


default search action
WEIS 2005: Cambridge, MA, USA
- 4th Annual Workshop on the Economics of Information Security, WEIS 2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005. 2005
Session 1. Investment in Security
- James R. Conrad:
Analyzing the Risks of Information Security Investments with Monte-Carlo Simulations. - Pei-Yu Sharon Chen, Gaurav Kataria, Ramayya Krishnan:
Software Diversity for Information Security. - Anindya Ghose, Arun Sundararajan:
Pricing Security Software: Theory and Evidence.
Session 2. Responses to Security Failure
- Avi Goldfarb:
Why Do Denial of Service Attacks Reduce Future Visits? Switching Costs vs. Changing Preferences. - Jennifer S. Granick:
Faking It: Criminal Sanctions and the Cost of Computer Intrusions. - Tyler Moore:
Countering Hidden-Action Attacks on Networked Systems.
Session 3. DRM & Spam
- Dirk Bergemann, Thomas Eisenbach, Joan Feigenbaum, Scott Shenker:
Flexibility as an Instrument in Digital Rights Management. - Yooki Park, Suzanne Scotchmer:
Digital Rights Management and the Pricing of Digital Products. - Andrei Serjantov, Richard Clayton:
Modeling Incentives for Email Blocking Strategies.
Session 4. Incentive Modeling
- Jay Pil Choi, Chaim Fershtman, Neil Gandal:
Internet Security, Vulnerability Disclosure, and Software Provision. - Byungcho Kim, Pei-Yu Sharon Chen, Tridas Mukhopadhyay:
An Economic Analysis of Software Market with Risk-Sharing Contract. - Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan:
Emerging Issues in Responsible Vulnerability Disclosure.
Session 5. Insurance
- Rainer Böhme:
Cyber-Insurance Revisited. - Jay P. Kesan, Ruperto P. Majuca, William Yurcik:
Cyber-insurance As A Market-Based Solution To The Problem Of Cybersecurity. - Hulisi Ögüt, Nirup M. Menon, Srinivasan Raghunathan:
Cyber Insurance and IT Security Investment: Impact of Interdependence Risk.
Session 6. Experiments & Field Studies
- Scott Dynes, Hans Brechbühl, M. Eric Johnson:
Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm. - Luc Wathieu, Allan Friedman:
An empirical approach to the valuing privacy valuation. - Bernardo A. Huberman, Eytan Adar, Leslie R. Fine:
Valuating Privacy. - Rahul Telang, Sunil Wattal:
Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical Investigation.
Session 7. Privacy
- Zhulei Tang, Yu (Jeffrey) Hu, Michael D. Smith:
Protecting Online Privacy: Self-Regulation, Mandatory Standards, or Caveat Emptor. - Alessandro Acquisti, Jens Grossklags:
Uncertainty, Ambiguity and Privacy. - Rachel Greenstadt, Michael D. Smith:
Protecting Personal Information: Obstacles and Directions. - David L. Baumer, Julia Brande Earp, J. C. Poindexter:
Quantifying Privacy Choices with Experimental Economics.
Session 8. Vulnerabilities
- Dmitri Nizovtsev, Marie Thursby:
Economic Analysis of Incentives to Disclose Software Vulnerabilities. - Andy Ozment:
The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting. - Ashish Arora, Ramayya Krishnan, Rahul Telang, Yubao Yang:
An Empirical Analysis of Vendor Response to Disclosure Policy.
Session 9. Rump
- Adam Shostack:
Avoiding Liability: An Alternative Route to More Secure Products. - Sabah S. Al-Fedaghi:
Privacy as a Base for Confidentiality. - Ritesh Kumar Tiwari, Kamalakar Karlapalem:
Cost Tradeoffs for Information Security Assurance. - Pramod A. Jamkhedkar, Gregory L. Heileman:
The Role of Architecture in DRM Vendor Economics. - Paul Judge, Dmitri Alperovitch, Weilai Yang:
Understanding and Reversing the Profit Model of Spam. - Marco Cremonini, Patrizia Martini:
Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA). - George Danezis, Stephen Lewis, Ross J. Anderson:
How Much Is Location Privacy Worth? - Brent R. Rowe, Michael P. Gallaher:
Could IPv6 Improve Network Security? And, If So, at What Cost? - Fariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr.:
Assessing Damages of Information Security Incidents and Selecting Control Measures, a Case Study Approach. - Peter E. Sand:
The Privacy Value. - Choong Hee Lee, Junseok Hwang:
Private Information Shielding Service for Overcoming Privacy Risk in Recommender System. - Christopher E. Everett:
Bridging the Gap Between Computer Security and Legal Requirements.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.