Risk Management and Investment: Difference between revisions
No edit summary |
No edit summary |
||
Line 16: | Line 16: | ||
Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]] | Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]] | ||
Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]] | |||
van Eeten, Michel J. G. and Bauer, Johannes M. (2008) [[Economics of Malware]] | van Eeten, Michel J. G. and Bauer, Johannes M. (2008) [[Economics of Malware]] |
Revision as of 15:28, 28 June 2010
Anderson, Ross (2001) Why Information Security is Hard
Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security
Arora et al. (2006) Does Information Security Attack Frequency Increase With Vulnerability Disclosure
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Camp, and L. Jean and Lewis, Stephen (2004) Economics of Information Security
Camp, L. Jean and Wolfram, Catherine (2004) Pricing Security
Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software
Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity
Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security
van Eeten, Michel J. G. and Bauer, Johannes M. (2008) Economics of Malware
Varian, Hal (2000) Managing Online Security Risks
Varian, Hal (2004) System Reliability and Free Riding