Risk Management and Investment: Difference between revisions
No edit summary |
No edit summary |
||
Line 14: | Line 14: | ||
Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]] | Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]] | ||
Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]] | |||
van Eeten, Michel J. G. and Bauer, Johannes M. (2008) [[Economics of Malware]] | van Eeten, Michel J. G. and Bauer, Johannes M. (2008) [[Economics of Malware]] |
Revision as of 13:18, 28 June 2010
Anderson, Ross (2001) Why Information Security is Hard
Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security
Arora et al. (2006) Does Information Security Attack Frequency Increase With Vulnerability Disclosure
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Camp, and L. Jean and Lewis, Stephen (2004) Economics of Information Security
Camp, L. Jean and Wolfram, Catherine (2004) Pricing Security
Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software
Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity
van Eeten, Michel J. G. and Bauer, Johannes M. (2008) Economics of Malware
Varian, Hal (2000) Managing Online Security Risks
Varian, Hal (2004) System Reliability and Free Riding