메뉴 건너뛰기




Volumn 08-10-June-2016, Issue , 2016, Pages 455-464

An economic alternative to improve Cybersecurity of e-government and smart cities

Author keywords

E government; Economics; Game Theory; Security and Privacy; Smart cities; Vulnerability

Indexed keywords

ECONOMICS; GAME THEORY;

EID: 84978654179     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2912160.2912170     Document Type: Conference Paper
Times cited : (3)

References (37)
  • 1
    • 84954443791 scopus 로고    scopus 로고
    • The Economist October 27
    • Open-Air computers. The Economist, October 27 2012.
    • (2012) Open-Air Computers
  • 5
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security: A survey and open questions
    • R. Anderson and T. Moore. The economics of information security: A survey and open questions. Science, 314:610-613, 2006.
    • (2006) Science , vol.314 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 6
    • 84978640047 scopus 로고    scopus 로고
    • The first rule of zero-days is no one talks about zero-days (so we'll explain)
    • October 20
    • S. Anthony. The first rule of zero-days is no one talks about zero-days (so we'll explain). Ars Technica, October 20 2015.
    • (2015) Ars Technica
    • Anthony, S.1
  • 7
    • 33846183559 scopus 로고    scopus 로고
    • Does information security attack frequency increase with vulnerability disclosure: An empircal analysis
    • A. Arora, A. Nandkumar, and R. Telang. Does information security attack frequency increase with vulnerability disclosure: An empircal analysis. Information Systems Frontiers, 8(5):350-362, 2006.
    • (2006) Information Systems Frontiers , vol.8 , Issue.5 , pp. 350-362
    • Arora, A.1    Nandkumar, A.2    Telang, R.3
  • 8
    • 61849175198 scopus 로고    scopus 로고
    • Optimal policy for software vulnerability disclosure
    • A. Arora, R. Telang, and H. Xu. Optimal policy for software vulnerability disclosure. Management Science, 54(4):642-656, 2008.
    • (2008) Management Science , vol.54 , Issue.4 , pp. 642-656
    • Arora, A.1    Telang, R.2    Xu, H.3
  • 9
    • 79956063140 scopus 로고    scopus 로고
    • Who should be responsible for software security? a comparative analysis of liability policies in network environments
    • T. August and T. I. Tunca. Who should be responsible for software security? a comparative analysis of liability policies in network environments. Management Science, 57(5):934-959, 2011.
    • (2011) Management Science , vol.57 , Issue.5 , pp. 934-959
    • August, T.1    Tunca, T.I.2
  • 12
    • 84983552576 scopus 로고    scopus 로고
    • An emerging US (and world) threat: Cities wide open to cyber attacks
    • C. Cerrudo. An emerging US (and world) threat: Cities wide open to cyber attacks. IOActive White Paper, 2015.
    • (2015) IOActive White Paper
    • Cerrudo, C.1
  • 14
    • 79960596666 scopus 로고    scopus 로고
    • The political economy of fiscal deficits: A survey
    • M. Eslava. The political economy of fiscal deficits: A survey. Journal of Economic Surveys, 25(4):645-673, 2011.
    • (2011) Journal of Economic Surveys , vol.25 , Issue.4 , pp. 645-673
    • Eslava, M.1
  • 16
    • 84942517822 scopus 로고    scopus 로고
    • The known unknowns: Empirical analyais of publicly unknown security vulnerabilities
    • December
    • S. Frei. The known unknowns: Empirical analyais of publicly unknown security vulnerabilities. NSS Labs, December 2013.
    • (2013) NSS Labs
    • Frei, S.1
  • 17
    • 84978447148 scopus 로고    scopus 로고
    • International vulnerability purchase program: Why buying all vulnerabilities above black market prices is economically sound
    • December
    • S. Frei and F. Artes. International vulnerability purchase program: Why buying all vulnerabilities above black market prices is economically sound. NSS Labs, December 2013.
    • (2013) NSS Labs
    • Frei, S.1    Artes, F.2
  • 22
    • 84944090355 scopus 로고    scopus 로고
    • Lights off! the darkness of the smart meters
    • October 14-17
    • A. G. Illera and J. V. Vidal. Lights off! The darkness of the smart meters. Black-hat Europe, October 14-17 2014.
    • (2014) Black-hat Europe
    • Illera, A.G.1    Vidal, J.V.2
  • 25
    • 84905000417 scopus 로고    scopus 로고
    • Towards an effective framework for building smart cities: Lessons from Seoul and San Francisco
    • November
    • J. H. Lee, M. G. Hancock, and M.-C. Hu. Towards an effective framework for building smart cities: Lessons from Seoul and San Francisco. Technological Forecasting and Social Change, 89:80-99, November 2014.
    • (2014) Technological Forecasting and Social Change , vol.89 , pp. 80-99
    • Lee, J.H.1    Hancock, M.G.2    Hu, M.-C.3
  • 26
    • 84978745807 scopus 로고    scopus 로고
    • Private market growing for zero-day exploits and vulnerabilities
    • November
    • R. Lemos. Private market growing for zero-day exploits and vulnerabilities. TechTarget, November 2012.
    • (2012) TechTarget
    • Lemos, R.1
  • 27
    • 0033451088 scopus 로고    scopus 로고
    • Evidence of under-investment in energy R&D in the United States and the impact of federal policy
    • R. M. Margolis and D. M. Kammen. Evidence of under-investment in energy R&D in the United States and the impact of federal policy. Energy Policy, 27:575-584, 1999.
    • (1999) Energy Policy , vol.27 , pp. 575-584
    • Margolis, R.M.1    Kammen, D.M.2
  • 31
    • 0000058335 scopus 로고
    • The political business cycle
    • April
    • W. D. Nordhaus. The political business cycle. Review of Economic Studies, 42(2):169-190, April 1975.
    • (1975) Review of Economic Studies , vol.42 , Issue.2 , pp. 169-190
    • Nordhaus, W.D.1
  • 32
    • 84952052459 scopus 로고    scopus 로고
    • Nations buying as hackers sell aws in computer code
    • July 13
    • N. Perlroth and D. E. Sanger. Nations buying as hackers sell aws in computer code. The New York Times, July 13 2013.
    • (2013) The New York Times
    • Perlroth, N.1    Sanger, D.E.2
  • 33
    • 77955132888 scopus 로고    scopus 로고
    • Why measuring security is hard
    • July/August
    • S. Peeger and R. Cunningham. Why measuring security is hard. IEEE Security & Privacy, 8(4):46-54, July/August 2010.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.4 , pp. 46-54
    • Peeger, S.1    Cunningham, R.2
  • 34
    • 84884138082 scopus 로고    scopus 로고
    • Are markets for vulnerabilities effective?
    • March
    • S. Ransbotham, S. Mitra, and J. Ramsey. Are markets for vulnerabilities effective? MIS Quarterly, 36(1):43-64, March, 2012.
    • (2012) MIS Quarterly , vol.36 , Issue.1 , pp. 43-64
    • Ransbotham, S.1    Mitra, S.2    Ramsey, J.3
  • 35
    • 84978753500 scopus 로고    scopus 로고
    • So you want to be a zero day exploit millionaire?
    • November 10
    • M. J. Schwartz. So you want to be a zero day exploit millionaire? InformationWeek, November 10 2011.
    • (2011) InformationWeek
    • Schwartz, M.J.1
  • 36
    • 77949757281 scopus 로고    scopus 로고
    • Tort liability for vendors of insecure software: Has the time finally come?
    • M. D. Scott. Tort liability for vendors of insecure software: Has the time finally come? Maryland Law Review, 67(2):425-484, 2008.
    • (2008) Maryland Law Review , vol.67 , Issue.2 , pp. 425-484
    • Scott, M.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.