Abstract is missing.
- System Reliability and Free RidingHal R. Varian. 1-15 [doi]
- Pricing Security - A Market in VulnerabilitiesL. Jean Camp, Catherine Wolfram. 17-34 [doi]
- Cryptography and Competition Policy - Issues with 'Trusted Computing'Ross Anderson. 35-52 [doi]
- How Much is Stronger DRM Worth?Stephen Lewis. 53-57 [doi]
- Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated EntertainmentStuart E. Schechter, Rachel Greenstadt, Michael D. Smith. 59-69 [doi]
- Economics of IT Security ManagementHuseyin Cavusoglu. 71-83 [doi]
- Evaluating Damages Caused by Information Systems Security IncidentsFariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr.. 85-94 [doi]
- The Economic Consequences of Sharing Security InformationEsther Gal-Or, Anindya Ghose. 95-104 [doi]
- The Economics of Information Security InvestmentLawrence A. Gordon, Martin P. Loeb. 105-125 [doi]
- What Price Privacy? - and why identity theft is about neither identity nor theftAdam Shostack, Paul Syverson. 129-142 [doi]
- Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons MarketTony Vila, Rachel Greenstadt, David Molnar. 143-153 [doi]
- Improving Information Flow in the Information Security Market - DoD Experience and Future DirectionsCarl E. Landwehr. 155-163 [doi]
- Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic DiscountingAlessandro Acquisti, Jens Grossklags. 165-178 [doi]
- Privacy and Security of Personal Information - Economic Incentives and Technological SolutionsAlessandro Acquisti. 179-186 [doi]
- Privacy, Economics, and Price Discrimination on the InternetAndrew M. Odlyzko. 187-211 [doi]
- We Want Security but We Hate It - The Foundations of security technoeconomics in the social worldfrom Control to SurveillanceMauro Sandrini, Ferdinando Cerbone. 213-223 [doi]
- Security and Lock-InTom D. Lookabaugh, Douglas C. Sicker. 225-246 [doi]
- How and Why More Secure Technologies Succeed in Legacy Markets - Lessons from the Success of SSHNicholas Rosasco, David Larochelle. 247-254 [doi]
- Cognitive HackingPaul Thompson, George Cybenko, Annarita Giani. 255-287 [doi]
- Evaluating Security Systems: A Five-Step ProcessBruce Schneier. 289-293 [doi]