Abstract is missing.
- Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. FreelancerVaibhav Garg, Chris Kanich, L. Jean Camp. [doi]
- Choice Architecture and Smartphone Privacy: There's a Price for ThatSerge Egelman, Adrienne Porter Felt, David Wagner. [doi]
- A Closer Look at Information Security CostsMatthias Brecht, Thomas Nowey. [doi]
- The Privacy Economics of Voluntary Over-disclosure in Web FormsSören Preibusch, Kat Krol, Alastair R. Beresford. [doi]
- Who Sometimes Violates the Rule of the Organizations? An Empirical Study on Information Security Behaviors and AwarenessToshihiko Takemura, Ayako Komatsu. [doi]
- Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security RisksBongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura. [doi]
- Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card ApplicationMiguel Malheiros, Sacha Brostoff, Charlene Jennett, Angela Sasse. [doi]
- Why do Nigerian Scammers Say They are From Nigeria?Cormac Herley. [doi]
- To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management ToolLukas Demetz, Daniel Bachlechner. [doi]
- Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted InfectionsTimothy Kelley, L. Jean Camp. [doi]
- Empirical Analysis of Data Breach LitigationSasha Romanosky, David Hoffman, Alessandro Acquisti. [doi]
- Security Resources, Capabilities and Cultural Values: Links to Security Performance and ComplianceJuhee Kwon, M. Eric Johnson. [doi]
- The Effect of Fraud Investigation Cost on Pay-Per-Click AdvertisingMin Chen, Varghese S. Jacob, Suresh Radhakrishnan, Young U. Ryu. [doi]
- Ad-blocking Games: Monetizing Online Content Under the Threat of Ad AvoidanceNevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux. [doi]
- IT Security Investment and Gordon-Loeb's 1/e RuleYuliy Baryshnikov. [doi]
- Is Patient Data Better Protected in Competitive Healthcare Markets?Martin S. Gaynor, Muhammad Zia Hydari, Rahul Telang. [doi]
- Measuring the Cost of CybercrimeRoss Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michael van Eeten, Michael Levi, Tyler Moore, Stefan Savage. [doi]
- Software Security Economics: Theory, in PracticeStephan Neuhaus, Bernhard Plattner. [doi]
- Contagion in Cybersecurity AttacksAdrian Baldwin, Iffat Gheyas, Christos Ioannidis, David J. Pym, Julian Williams. [doi]
- Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin CurrencyJörg Becker, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme. [doi]