010)
-
-
Cook, P.1
Macdonald, J.2
-
18
-
-
79952376890
-
-
Data Breaches and Identity Theft Prepared statement of the Federal Trade Commission before the Committee on Commerce, Science, and Transportation, U.S. Senate, 109th Congress.
-
Data Breaches and Identity Theft. (2005). Prepared statement of the Federal Trade Commission before the Committee on Commerce, Science, and Transportation, U.S. Senate, 109th Congress.
-
(2005)
-
-
-
19
-
-
79952394655
-
-
The deterrent effect of capital punishment: Evidence from a "judicial experiment." American Law and Economics Association Annual Meetings. Retrieved December 20, 2010, from.
-
Dezhbakhsh, H., & Shepherd, J. (2004). The deterrent effect of capital punishment: Evidence from a "judicial experiment." American Law and Economics Association Annual Meetings. Retrieved December 20, 2010, from.
-
(2004)
-
-
Dezhbakhsh, H.1
Shepherd, J.2
-
20
-
-
10844266420
-
Guns, crime, and the impact of state right-to-carry laws
-
Donohue, J. (2004). Guns, crime, and the impact of state right-to-carry laws. Fordham Law Review 73, 632-652.
-
(2004)
Fordham Law Review
, vol.73
, pp. 632-652
-
-
Donohue, J.1
-
21
-
-
0141543041
-
Shooting down the "more guns, less crime" hypothesis
-
Donohue, J., & Ayres, I. (2003). Shooting down the "more guns, less crime" hypothesis. Stanford Law Review, 51, 1193-1312.
-
(2003)
Stanford Law Review
, vol.51
, pp. 1193-1312
-
-
Donohue, J.1
Ayres, I.2
-
22
-
-
0036292476
-
Identifying unit-dependency and time-specificity in longitudinal analysis: A graphical methodology
-
Dugan, L. (2002). Identifying unit-dependency and time-specificity in longitudinal analysis: A graphical methodology. Journal of Quantitative Criminology, 18, 213-237.
-
(2002)
Journal of Quantitative Criminology
, vol.18
, pp. 213-237
-
-
Dugan, L.1
-
23
-
-
4444355305
-
FTC identity theft survey report: 2003
-
Federal Trade Commission. Washington, DC: Federal Trade Commission and Synovate.
-
Federal Trade Commission. (2003). FTC identity theft survey report: 2003. Washington, DC: Federal Trade Commission and Synovate.
-
(2003)
-
-
-
24
-
-
39349087810
-
Consumer fraud and identity theft complaint data: January-December 2006
-
Federal Trade Commission. Washington, DC: Author.
-
Federal Trade Commission. (2007a). Consumer fraud and identity theft complaint data: January-December 2006. Washington, DC: Author.
-
(2007)
-
-
-
25
-
-
79952429463
-
FTC identity theft survey report: 2006
-
Federal Trade Commission. Washington, DC: Federal Trade Commission and Synovate.
-
Federal Trade Commission. (2007b). FTC identity theft survey report: 2006. Washington, DC: Federal Trade Commission and Synovate.
-
(2007)
-
-
-
26
-
-
84928277629
-
Full disclosure: The perils of and promise of transparency
-
Cambridge, MA: Cambridge University Press.
-
Fung, A., Graham, M., & Weil, D. (2007). Full disclosure: The perils of and promise of transparency. Cambridge, MA: Cambridge University Press.
-
(2007)
-
-
Fung, A.1
Graham, M.2
Weil, D.3
-
27
-
-
79952425381
-
-
Identity theft: How it happens, its impact on victims, and legislative solutions. Written testimony for the U.S. Senate Judiciary Subcommittee on Technology, Terrorism, and Government Information, 109th Congress.
-
Givens, B. (2000). Identity theft: How it happens, its impact on victims, and legislative solutions. Written testimony for the U.S. Senate Judiciary Subcommittee on Technology, Terrorism, and Government Information, 109th Congress.
-
(2000)
-
-
Givens, B.1
-
28
-
-
70349274744
-
Identity fraud trends and patterns: Building a data-based foundation for proactive enforcement
-
Utica, NY: Center for Identity Management and Information Protection (CIMIP), Utica College.
-
Gordon, G. R., Rebovich, D. J., Choo, K., & Gordon, J. B. (2007). Identity fraud trends and patterns: Building a data-based foundation for proactive enforcement. Utica, NY: Center for Identity Management and Information Protection (CIMIP), Utica College.
-
(2007)
-
-
Gordon, G.R.1
Rebovich, D.J.2
Choo, K.3
Gordon, J.B.4
-
30
-
-
79952384832
-
Data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown
-
Government Accountability Office. GAO publication GAO-07-737. Washington, DC: Author.
-
Government Accountability Office. (2007). Data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown. GAO publication GAO-07-737. Washington, DC: Author.
-
(2007)
-
-
-
31
-
-
79952432128
-
-
H.B. 732, 59th Legislature, State of Montana. (enacted). Retrieved December 16, 2010, from.
-
H.B. 732, 59th Legislature, State of Montana. (2005) (enacted). Retrieved December 16, 2010, from.
-
(2005)
-
-
-
32
-
-
67650362253
-
Identity theft: Making the known unknowns known
-
Hoofnagle, C. J. (2007). Identity theft: Making the known unknowns known. Harvard Journal of Law and Technology, 21, 97-122.
-
(2007)
Harvard Journal of Law and Technology
, vol.21
, pp. 97-122
-
-
Hoofnagle, C.J.1
-
33
-
-
79952372250
-
-
Identity Theft: Recent Developments Involving the Security of Sensitive Consumer Information Hearing before the Committee on Banking, Housing, and Urban Affairs, Senate, 109th Congress.
-
Identity Theft: Recent Developments Involving the Security of Sensitive Consumer Information. (2005). Hearing before the Committee on Banking, Housing, and Urban Affairs, Senate, 109th Congress.
-
(2005)
-
-
-
34
-
-
79952368400
-
-
Illinois House Transcript 94th General Assembly, Regular Session, 38th Legislative Day. April 12
-
Illinois House Transcript. (2005, April 12). 94th General Assembly, Regular Session, 38th Legislative Day.
-
(2005)
-
-
-
35
-
-
43949118852
-
Identity fraud survey report: 2006
-
Javelin Research. Pleasanton, CA: Author., January
-
Javelin Research. (2006, January). Identity fraud survey report: 2006. Pleasanton, CA: Author.
-
(2006)
-
-
-
36
-
-
84892221422
-
Identity fraud survey report: 2007
-
Javelin Research. Pleasanton, CA: Author., February
-
Javelin Research. (2007, February). Identity fraud survey report: 2007. Pleasanton, CA: Author.
-
(2007)
-
-
-
37
-
-
79551532513
-
2010 Identity fraud survey report: Identity fraud continues to rise-new accounts fraud drives increase; consumer costs at an all time low
-
Javelin Research. Pleasanton, CA: Author., February
-
Javelin Research. (2010, February). 2010 Identity fraud survey report: Identity fraud continues to rise-new accounts fraud drives increase; consumer costs at an all time low. Pleasanton, CA: Author.
-
(2010)
-
-
-
38
-
-
0037677802
-
The effect of information on product quality: Evidence from restaurant hygiene grade cards
-
Jin, G. Z., & Leslie, P. (2003). The effect of information on product quality: Evidence from restaurant hygiene grade cards. Quarterly Journal of Economics, 118, 409-451.
-
(2003)
Quarterly Journal of Economics
, vol.118
, pp. 409-451
-
-
Jin, G.Z.1
Leslie, P.2
-
39
-
-
33745595609
-
Beyond logit and probit: Cox duration models of single, repeating, and competing events for state policy adoption
-
Jones, B. S., & Branton, R. P. (2005). Beyond logit and probit: Cox duration models of single, repeating, and competing events for state policy adoption. State Politics and Policy Quarterly, 5, 420-443.
-
(2005)
State Politics and Policy Quarterly
, vol.5
, pp. 420-443
-
-
Jones, B.S.1
Branton, R.P.2
-
40
-
-
79952369196
-
-
TJX reports soaring profits one year after breach disclosure. SC Magazine. Retrieved October 20, 2009, from., February 20
-
Kaplan, D. (2008, February 20). TJX reports soaring profits one year after breach disclosure. SC Magazine. Retrieved October 20, 2009, from.
-
(2008)
-
-
Kaplan, D.1
-
41
-
-
70249137560
-
The impact of information security breaches on financial performance of the breached firms: An empirical investigation
-
Ko, M., & Dorantes, C. (2006). The impact of information security breaches on financial performance of the breached firms: An empirical investigation. Journal of Information Technology Management, 17, 13-22.
-
(2006)
Journal of Information Technology Management
, vol.17
, pp. 13-22
-
-
Ko, M.1
Dorantes, C.2
-
42
-
-
79952365331
-
-
An economic analysis of the private and social costs of the provision of cybersecurity and other public security goods. George Mason University School of Law Working Papers Series.
-
Kobayashi, B. (2005). An economic analysis of the private and social costs of the provision of cybersecurity and other public security goods. George Mason University School of Law Working Papers Series.
-
(2005)
-
-
Kobayashi, B.1
-
43
-
-
0000274841
-
Ex post liability for harm vs. ex ante safety regulation: Substitutes or complements
-
Kolstad, C., Ulen, T., & Johnson, G. (1990). Ex post liability for harm vs. ex ante safety regulation: Substitutes or complements? American Economic Review, 80, 888-901.
-
(1990)
American Economic Review
, vol.80
, pp. 888-901
-
-
Kolstad, C.1
Ulen, T.2
Johnson, G.3
-
44
-
-
79952407987
-
Slow down on data security legislation. Progress Snapshot 1.9
-
Washington, DC: Progress & Freedom Foundation.
-
Lenard, T. M., & Rubin, P. H. (2005). Slow down on data security legislation. Progress Snapshot 1.9. Washington, DC: Progress & Freedom Foundation.
-
(2005)
-
-
Lenard, T.M.1
Rubin, P.H.2
-
45
-
-
61449168597
-
Much ado about notification
-
Lenard, T. M., & Rubin, P. H. (2006). Much ado about notification. Regulation, 29, 44-50.
-
(2006)
Regulation
, vol.29
, pp. 44-50
-
-
Lenard, T.M.1
Rubin, P.H.2
-
46
-
-
79952387351
-
The behavioral foundations of policy
-
(in press). In E. Shafir (Ed.), Princeton, NJ: Princeton University Press.
-
Loewenstein, G., John, L., & Volpp, K. (in press). Using decision errors to help people help themselves. In E. Shafir (Ed.), The behavioral foundations of policy. Princeton, NJ: Princeton University Press.
-
Using decision errors to help people help themselves
-
-
Loewenstein, G.1
John, L.2
Volpp, K.3
-
47
-
-
0038954679
-
Crime, deterrence and the right-to-carry concealed handguns
-
Lott, J. R., Jr., & Mustard, D. B. (1997). Crime, deterrence and the right-to-carry concealed handguns. Journal of Legal Studies, 26, 1-68.
-
(1997)
Journal of Legal Studies
, vol.26
, pp. 1-68
-
-
Lott Jr, J.R.1
Mustard, D.B.2
-
48
-
-
0004235595
-
Informational approaches to regulation
-
Cambridge, MA: MIT Press.
-
Magat, W. A., & Viscusi, W. K. (1992). Informational approaches to regulation. Cambridge, MA: MIT Press.
-
(1992)
-
-
Magat, W.A.1
Viscusi, W.K.2
-
49
-
-
0034353982
-
The impact of mandatory disclosure laws on product choices: An analysis of the salad dressing market
-
Mathios, A. (2000). The impact of mandatory disclosure laws on product choices: An analysis of the salad dressing market. Journal of Law and Economics, 43, 651-677.
-
(2000)
Journal of Law and Economics
, vol.43
, pp. 651-677
-
-
Mathios, A.1
-
50
-
-
79952393850
-
-
Michigan Senate Journal Regular Session No. 106.
-
Michigan Senate Journal. (2005). Regular Session No. 106.
-
(2005)
-
-
-
51
-
-
79952379162
-
-
Minnesota Commerce Committee Update. (2006, April 3). Minnesota Senate Committee on Commerce, Eighty-Fourth Legislature.
-
Minnesota Commerce Committee (2006) Update. (2006, April 3). Minnesota Senate Committee on Commerce, Eighty-Fourth Legislature.
-
(2006)
-
-
-
52
-
-
1342311439
-
Getting off death row: Commuted sentences and the deterrent effect of capital punishment
-
Mocan, H. N., & Gittings, K. (2003). Getting off death row: Commuted sentences and the deterrent effect of capital punishment. Journal of Law and Economics, 46, 453-478.
-
(2003)
Journal of Law and Economics
, vol.46
, pp. 453-478
-
-
Mocan, H.N.1
Gittings, K.2
-
53
-
-
79952381135
-
-
LexisNexis parent set to buy ChoicePoint. Washington Post. Retrieved November 1, 2009, from, February 22
-
Nakashima, E., & O'Harrow, R., Jr.. (2008, February 22). LexisNexis parent set to buy ChoicePoint. Washington Post. Retrieved November 1, 2009, from.
-
(2008)
-
-
Nakashima, E.1
O'Harrow Jr, R.2
-
54
-
-
79952422593
-
Learning the game: How the legislative process works
-
Washington, DC: National Conference of State Legislatures.
-
Neal, T. (2005). Learning the game: How the legislative process works. Washington, DC: National Conference of State Legislatures.
-
(2005)
-
-
Neal, T.1
-
55
-
-
79952423298
-
-
Personal Internet Security House of Lords, Science and Technology Committee, 5th Report of Session 2006-07, HL Paper 165-I.
-
Personal Internet Security. (2007). House of Lords, Science and Technology Committee, 5th Report of Session 2006-07, HL Paper 165-I.
-
(2007)
-
-
-
56
-
-
79952425380
-
National survey on data security breach notification
-
Ponemon Institute. Traverse City, MI: Author., September
-
Ponemon Institute. (2005, September). National survey on data security breach notification. Traverse City, MI: Author.
-
(2005)
-
-
-
57
-
-
78650708511
-
Consumers' report card on data breach notification
-
Ponemon Institute. Traverse City, MI: Author., March
-
Ponemon Institute. (2008, March). Consumers' report card on data breach notification. Traverse City, MI: Author.
-
(2008)
-
-
-
58
-
-
79952396360
-
-
Data breach laws make companies serious about security. Retrieved September 7, 2009, from., September 3
-
Ranger, S. (2007, September 3). Data breach laws make companies serious about security. Retrieved September 7, 2009, from.
-
(2007)
-
-
Ranger, S.1
-
59
-
-
55549118277
-
The role of deterrence in the formulation of criminal law rules: At its worst when doing its best
-
Robinson, P. H., & Darley, J. M., (2003). The role of deterrence in the formulation of criminal law rules: At its worst when doing its best. Georgetown Law Journal, 91, 949-1002.
-
(2003)
Georgetown Law Journal
, vol.91
, pp. 949-1002
-
-
Robinson, P.H.1
Darley, J.M.2
-
60
-
-
79952367190
-
Paper presented at the Ninth Workshop on the Economics of Information Security (WEIS 2010)
-
Harvard University, Cambridge, MA.
-
Romanosky, S., Sharp, R., & Acquisti, A. (2010). Data breaches and identity theft: When is mandatory disclosure optimal? Paper presented at the Ninth Workshop on the Economics of Information Security (WEIS 2010), Harvard University, Cambridge, MA.
-
(2010)
Data breaches and identity theft: When is mandatory disclosure optimal
-
-
Romanosky, S.1
Sharp, R.2
Acquisti, A.3
-
61
-
-
79952437669
-
-
Samuelson Law, Technology, amp; Public Policy Clinic Security breach notification laws: Views from chief security officers. Unpublished manuscript, University of California-Berkeley School of Law.
-
Samuelson Law, Technology, & Public Policy Clinic. (2007). Security breach notification laws: Views from chief security officers. Unpublished manuscript, University of California-Berkeley School of Law.
-
(2007)
-
-
-
62
-
-
79952395565
-
-
SB 1386: Bill analysis. Retrieved December 16, 2010, from.
-
Saskia, K. (2002). SB 1386: Bill analysis. Retrieved December 16, 2010, from.
-
(2002)
-
-
Saskia, K.1
-
63
-
-
79952380745
-
-
S.B. 2290 23d Legislature, State of Hawaii (enacted). Retrieved December 16, 2010, from.
-
S.B. 2290. (2006). 23d Legislature, State of Hawaii (enacted). Retrieved December 16, 2010, from.
-
(2006)
-
-
-
64
-
-
79952427945
-
-
Securing Consumers' Data: Options Following Security Breaches Hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, 109th Congress.
-
Securing Consumers' Data: Options Following Security Breaches. (2005). Hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, 109th Congress.
-
(2005)
-
-
-
65
-
-
79952369595
-
-
Securing Electronic Personal Data: Striking a Balance Between Privacy and Commercial and Governmental Use Hearing before the Committee on the Judiciary, Senate, 109th Congress.
-
Securing Electronic Personal Data: Striking a Balance Between Privacy and Commercial and Governmental Use. (2005). Hearing before the Committee on the Judiciary, Senate, 109th Congress.
-
(2005)
-
-
-
66
-
-
79952383341
-
-
Securities and Exchange Commission Part 248-Regulation s-p: Privacy of consumer financial information and safeguarding personal information; proposed rule. Retrieved November 11, 2008, from.
-
Securities and Exchange Commission. (2008). Part 248-Regulation s-p: Privacy of consumer financial information and safeguarding personal information; proposed rule. Retrieved November 11, 2008, from.
-
(2008)
-
-
-
67
-
-
33947536241
-
Notification of data security breaches
-
Schwartz, P., & Janger, E. (2007). Notification of data security breaches. Michigan Law Review, 105, 913-984.
-
(2007)
Michigan Law Review
, vol.105
, pp. 913-984
-
-
Schwartz, P.1
Janger, E.2
-
68
-
-
0000447575
-
A model of the optimal use of liability and safety regulation
-
Shavell, S. (1984). A model of the optimal use of liability and safety regulation. RAND Journal of Economics, 15, 271-280.
-
(1984)
RAND Journal of Economics
, vol.15
, pp. 271-280
-
-
Shavell, S.1
-
69
-
-
0000941631
-
Individual precautions to prevent theft: Private versus socially optimal behavior
-
Shavell, S. (1991). Individual precautions to prevent theft: Private versus socially optimal behavior. International Review of Law and Economics, 11, 123-132.
-
(1991)
International Review of Law and Economics
, vol.11
, pp. 123-132
-
-
Shavell, S.1
-
70
-
-
79952397143
-
How a bill becomes a law, really
-
Simitian, J. (2009a). How a bill becomes a law, really. Berkeley Technology Law Journal, 24, 1009-1017.
-
(2009)
Berkeley Technology Law Journal
, vol.24
, pp. 1009-1017
-
-
Simitian, J.1
-
71
-
-
79952365709
-
-
How a bill becomes a law, really. David Nelson Memorial Keynote Address at the symposium on Security Breach Notification Six Years Later: Lessons Learned about Identity Theft and Directions for the Future, Berkeley Center for Law & Technology, Berkeley, CA. Retrieved December 16, 2010, from, March
-
Simitian, J. (2009b, March). How a bill becomes a law, really. David Nelson Memorial Keynote Address at the symposium on Security Breach Notification Six Years Later: Lessons Learned about Identity Theft and Directions for the Future, Berkeley Center for Law & Technology, Berkeley, CA. Retrieved December 16, 2010, from.
-
(2009)
-
-
Simitian, J.1
-
72
-
-
0010134846
-
Understanding state constitutions
-
Princeton, NJ: Princeton University Press.
-
Tarr, G. A. (2000). Understanding state constitutions. Princeton, NJ: Princeton University Press.
-
(2000)
-
-
Tarr, G.A.1
-
73
-
-
34547100991
-
An empirical analysis of the impact of software vulnerability announcements on firm stock price
-
Telang, R., & Wattal, S. (2007). An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering, 33, 544-557.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
-
74
-
-
79952379161
-
-
ChoicePoint to pay $10M to settle breach-related lawsuit. Network World. Retrieved November 1, 2009, from, January 29
-
Vijayan, J. (2008, January 29). ChoicePoint to pay $10M to settle breach-related lawsuit. Network World. Retrieved November 1, 2009, from.
-
(2008)
-
-
Vijayan, J.1
-
75
-
-
0346225372
-
The diffusion of innovations among the American states
-
Walker, J. (1969). The diffusion of innovations among the American states. American Political Science Review, 63, 880-899.
-
(1969)
American Political Science Review
, vol.63
, pp. 880-899
-
-
Walker, J.1
-
76
-
-
77950789542
-
Uses and abuses of empirical evidence in the death penalty debate
-
CEPR Discussion Paper No. 5493. London: CEPR.
-
Wolfers, J., & Donohue, J. J. (2006). Uses and abuses of empirical evidence in the death penalty debate. CEPR Discussion Paper No. 5493. London: CEPR.
-
(2006)
-
-
Wolfers, J.1
Donohue, J.J.2
|