Abstract is missing.
- Countering Hidden-Action Attacks on Networked SystemsTyler Moore. [doi]
- Cyber-insurance As A Market-Based Solution To The Problem Of CybersecurityJay P. Kesan, Ruperto P. Majuca, William Yurcik. [doi]
- Flexibility as an Instrument in Digital Rights ManagementDirk Bergemann, Thomas Eisenbach, Joan Feigenbaum, Scott Shenker. [doi]
- Analyzing the Risks of Information Security Investments with Monte-Carlo SimulationsJames R. Conrad. [doi]
- Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial FirmScott Dynes, Hans Brechbuhl, M. Eric Johnson. [doi]
- Bridging the Gap Between Computer Security and Legal RequirementsChristopher E. Everett. [doi]
- Internet Security, Vulnerability Disclosure, and Software ProvisionJay Pil Choi, Chaim Fershtman, Neil Gandal. [doi]
- Pricing Security Software: Theory and EvidenceAnindya Ghose, Arun Sundararajan. [doi]
- Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA)Marco Cremonini, Patrizia Martini. [doi]
- The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability HuntingAndy Ozment. [doi]
- The Privacy ValuePeter E. Sand. [doi]
- Cost Tradeoffs for Information Security AssuranceRitesh Kumar Tiwari, Kamalakar Karlapalem. [doi]
- Assessing Damages of Information Security Incidents and Selecting Control Measures, a Case Study ApproachFariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr.. [doi]
- Emerging Issues in Responsible Vulnerability DisclosureHasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan. [doi]
- Digital Rights Management and the Pricing of Digital ProductsYooki Park, Suzanne Scotchmer. [doi]
- Cyber Insurance and IT Security Investment: Impact of Interdependence RiskHulisi Ogut, Nirup Menon, Srinivasan Raghunathan. [doi]
- Uncertainty, Ambiguity and PrivacyAlessandro Acquisti, Jens Grossklags. [doi]
- Valuating PrivacyBernardo A. Huberman, Eytan Adar, Leslie R. Fine. [doi]
- Modeling Incentives for Email Blocking StrategiesAndrei Serjantov, Richard Clayton. [doi]
- Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical InvestigationRahul Telang, Sunil Wattal. [doi]
- Privacy as a Base for ConfidentialitySabah S. Al-Fedaghi. [doi]
- Why Do Denial of Service Attacks Reduce Future Visits? Switching Costs vs. Changing PreferencesAvi Goldfarb. [doi]
- An Empirical Analysis of Vendor Response to Disclosure PolicyAshish Arora, Ramayya Krishnan, Rahul Telang, Yubao Yang. [doi]
- Faking It: Criminal Sanctions and the Cost of Computer IntrusionsJennifer S. Granick. [doi]
- Understanding and Reversing the Profit Model of SpamPaul Judge, Dmitri Alperovitch, Weilai Yang. [doi]
- Protecting Online Privacy: Self-Regulation, Mandatory Standards, or Caveat EmptorZhulei Tang, Yu (Jeffrey) Hu, Michael D. Smith. [doi]
- The Role of Architecture in DRM Vendor EconomicsPramod A. Jamkhedkar, Gregory L. Heileman. [doi]
- How Much Is Location Privacy Worth?George Danezis, Stephen Lewis, Ross J. Anderson. [doi]
- Protecting Personal Information: Obstacles and DirectionsRachel Greenstadt, Michael D. Smith. [doi]
- Quantifying Privacy Choices with Experimental EconomicsDavid L. Baumer, Julia Brande Earp, J. C. Poindexter. [doi]
- Economic Analysis of Incentives to Disclose Software VulnerabilitiesDmitri Nizovtsev, Marie Thursby. [doi]
- Cyber-Insurance RevisitedRainer Böhme. [doi]
- Could IPv6 Improve Network Security? And, If So, at What Cost?Brent R. Rowe, Michael P. Gallaher. [doi]
- Avoiding Liability: An Alternative Route to More Secure ProductsAdam Shostack. [doi]
- An empirical approach to the valuing privacy valuationLuc Wathieu, Allan Friedman. [doi]
- Software Diversity for Information SecurityPei-yu Chen, Gaurav Kataria, Ramayya Krishnan. [doi]
- Private Information Shielding Service for Overcoming Privacy Risk in Recommender SystemChoong-Hee Lee, Junseok Hwang. [doi]
- An Economic Analysis of Software Market with Risk-Sharing ContractByungcho Kim, Pei-yu Chen, Tridas Mukhopadhyay. [doi]