-
1
-
-
0012934466
-
-
Technical report, Software Engineering Institute, Carnegie Mellon University, Pittsburgh
-
Armour, J., W. S. Humphrey. 1993. Software product liability. Technical report, Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
-
(1993)
Software product liability
-
-
Armour, J.1
Humphrey, W.S.2
-
2
-
-
61849175198
-
Optimal policy for software vulnerability disclosure
-
Arora, A., R. Telang, H. Xu. 2008. Optimal policy for software vulnerability disclosure. Management Sci. 54(4) 642-656.
-
(2008)
Management Sci.
, vol.54
, Issue.4
, pp. 642-656
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
3
-
-
79956069138
-
EC takes three steps back on software liability
-
(May 12)
-
Asay, M. 2009. EC takes three steps back on software liability. CNET News (May 12), http://news.cnet.com/8301-13505-3 -10238475-16.html.
-
(2009)
CNET News
-
-
Asay, M.1
-
4
-
-
33750703619
-
Network software security and user incentives
-
DOI 10.1287/mnsc.1060.0568
-
August, T., T. I. Tunca. 2006. Network software security and user incentives. Management Sci. 52(11) 1703-1720. (Pubitemid 44706077)
-
(2006)
Management Science
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.I.2
-
5
-
-
61349202831
-
Let the pirates patch? An economic analysis of software security patch restrictions
-
August, T., T. I. Tunca. 2008. Let the pirates patch? An economic analysis of software security patch restrictions. Inform. Systems Res. 19(1) 48-70.
-
(2008)
Inform. Systems Res.
, vol.19
, Issue.1
, pp. 48-70
-
-
August, T.1
Tunca, T.I.2
-
6
-
-
78249276668
-
Timing the application of security patches for optimal uptime
-
USENIX Association, Berkeley, CA
-
Beattie, S., S. Arnold, C. Cowan, P. Wagle, C. Wright, A. Shostack. 2002. Timing the application of security patches for optimal uptime. Proc. 16th USENIX Conf. System Admin., USENIX Association, Berkeley, CA, 233-242.
-
(2002)
Proc. 16th USENIX Conf. System Admin.
, pp. 233-242
-
-
Beattie, S.1
Arnold, S.2
Cowan, C.3
Wagle, P.4
Wright, C.5
Shostack, A.6
-
7
-
-
79956060924
-
NHTSA to test Lexus SUV for rollover
-
(April 15)
-
Bennett, J. 2010. NHTSA to test Lexus SUV for rollover. Wall Street Journal (April 15), http://online. wsj.com/article/ SB10001424052702304510004575185983714141448.html.
-
(2010)
Wall Street Journal
-
-
Bennett, J.1
-
8
-
-
79956066093
-
-
Technical Report HPL-2009-153, Hewlett-Packard Laboratories, Palo Alto, CA
-
Beres, Y., J. Griffin. 2009. Optimizing network patching policy decisions. Technical Report HPL-2009-153, Hewlett-Packard Laboratories, Palo Alto, CA.
-
(2009)
Optimizing Network Patching Policy Decisions
-
-
Beres, Y.1
Griffin, J.2
-
9
-
-
79956080002
-
OSHA boosts oversight of state safety agencies
-
(March 29)
-
Berzon, A. 2010. OSHA boosts oversight of state safety agencies. Wall Street Journal (March 29), http://online. wsj.com/article/ SB1000142405274803409804575143994200426192.html.
-
(2010)
Wall Street Journal
-
-
Berzon, A.1
-
11
-
-
77956762114
-
Right approach, wrong implications: A critique of McKean on products liability
-
Calabresi, G., K. C. Bass, III. 1970. Right approach, wrong implications: A critique of McKean on products liability. Univ. Chicago Law Rev. 38(1) 74-91.
-
(1970)
Univ. Chicago Law Rev.
, vol.38
, Issue.1
, pp. 74-91
-
-
Calabresi, G.1
Bass III, K.C.2
-
12
-
-
33947376004
-
Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge
-
DOI 10.1109/TSE.2007.26
-
Cavusoglu, H., H. Cavusoglu, S. Raghunathan. 2007. Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge. IEEE Trans. Software Engrg. 33(3) 171-185. (Pubitemid 46443998)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.3
, pp. 171-185
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Raghunathan, S.3
-
13
-
-
61849135265
-
Security patch management: Share the burden or share the damage?
-
Cavusoglu, H., H. Cavusoglu, J. Zhang. 2008. Security patch management: Share the burden or share the damage? Management Sci. 54(4) 657-670.
-
(2008)
Management Sci.
, vol.54
, Issue.4
, pp. 657-670
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Zhang, J.3
-
14
-
-
7444242205
-
The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
-
Cavusoglu, H., B. Mishra, S. Raghunathan. 2004. The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. Internat. J. Electronic Commerce 9(1) 69-104. (Pubitemid 39444049)
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 69-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
15
-
-
80051749786
-
2011. Correlated failures, diversification, and information security risk management
-
Forthcoming
-
Chen, P., G. Kataria, R. Krishnan. 2011. Correlated failures, diversification, and information security risk management. MIS Quart. Forthcoming.
-
MIS Quart.
-
-
Chen, P.1
Kataria, G.2
Krishnan, R.3
-
17
-
-
78650565122
-
Network security: Vulnerabilities and disclosure policy
-
Choi, J. P., C. Fershtman, N. Gandal. 2010. Network security: Vulnerabilities and disclosure policy. J. Indust. Econom. 58(4) 868-894.
-
(2010)
J. Indust. Econom.
, vol.58
, Issue.4
, pp. 868-894
-
-
Choi, J.P.1
Fershtman, C.2
Gandal, N.3
-
18
-
-
79956107070
-
Interview: Frontline cyber war
-
(March 18)
-
Clarke, R. 2003. Interview: Frontline cyber war! PBS (March 18), http://www.pbs. org/wgbh/pages/frontline/shows/cyberwar/ interviews/clarke.html.
-
(2003)
PBS
-
-
Clarke, R.1
-
19
-
-
79956064556
-
Lords tell government to clean up "Wild West" Internet
-
(August 10)
-
Collins, B. 2007. Lords tell government to clean up "Wild West" Internet. PC Pro (August 10), http://www.pcpro.co.uk/news/ broadband/122086/ lords-tell-government-to-clean-up-wild -west-internet.
-
(2007)
PC Pro
-
-
Collins, B.1
-
20
-
-
79956144466
-
-
The cost impact of major virus attacks since 1995. (February)
-
Computer Economics. 2004. The cost impact of major virus attacks since 1995. (February), http://www.computereconomics.com/article. cfm?id=936
-
(2004)
Computer Economics
-
-
-
21
-
-
33751067472
-
A safetyoriented platform for Web applications
-
IEEE Computer Society Washington, DC
-
Cox, R. S., S. D. Gribble, H. M. Levy, J. G. Hansen. 2006. A safetyoriented platform for Web applications. Proc. 2006 IEEE Sympos. Security Privacy, IEEE Computer Society, Washington, DC, 350-364.
-
(2006)
Proc. 2006 IEEE Sympos. Security Privacy
, pp. 350-364
-
-
Cox, R.S.1
Gribble, S.D.2
Levy, H.M.3
Hansen, J.G.4
-
22
-
-
11844282731
-
Who is liable for bugs and security flaws in software?
-
Cusumano, M. A. 2004. Who is liable for bugs and security flaws in software? Commun. ACM 47(3) 25-27.
-
(2004)
Commun. ACM
, vol.47
, Issue.3
, pp. 25-27
-
-
Cusumano, M.A.1
-
23
-
-
77951593978
-
-
White paper, September 7, Secure Decisions, Applied Visions Inc., Northport, NY
-
D'Amico, A. D. 2000. What does a computer security breach really cost? White paper, September 7, Secure Decisions, Applied Visions Inc., Northport, NY.
-
(2000)
What Does a Computer Security Breach Really Cost?
-
-
D'Amico, A.D.1
-
24
-
-
85055761229
-
The economics of products liability: A reaction to McKean
-
Dorfman, R. 1970. The economics of products liability: A reaction to McKean. Univ. Chicago Law Rev. 38(1) 92-102.
-
(1970)
Univ. Chicago Law Rev.
, vol.38
, Issue.1
, pp. 92-102
-
-
Dorfman, R.1
-
25
-
-
77955498302
-
Product safety: Liability rules, market structure, and imperfect information
-
Epple, D., A. Raviv. 1978. Product safety: Liability rules, market structure, and imperfect information. Amer. Econom. Rev. 68(1) 80-95.
-
(1978)
Amer. Econom. Rev.
, vol.68
, Issue.1
, pp. 80-95
-
-
Epple, D.1
Raviv, A.2
-
26
-
-
79956140022
-
OWASP sheds light on its security standards
-
(May 13)
-
Feinman, J. 2009. OWASP sheds light on its security standards. SDTimes (May 13), http://www.sdtimes.com/link/33469.
-
(2009)
SDTimes
-
-
Feinman, J.1
-
27
-
-
79956140519
-
Software liability gaining attention
-
(January 14)
-
Fisher, D. 2002. Software liability gaining attention. eWeek.com (January 14), http://mobile. eweek.com/c/a/Application -Development/Software-Liability- Gaining-Attention/.
-
(2002)
EWeek.com
-
-
Fisher, D.1
-
28
-
-
79951860494
-
-
White paper, Wipro Technologies, Ltd., Bangalore, India
-
Forbath, T., P. Kalaher, T. O'Grady. 2005. The total cost of security patch management. White paper, Wipro Technologies, Ltd., Bangalore, India.
-
(2005)
The total cost of security patch management
-
-
Forbath, T.1
Kalaher, P.2
O'Grady, T.3
-
29
-
-
0000028492
-
The folk theorem in repeated games with discounting or with incomplete information
-
Fudenberg, D., E. Maskin. 1986. The folk theorem in repeated games with discounting or with incomplete information. Econometrica 54(3) 533-554.
-
(1986)
Econometrica
, vol.54
, Issue.3
, pp. 533-554
-
-
Fudenberg, D.1
Maskin, E.2
-
30
-
-
33750722921
-
The cost of information security breaches
-
Spring
-
Garg, A. 2003. The cost of information security breaches. Cross- Currents (Spring) 8-11.
-
(2003)
Cross Currents
, pp. 8-11
-
-
Garg, A.1
-
31
-
-
70450167605
-
How vulnerable is the power grid?
-
(April 15)
-
Ghosh, B. 2009. How vulnerable is the power grid? TIME (April 15), http://www.time.com/time/nation/article/0,8599,1891562,00.html.
-
(2009)
Time
-
-
Ghosh, B.1
-
32
-
-
79251594889
-
Products liability: A commentary
-
Gilmore, G. 1970. Products liability: A commentary. Univ. Chicago Law Rev. 38(1) 103-116.
-
(1970)
Univ. Chicago Law Rev.
, vol.38
, Issue.1
, pp. 103-116
-
-
Gilmore, G.1
-
33
-
-
79952977104
-
Webhost hack wipes out data for 100,000 sites
-
(June 8)
-
Goodin, D. 2009. Webhost hack wipes out data for 100s,000 sites. The Register (June 8), http://www.theregister.co.uk/ 2009/06/08/webhost-attack/.
-
(2009)
The Register
-
-
Goodin, D.1
-
34
-
-
79956159397
-
Security liability laws are NOT the answer
-
(November 1)
-
Haase, G. 2004. Security liability laws are NOT the answer. One- FreeVoice.com (November 1), http://blog. onefreevoice.com/ 2004/11/01/security- liability-laws-are-not-the-answer/.
-
(2004)
One- FreeVoice.com
-
-
Haase, G.1
-
35
-
-
40449116802
-
A classification of SQL-injection attacks and countermeasures
-
IEEE Computer Society, Los Alamitos, CA
-
Halfond, W. G., J. J. Viegas, A. Orso. 2006. A classification of SQL-injection attacks and countermeasures. Proc. IEEE Internat. Sympos. Secure Software Engrg., IEEE Computer Society, Los Alamitos, CA.
-
(2006)
Proc. IEEE Internat. Sympos. Secure Software Engrg.
-
-
Halfond, W.G.1
Viegas, J.J.2
Orso, A.3
-
36
-
-
3042780586
-
Two views on security software liability: Using the right legal tools
-
Heckman, C. 2003. Two views on security software liability: Using the right legal tools. IEEE Security & Privacy 1(1) 73-75.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 73-75
-
-
Heckman, C.1
-
37
-
-
79956149466
-
-
Hewlett-Packard
-
Hewlett-Packard. 2010. HP TippingPoint zero day initiative. http:// www.zerodayinitiative.com/advisories/published/.
-
(2010)
HP TippingPoint Zero Day Initiative
-
-
-
38
-
-
79956131357
-
EU software liability law could divide open source
-
(June 11)
-
Ho, V. 2009. EU software liability law could divide open source. CNET News (June 11), http://news.cnet.com/8301-1001-3 -10262503-92.html.
-
(2009)
CNET News
-
-
Ho, V.1
-
40
-
-
79956074863
-
More regulation for the software industry?
-
(February 16)
-
Joyce, E. 2005. More regulation for the software industry? eSecurity Planet.com (February 16), http://www.esecurityplanet.com/ trends/article. php/3483876/More-Regulation-For-The-Software -Industry.htm.
-
(2005)
ESecurity Planet.com
-
-
Joyce, E.1
-
41
-
-
84864137926
-
-
Unpublished paper
-
Kaner, C. 1997. Software liability. Unpublished paper, http://www.badsoftware.com/theories.htm.
-
(1997)
Software Liability
-
-
Kaner, C.1
-
42
-
-
79956075929
-
Sasser worm impacted businesses around the world
-
(May 7)
-
Keizer, G. 2004. Sasser worm impacted businesses around the world. TechWeb News (May 7), http://www.networkcomputing .com/data-protection/sasser- worm-impacted-businesses-around -the-world. php.
-
(2004)
TechWeb News
-
-
Keizer, G.1
-
43
-
-
79956067614
-
FAQ: The Monster.com mess
-
(August 24)
-
Keizer, G. 2007. FAQ: The Monster.com mess. Computerworld (August 24), http://www.computerworld.com/s/article/ 9032518/FAQ-The-Monster.com-mess.
-
(2007)
Computerworld
-
-
Keizer, G.1
-
44
-
-
79956099191
-
Researchers wait for Downadup worm's second act
-
(January 23)
-
Keizer, G. 2009. Researchers wait for Downadup worm's second act. Computerworld (January 23), http://www.computerworld .com/s/article/9126691/ Researchers-wait-for-Downadup-worm-s-second-act.
-
(2009)
Computerworld
-
-
Keizer, G.1
-
45
-
-
79956080001
-
Pwn2Own winner tells Apple, Microsoft to find their own bugs
-
(March 25)
-
Keizer, G. 2010. Pwn2Own winner tells Apple, Microsoft to find their own bugs. Computerworld (March 25), http://www .computerworld.com/s/article/9174120/ Pwn2Own-winner-tells-Apple-Microsoft-to-find-their-own-bugs.
-
(2010)
Computerworld
-
-
Keizer, G.1
-
46
-
-
72449167415
-
An economic analysis of the software market with a risk-sharing contract
-
Kim, B. C., P. Chen, T. Mukhopadhyay. 2010a. An economic analysis of the software market with a risk-sharing contract. Internat. J. Electronic Commerce 14(2) 7-39.
-
(2010)
Internat. J. Electronic Commerce
, vol.14
, Issue.2
, pp. 7-39
-
-
Kim, B.C.1
Chen, P.2
Mukhopadhyay, T.3
-
47
-
-
79960144492
-
The effect of liability and patch release on software security: The monopoly case
-
ePub ahead of print October 19
-
Kim, B. C., P. Chen, T. Mukhopadhyay. 2010b. The effect of liability and patch release on software security: The monopoly case. Production Oper. Management, ePub ahead of print October 19, http://onlinelibrary. wiley.com/doi/10. 1111/j. 1937-5956. 2010. 01189. x/full.
-
(2010)
Production Oper. Management
-
-
Kim, B.C.1
Chen, P.2
Mukhopadhyay, T.3
-
48
-
-
0000274841
-
Expost liability for harm vs. ex ante safety regulation: Substitutes or complements?
-
Kolstad, C. D., T. S. Ulen, G. V. Johnson. 1990. Ex post liability for harm vs. ex ante safety regulation: Substitutes or complements? Amer. Econom. Rev. 80(4) 888-901.
-
(1990)
Amer. Econom. Rev.
, vol.80
, Issue.4
, pp. 888-901
-
-
Kolstad, C.D.1
Ulen, T.S.2
Johnson, G.V.3
-
49
-
-
84960534381
-
Bush approves cybersecurity strategy
-
(January 31)
-
Krebs, B. 2003. Bush approves cybersecurity strategy. Washington Post (January 31), http://www.washingtonpost.com/.
-
(2003)
Washington Post
-
-
Krebs, B.1
-
50
-
-
79956140021
-
Should e-mail addresses be considered private data?
-
(October 19)
-
Krebs, B. 2007. Should e-mail addresses be considered private data? Washington Post (October 19), http://voices . washingtonpost.com/securityfix/ 2007/10/database-theft-leads-to-target.html.
-
(2007)
Washington Post
-
-
Krebs, B.1
-
51
-
-
0000517047
-
The dynamics of incentive contracts
-
Laffont, J. -J., J. Tirole. 1988. The dynamics of incentive contracts. Econometrica 56(5) 1153-1175.
-
(1988)
Econometrica
, vol.56
, Issue.5
, pp. 1153-1175
-
-
Laffont J., -J.1
Tirole, J.2
-
53
-
-
79956161527
-
Innovation and cybersecurity regulation
-
(March 31)
-
Lewis, J. 2009. Innovation and cybersecurity regulation. CircleID (March 31), http://www.circleid.com/posts/20090331-innovation-and-cybersecurity- regulation/.
-
(2009)
CircleID
-
-
Lewis, J.1
-
54
-
-
38249034455
-
Optimal research for cournot oligopolists
-
Li, L., R. D. McKelvey, T. Page. 1987. Optimal research for cournot oligopolists. J. Econom. Theory 42(1) 140-166.
-
(1987)
J. Econom. Theory
, vol.42
, Issue.1
, pp. 140-166
-
-
Li, L.1
McKelvey, R.D.2
Page, T.3
-
55
-
-
0000852455
-
Investments, holdup, and the form of market contracts
-
MacLeod, W. B., J. M. Malcomson. 1993. Investments, holdup, and the form of market contracts. Amer. Econom. Rev. 83(4) 811-837.
-
(1993)
Amer. Econom. Rev.
, vol.83
, Issue.4
, pp. 811-837
-
-
MacLeod, W.B.1
Malcomson, J.M.2
-
56
-
-
79956126097
-
Defying experts, rogue computer code still lurks
-
(August 26)
-
Markoff, J. 2009. Defying experts, rogue computer code still lurks. New York Times (August 26), http://www.nytimes.com/ 2009/08/27/technology/27compute. html.
-
(2009)
New York Times
-
-
Markoff, J.1
-
57
-
-
79956071826
-
Zero day attack imminent
-
(February 3)
-
McBride, S. 2005. Zero day attack imminent. Computerworld (February 3), http://www.computerworld.com. au/article/1535/zero-day-attack-imminent/.
-
(2005)
Computerworld
-
-
McBride, S.1
-
58
-
-
79956107135
-
Buggy McAfee update whacks Windows XP PCs
-
(April 21)
-
McCullagh, D. 2010. Buggy McAfee update whacks Windows XP PCs. CNET News (April 21), http://news.cnet.com/8301-1009-3-20003074-83.html.
-
(2010)
CNET News
-
-
McCullagh, D.1
-
59
-
-
0347417615
-
Products liability: Implications of some changing property rights. Quart. J. Econom. 84(4) 611-626. McKean, R. N. 1970b. Products liability: Trends and implications
-
McKean, R. N. 1970a. Products liability: Implications of some changing property rights. Quart. J. Econom. 84(4) 611-626. McKean, R. N. 1970b. Products liability: Trends and implications. Univ. Chicago Law Rev. 38(1) 3-63.
-
(1970)
Univ. Chicago Law Rev.
, vol.38
, Issue.1
, pp. 3-63
-
-
McKean, R.N.1
-
60
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
ACM, New York
-
Moore, D., C. Shannon, J. Brown. 2002. Code-Red: A case study on the spread and victims of an Internet worm. Proc. Second ACM SIGCOMM Workshop Internet Measurement, ACM, New York, 273-284.
-
(2002)
Proc. Second ACM SIGCOMM Workshop Internet Measurement
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
61
-
-
0011582206
-
Asymptotic efficiency in dynamic principalagent problems
-
Muller, H. M. 2000. Asymptotic efficiency in dynamic principalagent problems. J. Econom. Theory 91(2) 292-301.
-
(2000)
J. Econom. Theory
, vol.91
, Issue.2
, pp. 292-301
-
-
Muller, H.M.1
-
62
-
-
79956107659
-
-
National Infrastructure Advisory Council. The national strategy to secure cyberspace. Report U. S. Department of Homeland Security, Washington, DC
-
National Infrastructure Advisory Council. 2003. The national strategy to secure cyberspace. Report, U. S. Department of Homeland Security, Washington, DC, http://www.dhs. gov/ xlibrary/assets/National-Cyberspace-Strategy.pdf.
-
(2003)
-
-
-
63
-
-
0015602538
-
The economics of product safety
-
Oi, W. Y. 1973. The economics of product safety. Bell J. Econom. Management Sci. 4(1) 3-28.
-
(1973)
Bell J. Econom. Management Sci.
, vol.4
, Issue.1
, pp. 3-28
-
-
Oi, W.Y.1
-
64
-
-
2342631845
-
Regulation and information security: Can Y2K lessons help us?
-
Payne, J. E. 2004. Regulation and information security: Can Y2K lessons help us? IEEE Security & Privacy 2(2) 32-35.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.2
, pp. 32-35
-
-
Payne, J.E.1
-
65
-
-
0000779299
-
Efficiency and information aggregation in auctions
-
Pesendorfer, W., J. M. Swinkels. 2000. Efficiency and information aggregation in auctions. Amer. Econom. Rev. 90(3) 499-525.
-
(2000)
Amer. Econom. Rev.
, vol.90
, Issue.3
, pp. 499-525
-
-
Pesendorfer, W.1
Swinkels, J.M.2
-
66
-
-
78650760369
-
Information security: User precautions, attacker efforts, and enforcement
-
IEEE Computer Science, Los Alamitos, CA
-
Png, I. P. L., Q. -H. Wang. 2009. Information security: User precautions, attacker efforts, and enforcement. Proc. 42nd Hawaii Internat. Conf. System Sci., IEEE Computer Science, Los Alamitos, CA, 1-11.
-
(2009)
Proc. 42nd Hawaii Internat. Conf. System Sci.
, pp. 1-11
-
-
Png, I.P.L.1
Wang, Q.-H.2
-
67
-
-
0000345134
-
Strict liability vs. negligence in a market setting
-
Polinsky, A. M. 1980. Strict liability vs. negligence in a market setting. Amer. Econom. Rev. Papers Proc. 70(2) 363-367.
-
(1980)
Amer. Econom. Rev. Papers Proc.
, vol.70
, Issue.2
, pp. 363-367
-
-
Polinsky, A.M.1
-
68
-
-
33745446320
-
Slammer worm crashed Ohio nuke plant network
-
(August 19)
-
Poulsen, K. 2003. Slammer worm crashed Ohio nuke plant network. SecurityFocus (August 19), http://www.securityfocus .com/news/6767.
-
(2003)
SecurityFocus
-
-
Poulsen, K.1
-
69
-
-
67649548424
-
Choice and chance: A conceptual model of paths to information security compromise
-
Ransbotham, S., S. Mitra. 2009. Choice and chance: A conceptual model of paths to information security compromise. Inform. Systems Res. 20(1) 121-139.
-
(2009)
Inform. Systems Res.
, vol.20
, Issue.1
, pp. 121-139
-
-
Ransbotham, S.1
Mitra, S.2
-
71
-
-
0002623272
-
Equilibrium in supergames with the overtaking criterion
-
Rubinstein, A. 1979. Equilibrium in supergames with the overtaking criterion. J. Econom. Theory 21(1) 1-9.
-
(1979)
J. Econom. Theory
, vol.21
, Issue.1
, pp. 1-9
-
-
Rubinstein, A.1
-
72
-
-
3042744350
-
Two views on security software liability: Let the legal system decide
-
Ryan, D. J. 2003. Two views on security software liability: Let the legal system decide. IEEE Security & Privacy 1(1) 70-72.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 70-72
-
-
Ryan, D.J.1
-
73
-
-
78650325121
-
-
SANS Institute. Report, SANS Institute, Bethesda, MD
-
SANS Institute. 2009. The top cyber security risks. Report, SANS Institute, Bethesda, MD.
-
(2009)
The Top Cyber Security Risks
-
-
-
74
-
-
22444446684
-
It depends on what you pay
-
DOI 10.1109/MSP.2005.72
-
Schneider, F. B. 2005. It depends on what you pay. IEEE Security & Privacy 3(3) 3. (Pubitemid 40860465)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 3
-
-
Schneider, F.B.1
-
75
-
-
70849109374
-
Information security: How liable should vendors be?
-
(October 28)
-
Schneier, B. 2004. Information security: How liable should vendors be? Computerworld (October 28), http://www.computerworld .com/s/article/96948/ Information-security-How-liable-should-vendors-be-.
-
(2004)
Computerworld
-
-
Schneier, B.1
-
76
-
-
79956091894
-
Software makers should take responsibility
-
(July 17)
-
Schneier, B. 2008. Software makers should take responsibility. The Guardian (July 17), http://www.guardian.co.uk/technology/ 2008/jul/17/internet. security.
-
(2008)
The Guardian
-
-
Schneier, B.1
-
77
-
-
33645402013
-
Emerging technology: Patch me if you can!
-
August 5
-
Schweitzer, D. 2003. Emerging technology: Patch me if you can! NetworkMagazine.com. (August 5).
-
(2003)
NetworkMagazine.com.
-
-
Schweitzer, D.1
-
78
-
-
0000555891
-
On liability and insurance
-
Shavell, S. 1982. On liability and insurance. Bell J. Econom. 13(1) 120-132.
-
(1982)
Bell J. Econom.
, vol.13
, Issue.1
, pp. 120-132
-
-
Shavell, S.1
-
79
-
-
79956064001
-
Zero-day Malware attacks you can't block
-
(February 21)
-
Singel, R. 2007. Zero-day Malware attacks you can't block. PC World (February 21), http://www.pcworld.com/article/129020/zeroday-malware-attacks- you-cant-block.html.
-
(2007)
PC World
-
-
Singel, R.1
-
80
-
-
84959825935
-
Consumer misperceptions, product failure and producer liability
-
Spence, M. 1977. Consumer misperceptions, product failure and producer liability. Rev. Econom. Stud. 44(3) 561-572.
-
(1977)
Rev. Econom. Stud.
, vol.44
, Issue.3
, pp. 561-572
-
-
Spence, M.1
-
83
-
-
79956125147
-
-
U. S. Department of Homeland Security. National strategy for homeland security, October Homeland Security Council, Washington, DC
-
U. S. Department of Homeland Security. 2007. National strategy for homeland security, October. Homeland Security Council, Washington, DC.
-
(2007)
-
-
-
84
-
-
0012414932
-
-
U. S. Department of Transportation. Report, National Highway Traffic Safety Administration, Washington, DC.
-
U. S. Department of Transportation. 2004. Federal motor vehicle safety standards and regulations. Report, National Highway Traffic Safety Administration, Washington, DC. http://www . nhtsa. gov/cars/rules/standards/ FMVSS-Regs/index.htm.
-
(2004)
Federal Motor Vehicle Safety Standards and Regulations
-
-
-
86
-
-
85050648964
-
Product liability, research and development, and innovation
-
Viscusi, W. K., M. J. Moore. 1993. Product liability, research and development, and innovation. J. Political Econom. 101(1) 161-184.
-
(1993)
J. Political Econom.
, vol.101
, Issue.1
, pp. 161-184
-
-
Viscusi, W.K.1
Moore, M.J.2
-
87
-
-
67649987507
-
RFQ auctions with supplier qualification screening
-
Wan, Z., D. Beil. 2009. RFQ auctions with supplier qualification screening. Oper. Res. 57(4) 934-949.
-
(2009)
Oper. Res.
, vol.57
, Issue.4
, pp. 934-949
-
-
Wan, Z.1
Beil, D.2
-
88
-
-
79956126608
-
"All hands on deck" as FDA aims to fix food safety
-
(July 7)
-
Weise, E. 2009. "All hands on deck" as FDA aims to fix food safety. USA Today (July 7), http://www.usatoday.com/ news/health/2009-07-07- food-safety-guidelines-N.htm.
-
(2009)
USA Today
-
-
Weise, E.1
-
89
-
-
79956120631
-
Software crackdown
-
(July 25)
-
Werth, C. 2009. Software crackdown. Newsweek (July 25), http:// www.newsweek.com/2009/07/25/software-crackdown.html.
-
(2009)
Newsweek
-
-
Werth, C.1
-
90
-
-
79956113205
-
Google attackers gained access to computer code
-
(April 20).
-
Worthen, B., J. E. Vascellaro. 2010. Google attackers gained access to computer code. Wall Street Journal (April 20). http://online. wsj.com/ article/SB10001424052748703757504575194873659727984.html.
-
(2010)
Wall Street Journal
-
-
Worthen, B.1
Vascellaro, J.E.2
-
91
-
-
79956128713
-
-
Working paper, Rady School of Management, University of California, San Diego, La Jolla
-
Zhou, Z. Z., M. E. Johnson. 2010. The impact of professional information risk ratings on vendor competition. Working paper, Rady School of Management, University of California, San Diego, La Jolla.
-
(2010)
The Impact of Professional Information Risk Ratings on Vendor Competition
-
-
Zhou, Z.Z.1
Johnson, M.E.2
|