Abstract is missing.
- Cyber Insurance as an Incentive for IT SecurityJean Bolot, Marc Lelarge. [doi]
- Diffusion and Adoption of IPv6 in the United StatesHillary Elmore, L. Jean Camp, Brandon Stephens. [doi]
- CISO Perspective - Evaluating and Communicating Information RiskRuss Pierce, Phil Venables, Kavitha Venkita, Eric Johnson. [doi]
- Do Data Breaches Disclosure Laws Reduce Identity Theft?Sasha Romanosky, Rahul Telang, Alessandro Acquisti. [doi]
- BORIS - Business-Oriented Management of Information SecuritySebastian Sowa, Lampros Tsinas, Roland Gabriel. [doi]
- The Impact of Incentives on Notice and Take-downTyler Moore, Richard Clayton. [doi]
- Nonbanks and Risk in Retail PaymentsStuart Weiner, Richard Sullivan, Simonetta Rosati. [doi]
- Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User AgentsJens Grossklags, Nicolas Christin, John Chuang. [doi]
- Firms' Optimal Digital Rights Management (DRM) Strategies: The Effects of Public Copy Protection and DRM CompatibilitySang Hoo Bae, Pilsik Choi. [doi]
- The Economics of Covert Community Detection and HidingShishir Nagaraja. [doi]
- Botnet Economics: Uncertainty MattersZhen Li, Qi Liao, Aaron Striegel. [doi]
- Reinterpreting the Disclosure Debate for Web InfectionsOliver Day, Rachel Greenstadt, Brandon Palmen. [doi]
- Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and IncidentsTawei Wang, Jackie Rees, Karthik N. Kannan. [doi]
- Communicating Security - The Role of Media: A Journalistic PerspectiveByron Acohido, Scott Berinato, Brian Grow, Ryan Naraine, Dennis G. Fisher, M. Eric Johnson. [doi]
- Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment ModelKanta Matsuura. [doi]
- Modelling the Human and Technological Costs and Benefits of USB Memory Stick SecurityAdam Beautement, Robert Coles, Jonathan Griffin, Christos Ioannidis, Brian Monahan, David Pym, Angela Sasse, Mike Wonham. [doi]
- The Impact of Information Disclosure on Stock Market Returns: The Sarbanes-Oxley Act and the Role of Media as an Information IntermediaryKarthik Balakrishnan, Anindya Ghose, Panos Ipeirotis. [doi]
- Investigating and Prosecuting CybercrimeKathryn Warma, Jim Burrell, Lucy H. Carrillo, William Cantwell, Eric Goetz. [doi]
- Security Economics and European PolicyRoss Anderson, Rainer Böhme, Richard Clayton, Tyler Moore. [doi]
- Conformity or Diversity: Social Implications of Transparency in Personal Data ProcessingRainer Böhme. [doi]
- Is Distributed Trust More Trustworthy?Kurt Nielsen. [doi]
- Competition for Information under Privacy ConcernsRamnath K. Chellappa, Raymond G. Sin. [doi]
- Communicating the Economic Value of Security Investments; Value at Security RiskRolf Hulthén. [doi]
- Studying Malicious Websites and the Underground Economy on the Chinese WebJianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zou. [doi]
- Information Governance: Flexibility and Control through Escalation and IncentivesXia Zhao, Eric Johnson. [doi]