default search action
WEIS 2015: Delft, The Netherlands
- 14th Annual Workshop on the Economics of Information Security, WEIS 2015, Delft, The Netherlands, 22-23 June, 2015. 2015
Economics of Data Breaches
- Stefan Laube, Rainer Böhme:
The Economics of Mandatory Security Breach Reporting to Authorities. - Fabio Bisogni:
Data Breaches and the Dilemmas in Notifying Customers. - Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest:
Hype and Heavy Tails: A Closer Look at Data Breaches. - Juhee Kwon, M. Eric Johnson:
The Market Effect of Healthcare Security: Do Patients Care about Data Breaches?
Privacy Economics
- Alessandro Acquisti, Laura Brandimarte, Jeff T. Hancock:
Online Self-Disclosure and Offline Threat Detection. - Arslan Aziz, Rahul Telang:
What is a Cookie Worth? - Benjamin Johnson, Paul Laskowski, Thomas Maillart, John C.-I. Chuang, Nicolas Christin:
Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You. - Ignacio Cofone:
The Value of Privacy: Keeping the Money Where the Mouth is.
Security Behavior and Design
- Harry A. Kalodner, Miles Carlsten, Paul M. Ellenbogen, Joseph Bonneau, Arvind Narayanan:
An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design. - Zinaida Benenson, Anna Girard, Ioannis Krontiris:
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. - Jeffrey Pawlick, Quanyan Zhu:
Deception by Design: Evidence-Based Signaling Games for Network Defense. - Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer:
Experimental Elicitation of Risk Behaviour amongst Information Security Professionals.
Underground Markets
- Richard Clayton, Tyler Moore, Nicolas Christin:
Concentrating Correctly on Cybercrime Concentration. - Brian Glass, Michelle Baddeley, M. Angela Sasse:
Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty. - Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. - Peter Snyder, Chris Kanich:
No Please, After You: Detecting Fraud in Affiliate Marketing Networks.
Security Investments
- Armin Sarabi, Parinaz Naghizadeh, Yang Liu, Mingyan Liu:
Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles. - Chad Heitzenrater, Andrew C. Simpson:
Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures. - Wing Man Wynne Lam:
Attack-Deterring and Damage-Control Investments in Cybersecurity.
Security of Intermediaries
- Shu He, Gene Moo Lee, John S. Quarterman, Andrew B. Whinston:
Designing Cybersecurity Policies. - Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore:
Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.