메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Cyber attacks: Does physical boundary matter?

Author keywords

Cyber attacks; Information security; Interdependence; Physical boundary

Indexed keywords

AUTOCORRELATED; CROSS-NATIONAL; CYBER CRIMINALS; CYBER-ATTACKS; ECONOMIC OPPORTUNITIES; EMPIRICAL STUDIES; GOVERNMENT AUTHORITIES; INSURANCE COMPANIES; INTERDEPENDENCE; INTERNATIONAL COLLABORATIONS; IT INFRASTRUCTURES; MANAGERIAL IMPLICATIONS; PHYSICAL BOUNDARY; POTENTIAL RISKS; SPATIAL AUTOCORRELATIONS; STRATEGIC ISSUES;

EID: 84870960759     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (28)
  • 1
    • 84870972994 scopus 로고    scopus 로고
    • Workshop on the Economics of Information Security (WEIS), Dartmouth College, Hanover, NH (USA), June
    • Anderson, R., R. Böhme, R. Clayton, and T. Moore, "Security Economics and European Policy," Workshop on the Economics of Information Security (WEIS), Dartmouth College, Hanover, NH (USA), June 2008.
    • (2008) Security Economics and European Policy
    • Anderson, R.1    Böhme, R.2    Clayton, R.3    Moore, T.4
  • 2
    • 67249115152 scopus 로고    scopus 로고
    • working paper, Computer Laboratory, University of Cambridge
    • Anderson, Ross and Tyler Moore, "Information Security Economics - and Beyond", working paper, Computer Laboratory, University of Cambridge, 2008. http://www.cl.cam.ac.uk/~rja14/Papers/econ_czech.pdf.
    • (2008) Information Security Economics - and Beyond
    • Anderson, R.1    Moore, T.2
  • 3
    • 33750703619 scopus 로고    scopus 로고
    • Network Software Security and User Incentives
    • August, T., T. Tunca. 2006. Network Software Security and User Incentives. Management Science 52(11) 1703-1720.
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.2
  • 4
    • 0000787258 scopus 로고
    • Crime and punishment: An economic approach
    • March-April
    • Becker, G., "Crime and punishment: An economic approach." Journal of Political Economy, 76, 2 (March-April 1968), pp.169-217.
    • (1968) Journal of Political Economy , vol.76 , Issue.2 , pp. 169-217
    • Becker, G.1
  • 6
    • 84869997895 scopus 로고    scopus 로고
    • The Seventh Workshop on the Economics of Information Security, June 25-28, Tuck School of Business at Dartmouth College
    • Bolot, Jean and Lelarge, Marc. Cyber Insurance as an Incentive for Internet Security. The Seventh Workshop on the Economics of Information Security, June 25-28, 2008, Tuck School of Business at Dartmouth College.
    • (2008) Cyber Insurance As An Incentive For Internet Security
    • Bolot, J.1    Lelarge, M.2
  • 7
    • 7444242205 scopus 로고    scopus 로고
    • 'The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers'
    • Cavusoglu H, Mishra B and S Raghunathan (2004) 'The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers' International Journal of Electronic Commerce, 9(1), 69
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.1 , pp. 69
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 8
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu, Huseyin, Birendra Mishra, Srinivasan Raghunathan. 2005. The value of intrusion detection systems in information technology security architecture. Information Systems Research 16(1) 2846
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 2846
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 9
    • 34248356423 scopus 로고    scopus 로고
    • Inference with Difference-in-Differences and Other Panel Data
    • Donald, Stephen G. and Kevin Lang. 2007. "Inference with Difference-in-Differences and Other Panel Data." Review of Economics and Statistics. 89 (2): 221-233.
    • (2007) Review of Economics and Statistics , vol.89 , Issue.2 , pp. 221-233
    • Donald, S.G.1    Lang, K.2
  • 10
    • 34547101651 scopus 로고    scopus 로고
    • The economics of crime, Chapter 52
    • In Orley Ashenfelter and David E. Card, (eds.), Amsterdam, Netherlands: Elsevier
    • Freeman, R.B. The economics of crime, Chapter 52, In Orley Ashenfelter and David E. Card, (eds.), Handbook of Labor Economics, Volume 3C, 1999, Amsterdam, Netherlands: Elsevier, pp.3529-3571.
    • (1999) Handbook of Labor Economics , vol.3 C , pp. 3529-3571
    • Freeman, R.B.1
  • 11
    • 34547101651 scopus 로고    scopus 로고
    • The economics of crime
    • In O. Ashenfelter and D.E. Card (eds.), Amsterdam: Elsevier
    • Freeman, R.B., The economics of crime. In O. Ashenfelter and D.E. Card (eds.), Handbook of Labor Economics, volume 3C. Amsterdam: Elsevier, 1999, pp. 3529-3571.
    • (1999) Handbook of Labor Economics , vol.3 C , pp. 3529-3571
    • Freeman, R.B.1
  • 12
    • 10344224249 scopus 로고    scopus 로고
    • Exact interpretation of dummy variables in semilogarithmic equations
    • IANA, as of March 7
    • Garderen, Kees Jan Van and Chandra Shah, "Exact interpretation of dummy variables in semilogarithmic equations", Econometrics Journal, Vol. 5, No. 1, 2002, 149-159. IANA, http://www.iana.org/assignments/portnumbers, as of March 7, 2009.
    • (2002) Econometrics Journal , vol.5 , Issue.1 , pp. 149-159
    • van Garderen, K.J.1    Shah, C.2
  • 13
    • 33846349590 scopus 로고    scopus 로고
    • New developments in social interdependence theory, (SOCIAL INTERDEPENDENCE THEORY)
    • Heldref Publications
    • Johnson, David W. and Roger Johnson, "New developments in social interdependence theory, (SOCIAL INTERDEPENDENCE THEORY)", Genetic, Social, and General Psychology Monographs, Heldref Publications, 2005.
    • (2005) Genetic, Social, and General Psychology Monographs
    • Johnson, D.W.1    Johnson, R.2
  • 14
    • 35948938098 scopus 로고    scopus 로고
    • Market Reactions to Information Security Breach Announcements: An Empirical Analysis
    • Kannan, K., Rees, J., and Sridhar, S., "Market Reactions to Information Security Breach Announcements: An Empirical Analysis," International Journal of Electronic Commerce, 12(1), 69-91. 2007.
    • (2007) International Journal of Electronic Commerce , vol.12 , Issue.1 , pp. 69-91
    • Kannan, K.1    Rees, J.2    Sridhar, S.3
  • 15
    • 0001379680 scopus 로고
    • Estimation with correctly interpreted dummy variables in semilogarithmic equations
    • Sep
    • Kennedy, P. E., "Estimation with correctly interpreted dummy variables in semilogarithmic equations", American Economic Review, Vol. 71, No. 4 (Sep., 1981), 801.
    • (1981) American Economic Review , vol.71 , Issue.4 , pp. 801
    • Kennedy, P.E.1
  • 16
    • 33244491931 scopus 로고    scopus 로고
    • The simple economics of cybercrimes
    • January/February
    • Kshetri, N., "The simple economics of cybercrimes", IEEE Security & Privacy, 4, 1 (January/February 2006), 33-39.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.1 , pp. 33-39
    • Kshetri, N.1
  • 17
    • 0037786763 scopus 로고    scopus 로고
    • Interdependent Security
    • March
    • Kunreuther, Howard and Geoffrey Heal, "Interdependent Security", Journal of Risk and Uncertainty, Vol. 26 Nos. 2/3, March 2003, 231-249.
    • (2003) Journal of Risk and Uncertainty , vol.26 , Issue.2-3 , pp. 231-249
    • Kunreuther, H.1    Heal, G.2
  • 18
    • 34447320540 scopus 로고    scopus 로고
    • Modeling Interdependent Security
    • June
    • Kunreuther, Howard and Geoffrey Heal, "Modeling Interdependent Security", Risk Analysis, Vol. 27 No. 3, June 2007, 621-634.
    • (2007) Risk Analysis , vol.27 , Issue.3 , pp. 621-634
    • Kunreuther, H.1    Heal, G.2
  • 20
    • 76549254593 scopus 로고
    • Notes on continuous stochastic phenomena
    • Moran, P.A.P. (1950). Notes on continuous stochastic phenomena. Biometrika 37, 17-23.
    • (1950) Biometrika , vol.37 , pp. 17-23
    • Moran, P.A.P.1
  • 21
    • 33846588487 scopus 로고    scopus 로고
    • To Disclose Or Not? An Analysis of Software User Behavior
    • Nizovtsev, D. M. Thursby. 2007. To Disclose Or Not? An Analysis of Software User Behavior. Information Economics and Policy 19(1) 43-64.
    • (2007) Information Economics and Policy , vol.19 , Issue.1 , pp. 43-64
    • Nizovtsev, D.M.T.1
  • 22
    • 0031291185 scopus 로고    scopus 로고
    • The Classical Liberals Were Right: Democracy, Interdependence, and Conflict, 1950-1985
    • Oneal, John R. and Bruce M. Russett, "The Classical Liberals Were Right: Democracy, Interdependence, and Conflict, 1950-1985", International Studies Quarterly, 1997, 41, 267-294.
    • (1997) International Studies Quarterly , vol.41 , pp. 267-294
    • Oneal, J.R.1    Russett, B.M.2
  • 23
    • 63349088117 scopus 로고    scopus 로고
    • The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
    • Fall
    • Png, Ivan P.L., Wang, Chen-Yu, and Wang, Qiu-Hong "The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence," Journal of Management Information Systems, 25:2, Fall 2008, 125-144.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 125-144
    • Png, I.P.L.1    Wang, C.-Y.2    Wang, Q.-H.3
  • 24
    • 0001861227 scopus 로고    scopus 로고
    • The economic theory of public enforcement of law
    • (March)
    • Polinsky, A.M., and Shavell, S., "The economic theory of public enforcement of law," Journal of Economic Literature, 38, 1 (March 2000), pp.45-77.
    • (2000) Journal of Economic Literature , vol.38 , Issue.1 , pp. 45-77
    • Polinsky, A.M.1    Shavell, S.2
  • 25
    • 84980092818 scopus 로고
    • Capital Asset Prices: A Theory of Market Equilibrium under Conditions of Risk
    • Sharpe, William F., "Capital Asset Prices: A Theory of Market Equilibrium under Conditions of Risk", Journal of Finance, 1964, 19:3, pp. 425-442.
    • (1964) Journal of Finance , vol.19 , Issue.3 , pp. 425-442
    • Sharpe, W.F.1
  • 27
    • 34547100991 scopus 로고    scopus 로고
    • Impact of Vulnerability Disclosure on Market Value of Software Vendors: An Empirical Analysis
    • Telang R., S. Wattal. 2007. "Impact of Vulnerability Disclosure on Market Value of Software Vendors: An Empirical Analysis", IEEE Transactions on software Engineering, 33(8), 544-557.
    • (2007) IEEE Transactions On Software Engineering , vol.33 , Issue.8 , pp. 544-557
    • Telang, R.1    Wattal, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.