Incentives: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 4: | Line 4: | ||
Camp, L. Jean and Wolfram, Catherine (2004) [[Pricing Security]] | Camp, L. Jean and Wolfram, Catherine (2004) [[Pricing Security]] | ||
Gandal, Neil (2008) [[An Introduction to Key Themes in the Economics of Cyber Security]] | |||
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]] | Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]] | ||
van Eeten, Michel J. G. and Bauer, Johannes M. ''(2008)'' [[Economics of Malware]] | van Eeten, Michel J. G. and Bauer, Johannes M. ''(2008)'' [[Economics of Malware]] |
Revision as of 12:17, 24 June 2010
Anderson, Ross (2001) Why Information Security is Hard
Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security
Camp, L. Jean and Wolfram, Catherine (2004) Pricing Security
Gandal, Neil (2008) An Introduction to Key Themes in the Economics of Cyber Security
Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability
van Eeten, Michel J. G. and Bauer, Johannes M. (2008) Economics of Malware