Abstract is missing.
- An Organizational Learning Perspective on Proactive vs. Reactive investment in Information SecurityJuhee Kwon, M. Eric Johnson. [doi]
- Modeling Internet-Scale Policies for Cleaning up MalwareSteven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle. [doi]
- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic ApproachChristos Ioannidis, David Pym, Julian Williams. [doi]
- Information Targeting and Coordination: An Experimental StudyMatthew Hashim, Sandra Maximiano, Karthik Kannan. [doi]
- Economic Methods and Decision Making by Security ProfessionalsSimon Shiu, Adrian Baldwin, Yolanta Beres, Marco Casassa Mont, Geoff Duggan. [doi]
- Resilience of the Internet Interconnection EcosystemChris Hall, Ross Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios. [doi]
- The Privacy Landscape: Product Differentiation on Data CollectionSören Preibusch, Joseph Bonneau. [doi]
- Security Standardization in the Presence of Unverifiable ControlChul-Ho Lee, Xianjun Geng, Srinivasan Raghunathan. [doi]
- Assessing Home Internet Users' Demand for Security: Will They Pay ISPs?Dallas Wood, Brent Rowe. [doi]
- Sex, Lies and Cyber-crime SurveyDinei A. F. Florêncio, Cormac Herley. [doi]
- Real Name Verification Law on the Internet: a Poison or Cure for Privacy?Daegon Cho. [doi]
- The Inconvenient Truth about Web CertificatesNevena Vratonjic, Julien Freudiger, Vincent Bindschaedler, Jean-Pierre Hubaux. [doi]
- Where Do All the Attacks Go?Dinei A. F. Florêncio, Cormac Herley. [doi]
- Health Disclosure Laws and Health Information ExchangesIdris Adjerid, Alessandro Acquisti, Rema Padman, Rahul Telang, Julia Adler-Milstein. [doi]
- Negative Information Looms Longer than Positive InformationLaura Brandimarte, Alessandro Acquisti, Joachim Vosgerau.
- Social Networks, Personalized Advertising, and Privacy ControlsCatherine Tucker. [doi]
- The Underground Economy of Fake Antivirus SoftwareBrett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald. [doi]
- Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network EnvironmentsTerrence August, Tunay I. Tunca. [doi]
- The Impact of Immediate Disclosure on Attack Diffusion and VolumeSam Ransbotham, Sabyasachi Mitra. [doi]
- Economic Tussles in Federated Identity ManagementSusan Landau, Tyler Moore. [doi]