| 1 | -- | 2 | Tyler Moore, David J. Pym, Michel van Eeten. Introduction |
| 3 | -- | 14 | Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest. Hype and heavy tails: A closer look at data breaches |
| 15 | -- | 28 | Armin Sarabi, Parinaz Naghizadeh, Yang Liu 0018, Mingyan Liu. Risky business: Fine-grained data breach prediction using business profiles |
| 29 | -- | 41 | Stefan Laube, Rainer Böhme. The economics of mandatory security breach reporting to authorities |
| 43 | -- | 56 | Chad Heitzenrater, Andrew C. Simpson. Policy, statistics and questions: Reflections on UK cyber security disclosures |
| 57 | -- | 70 | Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer. Are information security professionals expected value maximizers?: An experiment and survey-based test |
| 71 | -- | 81 | Peter Snyder, Chris Kanich. Characterizing fraud and its ramifications in affiliate marketing networks |
| 83 | -- | 98 | Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore. Understanding the role of sender reputation in abuse reporting and cleanup |
| 99 | -- | 118 | Shu He, Gene Moo Lee, Sukjin Han, Andrew B. Whinston. How would information disclosure influence organizations' outbound spam volume? Evidence from a field experiment |