Abstract is missing.
- A Closer Look at Information Security CostsMatthias Brecht, Thomas Nowey. 3-24 [doi]
- To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management ToolLukas Demetz, Daniel Bachlechner. 25-47 [doi]
- Ad-Blocking Games: Monetizing Online Content Under the Threat of Ad AvoidanceNevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux. 49-73 [doi]
- Software Security Economics: Theory, in PracticeStephan Neuhaus, Bernhard Plattner. 75-92 [doi]
- An Empirical Study on Information Security Behaviors and AwarenessToshihiko Takemura, Ayako Komatsu. 95-114 [doi]
- Sectoral and Regional Interdependency of Japanese Firms Under the Influence of Information Security RisksBongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura. 115-134 [doi]
- Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin CurrencyJörg Becker, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme. 135-156 [doi]
- Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted InfectionsTimothy Kelley, L. Jean Camp. 157-180 [doi]
- The Privacy Economics of Voluntary Over-disclosure in Web FormsSören Preibusch, Kat Krol, Alastair R. Beresford. 183-209 [doi]
- Choice Architecture and Smartphone Privacy: There's a Price for ThatSerge Egelman, Adrienne Porter Felt, David Wagner. 211-236 [doi]
- Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card ApplicationMiguel Malheiros, Sacha Brostoff, Charlene Jennett, M. Angela Sasse. 237-261 [doi]
- Measuring the Cost of CybercrimeRoss J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten, Michael Levi, Tyler Moore, Stefan Savage. 265-300 [doi]
- Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. FreelancerVaibhav Garg, L. Jean Camp, Chris Kanich. 301-321 [doi]