Abstract is missing.
- Security Games in Online Advertising: Can Ads Help Secure the Web?Nevena Vratonjic, Jean-Pierre Hubaux, Maxim Raya, David C. Parkes. [doi]
- Towards a Cooperative Defense Model Against Network Security AttacksHarikrishna Narasimhan, Venkatanathan Varadarajan, Pandu Rangan Chandrasekaran. [doi]
- The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam DataMichel van Eeten, Johannes M. Bauer, Hadi Asghari, Shirin Tabatabaie, Dave Rand. [doi]
- Guns, Privacy, and CrimeAlessandro Acquisti, Catherine Tucker. [doi]
- Outsourcing Information Security: Contracting Issues and Security ImplicationsAsunur Cezar, Huseyin Cavusoglu, Srinivasan Raghunathan. [doi]
- Is the Internet for Porn? An Insight Into the Online Adult IndustryGilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda, Christopher Kruegel. [doi]
- The Plight of the Targeted Attacker in a World of ScaleCormac Herley. [doi]
- The Password Thicket: Technical and Market Failures in Human Authentication on the WebJoseph Bonneau, Sören Preibusch. [doi]
- Data Breaches and Identity Theft: When is Mandatory Disclosure Optimal?Sasha Romanosky, Richard Sharp, Alessandro Acquisti. [doi]
- Might Governments Clean-up Malware?Richard Clayton. [doi]
- Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the CloudDavid Molnar, Stuart E. Schechter. [doi]
- Inglorious Installers: Security in the Application MarketplaceJonathan Anderson, Joseph Bonneau, Frank Stajano. [doi]
- On the Security Economics of Electricity MeteringRoss Anderson, Shailendra Fuloria. [doi]
- Structured Systems Economics for Security ManagementAdam Beautement, David Pym. [doi]
- Misplaced Confidences: Privacy and the Control ParadoxLaura Brandimarte, Alessandro Acquisti, George Loewenstein. [doi]
- An Empirical Analysis of Exploitation Attempts Based on Vulnerabilities in Open Source SoftwareSam Ransbotham. [doi]
- Encryption and Data LossAmalia R. Miller, Catherine Tucker. [doi]
- Modeling Cyber-Insurance: Towards a Unifying FrameworkRainer Böhme, Galina Schwartz. [doi]
- A Welfare Analysis of Secondary Use of Personal DataNicola Jentzsch. [doi]
- Market Impact on IT Security SpendingBora Kolfal, Raymond A. Patterson, M. Lisa Yeo.
- The Mathematics of Obscurity: On the Trustworthiness of Open SourceHermann Härtig, Claude-Joachim Hamann, Michael Roitzsch. [doi]
- Please Continue to Hold: An Empirical Study on User Tolerance of Security DelaysSerge Egelman, David Molnar, Nicolas Christin, Alessandro Acquisti, Cormac Herley, Shriram Krishnamurthi. [doi]
- The Changing Nature of US Card Payment Fraud: Issues for Industry and Public PolicyRichard Sullivan. [doi]
- Information Security Policy in the U.S. Retail Payments IndustryMark MacCarthy. [doi]