Abstract is missing.
- Bootstrapping the Adoption of Internet Security ProtocolsAndy Ozment, Stuart E. Schechter. [doi]
- Hackers, Users, Information SecurityIvan P. L. Png, Candy Q. Tang, Qiu-Hong Wang. [doi]
- Financial Privacy for Free? US Consumers' Response to FACTAAlessandro Acquisti, Bin Zhang. [doi]
- Private Sector Cyber Security Investment: An Empirical AnalysisBrent R. Rowe, Michael P. Gallaher. [doi]
- Justifying Spam and E-mail Virus Security Investments: A Case StudyHemantha S. B. Herath, Tejaswini Herath. [doi]
- A Model for Opportunistic Network Exploits: The Case of P2P WormsMichael P. Collins, Carrie Gates, Gaurav Kataria. [doi]
- An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in JapanWei Liu, Hideyuki Tanaka, Kanta Matsuura. [doi]
- Reliable, Usable Signaling to Defeat Masquerade AttacksL. Jean Camp. [doi]
- Anonymity Loves Company: Usability and the Network EffectRoger Dingledine, Nick Mathewson. [doi]
- Is There a Cost to Privacy Breaches? An Event StudyAlessandro Acquisti, Allan Friedman, Rahul Telang. [doi]
- Collaborative Scheduling: Threats and PromisesRachel Greenstadt, Michael D. Smith. [doi]
- Models and Measures for Correlation in Cyber-InsuranceRainer Böhme, Gaurav Kataria. [doi]
- The Potential for Underinvestment in Internet Security: Implications for Regulatory PolicyAlfredo Garcia, Barry M. Horowitz. [doi]
- Adverse Selection in Online 'Trust' CertificationsBenjamin Edelman. [doi]
- Competitive and Strategic Effects in the Timing of Patch ReleaseAshish Arora, Chris Forman, Anand Nandkumar, Rahul Telang. [doi]
- Understanding and Influencing Attackers' Decisions: Implications for Security Investment StrategiesMarco Cremonini, Dmitri Nizovtsev. [doi]
- Enterprise Information Security: Who Should Manage it and How?Vineet Kumar, Rahul Telang, Tridas Mukhopadhyay. [doi]
- Opt In Versus Opt Out: A Free-Entry Analysis of Privacy PoliciesJan Bouckaert, Hans Degryse. [doi]
- The Economic Impact of Regulatory Information Disclosure on Information Security Investments, Competition, and Social WelfareAnindya Ghose, Uday Rajan. [doi]
- The Effect of Stock Spam on Financial MarketsRainer Böhme, Thorsten Holz. [doi]
- Costs to the U.S. Economy of Information Infrastructure Failures: Estimates from Field Studies and Economic DataScott Dynes, Eva Andrijicic, M. Eric Johnson. [doi]
- Predictors of Home-Based Wireless SecurityMatthew P. Hottell, Drew Carter, Matthew Deniszczuk. [doi]
- The Topology of Covert ConflictShishir Nagaraja, Ross Anderson. [doi]
- Proof of Work can WorkDebin Liu, L. Jean Camp. [doi]
- The Economics of Mass Surveillance and the Questionable Value of Anonymous CommunicationsGeorge Danezis, Bettina Wittneben. [doi]
- Economics of Information Security Investment in the Case of Simultaneous AttacksC. Derrick Huang, Qing Hu, Ravi S. Behara. [doi]
- On the Gordon & Loeb Model for Information Security InvestmentJan Willemson. [doi]
- Emerging Economic Models for Vulnerability ResearchMichael Sutton, Frank Nagle. [doi]
- The Economics of Digital ForensicsTyler Moore. [doi]
- Economics of Security Patch ManagementHuseyin Cavusoglu, Hasan Cavusoglu, Jun Zhang. [doi]