Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer |
Experimental Elicitation of Risk Behaviour amongst Information Security Professionals. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Ignacio Cofone |
The Value of Privacy: Keeping the Money Where the Mouth is. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Harry A. Kalodner, Miles Carlsten, Paul M. Ellenbogen, Joseph Bonneau, Arvind Narayanan |
An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Chad Heitzenrater, Andrew C. Simpson |
Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Stefan Laube, Rainer Böhme |
The Economics of Mandatory Security Breach Reporting to Authorities. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Fabio Bisogni |
Data Breaches and the Dilemmas in Notifying Customers. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Peter Snyder, Chris Kanich |
No Please, After You: Detecting Fraud in Affiliate Marketing Networks. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Brian Glass, Michelle Baddeley, M. Angela Sasse |
Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Zinaida Benenson, Anna Girard, Ioannis Krontiris |
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna |
Framing Dependencies Introduced by Underground Commoditization. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Alessandro Acquisti, Laura Brandimarte, Jeff T. Hancock |
Online Self-Disclosure and Offline Threat Detection. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Arslan Aziz, Rahul Telang |
What is a Cookie Worth? |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Shu He, Gene Moo Lee, John S. Quarterman, Andrew B. Whinston |
Designing Cybersecurity Policies. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Juhee Kwon, M. Eric Johnson |
The Market Effect of Healthcare Security: Do Patients Care about Data Breaches? |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest |
Hype and Heavy Tails: A Closer Look at Data Breaches. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | |
14th Annual Workshop on the Economics of Information Security, WEIS 2015, Delft, The Netherlands, 22-23 June, 2015 |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Wing Man Wynne Lam |
Attack-Deterring and Damage-Control Investments in Cybersecurity. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Benjamin Johnson 0001, Paul Laskowski, Thomas Maillart, John C.-I. Chuang, Nicolas Christin |
Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Armin Sarabi, Parinaz Naghizadeh, Yang Liu 0018, Mingyan Liu |
Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore 0001 |
Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Richard Clayton 0001, Tyler Moore 0001, Nicolas Christin |
Concentrating Correctly on Cybercrime Concentration. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Jeffrey Pawlick, Quanyan Zhu |
Deception by Design: Evidence-Based Signaling Games for Network Defense. |
WEIS |
2015 |
DBLP BibTeX RDF |
|
1 | Stephan Neuhaus, Bernhard Plattner |
Software Security Economics: Theory, in Practice. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Yuliy M. Baryshnikov |
IT Security Investment and Gordon-Loeb's 1/e Rule. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Sören Preibusch, Kat Krol, Alastair R. Beresford |
The Privacy Economics of Voluntary Over-disclosure in Web Forms. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Miguel Malheiros, Sacha Brostoff, Charlene Jennett, M. Angela Sasse |
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Jörg Becker 0001, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme |
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Serge Egelman, Adrienne Porter Felt, David A. Wagner 0001 |
Choice Architecture and Smartphone Privacy: There's a Price for That. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Timothy Kelley, L. Jean Camp |
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Sasha Romanosky, David Hoffman, Alessandro Acquisti |
Empirical Analysis of Data Breach Litigation. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Min Chen 0027, Varghese S. Jacob, Suresh Radhakrishnan, Young U. Ryu |
The Effect of Fraud Investigation Cost on Pay-Per-Click Advertising. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Martin S. Gaynor, Muhammad Zia Hydari, Rahul Telang |
Is Patient Data Better Protected in Competitive Healthcare Markets? |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Cormac Herley |
Why do Nigerian Scammers Say They are From Nigeria? |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Toshihiko Takemura, Ayako Komatsu |
Who Sometimes Violates the Rule of the Organizations? An Empirical Study on Information Security Behaviors and Awareness. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Lukas Demetz, Daniel Bachlechner |
To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Juhee Kwon, M. Eric Johnson |
Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Vaibhav Garg, Chris Kanich, L. Jean Camp |
Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura |
Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Matthias Brecht, Thomas Nowey |
A Closer Look at Information Security Costs. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | |
11th Annual Workshop on the Economics of Information Security, WEIS 2012, Berlin, Germany, 25-26 June, 2012 |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Nevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux |
Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton 0001, Michel van Eeten, Michael Levi, Tyler Moore 0001, Stefan Savage |
Measuring the Cost of Cybercrime. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Adrian Baldwin, Iffat Gheyas, Christos Ioannidis, David J. Pym, Julian Williams |
Contagion in Cybersecurity Attacks. |
WEIS |
2012 |
DBLP BibTeX RDF |
|
1 | Susan Landau 0001, Tyler Moore 0001 |
Economic Tussles in Federated Identity Management. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Daegon Cho |
Real Name Verification Law on the Internet: a Poison or Cure for Privacy? |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | |
10th Annual Workshop on the Economics of Information Security, WEIS 2011, George Mason University, Fairfax, VA, USA, June 14-15, 2011 |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Sören Preibusch, Joseph Bonneau |
The Privacy Landscape: Product Differentiation on Data Collection. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Idris Adjerid, Alessandro Acquisti, Rema Padman, Rahul Telang, Julia Adler-Milstein |
Health Disclosure Laws and Health Information Exchanges. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Steven A. Hofmeyr, Tyler Moore 0001, Stephanie Forrest, Benjamin Edwards, George Stelle |
Modeling Internet-Scale Policies for Cleaning up Malware. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Matthew J. Hashim, Sandra Maximiano, Karthik N. Kannan |
Information Targeting and Coordination: An Experimental Study. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Dinei A. F. Florêncio, Cormac Herley |
Where Do All the Attacks Go? |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Juhee Kwon, M. Eric Johnson |
An Organizational Learning Perspective on Proactive vs. Reactive investment in Information Security. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler, Jean-Pierre Hubaux |
The Inconvenient Truth about Web Certificates. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Dallas Wood, Brent Rowe |
Assessing Home Internet Users' Demand for Security: Will They Pay ISPs? |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Sam Ransbotham, Sabyasachi Mitra |
The Impact of Immediate Disclosure on Attack Diffusion and Volume. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Simon Shiu, Adrian Baldwin, Yolanta Beres, Marco Casassa Mont, Geoff Duggan |
Economic Methods and Decision Making by Security Professionals. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Terrence August, Tunay I. Tunca |
Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald |
The Underground Economy of Fake Antivirus Software. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Chul-Ho Lee, Xianjun Geng, Srinivasan Raghunathan |
Security Standardization in the Presence of Unverifiable Control. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Catherine Tucker |
Social Networks, Personalized Advertising, and Privacy Controls. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Dinei A. F. Florêncio, Cormac Herley |
Sex, Lies and Cyber-crime Survey. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Laura Brandimarte, Alessandro Acquisti, Joachim Vosgerau |
Negative Information Looms Longer than Positive Information. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Christos Ioannidis, David J. Pym, Julian Williams |
Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Chris Hall, Ross J. Anderson, Richard Clayton 0001, Evangelos Ouzounis, Panagiotis Trimintzios |
Resilience of the Internet Interconnection Ecosystem. |
WEIS |
2011 |
DBLP BibTeX RDF |
|
1 | Richard J. Sullivan |
The Changing Nature of US Card Payment Fraud: Issues for Industry and Public Policy. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Cormac Herley |
The Plight of the Targeted Attacker in a World of Scale. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Mark MacCarthy |
Information Security Policy in the U.S. Retail Payments Industry. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Sasha Romanosky, Richard Sharp, Alessandro Acquisti |
Data Breaches and Identity Theft: When is Mandatory Disclosure Optimal? |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Amalia R. Miller, Catherine Tucker |
Encryption and Data Loss. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Sam Ransbotham |
An Empirical Analysis of Exploitation Attempts Based on Vulnerabilities in Open Source Software. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Richard Clayton |
Might Governments Clean-up Malware? |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Jonathan Anderson, Joseph Bonneau, Frank Stajano |
Inglorious Installers: Security in the Application Marketplace. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Joseph Bonneau, Sören Preibusch |
The Password Thicket: Technical and Market Failures in Human Authentication on the Web. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Nicola Jentzsch |
A Welfare Analysis of Secondary Use of Personal Data. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Serge Egelman, David Molnar, Nicolas Christin, Alessandro Acquisti, Cormac Herley, Shriram Krishnamurthi |
Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Michel van Eeten, Johannes M. Bauer, Hadi Asghari, Shirin Tabatabaie, Dave Rand |
The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Nevena Vratonjic, Jean-Pierre Hubaux, Maxim Raya, David C. Parkes |
Security Games in Online Advertising: Can Ads Help Secure the Web? |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Adam Beautement, David J. Pym |
Structured Systems Economics for Security Management. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Rainer Böhme, Galina Schwartz |
Modeling Cyber-Insurance: Towards a Unifying Framework. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | David Molnar, Stuart E. Schechter |
Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Ross J. Anderson, Shailendra Fuloria |
On the Security Economics of Electricity Metering. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Bora Kolfal, Raymond A. Patterson, M. Lisa Yeo |
Market Impact on IT Security Spending. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Asunur Cezar, Huseyin Cavusoglu, Srinivasan Raghunathan |
Outsourcing Information Security: Contracting Issues and Security Implications. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda, Christopher Kruegel |
Is the Internet for Porn? An Insight Into the Online Adult Industry. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan |
Towards a Cooperative Defense Model Against Network Security Attacks. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Hermann Härtig, Claude-Joachim Hamann, Michael Roitzsch |
The Mathematics of Obscurity: On the Trustworthiness of Open Source. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Laura Brandimarte, Alessandro Acquisti, George Loewenstein |
Misplaced Confidences: Privacy and the Control Paradox. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | |
9th Annual Workshop on the Economics of Information Security, WEIS 2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010 |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Alessandro Acquisti, Catherine Tucker |
Guns, Privacy, and Crime. |
WEIS |
2010 |
DBLP BibTeX RDF |
|
1 | Zach Zhizhong Zhou, M. Eric Johnson |
The Impact of Information Security Ratings on Vendor Competition. |
WEIS |
2009 |
DBLP BibTeX RDF |
|
1 | Richard Clayton |
Internet Multi-Homing Problems: Explanations from Economics. |
WEIS |
2009 |
DBLP BibTeX RDF |
|
1 | Ajit Appari, Denise L. Anthony, M. Eric Johnson |
HIPAA Compliance: An Examination of Institutional and Market Forces. |
WEIS |
2009 |
DBLP BibTeX RDF |
|
1 | Rainer Böhme, Tyler Moore 0001 |
The Iterated Weakest Link - A Model of Adaptive Security Investment. |
WEIS |
2009 |
DBLP BibTeX RDF |
|
1 | Qui-Hong Wang, Seung-Huyn Kim |
Cyber Attacks: Cross-Country Interdependence and Enforcement. |
WEIS |
2009 |
DBLP BibTeX RDF |
|
1 | Nikhil Shetty, Galina Schwartz, Márk Félegyházi, Jean C. Walrand |
Competitive Cyber-Insurance and Internet Security. |
WEIS |
2009 |
DBLP BibTeX RDF |
|
1 | Alessandro Acquisti, Ralph Gross |
Social Insecurity: The Unintended Consequences of Identity Fraud Prevention Policies. |
WEIS |
2009 |
DBLP BibTeX RDF |
|
1 | Joseph Bonneau, Sören Preibusch |
The Privacy Jungle: On the Market for Data Protection in Social Networks. |
WEIS |
2009 |
DBLP BibTeX RDF |
|
1 | |
8th Annual Workshop on the Economics of Information Security, WEIS 2009, University College London, England, UK, June 24-25, 2009 |
WEIS |
2009 |
DBLP BibTeX RDF |
|
1 | Marc Lelarge |
Economics of Malware: Epidemic Risks Model, Network Externalities and Incentives. |
WEIS |
2009 |
DBLP BibTeX RDF |
|
1 | Jens Grossklags, Benjamin Johnson 0001, Nicolas Christin |
The Price of Uncertainty in Security Games. |
WEIS |
2009 |
DBLP BibTeX RDF |
|