default search action
Economics of Information Security 2004
- L. Jean Camp, Stephen Lewis:
Economics of Information Security. Advances in Information Security 12, Springer 2004, ISBN 1-4020-8089-1 - Hal R. Varian:
System Reliability and Free Riding. 1-15 - L. Jean Camp, Catherine Wolfram:
Pricing Security - A Market in Vulnerabilities. 17-34 - Ross J. Anderson:
Cryptography and Competition Policy - Issues with 'Trusted Computing'. 35-52 - Stephen Lewis:
How Much is Stronger DRM Worth? 53-57 - Stuart E. Schechter, Rachel Greenstadt, Michael D. Smith:
Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment. 59-69 - Huseyin Cavusoglu:
Economics of IT Security Management. 71-83 - Fariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr.:
Evaluating Damages Caused by Information Systems Security Incidents. 85-94 - Esther Gal-Or, Anindya Ghose:
The Economic Consequences of Sharing Security Information. 95-104 - Lawrence A. Gordon, Martin P. Loeb:
The Economics of Information Security Investment. 105-125 - Adam Shostack, Paul Syverson:
What Price Privacy? - and why identity theft is about neither identity nor theft. 129-142 - Tony Vila, Rachel Greenstadt, David Molnar:
Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons Market. 143-153 - Carl E. Landwehr:
Improving Information Flow in the Information Security Market - DoD Experience and Future Directions. 155-163 - Alessandro Acquisti, Jens Grossklags:
Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting. 165-178 - Alessandro Acquisti:
Privacy and Security of Personal Information - Economic Incentives and Technological Solutions. 179-186 - Andrew M. Odlyzko:
Privacy, Economics, and Price Discrimination on the Internet. 187-211 - Mauro Sandrini, Ferdinando Cerbone:
We Want Security but We Hate It - The Foundations of security technoeconomics in the social worldfrom Control to Surveillance. 213-223 - Tom D. Lookabaugh, Douglas C. Sicker:
Security and Lock-In. 225-246 - Nicholas Rosasco, David Larochelle:
How and Why More Secure Technologies Succeed in Legacy Markets - Lessons from the Success of SSH. 247-254 - Paul Thompson, George Cybenko, Annarita Giani:
Cognitive Hacking. 255-287 - Bruce Schneier:
Evaluating Security Systems: A Five-Step Process. 289-293
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.