Incentives: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
Anderson, Ross and Moore, Tyler (2006) [[The Economics of Information Security]] | Anderson, Ross and Moore, Tyler (2006) [[The Economics of Information Security]] | ||
Camp, L. Jean and Wolfram, Catherine (2004) [[Pricing Security]] | |||
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]] | Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]] | ||
van Eeten, Michel J. G. and Bauer, Johannes M. ''(2008)'' [[Economics of Malware]] | van Eeten, Michel J. G. and Bauer, Johannes M. ''(2008)'' [[Economics of Malware]] |
Revision as of 15:49, 21 June 2010
Anderson, Ross (2001) Why Information Security is Hard
Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security
Camp, L. Jean and Wolfram, Catherine (2004) Pricing Security
Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability
van Eeten, Michel J. G. and Bauer, Johannes M. (2008) Economics of Malware