-
4
-
-
84886433601
-
Blueprint for a science of cybersecurity
-
47
-
See Fred B. Schneider, Blueprint for a Science of Cybersecurity, 19 Next Wave 47, 47(2012), archived at http://perma.cc/CMH7-QNJL.
-
(2012)
Next Wave
, vol.19
, pp. 47
-
-
Schneider, F.B.1
-
5
-
-
84964531840
-
Guest editor's column
-
i
-
Frederick R. Chang, Guest Editor's Column, 19 Next Wave i, i (2012), archived at http://perma.cc/Q4KV-LYXF ("There are some promising indications that a science of cybersecurity initiative is gaining momentum, including several workshops, conferences, and reports that point to the need for an interdisciplinary approach to addressing the problem.");
-
(2012)
Next Wave
, vol.19
, pp. i
-
-
Chang, F.R.1
-
6
-
-
84986616439
-
NSA initiatives in cybersecurity science
-
10-11
-
Robert Meushaw, NSA Initiatives in Cybersecurity Science, 19 Next Wave 8, 10-11(2012), archived at http://perma.cc/Q4KV-LYXF (discussing funding for cybersecurity research).
-
(2012)
Next Wave
, vol.19
, pp. 8
-
-
Meushaw, R.1
-
8
-
-
84964540245
-
-
cited in note 5
-
Schneider, Blueprint at 53 (cited in note 5).
-
Blueprint
, pp. 53
-
-
Schneider1
-
9
-
-
84964540226
-
-
AFCEA International Cyber Committee, June
-
See Charles H. Brown, et al, The Science of Security: A Survey and Analysis ∗2 (AFCEA International Cyber Committee, June 2014), archived at http://perma.cc/39CH-XUJF (highlighting the various areas that are reliant on cybertechnologies and the broad motivations for developing a science of cybersecurity).
-
(2014)
The Science of Security: A Survey and Analysis
, pp. 2
-
-
Brown, C.H.1
-
10
-
-
84892448683
-
-
House Permanent Select Committee on Intelligence, Sept 10
-
James R. Clapper, Worldwide Cyber Threats ∗2 (House Permanent Select Committee on Intelligence, Sept 10, 2015), archived at http://perma.cc/7XN6-9N5W.
-
(2015)
Worldwide Cyber Threats
, pp. 2
-
-
Clapper, J.R.1
-
12
-
-
84964422958
-
-
Twenty Seventh International Conference on Information Systems
-
See Alessandro Acquisti, Allan Friedman, and Rahul Telang, Is There a Cost to Privacy Breaches? An Event Study ∗2 (Twenty Seventh International Conference on Information Systems, 2006), archived at http://perma.cc/4QM6-VHT2 (noting that some companies that have experienced "privacy debacles" were subjected to "public outrage and hard to quantify reputation losses").
-
(2006)
Is There a Cost to Privacy Breaches? An Event Study
, pp. 2
-
-
Acquisti, A.1
Friedman, A.2
Telang, R.3
-
14
-
-
84964487857
-
-
Visa, Apr. 15
-
See, for example, Visa International Operating Regulations ∗648-53 (Visa, Apr. 15, 2014), archived at http://perma.cc/79X7-EDGL.
-
(2014)
Visa International Operating Regulations
, pp. 648-653
-
-
-
15
-
-
84865316760
-
Private disordering? Payment card fraud liability rules
-
14-15
-
See also Adam J. Levitin, Private Disordering? Payment Card Fraud Liability Rules, 5 Brooklyn J Corp, Fin & Comm L 1, 14-15 (2010) (outlining the general rules of liability for unauthorized credit card transactions);
-
(2010)
Brooklyn J Corp, Fin & Comm L
, vol.5
, pp. 1
-
-
Levitin, A.J.1
-
16
-
-
41449116360
-
Cybersecurity in the payment card industry
-
214-16
-
Richard A. Epstein and Thomas P. Brown, Cybersecurity in the Payment Card Industry, 75 U Chi L Rev 203, 214-16 (2008) (describing the "elaborate systems to detect fraud" and the punishments prescribed for noncompliance).
-
(2008)
U Chi L Rev
, vol.75
, pp. 203
-
-
Epstein, R.A.1
Brown, T.P.2
-
17
-
-
84964457351
-
Pennsylvania State Employees Credit Union v Fifth Third Bank
-
322 MD Pa
-
See, for example, Pennsylvania State Employees Credit Union v Fifth Third Bank, 398 F Supp 2d 317, 322 (MD Pa 2005) (stating that the Pennsylvania State Employees Credit Union canceled and reissued 20, 029 cards at a total cost of $98, 128, or about $5 per card);
-
(2005)
F Supp 2d
, vol.398
, pp. 317
-
-
-
18
-
-
84964457306
-
-
Maine Department of Professional & Financial Regulation, Nov. 24
-
Maine Bureau of Financial Institutions, Maine Data Breach Study ∗18-20 (Maine Department of Professional & Financial Regulation, Nov. 24, 2008), archived at http://perma.cc/D8U9-CMA7 (finding reissuance costs totaling $1, 164, 200 across 246, 479 reissued cards, or an average cost to issuers of $4.72 per card);
-
(2008)
Maine Data Breach Study
, pp. 18-20
-
-
Maine Bureau of Financial Institutions1
-
19
-
-
84964530717
-
-
Reuters, Apr. 28
-
Maria Aspan and Clare Baldwin, Sony Breach Could Cost Card Lenders $300 Mln (Reuters, Apr. 28, 2011), archived at http://perma.cc/W6YE-KCMK (reporting that "[e]ach customer request to replace a credit card would cost lenders about $3 to $5 per card", which includes "the new piece of plastic itself, postage, and various customer service costs");
-
(2011)
Sony Breach Could Cost Card Lenders $300 Mln
-
-
Aspan, M.1
Baldwin, C.2
-
20
-
-
84964530714
-
TJX Reacts to Bank Lawsuit; T. J. Maxx Parent in Filing Says TrustCo Failed to Mitigate Injury from Data Breach
-
Aug. 30
-
Chris Churchill, TJX Reacts to Bank Lawsuit; T. J. Maxx Parent in Filing Says TrustCo Failed to Mitigate Injury from Data Breach, Times Union B9 (Aug. 30, 2008) (citing TrustCo as saying that its costs from the TJX breach, including reissuing four thousand debit cards, were up to $20 per affected account);
-
(2008)
Times Union
, pp. B9
-
-
Churchill, C.1
-
21
-
-
84964457365
-
IDs are a steal; thieves looking for credit numbers set their sights on big targets
-
Aug. 23
-
Mark Jewell, IDs Are a Steal; Thieves Looking for Credit Numbers Set Their Sights on Big Targets, Vancouver Columbian E1 (Aug. 23, 2004) (reporting that Sovereign Bank reissued eighty-one thousand cards twice at a total cost of about $1 million);
-
(2004)
Vancouver Columbian
, pp. E1
-
-
Jewell, M.1
-
22
-
-
84964540193
-
Compromised credit cards top 100, 000
-
Jan 31
-
Denis Paiste, Compromised Credit Cards Top 100, 000, NH Union Leader B3 (Jan 31, 2007) (reporting that "[v]arious banks and credit unions have said it costs from $5 to $25 per card reissued");
-
(2007)
NH Union Leader
, pp. B3
-
-
Paiste, D.1
-
23
-
-
84964540186
-
Banks start credit card reissue; breach of databases prompts replacements
-
Feb. 8
-
Anne Ravana, Banks Start Credit Card Reissue; Breach of Databases Prompts Replacements, Bangor Daily News A4 (Feb. 8, 2007) (quoting a Merrill Bank executive as saying that the cost of replacing seventyone cards was about $14 per card);
-
(2007)
Bangor Daily News
, pp. A4
-
-
Ravana, A.1
-
24
-
-
84964487824
-
Computer hackers are stealing bank card information, but there is protection and some banks have been aggressive
-
July 11
-
Eric G. Stark, Computer Hackers Are Stealing Bank Card Information, but There Is Protection and Some Banks Have Been Aggressive, Lancaster Sunday News D1 (July 11, 2004) (reporting that Fulton Bank spent $100, 000 to replace twenty thousand cards).
-
(2004)
Lancaster Sunday News
, pp. D1
-
-
Stark, E.G.1
-
25
-
-
84964487841
-
-
Sept 9
-
See, for example, Harriet Pearson, Letter to the Office of the Attorney General (Sept 9, 2014), archived at http://perma.cc/YM3P-QUZ6 (stating that Home Depot "received reports from its banking partners and law enforcement that criminals may have hacked its payment data systems");
-
(2014)
Letter to the Office of the Attorney General
-
-
Pearson, H.1
-
26
-
-
85027525282
-
-
Krebs on Security, Dec. 19
-
Brian Krebs, Staples: 6-Month Breach, 1.16 Million Cards (Krebs on Security, Dec. 19, 2014), archived at http://perma.cc/86YF-PUPG (implying that the office-supply store Staples may have been informed of a data breach by banks that noticed suspicious activity);
-
(2014)
Staples: 6-month Breach, 1.16 Million Cards
-
-
Krebs, B.1
-
33
-
-
84964487865
-
-
National Conference of State Legislatures, June 11
-
Security Breach Notification Laws (National Conference of State Legislatures, June 11, 2015), archived at http://perma.cc/86QR-KUXN.
-
(2015)
Security Breach Notification Laws
-
-
-
36
-
-
84964418075
-
-
Database Breach Notification Requirements, archived at http://perma.cc/FEH3-XTDU (requesting information to be sent to the Virginia attorney general office).
-
Database Breach Notification Requirements
-
-
-
38
-
-
84964520631
-
-
Data Breach Notices, archived at http://perma.cc/4L2L-VUGE (listing breach notifications sent to the attorney general of Maine);
-
Data Breach Notices
-
-
-
40
-
-
84964520615
-
-
New Hampshire Department of Justice
-
Security Breach Notifications (New Hampshire Department of Justice), archived at http://perma.cc/PW7M-24JN.
-
Security Breach Notifications
-
-
-
41
-
-
84964520611
-
-
cited in note 20
-
See Langton, Identity Theft at ∗5 (cited in note 20).
-
Identity Theft
, pp. 5
-
-
Langton1
-
47
-
-
84964418379
-
-
cited in note 33
-
Foley, et al, Identity Theft at ∗15 (cited in note 33).
-
Identity Theft at
, pp. 15
-
-
Foley1
-
49
-
-
84964511796
-
-
cited in note 32
-
See, for example, Gordon, et al, Identity Fraud Trends at ∗53 (cited in note 32).
-
Identity Fraud Trends
, pp. 53
-
-
Gordon1
-
50
-
-
77956890234
-
Monte Carlo sampling methods using Markov chains and their applications
-
97-98
-
For an introduction to Monte Carlo simulations, see W. K. Hastings, Monte Carlo Sampling Methods Using Markov Chains and Their Applications, 57 Biometrika 97, 97-98 (1970) ("For numerical problems in a large number of dimensions, Monte Carlo methods are often more efficient than conventional numerical methods.").
-
(1970)
Biometrika
, vol.57
, pp. 97
-
-
Hastings, W.K.1
-
52
-
-
84964453755
-
-
Aite Group, Oct
-
See, for example, Shirley W. Inscoe, Global Consumers React to Rising Fraud: Beware Back of Wallet ∗17 (Aite Group, Oct. 2012), archived at http://perma.cc/TZ4B-QB2F ("33% of consumers who received replacement cards [after a breach] state that they used the new card less frequently than the original card."). It is unclear whether this is because a card was reissued or because of the card exposure regardless of reissue.
-
(2012)
Global Consumers React to Rising Fraud: Beware Back of Wallet
, pp. 17
-
-
Inscoe, S.W.1
-
54
-
-
75749102614
-
The economics of online crime
-
3-4 Summer
-
See Tyler Moore, Richard Clayton, and Ross Anderson, The Economics of Online Crime, 23 J Econ Persp 3, 3-4 (Summer 2009) (describing the transition from "amateur hackers who defaced websites and wrote malicious software" in a "cottage industry" to "criminal networks" and "online black markets").
-
(2009)
J Econ Persp
, vol.23
, pp. 3
-
-
Moore, T.1
Clayton, R.2
Anderson, R.3
-
55
-
-
84898033338
-
Measuring the cost of cybercrime
-
Rainer Böhme, ed, 296-97 Springer
-
See id; Ross Anderson, et al, Measuring the Cost of Cybercrime, in Rainer Böhme, ed, The Economics of Information Security and Privacy 265, 296-97 (Springer 2013).
-
(2013)
The Economics of Information Security and Privacy
, pp. 265
-
-
Anderson, R.1
-
56
-
-
0032402858
-
The effect of variation in high-level domestic drug enforcement on variation in drug prices
-
266
-
See, for example, Yuehong Yuan and Jonathan P. Caulkins, The Effect of Variation in High-Level Domestic Drug Enforcement on Variation in Drug Prices, 32 Socio-Econ Planning Sci 265, 266 (1998).
-
(1998)
Socio-Econ Planning Sci
, vol.32
, pp. 265
-
-
Yuan, Y.1
Caulkins, J.P.2
-
57
-
-
84964504437
-
-
cited in note 40
-
See, for example, Moore, Clayton, and Anderson, 23 J Econ Persp at 8 (cited in note 40) (describing the ability of researchers to "stud[y] the new criminal markets directly" by "monitor[ing] the public chat channels used by online criminals to contact each other", "infiltrat[ing]⋯ botnet[s]", and using related means).
-
J Econ Persp
, vol.23
, pp. 8
-
-
Moore1
Clayton2
Anderson3
-
58
-
-
84964541648
-
-
Anderson, et al, cited in note 41
-
Anderson, et al, Measuring the Cost at 267-73 (cited in note 41).
-
Measuring the Cost
, pp. 267-273
-
-
-
59
-
-
84888321575
-
-
Pro Publica, Aug. 1
-
See Peter Maass and Megha Rajagopalan, Does Cybercrime Really Cost $1 Trillion? (Pro Publica, Aug. 1, 2012), archived at http://perma.cc/6UD3-GA3S (questioning McAfee's $1 trillion estimate, a figure cited by General Keith Alexander, then-director of the NSA, but published only in a McAfee news release and not in its cybercrime study);
-
(2012)
Does Cybercrime Really Cost $1 Trillion?
-
-
Maass, P.1
Rajagopalan, M.2
-
62
-
-
84964453849
-
-
Compare Ross Anderson
-
Compare Ross Anderson, Unsettling Parallels between Security and the Environment, archived at http://perma.cc/A8Z6-L67K ("My intuition is that many firms get it about right, or if anything spend slightly too much [on network security].")
-
Unsettling Parallels between Security and the Environment
-
-
-
63
-
-
84964487785
-
-
with, Workshop on Economics and Information Security, May 16
-
with Bruce Schneier, Computer Security: It's the Economics, Stupid (Workshop on Economics and Information Security, May 16, 2002), archived at http://perma.cc/RWR3-J4XQ (arguing that organizations spend too little on computer security but will spend more only if software companies improve their security abilities).
-
(2002)
Computer Security: It's the Economics, Stupid
-
-
Schneier, B.1
-
66
-
-
84964541616
-
-
Daily Dot, May 13
-
See, for example, Patrick Howell O'Neill, Dark Net Markets Offer More Drugs Than Ever Before (Daily Dot, May 13, 2015), archived at http://perma.cc/432X-46JT ("Dark Net markets have grown over 37 percent in product listings in the last year despite sweeping police actions and the constant threat of multimillion-dollar thefts looming large.");
-
(2015)
Dark Net Markets Offer More Drugs Than Ever Before
-
-
Howell O'Neill, P.1
-
67
-
-
84964504418
-
-
US News, Mar. 18
-
Steven Nelson, Largest Online Drug Market Shuts in Massive Suspected Scam (US News, Mar. 18, 2015), archived at http://perma.cc/2MS4-JQLX ("The 15 largest deep web markets had about 42, 000 drug listings, indicating the overall deep web drug market had nearly recovered from last year's FBI-led raids.");
-
(2015)
Largest Online Drug Market Shuts in Massive Suspected Scam
-
-
Nelson, S.1
-
70
-
-
84867116528
-
Introduction: The politics of numbers
-
Peter Andreas and Kelly M. Greenhill, eds, 19 Cornell
-
Peter Andreas and Kelly M. Greenhill, Introduction: The Politics of Numbers, in Peter Andreas and Kelly M. Greenhill, eds, Sex, Drugs, and Body Counts: The Politics of Numbers in Global Crime and Conflict 1, 19 (Cornell 2010).
-
(2010)
Sex, Drugs, and Body Counts: The Politics of Numbers in Global Crime and Conflict
, pp. 1
-
-
Andreas, P.1
Greenhill, K.M.2
-
72
-
-
84964504404
-
-
MailChimp, July 24
-
See How Blacklists Work (MailChimp, July 24, 2015), archived at http://perma.cc/534J-MHHL.
-
(2015)
How Blacklists Work
-
-
-
75
-
-
84929077014
-
Bitcoin: Economics, technology, and governance
-
222-23 Spring
-
Rainer Böhme, et al, Bitcoin: Economics, Technology, and Governance, 29 J Econ Persp 213, 222-23 (Spring 2015).
-
(2015)
J Econ Persp
, vol.29
, pp. 213
-
-
Böhme, R.1
-
76
-
-
84930982034
-
-
Criminal Action No 13-2328, SDNY filed Sept 27
-
Sealed Complaint, United States v Ulbricht, Criminal Action No 13-2328, ∗15 (SDNY filed Sept 27, 2013) ("Ulbricht Complaint") ("The total revenue generated from these sales was 9, 519, 664 Bitcoins, and the total commissions collected by Silk Road from the sales amounted to 614, 305 Bitcoins. These figures are equivalent to roughly $1.2 billion in revenue and $79.8 million in commissions.").
-
(2013)
United States V Ulbricht
, pp. 15
-
-
Complaint, S.1
-
78
-
-
84964496731
-
-
Wired, May 23
-
See, for example, Joshuah Bearman, Silk Road: The Untold Story (Wired, May 23, 2015), archived at http://perma.cc/JL8R-3F43;
-
(2015)
Silk Road: The Untold Story
-
-
Bearman, J.1
-
82
-
-
84964472842
-
-
See, for example, Soska and Christin, Measuring the Longitudinal Evolution at ∗40 (cited in note 50) (estimating Silk Road's gross sales at over $100 million per year, which "appears consistent with the (revised) US Government calculations of $214M of total grossed income by Silk Road over its lifetime").
-
Measuring the Longitudinal Evolution
, pp. 40
-
-
Soska1
Christin2
-
83
-
-
84964542301
-
-
cited in note 60
-
See Ulbricht Complaint at ∗15 (cited in note 60).
-
Ulbricht Complaint
, pp. 15
-
-
-
84
-
-
84964496740
-
United States v Ulbricht
-
550 SDNY
-
See United States v Ulbricht, 31 F Supp 3d 540, 550 (SDNY 2014) ("According to the Indictment, the defendant pursued violent means, including soliciting the murderfor-hire of several individuals he believed posed a threat to that enterprise.') (quotation marks omitted).
-
(2014)
F Supp 3d
, vol.31
, pp. 540
-
-
-
85
-
-
73049098066
-
-
Criminal Action No 13-0222, D Md filed Oct. 1
-
See also Superseding Indictment, United States v Ulbricht, Criminal Action No 13-0222, ∗6-11 (D Md filed Oct. 1, 2013).
-
(2013)
United States V Ulbricht
, pp. 6-11
-
-
Superseding Indictment1
-
89
-
-
84922535939
-
-
UN Office on Drugs and Crime, June
-
World Drug Report 2014 ∗18 (UN Office on Drugs and Crime, June 2014), archived at http://perma.cc/4GKG-4TW8.
-
(2014)
World Drug Report 2014
, pp. 18
-
-
-
90
-
-
78349239937
-
-
Sept 16
-
See, for example, Fred Chong, et al, National Cyber Leap Year Summit 2009: Co-Chairs' Report ∗9-12 (Sept 16, 2009), archived at http://perma.cc/4CAK-5TZ6 ("[I]t is imperative that appropriate models of cooperation are developed immediately to incentivize the participants to engage in research, development, and testing of technologies and approaches to achieve [security] goals.").
-
(2009)
National Cyber Leap Year Summit 2009: Co-Chairs' Report
, pp. 9-12
-
-
Chong, F.1
-
91
-
-
84964527953
-
-
Wall St J, Oct. 5
-
See, for example, Shirley S. Wang, How Much Should Scientists Check Other Scientists' Work? (Wall St J, Oct. 5, 2015), archived at http://perma.cc/WN46-JWGT (discussing one psychology journal's initiative to promote data sharing, as well as the advantages and disadvantages of "open science and data sharing").
-
(2015)
How Much Should Scientists Check Other Scientists' Work?
-
-
Wang, S.S.1
-
96
-
-
84964527929
-
-
TIAS No 13174
-
TIAS No 13174, 2296 UNTS 167 (2001).
-
(2001)
UNTS
, vol.2296
, pp. 167
-
-
|