Search dblp for Publications

export results for "toc:db/series/ais/ais12.bht:"

 download as .bib file

@incollection{DBLP:series/ais/Acquisti04,
  author       = {Alessandro Acquisti},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Privacy and Security of Personal Information - Economic Incentives
                  and Technological Solutions},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {179--186},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_14},
  doi          = {10.1007/1-4020-8090-5\_14},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Acquisti04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AcquistiG04,
  author       = {Alessandro Acquisti and
                  Jens Grossklags},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic
                  Discounting},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {165--178},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_13},
  doi          = {10.1007/1-4020-8090-5\_13},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/AcquistiG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Anderson04,
  author       = {Ross J. Anderson},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Cryptography and Competition Policy - Issues with 'Trusted Computing'},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {35--52},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_3},
  doi          = {10.1007/1-4020-8090-5\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Anderson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CampW04,
  author       = {L. Jean Camp and
                  Catherine Wolfram},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Pricing Security - {A} Market in Vulnerabilities},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_2},
  doi          = {10.1007/1-4020-8090-5\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/CampW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Cavusoglu04,
  author       = {Huseyin Cavusoglu},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Economics of {IT} Security Management},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {71--83},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_6},
  doi          = {10.1007/1-4020-8090-5\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Cavusoglu04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FarahmandNSE04,
  author       = {Fariborz Farahmand and
                  Shamkant B. Navathe and
                  Gunter P. Sharp and
                  Philip H. Enslow Jr.},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Evaluating Damages Caused by Information Systems Security Incidents},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {85--94},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_7},
  doi          = {10.1007/1-4020-8090-5\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FarahmandNSE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Gal-OrG04,
  author       = {Esther Gal{-}Or and
                  Anindya Ghose},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {The Economic Consequences of Sharing Security Information},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {95--104},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_8},
  doi          = {10.1007/1-4020-8090-5\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Gal-OrG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GordonL04,
  author       = {Lawrence A. Gordon and
                  Martin P. Loeb},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {The Economics of Information Security Investment},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {105--125},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_9},
  doi          = {10.1007/1-4020-8090-5\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GordonL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Landwehr04,
  author       = {Carl E. Landwehr},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Improving Information Flow in the Information Security Market - DoD
                  Experience and Future Directions},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {155--163},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_12},
  doi          = {10.1007/1-4020-8090-5\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Landwehr04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Lewis04,
  author       = {Stephen Lewis},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {How Much is Stronger {DRM} Worth?},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {53--57},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_4},
  doi          = {10.1007/1-4020-8090-5\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Lewis04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LookabaughS04,
  author       = {Tom D. Lookabaugh and
                  Douglas C. Sicker},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Security and Lock-In},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {225--246},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_17},
  doi          = {10.1007/1-4020-8090-5\_17},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LookabaughS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Odlyzko04,
  author       = {Andrew M. Odlyzko},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Privacy, Economics, and Price Discrimination on the Internet},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {187--211},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_15},
  doi          = {10.1007/1-4020-8090-5\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Odlyzko04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RosascoL04,
  author       = {Nicholas Rosasco and
                  David Larochelle},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {How and Why More Secure Technologies Succeed in Legacy Markets - Lessons
                  from the Success of {SSH}},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {247--254},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_18},
  doi          = {10.1007/1-4020-8090-5\_18},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/RosascoL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SandriniC04,
  author       = {Mauro Sandrini and
                  Ferdinando Cerbone},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {We Want Security but We Hate It - The Foundations of security technoeconomics
                  in the social worldfrom Control to Surveillance},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {213--223},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_16},
  doi          = {10.1007/1-4020-8090-5\_16},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SandriniC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SchechterGS04,
  author       = {Stuart E. Schechter and
                  Rachel Greenstadt and
                  Michael D. Smith},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Trusted Computing, Peer-to-Peer Distribution, and The Economics of
                  Pirated Entertainment},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {59--69},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_5},
  doi          = {10.1007/1-4020-8090-5\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SchechterGS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Schneier04,
  author       = {Bruce Schneier},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Evaluating Security Systems: {A} Five-Step Process},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {289--293},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_20},
  doi          = {10.1007/1-4020-8090-5\_20},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Schneier04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ShostackS04,
  author       = {Adam Shostack and
                  Paul Syverson},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {What Price Privacy? - and why identity theft is about neither identity
                  nor theft},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {129--142},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_10},
  doi          = {10.1007/1-4020-8090-5\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ShostackS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ThompsonCG04,
  author       = {Paul Thompson and
                  George Cybenko and
                  Annarita Giani},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Cognitive Hacking},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {255--287},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_19},
  doi          = {10.1007/1-4020-8090-5\_19},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ThompsonCG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Varian04,
  author       = {Hal R. Varian},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {System Reliability and Free Riding},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_1},
  doi          = {10.1007/1-4020-8090-5\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Varian04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/VilaGM04,
  author       = {Tony Vila and
                  Rachel Greenstadt and
                  David Molnar},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy
                  Economics as a Lemons Market},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {143--153},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_11},
  doi          = {10.1007/1-4020-8090-5\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/VilaGM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/12,
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b116816},
  doi          = {10.1007/B116816},
  isbn         = {1-4020-8089-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics