-
1
-
-
85005305538
-
The market for “lemons”: Quality uncertainty and the market mechanism
-
G.A. Akerlof. The market for “lemons”: Quality uncertainty and the market mechanism. Q. J. Econ., 84(3):488–500, 1970.
-
(1970)
Q. J. Econ
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.A.1
-
2
-
-
0034721164
-
Error and attack tolerance of complex networks
-
R. Albert, H. Jeong, and A.l. Barabási. Error and attack tolerance of complex networks. Nature, 406(1):387–482, 2000.
-
(2000)
Nature
, vol.406
, Issue.1
, pp. 387-482
-
-
Albert, R.1
Jeong, H.2
Barabási, A.L.3
-
3
-
-
0028532579
-
Why cryptosystems fail
-
R.J. Anderson. Why cryptosystems fail. Commun. ACM, 37(11):32–40, 1994.
-
(1994)
Commun. ACM
, vol.37
, Issue.11
, pp. 32-40
-
-
Anderson, R.J.1
-
5
-
-
84925838576
-
Why information security is hard – an economic perspective
-
December, New Orleans, LA
-
R. Anderson. Why information security is hard – an economic perspective. In 17th Annual Computer Security Applications Conf., December 2001. New Orleans, LA.
-
(2001)
17Th Annual Computer Security Applications Conf
-
-
Anderson, R.1
-
6
-
-
33746613622
-
A comparison of market approaches to software vulnerability disclosure
-
LNCS, Springer
-
R. Böhme. A comparison of market approaches to software vulnerability disclosure. In Proc. of ETRICS, LNCS 2995:298–311, Springer, 2006.
-
(2006)
Proc. of ETRICS
, vol.2995
, pp. 298-311
-
-
Böhme, R.1
-
8
-
-
37249061695
-
Who’s who in crime networks – wanted the key player
-
The Research Institute of Industrial Economics
-
A. Calvó-Armengol, C. Ballester, and Y. Zenou. Who’s who in crime networks – wanted the key player. In IUI Working Paper Series 617, 2004. The Research Institute of Industrial Economics.
-
(2004)
IUI Working Paper Series 617
-
-
Calvó-Armengol, A.1
Ballester, C.2
Zenou, Y.3
-
10
-
-
14744271851
-
The economics of resisting censorship
-
G. Danezis and R.J. Anderson. The economics of resisting censorship. IEEE Security & Privacy, 3(1):45–50, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 45-50
-
-
Danezis, G.1
Anderson, R.J.2
-
11
-
-
78650383918
-
-
February
-
D. Goodhart. Too diverse? Prospect, February 2004. http://www.guardian.co.uk/race/story/0,11374,1154684,00.html.
-
(2004)
Too Diverse? Prospect
-
-
Goodhart, D.1
-
13
-
-
85020616309
-
Network externalities, competition, and compatibility
-
June
-
M.L. Katz and C. Shapiro. Network externalities, competition, and compatibility. Amer. Econ. Rev., 75(3):424–440, June 1985.
-
(1985)
Amer. Econ. Rev
, vol.75
, Issue.3
, pp. 424-440
-
-
Katz, M.L.1
Shapiro, C.2
-
14
-
-
0037786763
-
Interdependent security
-
March–May 2003
-
H. Kunreuther and G. Heal. Interdependent security. J. Risk and Uncertainty, 26(2–3):231–249, March–May 2003.
-
J. Risk and Uncertainty
, vol.26
, Issue.2-3
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
21
-
-
84944051648
-
How to buy better testing
-
George I. Davida, Yair Frankel, and Owen Rees, editors, LNCS, Springer
-
S.E. Schechter. How to buy better testing. In George I. Davida, Yair Frankel, and Owen Rees, editors, InfraSec, LNCS 2437:73–87. Springer, 2002.
-
(2002)
Infrasec
, vol.2437
, pp. 73-87
-
-
Schechter, S.E.1
-
22
-
-
0012254042
-
The application of network analysis to criminal intelligence: An assessment of the prospects
-
M. Sparrow. The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13:253–274, 1990.
-
(1990)
Social Networks
, vol.13
, pp. 253-274
-
-
Sparrow, M.1
-
23
-
-
0344792106
-
Managing online security risks
-
June, Available at
-
H. Varian. Managing online security risks. The New York Times, June 2000. Available at: http://www.nytimes.com/library/financial/columns/060100econ-scene.html.
-
(2000)
The New York Times
-
-
Varian, H.1
-
24
-
-
33750482906
-
System reliability and free riding
-
L. Jean Camp and Stephen Lewis, editors, Kluwer Academic Publishers
-
H. Varian. System reliability and free riding. In L. Jean Camp and Stephen Lewis, editors, Economics of Information Security, Advances in Information Security, 12:1–15. Kluwer Academic Publishers, 2004.
-
(2004)
Economics of Information Security
, vol.12
, pp. 1-15
-
-
Varian, H.1
-
25
-
-
85032409386
-
-
Available at
-
PIN management requirements: PIN entry device security requirements manual, 2004. Available at: http://partnernetwork.visa.com/dv/pin/pdf/Visa_ATM_Security_Requirements.pdf.
-
(2004)
-
-
|