The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WEIS"( http://dblp.L3S.de/Venues/WEIS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/weis

Publication years (Num. hits)
2005 (39) 2006 (31) 2007 (28) 2008 (26) 2009 (22) 2010 (25) 2011 (21) 2012 (21) 2015 (22)
Publication types (Num. hits)
inproceedings(226) proceedings(9)
Venues (Conferences, Journals, ...)
WEIS(235)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 235 publication records. Showing 235 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer Experimental Elicitation of Risk Behaviour amongst Information Security Professionals. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Ignacio Cofone The Value of Privacy: Keeping the Money Where the Mouth is. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Harry A. Kalodner, Miles Carlsten, Paul M. Ellenbogen, Joseph Bonneau, Arvind Narayanan An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Chad Heitzenrater, Andrew C. Simpson Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Stefan Laube, Rainer Böhme The Economics of Mandatory Security Breach Reporting to Authorities. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Fabio Bisogni Data Breaches and the Dilemmas in Notifying Customers. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Peter Snyder, Chris Kanich No Please, After You: Detecting Fraud in Affiliate Marketing Networks. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Brian Glass, Michelle Baddeley, M. Angela Sasse Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Zinaida Benenson, Anna Girard, Ioannis Krontiris User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna Framing Dependencies Introduced by Underground Commoditization. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Alessandro Acquisti, Laura Brandimarte, Jeff T. Hancock Online Self-Disclosure and Offline Threat Detection. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Arslan Aziz, Rahul Telang What is a Cookie Worth? Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Shu He, Gene Moo Lee, John S. Quarterman, Andrew B. Whinston Designing Cybersecurity Policies. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Juhee Kwon, M. Eric Johnson The Market Effect of Healthcare Security: Do Patients Care about Data Breaches? Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest Hype and Heavy Tails: A Closer Look at Data Breaches. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1 14th Annual Workshop on the Economics of Information Security, WEIS 2015, Delft, The Netherlands, 22-23 June, 2015 Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Wing Man Wynne Lam Attack-Deterring and Damage-Control Investments in Cybersecurity. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Benjamin Johnson 0001, Paul Laskowski, Thomas Maillart, John C.-I. Chuang, Nicolas Christin Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Armin Sarabi, Parinaz Naghizadeh, Yang Liu 0018, Mingyan Liu Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore 0001 Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Richard Clayton 0001, Tyler Moore 0001, Nicolas Christin Concentrating Correctly on Cybercrime Concentration. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Jeffrey Pawlick, Quanyan Zhu Deception by Design: Evidence-Based Signaling Games for Network Defense. Search on Bibsonomy WEIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Stephan Neuhaus, Bernhard Plattner Software Security Economics: Theory, in Practice. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Yuliy M. Baryshnikov IT Security Investment and Gordon-Loeb's 1/e Rule. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Sören Preibusch, Kat Krol, Alastair R. Beresford The Privacy Economics of Voluntary Over-disclosure in Web Forms. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Miguel Malheiros, Sacha Brostoff, Charlene Jennett, M. Angela Sasse Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Jörg Becker 0001, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Serge Egelman, Adrienne Porter Felt, David A. Wagner 0001 Choice Architecture and Smartphone Privacy: There's a Price for That. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Timothy Kelley, L. Jean Camp Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Sasha Romanosky, David Hoffman, Alessandro Acquisti Empirical Analysis of Data Breach Litigation. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Min Chen 0027, Varghese S. Jacob, Suresh Radhakrishnan, Young U. Ryu The Effect of Fraud Investigation Cost on Pay-Per-Click Advertising. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Martin S. Gaynor, Muhammad Zia Hydari, Rahul Telang Is Patient Data Better Protected in Competitive Healthcare Markets? Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Cormac Herley Why do Nigerian Scammers Say They are From Nigeria? Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Toshihiko Takemura, Ayako Komatsu Who Sometimes Violates the Rule of the Organizations? An Empirical Study on Information Security Behaviors and Awareness. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Lukas Demetz, Daniel Bachlechner To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Juhee Kwon, M. Eric Johnson Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Vaibhav Garg, Chris Kanich, L. Jean Camp Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Matthias Brecht, Thomas Nowey A Closer Look at Information Security Costs. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1 11th Annual Workshop on the Economics of Information Security, WEIS 2012, Berlin, Germany, 25-26 June, 2012 Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Nevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton 0001, Michel van Eeten, Michael Levi, Tyler Moore 0001, Stefan Savage Measuring the Cost of Cybercrime. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Adrian Baldwin, Iffat Gheyas, Christos Ioannidis, David J. Pym, Julian Williams Contagion in Cybersecurity Attacks. Search on Bibsonomy WEIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Susan Landau 0001, Tyler Moore 0001 Economic Tussles in Federated Identity Management. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Daegon Cho Real Name Verification Law on the Internet: a Poison or Cure for Privacy? Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1 10th Annual Workshop on the Economics of Information Security, WEIS 2011, George Mason University, Fairfax, VA, USA, June 14-15, 2011 Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Sören Preibusch, Joseph Bonneau The Privacy Landscape: Product Differentiation on Data Collection. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Idris Adjerid, Alessandro Acquisti, Rema Padman, Rahul Telang, Julia Adler-Milstein Health Disclosure Laws and Health Information Exchanges. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Steven A. Hofmeyr, Tyler Moore 0001, Stephanie Forrest, Benjamin Edwards, George Stelle Modeling Internet-Scale Policies for Cleaning up Malware. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Matthew J. Hashim, Sandra Maximiano, Karthik N. Kannan Information Targeting and Coordination: An Experimental Study. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Dinei A. F. Florêncio, Cormac Herley Where Do All the Attacks Go? Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Juhee Kwon, M. Eric Johnson An Organizational Learning Perspective on Proactive vs. Reactive investment in Information Security. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler, Jean-Pierre Hubaux The Inconvenient Truth about Web Certificates. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Dallas Wood, Brent Rowe Assessing Home Internet Users' Demand for Security: Will They Pay ISPs? Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Sam Ransbotham, Sabyasachi Mitra The Impact of Immediate Disclosure on Attack Diffusion and Volume. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Simon Shiu, Adrian Baldwin, Yolanta Beres, Marco Casassa Mont, Geoff Duggan Economic Methods and Decision Making by Security Professionals. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Terrence August, Tunay I. Tunca Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald The Underground Economy of Fake Antivirus Software. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Chul-Ho Lee, Xianjun Geng, Srinivasan Raghunathan Security Standardization in the Presence of Unverifiable Control. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Catherine Tucker Social Networks, Personalized Advertising, and Privacy Controls. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Dinei A. F. Florêncio, Cormac Herley Sex, Lies and Cyber-crime Survey. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Laura Brandimarte, Alessandro Acquisti, Joachim Vosgerau Negative Information Looms Longer than Positive Information. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Christos Ioannidis, David J. Pym, Julian Williams Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Chris Hall, Ross J. Anderson, Richard Clayton 0001, Evangelos Ouzounis, Panagiotis Trimintzios Resilience of the Internet Interconnection Ecosystem. Search on Bibsonomy WEIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Richard J. Sullivan The Changing Nature of US Card Payment Fraud: Issues for Industry and Public Policy. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Cormac Herley The Plight of the Targeted Attacker in a World of Scale. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Mark MacCarthy Information Security Policy in the U.S. Retail Payments Industry. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Sasha Romanosky, Richard Sharp, Alessandro Acquisti Data Breaches and Identity Theft: When is Mandatory Disclosure Optimal? Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Amalia R. Miller, Catherine Tucker Encryption and Data Loss. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Sam Ransbotham An Empirical Analysis of Exploitation Attempts Based on Vulnerabilities in Open Source Software. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Richard Clayton Might Governments Clean-up Malware? Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Jonathan Anderson, Joseph Bonneau, Frank Stajano Inglorious Installers: Security in the Application Marketplace. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Joseph Bonneau, Sören Preibusch The Password Thicket: Technical and Market Failures in Human Authentication on the Web. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Nicola Jentzsch A Welfare Analysis of Secondary Use of Personal Data. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Serge Egelman, David Molnar, Nicolas Christin, Alessandro Acquisti, Cormac Herley, Shriram Krishnamurthi Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Michel van Eeten, Johannes M. Bauer, Hadi Asghari, Shirin Tabatabaie, Dave Rand The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Nevena Vratonjic, Jean-Pierre Hubaux, Maxim Raya, David C. Parkes Security Games in Online Advertising: Can Ads Help Secure the Web? Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Adam Beautement, David J. Pym Structured Systems Economics for Security Management. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Rainer Böhme, Galina Schwartz Modeling Cyber-Insurance: Towards a Unifying Framework. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1David Molnar, Stuart E. Schechter Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Ross J. Anderson, Shailendra Fuloria On the Security Economics of Electricity Metering. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Bora Kolfal, Raymond A. Patterson, M. Lisa Yeo Market Impact on IT Security Spending. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Asunur Cezar, Huseyin Cavusoglu, Srinivasan Raghunathan Outsourcing Information Security: Contracting Issues and Security Implications. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda, Christopher Kruegel Is the Internet for Porn? An Insight Into the Online Adult Industry. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan Towards a Cooperative Defense Model Against Network Security Attacks. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Hermann Härtig, Claude-Joachim Hamann, Michael Roitzsch The Mathematics of Obscurity: On the Trustworthiness of Open Source. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Laura Brandimarte, Alessandro Acquisti, George Loewenstein Misplaced Confidences: Privacy and the Control Paradox. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1 9th Annual Workshop on the Economics of Information Security, WEIS 2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010 Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Alessandro Acquisti, Catherine Tucker Guns, Privacy, and Crime. Search on Bibsonomy WEIS The full citation details ... 2010 DBLP  BibTeX  RDF
1Zach Zhizhong Zhou, M. Eric Johnson The Impact of Information Security Ratings on Vendor Competition. Search on Bibsonomy WEIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Richard Clayton Internet Multi-Homing Problems: Explanations from Economics. Search on Bibsonomy WEIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Ajit Appari, Denise L. Anthony, M. Eric Johnson HIPAA Compliance: An Examination of Institutional and Market Forces. Search on Bibsonomy WEIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Rainer Böhme, Tyler Moore 0001 The Iterated Weakest Link - A Model of Adaptive Security Investment. Search on Bibsonomy WEIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Qui-Hong Wang, Seung-Huyn Kim Cyber Attacks: Cross-Country Interdependence and Enforcement. Search on Bibsonomy WEIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Nikhil Shetty, Galina Schwartz, Márk Félegyházi, Jean C. Walrand Competitive Cyber-Insurance and Internet Security. Search on Bibsonomy WEIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Alessandro Acquisti, Ralph Gross Social Insecurity: The Unintended Consequences of Identity Fraud Prevention Policies. Search on Bibsonomy WEIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Joseph Bonneau, Sören Preibusch The Privacy Jungle: On the Market for Data Protection in Social Networks. Search on Bibsonomy WEIS The full citation details ... 2009 DBLP  BibTeX  RDF
1 8th Annual Workshop on the Economics of Information Security, WEIS 2009, University College London, England, UK, June 24-25, 2009 Search on Bibsonomy WEIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Marc Lelarge Economics of Malware: Epidemic Risks Model, Network Externalities and Incentives. Search on Bibsonomy WEIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Jens Grossklags, Benjamin Johnson 0001, Nicolas Christin The Price of Uncertainty in Security Games. Search on Bibsonomy WEIS The full citation details ... 2009 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 235 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license