-
1
-
-
84870972994
-
-
Workshop on the Economics of Information Security (WEIS), Dartmouth College, Hanover, NH (USA), June
-
Anderson, R., R. Böhme, R. Clayton, and T. Moore, "Security Economics and European Policy," Workshop on the Economics of Information Security (WEIS), Dartmouth College, Hanover, NH (USA), June 2008.
-
(2008)
Security Economics and European Policy
-
-
Anderson, R.1
Böhme, R.2
Clayton, R.3
Moore, T.4
-
2
-
-
67249115152
-
-
working paper, Computer Laboratory, University of Cambridge
-
Anderson, Ross and Tyler Moore, "Information Security Economics - and Beyond", working paper, Computer Laboratory, University of Cambridge, 2008. http://www.cl.cam.ac.uk/~rja14/Papers/econ_czech.pdf.
-
(2008)
Information Security Economics - and Beyond
-
-
Anderson, R.1
Moore, T.2
-
3
-
-
33750703619
-
Network Software Security and User Incentives
-
August, T., T. Tunca. 2006. Network Software Security and User Incentives. Management Science 52(11) 1703-1720.
-
(2006)
Management Science
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.2
-
4
-
-
0000787258
-
Crime and punishment: An economic approach
-
March-April
-
Becker, G., "Crime and punishment: An economic approach." Journal of Political Economy, 76, 2 (March-April 1968), pp.169-217.
-
(1968)
Journal of Political Economy
, vol.76
, Issue.2
, pp. 169-217
-
-
Becker, G.1
-
5
-
-
84870970632
-
-
Workshop on the Economics of Information Security (WEIS), University of Cambridge, UK, June
-
Böhme R. and G. Kataria, "Models and Measures for Correlation in Cyber-Insurance," Workshop on the Economics of Information Security (WEIS), University of Cambridge, UK, June 2006.
-
(2006)
Models and Measures For Correlation In Cyber-Insurance
-
-
Böhme, R.1
Kataria, G.2
-
6
-
-
84869997895
-
-
The Seventh Workshop on the Economics of Information Security, June 25-28, Tuck School of Business at Dartmouth College
-
Bolot, Jean and Lelarge, Marc. Cyber Insurance as an Incentive for Internet Security. The Seventh Workshop on the Economics of Information Security, June 25-28, 2008, Tuck School of Business at Dartmouth College.
-
(2008)
Cyber Insurance As An Incentive For Internet Security
-
-
Bolot, J.1
Lelarge, M.2
-
7
-
-
7444242205
-
'The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers'
-
Cavusoglu H, Mishra B and S Raghunathan (2004) 'The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers' International Journal of Electronic Commerce, 9(1), 69
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 69
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
8
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu, Huseyin, Birendra Mishra, Srinivasan Raghunathan. 2005. The value of intrusion detection systems in information technology security architecture. Information Systems Research 16(1) 2846
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 2846
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
9
-
-
34248356423
-
Inference with Difference-in-Differences and Other Panel Data
-
Donald, Stephen G. and Kevin Lang. 2007. "Inference with Difference-in-Differences and Other Panel Data." Review of Economics and Statistics. 89 (2): 221-233.
-
(2007)
Review of Economics and Statistics
, vol.89
, Issue.2
, pp. 221-233
-
-
Donald, S.G.1
Lang, K.2
-
10
-
-
34547101651
-
The economics of crime, Chapter 52
-
In Orley Ashenfelter and David E. Card, (eds.), Amsterdam, Netherlands: Elsevier
-
Freeman, R.B. The economics of crime, Chapter 52, In Orley Ashenfelter and David E. Card, (eds.), Handbook of Labor Economics, Volume 3C, 1999, Amsterdam, Netherlands: Elsevier, pp.3529-3571.
-
(1999)
Handbook of Labor Economics
, vol.3 C
, pp. 3529-3571
-
-
Freeman, R.B.1
-
11
-
-
34547101651
-
The economics of crime
-
In O. Ashenfelter and D.E. Card (eds.), Amsterdam: Elsevier
-
Freeman, R.B., The economics of crime. In O. Ashenfelter and D.E. Card (eds.), Handbook of Labor Economics, volume 3C. Amsterdam: Elsevier, 1999, pp. 3529-3571.
-
(1999)
Handbook of Labor Economics
, vol.3 C
, pp. 3529-3571
-
-
Freeman, R.B.1
-
12
-
-
10344224249
-
Exact interpretation of dummy variables in semilogarithmic equations
-
IANA, as of March 7
-
Garderen, Kees Jan Van and Chandra Shah, "Exact interpretation of dummy variables in semilogarithmic equations", Econometrics Journal, Vol. 5, No. 1, 2002, 149-159. IANA, http://www.iana.org/assignments/portnumbers, as of March 7, 2009.
-
(2002)
Econometrics Journal
, vol.5
, Issue.1
, pp. 149-159
-
-
van Garderen, K.J.1
Shah, C.2
-
13
-
-
33846349590
-
New developments in social interdependence theory, (SOCIAL INTERDEPENDENCE THEORY)
-
Heldref Publications
-
Johnson, David W. and Roger Johnson, "New developments in social interdependence theory, (SOCIAL INTERDEPENDENCE THEORY)", Genetic, Social, and General Psychology Monographs, Heldref Publications, 2005.
-
(2005)
Genetic, Social, and General Psychology Monographs
-
-
Johnson, D.W.1
Johnson, R.2
-
14
-
-
35948938098
-
Market Reactions to Information Security Breach Announcements: An Empirical Analysis
-
Kannan, K., Rees, J., and Sridhar, S., "Market Reactions to Information Security Breach Announcements: An Empirical Analysis," International Journal of Electronic Commerce, 12(1), 69-91. 2007.
-
(2007)
International Journal of Electronic Commerce
, vol.12
, Issue.1
, pp. 69-91
-
-
Kannan, K.1
Rees, J.2
Sridhar, S.3
-
15
-
-
0001379680
-
Estimation with correctly interpreted dummy variables in semilogarithmic equations
-
Sep
-
Kennedy, P. E., "Estimation with correctly interpreted dummy variables in semilogarithmic equations", American Economic Review, Vol. 71, No. 4 (Sep., 1981), 801.
-
(1981)
American Economic Review
, vol.71
, Issue.4
, pp. 801
-
-
Kennedy, P.E.1
-
16
-
-
33244491931
-
The simple economics of cybercrimes
-
January/February
-
Kshetri, N., "The simple economics of cybercrimes", IEEE Security & Privacy, 4, 1 (January/February 2006), 33-39.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.1
, pp. 33-39
-
-
Kshetri, N.1
-
17
-
-
0037786763
-
Interdependent Security
-
March
-
Kunreuther, Howard and Geoffrey Heal, "Interdependent Security", Journal of Risk and Uncertainty, Vol. 26 Nos. 2/3, March 2003, 231-249.
-
(2003)
Journal of Risk and Uncertainty
, vol.26
, Issue.2-3
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
18
-
-
34447320540
-
Modeling Interdependent Security
-
June
-
Kunreuther, Howard and Geoffrey Heal, "Modeling Interdependent Security", Risk Analysis, Vol. 27 No. 3, June 2007, 621-634.
-
(2007)
Risk Analysis
, vol.27
, Issue.3
, pp. 621-634
-
-
Kunreuther, H.1
Heal, G.2
-
19
-
-
33750054735
-
-
ACM Computing Research Repository (CoRR), Technical Report cs.CR/0601020
-
Majuca, R. P., W. Yurcik, and J. P. Kesan. "The evolution of cyberinsurance," ACM Computing Research Repository (CoRR), Technical Report cs.CR/0601020, 2006.
-
(2006)
The Evolution of Cyberinsurance
-
-
Majuca, R.P.1
Yurcik, W.2
Kesan, J.P.3
-
20
-
-
76549254593
-
Notes on continuous stochastic phenomena
-
Moran, P.A.P. (1950). Notes on continuous stochastic phenomena. Biometrika 37, 17-23.
-
(1950)
Biometrika
, vol.37
, pp. 17-23
-
-
Moran, P.A.P.1
-
21
-
-
33846588487
-
To Disclose Or Not? An Analysis of Software User Behavior
-
Nizovtsev, D. M. Thursby. 2007. To Disclose Or Not? An Analysis of Software User Behavior. Information Economics and Policy 19(1) 43-64.
-
(2007)
Information Economics and Policy
, vol.19
, Issue.1
, pp. 43-64
-
-
Nizovtsev, D.M.T.1
-
22
-
-
0031291185
-
The Classical Liberals Were Right: Democracy, Interdependence, and Conflict, 1950-1985
-
Oneal, John R. and Bruce M. Russett, "The Classical Liberals Were Right: Democracy, Interdependence, and Conflict, 1950-1985", International Studies Quarterly, 1997, 41, 267-294.
-
(1997)
International Studies Quarterly
, vol.41
, pp. 267-294
-
-
Oneal, J.R.1
Russett, B.M.2
-
23
-
-
63349088117
-
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
-
Fall
-
Png, Ivan P.L., Wang, Chen-Yu, and Wang, Qiu-Hong "The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence," Journal of Management Information Systems, 25:2, Fall 2008, 125-144.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 125-144
-
-
Png, I.P.L.1
Wang, C.-Y.2
Wang, Q.-H.3
-
24
-
-
0001861227
-
The economic theory of public enforcement of law
-
(March)
-
Polinsky, A.M., and Shavell, S., "The economic theory of public enforcement of law," Journal of Economic Literature, 38, 1 (March 2000), pp.45-77.
-
(2000)
Journal of Economic Literature
, vol.38
, Issue.1
, pp. 45-77
-
-
Polinsky, A.M.1
Shavell, S.2
-
25
-
-
84980092818
-
Capital Asset Prices: A Theory of Market Equilibrium under Conditions of Risk
-
Sharpe, William F., "Capital Asset Prices: A Theory of Market Equilibrium under Conditions of Risk", Journal of Finance, 1964, 19:3, pp. 425-442.
-
(1964)
Journal of Finance
, vol.19
, Issue.3
, pp. 425-442
-
-
Sharpe, W.F.1
-
27
-
-
34547100991
-
Impact of Vulnerability Disclosure on Market Value of Software Vendors: An Empirical Analysis
-
Telang R., S. Wattal. 2007. "Impact of Vulnerability Disclosure on Market Value of Software Vendors: An Empirical Analysis", IEEE Transactions on software Engineering, 33(8), 544-557.
-
(2007)
IEEE Transactions On Software Engineering
, vol.33
, Issue.8
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
|