


default search action
WEIS 2012: Berlin, Germany
- 11th Annual Workshop on the Economics of Information Security, WEIS 2012, Berlin, Germany, 25-26 June, 2012. 2012
Session 1. Privacy Economics
- Sasha Romanosky, David Hoffman, Alessandro Acquisti:
Empirical Analysis of Data Breach Litigation. - Martin S. Gaynor, Muhammad Zia Hydari, Rahul Telang:
Is Patient Data Better Protected in Competitive Healthcare Markets? - Sören Preibusch, Kat Krol, Alastair R. Beresford:
The Privacy Economics of Voluntary Over-disclosure in Web Forms.
Session 2. Security Economics
- Juhee Kwon, M. Eric Johnson:
Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance. - Stephan Neuhaus, Bernhard Plattner:
Software Security Economics: Theory, in Practice. - Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura:
Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks.
Session 3. Studying the Attacker
- Cormac Herley:
Why do Nigerian Scammers Say They are From Nigeria? - Vaibhav Garg, Chris Kanich, L. Jean Camp:
Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. - Jörg Becker, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme:
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency.
Session 4. Cost of Security
- Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. - Matthias Brecht, Thomas Nowey:
A Closer Look at Information Security Costs. - Yuliy M. Baryshnikov:
IT Security Investment and Gordon-Loeb's 1/e Rule.
Session 5. Management of Information Security
- Toshihiko Takemura, Ayako Komatsu:
Who Sometimes Violates the Rule of the Organizations? An Empirical Study on Information Security Behaviors and Awareness. - Lukas Demetz, Daniel Bachlechner:
To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool. - Timothy Kelley, L. Jean Camp:
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. - Adrian Baldwin, Iffat Gheyas, Christos Ioannidis, David J. Pym, Julian Williams:
Contagion in Cybersecurity Attacks.
Session 6. Privacy, Security, and Marketing
- Min Chen, Varghese S. Jacob, Suresh Radhakrishnan, Young U. Ryu:
The Effect of Fraud Investigation Cost on Pay-Per-Click Advertising. - Nevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux:
Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance. - Serge Egelman, Adrienne Porter Felt, David A. Wagner:
Choice Architecture and Smartphone Privacy: There's a Price for That. - Miguel Malheiros, Sacha Brostoff, Charlene Jennett, M. Angela Sasse:
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.