-
2
-
-
33750440197
-
The Economics of Information Security
-
Anderson R., Moore, T. The Economics of Information Security. Science (314), 2006, pp. 610-613.
-
(2006)
Science
, vol.314
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
4
-
-
0040679785
-
Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack
-
Ayres, I. and Levitt, S. Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack, The Quarterly Journal of Economics (113:1), 1998, pp. 43-77.
-
(1998)
The Quarterly Journal of Economics
, vol.113
, Issue.1
, pp. 43-77
-
-
Ayres, I.1
Levitt, S.2
-
5
-
-
4243109556
-
A Model for Evaluating IT Security Investments
-
Cavusoglu, H., Mishra, B., Raghunathan, S. A Model for Evaluating IT Security Investments, Communications of the ACM (47:7), 2004, pp. 87-92.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
6
-
-
18944385964
-
The Value of Intrusion Detection Systems in Information Technology Security Architecture
-
Cavusoglu, H., Mishra, B., Raghunathan, S. The Value of Intrusion Detection Systems in Information Technology Security Architecture, Information Systems Research (16:1), 2005, pp. 28-46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
7
-
-
0033363329
-
Organizational Form and Efficiency: The Coexistence of Stock and Mutual Property-Liability Insurers
-
Cummins, J. D., Weiss, M. A. Organizational Form and Efficiency: The Coexistence of Stock and Mutual Property-Liability Insurers, Management Science (45:9), 1999, pp.1254-1270.
-
(1999)
Management Science
, vol.45
, Issue.9
, pp. 1254-1270
-
-
Cummins, J.D.1
Weiss, M.A.2
-
8
-
-
84870961075
-
-
The International Conference on Telecommunication Systems-Modeling and Analysis, Dallas, Texas, November 17-20, 2005
-
Ding, W., Yurcik, W. Outsourcing Internet Security: The Effect of Transaction Costs on Managed Service Providers, The International Conference on Telecommunication Systems-Modeling and Analysis, Dallas, Texas, November 17-20, 2005.
-
Outsourcing Internet Security: The Effect of Transaction Costs on Managed Service Providers
-
-
Ding, W.1
Yurcik, W.2
-
9
-
-
84870969872
-
Economics of Internet Security Outsourcing: Simulation Results Based on the Schneier Model
-
The Workshop on the Economics of Securing the Information Infrastructure (WESII), Washington D.C., October 23-24, 2006
-
Ding, W., Yurcik, W. Economics of Internet Security Outsourcing: Simulation Results Based on the Schneier Model," The Workshop on the Economics of Securing the Information Infrastructure (WESII), Washington D.C., October 23-24, 2006.
-
-
-
Ding, W.1
Yurcik, W.2
-
10
-
-
84870960939
-
-
The Workshop on Internet and Network Economics (WINE), Hong Kong, China, December 15-17, 2005
-
Ding, W., Yurcik, W., Yin, X. Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers, The Workshop on Internet and Network Economics (WINE), Hong Kong, China, December 15-17, 2005.
-
Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers
-
-
Ding, W.1
Yurcik, W.2
Yin, X.3
-
11
-
-
21144466432
-
Insurance with Undiversifiable Risk: Contract Structure and Organizational Form of Insurance Firms
-
Doherty, N. A., Dionne, G. Insurance with Undiversifiable Risk: Contract Structure and Organizational Form of Insurance Firms, Journal of Risk and Uncertainty (6), 1993, pp.187-203.
-
(1993)
Journal of Risk and Uncertainty
, vol.6
, pp. 187-203
-
-
Doherty, N.A.1
Dionne, G.2
-
12
-
-
30344462995
-
The Economic Incentives for Sharing Security Information
-
Gal-Or, E., Ghose, A. The Economic Incentives for Sharing Security Information, Information Systems Research (16:2), 2005, pp. 186-208
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
13
-
-
0036602405
-
Privacy Protection of Binary Confidential Data against Deterministic, Stochastic, and Insider Threat
-
Garfinkel, R., Gopal, R., Goes, P. Privacy Protection of Binary Confidential Data against Deterministic, Stochastic, and Insider Threat, Management Science (48:6), 2002, pp.749-764.
-
(2002)
Management Science
, vol.48
, Issue.6
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.2
Goes, P.3
-
14
-
-
0005766289
-
Morality and Computers: Attitudes and Differences in Moral Judgments
-
Gattiker, U. E., Kelley, H. Morality and Computers: Attitudes and Differences in Moral Judgments, Information Systems Research (10:3), 1999, pp. 233-255.
-
(1999)
Information Systems Research
, vol.10
, Issue.3
, pp. 233-255
-
-
Gattiker, U.E.1
Kelley, H.2
-
15
-
-
84870963663
-
-
The Fifth Workshop on Economics of Information Security (WEIS2006), University of Cambridge, United Kingdom, June 26-28, 2006
-
Ghose, A., Rajan, U. The Economic Impact of Regulatory Information Disclosure on Information Security Investments, Competition, and Social Welfare, The Fifth Workshop on Economics of Information Security (WEIS2006), University of Cambridge, United Kingdom, June 26-28, 2006.
-
The Economic Impact of Regulatory Information Disclosure on Information Security Investments, Competition, and Social Welfare
-
-
Ghose, A.1
Rajan, U.2
-
16
-
-
84990029315
-
The Economics of Information Security Investment
-
Gordon, L. A., Loeb, M. P. The Economics of Information Security Investment, ACM Transactions on Information and Systems Security (5:4), 2002, pp. 428-457
-
(2002)
ACM Transactions On Information and Systems Security
, vol.5
, Issue.4
, pp. 428-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
17
-
-
33745210521
-
Budgeting Process for Information Security Expenditure
-
Gordon, L. A., Loeb, M. P. Budgeting Process for Information Security Expenditure, Communications of the ACM (49:1), 2006, pp. 121-125
-
(2006)
Communications of the ACM
, vol.49
, Issue.1
, pp. 121-125
-
-
Gordon, L.A.1
Loeb, M.P.2
-
18
-
-
4243121902
-
A Framework for Using Insurance for Cyber-risk Management
-
Gordon, L. A., Loeb, M. P., Sohail, T. A Framework for Using Insurance for Cyber-risk Management, Communication of ACM (46:3), 2003, pp. 81-85
-
(2003)
Communication of ACM
, vol.46
, Issue.3
, pp. 81-85
-
-
Gordon, L.A.1
Loeb, M.P.2
Sohail, T.3
-
19
-
-
0344899914
-
Sharing Information on Computer System Security: An Economic Analysis
-
Gordon, L. A., Lucyshyn, W. Sharing Information on Computer System Security: An Economic Analysis, Journal of Accounting and Public Policy (22), 2003, pp. 461-485
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, pp. 461-485
-
-
Gordon, L.A.1
Lucyshyn, W.2
-
20
-
-
84870961172
-
-
The Workshop of the Economics on Information Security (WEIS), Pittsburgh, Pennsylvania, June 7-8, 2007
-
Gupta, A., Zhdanov, D. Growth and Sustainability of Managed Security Services Networks: An Economic Perspective, The Workshop of the Economics on Information Security (WEIS), Pittsburgh, Pennsylvania, June 7-8, 2007
-
Growth and Sustainability of Managed Security Services Networks: An Economic Perspective
-
-
Gupta, A.1
Zhdanov, D.2
-
21
-
-
0000139690
-
Moral Hazard in Teams
-
Holmstrom, B. Moral Hazard in Teams, Bell Journal of Economics (13:2), 1982, pp. 324-340.
-
(1982)
Bell Journal of Economics
, vol.13
, Issue.2
, pp. 324-340
-
-
Holmstrom, B.1
-
22
-
-
84870043039
-
-
Infonetics Research, Infornetics Report
-
Infonetics Research. Security and Encrypted VPN Services. Infornetics Report, 2008.
-
(2008)
Security and Encrypted VPN Services
-
-
-
23
-
-
20944441343
-
Market for Software Vulnerabilities? Think Again
-
Kannan, K., Telang, R. Market for Software Vulnerabilities? Think Again, Management Science (51:5), 2005, pp. 726-740.
-
(2005)
Management Science
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
24
-
-
84870009325
-
-
Securing Privacy In the Internet Age Symposium, Stanford University Press
-
Kesan, J. P., Majuca, R. P., Yurcik, W. The Economic Case for Cyberinsurance, Securing Privacy in the Internet Age Symposium, Stanford University Press, 2005.
-
(2005)
The Economic Case For Cyberinsurance
-
-
Kesan, J.P.1
Majuca, R.P.2
Yurcik, W.3
-
25
-
-
0037786763
-
Interdependent Security
-
Kunreuther, H., Heal, G. Interdependent Security, Journal of Risk and Uncertainty (26:2/3), 2003, pp. 231-249.
-
(2003)
Journal of Risk and Uncertainty
, vol.26
, Issue.2-3
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
26
-
-
0039145725
-
Moral Hazard in Risk Pooling Arrangements
-
Lee, W., Ligon, J. A. Moral Hazard in Risk Pooling Arrangements, Journal of Risk and Insurance (68:1), 2001, pp. 175-190.
-
(2001)
Journal of Risk and Insurance
, vol.68
, Issue.1
, pp. 175-190
-
-
Lee, W.1
Ligon, J.A.2
-
27
-
-
21144458956
-
The Formation of Mutual Insurers in Markets with Adverse Selection
-
Ligon, J. A., Thistle, P. D. The Formation of Mutual Insurers in Markets with Adverse Selection, Journal of Business (78:2), 2005, pp. 529-555.
-
(2005)
Journal of Business
, vol.78
, Issue.2
, pp. 529-555
-
-
Ligon, J.A.1
Thistle, P.D.2
-
28
-
-
0000133760
-
Threats to Information Systems: Today's Reality, Yesterday's Understanding
-
Loch K. D., Carr, H. H., Warkentin, M. E. Threats to Information Systems: Today's Reality, Yesterday's Understanding, MIS Quarterly (16:2), 1992, pp. 173-186h.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
29
-
-
84985854729
-
Insurance Theory: Reserves versus Mutuality
-
Marshall, J. M. Insurance Theory: Reserves versus Mutuality, Economic Inquiry (12), 1974, pp. 476-492.
-
(1974)
Economic Inquiry
, vol.12
, pp. 476-492
-
-
Marshall, J.M.1
-
30
-
-
84934562851
-
Ownership Structure across Lines of Property-Causality Insurance
-
Mayers, D. Ownership Structure across Lines of Property-Causality Insurance, Journal of Law and Economics (31), 1988, pp. 351-378.
-
(1988)
Journal of Law and Economics
, vol.31
, pp. 351-378
-
-
Mayers, D.1
-
31
-
-
0001689706
-
Contractual Provisions, Organizational Structure and Conflict in Insurance Markets
-
Mayers, D., Smith, C. W. Contractual Provisions, Organizational Structure and Conflict in Insurance Markets, Journal of Business (54), 1981, pp. 407-434.
-
(1981)
Journal of Business
, vol.54
, pp. 407-434
-
-
Mayers, D.1
Smith, C.W.2
-
32
-
-
84883156489
-
How to Work With a Managed Security Service Provider?
-
Harold F. Tipton, Micki Krause (eds.) CRC Press
-
McQuillan, L. H. How to Work with a Managed Security Service Provider? Harold F. Tipton, Micki Krause (eds.) Information Security Management Handbook. CRC Press. 2007, pp. 631-642.
-
(2007)
Information Security Management Handbook
, pp. 631-642
-
-
McQuillan, L.H.1
-
33
-
-
0033207750
-
A General Additive Data Perturbation Method for Database Security
-
Muralidhar, K., Parsa, R., Sarathy, R. A General Additive Data Perturbation Method for Database Security, Management Science (45:10), 1999, pp. 1399-1416.
-
(1999)
Management Science
, vol.45
, Issue.10
, pp. 1399-1416
-
-
Muralidhar, K.1
Parsa, R.2
Sarathy, R.3
-
34
-
-
80455162753
-
-
Working paper, University of Texas at Dallas
-
Ogut, H., Menon, N., Raghunathan, S. Cyber Insurance and IT Security Investment: Impact of Interdependent Risk, Working paper, University of Texas at Dallas, 2005.
-
(2005)
Cyber Insurance and IT Security Investment: Impact of Interdependent Risk
-
-
Ogut, H.1
Menon, N.2
Raghunathan, S.3
-
35
-
-
33847617478
-
Reengineering the Internet for Better Security
-
Parameswaran, M., Zhao, X., Whinston, A.B. and Fang F. Reengineering the Internet for Better Security, IEEE Computer, (40:1), 2007, pp. 40-44.
-
(2007)
IEEE Computer
, vol.40
, Issue.1
, pp. 40-44
-
-
Parameswaran, M.1
Zhao, X.2
Whinston, A.B.3
Fang, F.4
-
39
-
-
0036909696
-
The Security of Confidential Numerical Data in Databases
-
Sarathy, R., Muralidhar, K. The Security of Confidential Numerical Data in Databases, Information Systems Research (13:4), 2002, pp. 389-403.
-
(2002)
Information Systems Research
, vol.13
, Issue.4
, pp. 389-403
-
-
Sarathy, R.1
Muralidhar, K.2
-
40
-
-
0001133137
-
Coping with Systems Risk: Security Planning Models for Managerial Decision Making
-
Straub, D. W., Welke R. J. Coping with Systems Risk: Security Planning Models for Managerial Decision Making, MIS Quarterly (22:4), 1998, pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
41
-
-
84870009327
-
The Picture of ART
-
Swiss Re, Copyright Swiss Re
-
Swiss Re. The Picture of ART, Sigma, No.1 2003. Copyright Swiss Re.
-
(2003)
Sigma
, pp. 1
-
-
-
42
-
-
84870970717
-
-
Symantec, Report published by Symantec, February 2007
-
Symantec. IT Risk Management Report-Trend through December 2006, Volume 1. Report published by Symantec, February 2007. http://www.symantec.com/riskreport/
-
IT Risk Management Report-Trend Through December 2006
, vol.1
-
-
-
43
-
-
12144285368
-
Vulnerability and Information Security Investment: An Empirical Analysis of E-local Government in Japan
-
Tanaka, H., Matsuura, K., Sudoh, O. Vulnerability and Information Security Investment: An Empirical Analysis of E-local Government in Japan, Journal of Accounting and Public Policy (24), 2005, pp. 37-59.
-
(2005)
Journal of Accounting and Public Policy
, vol.24
, pp. 37-59
-
-
Tanaka, H.1
Matsuura, K.2
Sudoh, O.3
-
45
-
-
53349109106
-
An Economic Mechanism for Better Internet Security
-
Zhao, X., Fang, F. and Whinston, A.B. An Economic Mechanism for Better Internet Security, Decision Support Systems, (45:4), 2008, pp. 811-821.
-
(2008)
Decision Support Systems
, vol.45
, Issue.4
, pp. 811-821
-
-
Zhao, X.1
Fang, F.2
Whinston, A.B.3
|