-
1
-
-
84914124144
-
Markets for cybercrime tools and stolen data: Hackers’ bazaar
-
Ablon, L., Libicki, M.C., Golay, A.A., Markets for cybercrime tools and stolen data: Hackers’ bazaar. Rand corporation research report., 2014.
-
(2014)
Rand corporation research report.
-
-
Ablon, L.1
Libicki, M.C.2
Golay, A.A.3
-
2
-
-
84937682897
-
Software vulnerability markets: Discoverers and buyers
-
Algarni, A.M., Malaiya, Y.K., Software vulnerability markets: Discoverers and buyers. International Journal of Computer, Information Science and Engineering 8 (2014), 71–81.
-
(2014)
International Journal of Computer, Information Science and Engineering
, vol.8
, pp. 71-81
-
-
Algarni, A.M.1
Malaiya, Y.K.2
-
4
-
-
33750440197
-
The economics of information security: A survey and open questions
-
Anderson, R., Moore, T., The economics of information security: A survey and open questions. Science 314 (2006), 610–613.
-
(2006)
Science
, vol.314
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
5
-
-
33846183559
-
Does information security attack frequency increase with vulnerability disclosure: An empirical analysis
-
Arora, A., Nandkumar, A., Telang, R., Does information security attack frequency increase with vulnerability disclosure: An empirical analysis. Information Systems Frontiers 8 (2006), 350–362.
-
(2006)
Information Systems Frontiers
, vol.8
, pp. 350-362
-
-
Arora, A.1
Nandkumar, A.2
Telang, R.3
-
6
-
-
61849175198
-
Optimal policy for software vulnerability disclosure
-
Arora, A., Telang, R., Xu, H., Optimal policy for software vulnerability disclosure. Management Science 54 (2008), 642–656.
-
(2008)
Management Science
, vol.54
, pp. 642-656
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
7
-
-
79956063140
-
Who should be responsible for software security? A comparative analysis of liability policies in network environments
-
August, T., Tunca, T.I., Who should be responsible for software security? A comparative analysis of liability policies in network environments. Management Science 57 (2011), 934–959.
-
(2011)
Management Science
, vol.57
, pp. 934-959
-
-
August, T.1
Tunca, T.I.2
-
8
-
-
84928754872
-
Determinants of multi-service smartcard success for smart cities development: A study based on citizens’ privacy and security perceptions
-
Belanche-Gracia, D., Casalo-Arinob, L.V., Perez-Rueda, A., Determinants of multi-service smartcard success for smart cities development: A study based on citizens’ privacy and security perceptions. Government Information Quarterly 32 (2015), 154–163.
-
(2015)
Government Information Quarterly
, vol.32
, pp. 154-163
-
-
Belanche-Gracia, D.1
Casalo-Arinob, L.V.2
Perez-Rueda, A.3
-
9
-
-
84869403808
-
Before we knew it: An empirical study of zero-day attacks in the real world
-
Raleigh, NC
-
Bilge, L., Dumitras, T., Before we knew it: An empirical study of zero-day attacks in the real world. Proceedings of the 2012 ACM conference on computer and communications security, 2012, 833–844 Raleigh, NC.
-
(2012)
Proceedings of the 2012 ACM conference on computer and communications security
, pp. 833-844
-
-
Bilge, L.1
Dumitras, T.2
-
12
-
-
84940878946
-
Smart and digital city: A systematic literature review
-
R.P. Dameri C. Sabroux Spri nger International Publishing Switzerland
-
Cocchia, A., Smart and digital city: A systematic literature review. Dameri, R.P., Sabroux, C., (eds.) Smart city: How to create public and economic value with high technology in urban space, 2014, Spri nger International Publishing, Switzerland, 13–43.
-
(2014)
Smart city: How to create public and economic value with high technology in urban space
, pp. 13-43
-
-
Cocchia, A.1
-
13
-
-
85015714120
-
Building cybersecurity awareness: The need for evidence-based framing strategies
-
de Bruijn, H., Janssen, M., Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly 34 (2017), 1–7.
-
(2017)
Government Information Quarterly
, vol.34
, pp. 1-7
-
-
de Bruijn, H.1
Janssen, M.2
-
14
-
-
36248964709
-
Cyber security: Are economic incentives adequate?
-
Dynes, S., Goetz, E., Freeman, M., Cyber security: Are economic incentives adequate?. IFIP International Federation for Information Processing 253 (2008), 15–27.
-
(2008)
IFIP International Federation for Information Processing
, vol.253
, pp. 15-27
-
-
Dynes, S.1
Goetz, E.2
Freeman, M.3
-
15
-
-
79960596666
-
The political economy of fiscal deficits: A survey
-
Eslava, M., The political economy of fiscal deficits: A survey. Journal of Economic Surveys 25 (2011), 645–673.
-
(2011)
Journal of Economic Surveys
, vol.25
, pp. 645-673
-
-
Eslava, M.1
-
16
-
-
85076311227
-
An empirical study of vulnerability reward programs
-
Washington, D.C.
-
Finifter, M., Akhawe, D., Wagner, D., An empirical study of vulnerability reward programs. Proceedings of the 22nd USENIX conference on security, 2013, 273–288 Washington, D.C.
-
(2013)
Proceedings of the 22nd USENIX conference on security
, pp. 273-288
-
-
Finifter, M.1
Akhawe, D.2
Wagner, D.3
-
19
-
-
85084160169
-
Green lights forever: Analyzing the security of traffic infrastructure
-
San Diego, CA
-
Ghena, B., Beyer, W., Hillaker, A., Pevarnek, J., Halderman, J.A., Green lights forever: Analyzing the security of traffic infrastructure. Woot’14 proceedings of the 8th USENIX conference on offensive technologies, 2014, 7-7 San Diego, CA.
-
(2014)
Woot’14 proceedings of the 8th USENIX conference on offensive technologies
, pp. 7-7
-
-
Ghena, B.1
Beyer, W.2
Hillaker, A.3
Pevarnek, J.4
Halderman, J.A.5
-
20
-
-
85042800071
-
Governing proliferation in cybersecurity
-
Herr, T., Governing proliferation in cybersecurity. Global Summitry, 3, 2017.
-
(2017)
Global Summitry
, vol.3
-
-
Herr, T.1
-
21
-
-
84954189434
-
An empirical analysis of contemporary android mobile vulnerability market
-
New York, NY
-
Huang, K., Zhang, J., Tan, W., Feng, Z., An empirical analysis of contemporary android mobile vulnerability market. Proceedings of the 2015 IEEE international conference on mobile services (ms), 2015, 182–189 New York, NY.
-
(2015)
Proceedings of the 2015 IEEE international conference on mobile services (ms)
, pp. 182-189
-
-
Huang, K.1
Zhang, J.2
Tan, W.3
Feng, Z.4
-
23
-
-
67650114104
-
Seasonal variation in the vulnerability discovery process
-
Denver, CO
-
Joh, H., Malaiya, Y., Seasonal variation in the vulnerability discovery process. Proceedings of ICST ’09, international conference on software testing verification and validation, 2009, 191–200 Denver, CO.
-
(2009)
Proceedings of ICST ’09, international conference on software testing verification and validation
, pp. 191-200
-
-
Joh, H.1
Malaiya, Y.2
-
26
-
-
84958213653
-
Beyond the castle model of cyber-risk and cyber-security
-
Leuprecht, C., Skillicorn, D.B., Tait, V.E., Beyond the castle model of cyber-risk and cyber-security. Government Information Quarterly 33 (2016), 250–257.
-
(2016)
Government Information Quarterly
, vol.33
, pp. 250-257
-
-
Leuprecht, C.1
Skillicorn, D.B.2
Tait, V.E.3
-
27
-
-
84978654179
-
An economic alternative to improve cybersecurity of e-government and smart cities
-
Shanghai, China
-
Li, Z., Liao, Q., An economic alternative to improve cybersecurity of e-government and smart cities. Proceedings of the 17th international digital government research conference on digital government research, 2016, 455–464 Shanghai, China.
-
(2016)
Proceedings of the 17th international digital government research conference on digital government research
, pp. 455-464
-
-
Li, Z.1
Liao, Q.2
-
28
-
-
0033451088
-
Evidence of under-investment in energy R&D in the United States and the impact of federal policy
-
Margolis, R.M., Kammen, D.M., Evidence of under-investment in energy R&D in the United States and the impact of federal policy. Energy Policy 27 (1999), 575–584.
-
(1999)
Energy Policy
, vol.27
, pp. 575-584
-
-
Margolis, R.M.1
Kammen, D.M.2
-
31
-
-
84897046373
-
A large-scale empirical study on software reuse in mobile apps
-
Mojica, I.J., Adams, B., Nagappan, M., Dienst, S., Berger, T., Hassan, A.E., A large-scale empirical study on software reuse in mobile apps. IEEE Software 31 (2014), 78–86.
-
(2014)
IEEE Software
, vol.31
, pp. 78-86
-
-
Mojica, I.J.1
Adams, B.2
Nagappan, M.3
Dienst, S.4
Berger, T.5
Hassan, A.E.6
-
32
-
-
0000058335
-
The political business cycle
-
Nordhaus, W.D., The political business cycle. Review of Economic Studies 42 (1975), 169–190.
-
(1975)
Review of Economic Studies
, vol.42
, pp. 169-190
-
-
Nordhaus, W.D.1
-
33
-
-
77953614890
-
Identifying the security risks associated with governmental use of cloud computing
-
Paquette, S., Jaeger, P.T., Wilson, S.C., Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 27 (2010), 245–253.
-
(2010)
Government Information Quarterly
, vol.27
, pp. 245-253
-
-
Paquette, S.1
Jaeger, P.T.2
Wilson, S.C.3
-
36
-
-
84928771409
-
‘cyber gurus’: A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection
-
Quigley, K., Burns, C., Stallard, K., ‘cyber gurus’: A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection. Government Information Quarterly 32 (2015), 108–117.
-
(2015)
Government Information Quarterly
, vol.32
, pp. 108-117
-
-
Quigley, K.1
Burns, C.2
Stallard, K.3
-
37
-
-
84884138082
-
Are markets for vulnerabilities effective?
-
Ransbotham, S., Mitra, S., Ramsey, J., Are markets for vulnerabilities effective?. MIS Quarterly 36 (2012, March), 43–64.
-
(2012)
MIS Quarterly
, vol.36
, pp. 43-64
-
-
Ransbotham, S.1
Mitra, S.2
Ramsey, J.3
-
38
-
-
84976313991
-
Potential dimensions for a local e-government services quality model
-
Sa, F., Rochac, A., Cota, M.P., Potential dimensions for a local e-government services quality model. Telematics and Informatics 33 (2016), 270–276.
-
(2016)
Telematics and Informatics
, vol.33
, pp. 270-276
-
-
Sa, F.1
Rochac, A.2
Cota, M.P.3
-
39
-
-
77949757281
-
Tort liability for vendors of insecure software: Has the time finally come?
-
Scott, M.D., Tort liability for vendors of insecure software: Has the time finally come?. Maryland Law Review 67 (2008), 425–484.
-
(2008)
Maryland Law Review
, vol.67
, pp. 425-484
-
-
Scott, M.D.1
-
41
-
-
85042783851
-
Review on identification of success factors for designing of smart cities
-
Sureshchandra, S.M., Bhavsar, J.J., Pitroda, J.R., Review on identification of success factors for designing of smart cities. International Journal of Science Technology & Engineering 2 (2016), 125–133.
-
(2016)
International Journal of Science Technology & Engineering
, vol.2
, pp. 125-133
-
-
Sureshchandra, S.M.1
Bhavsar, J.J.2
Pitroda, J.R.3
-
42
-
-
84991787674
-
Determinants of data sharing in U.S. city governments
-
Welch, E.W., Feeney, M.K., Park, C.H., Determinants of data sharing in U.S. city governments. Government Information Quarterly 33 (2016), 393–403.
-
(2016)
Government Information Quarterly
, vol.33
, pp. 393-403
-
-
Welch, E.W.1
Feeney, M.K.2
Park, C.H.3
-
43
-
-
84895907919
-
Protecting personal data in e-government: A cross-country study
-
Wu, Y., Protecting personal data in e-government: A cross-country study. Government Information Quarterly 31 (2014), 150–159.
-
(2014)
Government Information Quarterly
, vol.31
, pp. 150-159
-
-
Wu, Y.1
-
44
-
-
70549093057
-
Opportunities and threats: A security assessment of state e-government websites
-
Zhao, J.J., Zhao, S.Y., Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly 27 (2010), 49–56.
-
(2010)
Government Information Quarterly
, vol.27
, pp. 49-56
-
-
Zhao, J.J.1
Zhao, S.Y.2
|