|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 235 publication records. Showing 235 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | David L. Baumer, Julia Brande Earp, J. C. Poindexter |
Quantifying Privacy Choices with Experimental Economics. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Fariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr. |
Assessing Damages of Information Security Incidents and Selecting Control Measures, a Case Study Approach. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | |
4th Annual Workshop on the Economics of Information Security, WEIS 2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005 |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Yooki Park, Suzanne Scotchmer |
Digital Rights Management and the Pricing of Digital Products. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Bernardo A. Huberman, Eytan Adar, Leslie R. Fine |
Valuating Privacy. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Tyler Moore 0001 |
Countering Hidden-Action Attacks on Networked Systems. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Scott Dynes, Hans Brechbühl, M. Eric Johnson |
Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Ritesh Kumar Tiwari, Kamalakar Karlapalem |
Cost Tradeoffs for Information Security Assurance. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Dirk Bergemann, Thomas Eisenbach, Joan Feigenbaum, Scott Shenker |
Flexibility as an Instrument in Digital Rights Management. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Peter E. Sand |
The Privacy Value. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Zhulei Tang, Yu (Jeffrey) Hu, Michael D. Smith 0002 |
Protecting Online Privacy: Self-Regulation, Mandatory Standards, or Caveat Emptor. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Ashish Arora, Ramayya Krishnan, Rahul Telang, Yubao Yang |
An Empirical Analysis of Vendor Response to Disclosure Policy. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Avi Goldfarb |
Why Do Denial of Service Attacks Reduce Future Visits? Switching Costs vs. Changing Preferences. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Pei-Yu Sharon Chen, Gaurav Kataria, Ramayya Krishnan |
Software Diversity for Information Security. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Paul Judge, Dmitri Alperovitch, Weilai Yang |
Understanding and Reversing the Profit Model of Spam. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Andy Ozment |
The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | James R. Conrad |
Analyzing the Risks of Information Security Investments with Monte-Carlo Simulations. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Marco Cremonini, Patrizia Martini |
Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA). |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Dmitri Nizovtsev, Marie Thursby |
Economic Analysis of Incentives to Disclose Software Vulnerabilities. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan |
Emerging Issues in Responsible Vulnerability Disclosure. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Choong Hee Lee, Junseok Hwang |
Private Information Shielding Service for Overcoming Privacy Risk in Recommender System. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Rachel Greenstadt, Michael D. Smith 0001 |
Protecting Personal Information: Obstacles and Directions. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Hulisi Ögüt, Nirup M. Menon, Srinivasan Raghunathan |
Cyber Insurance and IT Security Investment: Impact of Interdependence Risk. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Rainer Böhme |
Cyber-Insurance Revisited. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Anindya Ghose, Arun Sundararajan |
Pricing Security Software: Theory and Evidence. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Adam Shostack |
Avoiding Liability: An Alternative Route to More Secure Products. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | George Danezis, Stephen Lewis, Ross J. Anderson |
How Much Is Location Privacy Worth? |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Byungcho Kim, Pei-Yu Sharon Chen, Tridas Mukhopadhyay |
An Economic Analysis of Software Market with Risk-Sharing Contract. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Jay P. Kesan, Ruperto P. Majuca, William Yurcik |
Cyber-insurance As A Market-Based Solution To The Problem Of Cybersecurity. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Christopher E. Everett |
Bridging the Gap Between Computer Security and Legal Requirements. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Jennifer S. Granick |
Faking It: Criminal Sanctions and the Cost of Computer Intrusions. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Jay Pil Choi, Chaim Fershtman, Neil Gandal |
Internet Security, Vulnerability Disclosure, and Software Provision. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Alessandro Acquisti, Jens Grossklags |
Uncertainty, Ambiguity and Privacy. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Pramod A. Jamkhedkar, Gregory L. Heileman |
The Role of Architecture in DRM Vendor Economics. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
1 | Andrei Serjantov, Richard Clayton 0001 |
Modeling Incentives for Email Blocking Strategies. |
WEIS |
2005 |
DBLP BibTeX RDF |
|
Displaying result #201 - #235 of 235 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3] |
|