Economics of Cybersecurity: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
Anderson, Ross (2001) [[Why Information Security is Hard]]
Anderson, Ross (2001) [[Why Information Security is Hard]]


Anderson, Ross, et. al (2008) [[Security Economics and the Internal Market]]
Anderson, Ross and Moore, Tyler (2006) [[The Economics of Information Security]]


Anderson, Ross J. (2008) [[Security Engineering]]
Anderson, Ross J. (2008) [[Security Engineering]]


Anderson, Ross and Moore, Tyler (2006) [[The Economics of Information Security]]
Arora et al. (2006) [[Does Information Security Attack Frequency Increase With Vulnerability Disclosure]]


Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]


Camp, L. Jean and Lewis, Stephen (2004) [[Economics of Information Security]]
Bohme, Rainer ''(2005)'' [[Cyber-Insurance Revisited]]
 
Bohme, Rainer and Kataria, Gaurav ''(2006)'' [[Models and Measures for Correlation in Cyber-Insurance]]
 
Bohme, Rainer and Schwartz, Galina ''(2010)'' [[Modeling Cyber-Insurance]]
 
Camp, and L. Jean and Lewis, Stephen (2004) [[Economics of Information Security]]


Camp, L. Jean and Wolfram, Catherine  (2004) [[Pricing Security]]
Camp, L. Jean and Wolfram, Catherine  (2004) [[Pricing Security]]


Computer Economics, Inc. (2007) [[2007 Malware Report]]  
Clinton, Larry ''(Undated)'' [[Cyber-Insurance Metrics and Impact on Cyber-Security]]
 
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]


Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
Line 20: Line 28:


Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]]
Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]]
Granick, Jennifer Stisa (2005) [[The Price of Restricting Vulnerability Publications]]


Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]]
Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]]
Line 30: Line 36:


Lernard, Thomas M. and Rubin, Paul H. (2005) [[An Economic Analysis of Notification Requirements for Data Security Breaches]]
Lernard, Thomas M. and Rubin, Paul H. (2005) [[An Economic Analysis of Notification Requirements for Data Security Breaches]]
Moore, Tyler and Clayton, Richard  (2007) [[Examining the Impact of Website Take-down on Phishing]]
Moore, Tyler and Clayton, Richard  (2008) [[The Consequence of Non-Cooperation in the Fight Against Phishing]]


Moore, Tyler and Clayton, Richard  (2009)  [[The Impact of Incentives on Notice and Take-down]]
Moore, Tyler and Clayton, Richard  (2009)  [[The Impact of Incentives on Notice and Take-down]]
Line 41: Line 43:
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]


Schneier, Bruce (2003) [[Beyond Fear]]
Romanosky et al. (2008) [[Do Data Breach Disclosure Laws Reduce Identity Theft]]
 
Schwartz, Paul and Janger, Edward (2007) [[Notification of Data Security Breaches]]
 
Swire, Peter P (2004) [[A Model for When Disclosure Helps Security]]


Swire, Peter P (2006) [[A Theory of Disclosure for Security and Competitive Reasons]]
Swire, Peter P (2006) [[A Theory of Disclosure for Security and Competitive Reasons]]
Line 47: Line 53:
Telang, Rahul and Wattal, Sunil (2007) [[Impact of Software Vulnerability Announcements on the Market Value of Software Vendors]]
Telang, Rahul and Wattal, Sunil (2007) [[Impact of Software Vulnerability Announcements on the Market Value of Software Vendors]]


Thomas, Rob and Martin, Jerry (2006) [[The Underground Economy]]
van Eeten, Michel J. G.  and Bauer, Johannes M. (2008) [[Economics of Malware]]


van Eeten, Michel J. G.  and  Bauer, Johannes M. (2008) [[Economics of Malware]]
Varian, Hal ''(2000)'' [[Managing Online Security Risks]]


Varian, Hal (2004) [[System Reliability and Free Riding]]
Varian, Hal (2004) [[System Reliability and Free Riding]]


''[[Annotated_Bibliography | Jump to Annotated Bibliography]]''
''[[Annotated_Bibliography | Jump to Annotated Bibliography]]''

Revision as of 14:04, 30 June 2010

Anderson, Ross (2001) Why Information Security is Hard

Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security

Anderson, Ross J. (2008) Security Engineering

Arora et al. (2006) Does Information Security Attack Frequency Increase With Vulnerability Disclosure

Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing

Bohme, Rainer (2005) Cyber-Insurance Revisited

Bohme, Rainer and Kataria, Gaurav (2006) Models and Measures for Correlation in Cyber-Insurance

Bohme, Rainer and Schwartz, Galina (2010) Modeling Cyber-Insurance

Camp, and L. Jean and Lewis, Stephen (2004) Economics of Information Security

Camp, L. Jean and Wolfram, Catherine (2004) Pricing Security

Clinton, Larry (Undated) Cyber-Insurance Metrics and Impact on Cyber-Security

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants

Gandal, Neil (2008) An Introduction to Key Themes in the Economics of Cyber Security

Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity

Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security

Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability

Kobayashi, Bruce H. (2006) An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods

Lernard, Thomas M. and Rubin, Paul H. (2005) An Economic Analysis of Notification Requirements for Data Security Breaches

Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down

Moore, Tyler, et. al (2009) The Economics of Online Crime

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft

Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches

Swire, Peter P (2004) A Model for When Disclosure Helps Security

Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons

Telang, Rahul and Wattal, Sunil (2007) Impact of Software Vulnerability Announcements on the Market Value of Software Vendors

van Eeten, Michel J. G. and Bauer, Johannes M. (2008) Economics of Malware

Varian, Hal (2000) Managing Online Security Risks

Varian, Hal (2004) System Reliability and Free Riding

Jump to Annotated Bibliography