Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/series/ais/ais12.bht:"
@incollection{DBLP:series/ais/Acquisti04, author = {Alessandro Acquisti}, editor = {L. Jean Camp and Stephen Lewis}, title = {Privacy and Security of Personal Information - Economic Incentives and Technological Solutions}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {179--186}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_14}, doi = {10.1007/1-4020-8090-5\_14}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Acquisti04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AcquistiG04, author = {Alessandro Acquisti and Jens Grossklags}, editor = {L. Jean Camp and Stephen Lewis}, title = {Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {165--178}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_13}, doi = {10.1007/1-4020-8090-5\_13}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/AcquistiG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Anderson04, author = {Ross J. Anderson}, editor = {L. Jean Camp and Stephen Lewis}, title = {Cryptography and Competition Policy - Issues with 'Trusted Computing'}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {35--52}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_3}, doi = {10.1007/1-4020-8090-5\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Anderson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CampW04, author = {L. Jean Camp and Catherine Wolfram}, editor = {L. Jean Camp and Stephen Lewis}, title = {Pricing Security - {A} Market in Vulnerabilities}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {17--34}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_2}, doi = {10.1007/1-4020-8090-5\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/CampW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Cavusoglu04, author = {Huseyin Cavusoglu}, editor = {L. Jean Camp and Stephen Lewis}, title = {Economics of {IT} Security Management}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {71--83}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_6}, doi = {10.1007/1-4020-8090-5\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Cavusoglu04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FarahmandNSE04, author = {Fariborz Farahmand and Shamkant B. Navathe and Gunter P. Sharp and Philip H. Enslow Jr.}, editor = {L. Jean Camp and Stephen Lewis}, title = {Evaluating Damages Caused by Information Systems Security Incidents}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {85--94}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_7}, doi = {10.1007/1-4020-8090-5\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FarahmandNSE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Gal-OrG04, author = {Esther Gal{-}Or and Anindya Ghose}, editor = {L. Jean Camp and Stephen Lewis}, title = {The Economic Consequences of Sharing Security Information}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {95--104}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_8}, doi = {10.1007/1-4020-8090-5\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Gal-OrG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GordonL04, author = {Lawrence A. Gordon and Martin P. Loeb}, editor = {L. Jean Camp and Stephen Lewis}, title = {The Economics of Information Security Investment}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {105--125}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_9}, doi = {10.1007/1-4020-8090-5\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GordonL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Landwehr04, author = {Carl E. Landwehr}, editor = {L. Jean Camp and Stephen Lewis}, title = {Improving Information Flow in the Information Security Market - DoD Experience and Future Directions}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {155--163}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_12}, doi = {10.1007/1-4020-8090-5\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Landwehr04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Lewis04, author = {Stephen Lewis}, editor = {L. Jean Camp and Stephen Lewis}, title = {How Much is Stronger {DRM} Worth?}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {53--57}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_4}, doi = {10.1007/1-4020-8090-5\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Lewis04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LookabaughS04, author = {Tom D. Lookabaugh and Douglas C. Sicker}, editor = {L. Jean Camp and Stephen Lewis}, title = {Security and Lock-In}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {225--246}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_17}, doi = {10.1007/1-4020-8090-5\_17}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LookabaughS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Odlyzko04, author = {Andrew M. Odlyzko}, editor = {L. Jean Camp and Stephen Lewis}, title = {Privacy, Economics, and Price Discrimination on the Internet}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {187--211}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_15}, doi = {10.1007/1-4020-8090-5\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Odlyzko04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RosascoL04, author = {Nicholas Rosasco and David Larochelle}, editor = {L. Jean Camp and Stephen Lewis}, title = {How and Why More Secure Technologies Succeed in Legacy Markets - Lessons from the Success of {SSH}}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {247--254}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_18}, doi = {10.1007/1-4020-8090-5\_18}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/RosascoL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SandriniC04, author = {Mauro Sandrini and Ferdinando Cerbone}, editor = {L. Jean Camp and Stephen Lewis}, title = {We Want Security but We Hate It - The Foundations of security technoeconomics in the social worldfrom Control to Surveillance}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {213--223}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_16}, doi = {10.1007/1-4020-8090-5\_16}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SandriniC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SchechterGS04, author = {Stuart E. Schechter and Rachel Greenstadt and Michael D. Smith}, editor = {L. Jean Camp and Stephen Lewis}, title = {Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {59--69}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_5}, doi = {10.1007/1-4020-8090-5\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SchechterGS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Schneier04, author = {Bruce Schneier}, editor = {L. Jean Camp and Stephen Lewis}, title = {Evaluating Security Systems: {A} Five-Step Process}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {289--293}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_20}, doi = {10.1007/1-4020-8090-5\_20}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Schneier04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ShostackS04, author = {Adam Shostack and Paul Syverson}, editor = {L. Jean Camp and Stephen Lewis}, title = {What Price Privacy? - and why identity theft is about neither identity nor theft}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {129--142}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_10}, doi = {10.1007/1-4020-8090-5\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ShostackS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ThompsonCG04, author = {Paul Thompson and George Cybenko and Annarita Giani}, editor = {L. Jean Camp and Stephen Lewis}, title = {Cognitive Hacking}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {255--287}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_19}, doi = {10.1007/1-4020-8090-5\_19}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ThompsonCG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Varian04, author = {Hal R. Varian}, editor = {L. Jean Camp and Stephen Lewis}, title = {System Reliability and Free Riding}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {1--15}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_1}, doi = {10.1007/1-4020-8090-5\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Varian04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/VilaGM04, author = {Tony Vila and Rachel Greenstadt and David Molnar}, editor = {L. Jean Camp and Stephen Lewis}, title = {Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons Market}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {143--153}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_11}, doi = {10.1007/1-4020-8090-5\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/VilaGM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/12, editor = {L. Jean Camp and Stephen Lewis}, title = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b116816}, doi = {10.1007/B116816}, isbn = {1-4020-8089-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.