![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
WEIS 2006: Cambridge, England, UK
- 5th Annual Workshop on the Economics of Information Security, WEIS 2006, Robinson College, University of Cambridge, England, UK, June 26-28, 2006. 2006
Session 1.
- Rainer Böhme, Gaurav Kataria:
Models and Measures for Correlation in Cyber-Insurance. - Rainer Böhme, Thorsten Holz
:
The Effect of Stock Spam on Financial Markets. - Tyler Moore:
The Economics of Digital Forensics.
Session 2.
- Marco Cremonini, Dmitri Nizovtsev:
Understanding and Influencing Attackers' Decisions: Implications for Security Investment Strategies. - Jan Willemson
:
On the Gordon & Loeb Model for Information Security Investment. - C. Derrick Huang, Qing Hu, Ravi S. Behara:
Economics of Information Security Investment in the Case of Simultaneous Attacks.
Session 3.
- Vineet Kumar, Rahul Telang, Tridas Mukhopadhyay:
Enterprise Information Security: Who Should Manage it and How? - Ivan P. L. Png, Candy Q. Tang, Qiu-Hong Wang:
Hackers, Users, Information Security. - Michael P. Collins, Carrie Gates, Gaurav Kataria:
A Model for Opportunistic Network Exploits: The Case of P2P Worms.
Session 4.
- Matthew P. Hottell, Drew Carter, Matthew Deniszczuk:
Predictors of Home-Based Wireless Security. - Debin Liu, L. Jean Camp:
Proof of Work can Work. - Shishir Nagaraja, Ross J. Anderson:
The Topology of Covert Conflict.
Session 5.
- Scott Dynes, Eva Andrijicic, M. Eric Johnson:
Costs to the U.S. Economy of Information Infrastructure Failures: Estimates from Field Studies and Economic Data. - Alfredo Garcia, Barry M. Horowitz:
The Potential for Underinvestment in Internet Security: Implications for Regulatory Policy. - Andy Ozment, Stuart E. Schechter:
Bootstrapping the Adoption of Internet Security Protocols.
Session 6.
- Anindya Ghose, Uday Rajan:
The Economic Impact of Regulatory Information Disclosure on Information Security Investments, Competition, and Social Welfare. - Jan Bouckaert, Hans Degryse:
Opt In Versus Opt Out: A Free-Entry Analysis of Privacy Policies. - L. Jean Camp:
Reliable, Usable Signaling to Defeat Masquerade Attacks.
Session 7.
- Huseyin Cavusoglu, Hasan Cavusoglu, Jun Zhang:
Economics of Security Patch Management. - Michael Sutton, Frank Nagle:
Emerging Economic Models for Vulnerability Research. - Ashish Arora, Chris Forman, Anand Nandkumar, Rahul Telang:
Competitive and Strategic Effects in the Timing of Patch Release.
Session 8.
- Brent R. Rowe, Michael P. Gallaher:
Private Sector Cyber Security Investment: An Empirical Analysis. - Wei Liu, Hideyuki Tanaka, Kanta Matsuura:
An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan. - Hemantha S. B. Herath, Tejaswini C. Herath:
Justifying Spam and E-mail Virus Security Investments: A Case Study.
Session 9.
- George Danezis, Bettina Wittneben:
The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications. - Alessandro Acquisti, Allan Friedman, Rahul Telang:
Is There a Cost to Privacy Breaches? An Event Study. - Alessandro Acquisti, Bin Zhang:
Financial Privacy for Free? US Consumers' Response to FACTA.
Session 10.
- Roger Dingledine, Nick Mathewson:
Anonymity Loves Company: Usability and the Network Effect. - Rachel Greenstadt, Michael D. Smith:
Collaborative Scheduling: Threats and Promises. - Benjamin Edelman:
Adverse Selection in Online 'Trust' Certifications.
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.