![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
WEIS 2010: Cambridge, MA, USA
- 9th Annual Workshop on the Economics of Information Security, WEIS 2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010. 2010
Session 1. Data Breaches and Organizational Security
- Sasha Romanosky, Richard Sharp, Alessandro Acquisti:
Data Breaches and Identity Theft: When is Mandatory Disclosure Optimal? - Amalia R. Miller, Catherine Tucker:
Encryption and Data Loss. - Bora Kolfal, Raymond A. Patterson, M. Lisa Yeo:
Market Impact on IT Security Spending. WEIS 2010 - Asunur Cezar, Huseyin Cavusoglu, Srinivasan Raghunathan:
Outsourcing Information Security: Contracting Issues and Security Implications.
Session 2. Privacy and Controversial Social Issues
- Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda, Christopher Kruegel:
Is the Internet for Porn? An Insight Into the Online Adult Industry. - Alessandro Acquisti, Catherine Tucker:
Guns, Privacy, and Crime. - Laura Brandimarte, Alessandro Acquisti, George Loewenstein:
Misplaced Confidences: Privacy and the Control Paradox. - Nicola Jentzsch:
A Welfare Analysis of Secondary Use of Personal Data.
Session 3. Empirical Studies
- Joseph Bonneau, Sören Preibusch:
The Password Thicket: Technical and Market Failures in Human Authentication on the Web. - Serge Egelman, David Molnar, Nicolas Christin, Alessandro Acquisti, Cormac Herley, Shriram Krishnamurthi:
Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays. - Jonathan Anderson, Joseph Bonneau, Frank Stajano:
Inglorious Installers: Security in the Application Marketplace.
Session 4. Economic and Policy Considerations for ISPs
- Richard Clayton:
Might Governments Clean-up Malware? - Michel van Eeten, Johannes M. Bauer, Hadi Asghari, Shirin Tabatabaie, Dave Rand:
The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data. - Nevena Vratonjic, Jean-Pierre Hubaux, Maxim Raya, David C. Parkes:
Security Games in Online Advertising: Can Ads Help Secure the Web? - Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan:
Towards a Cooperative Defense Model Against Network Security Attacks.
Panel: Policy for Payment System Security
- Richard J. Sullivan:
The Changing Nature of US Card Payment Fraud: Issues for Industry and Public Policy. - Mark MacCarthy:
Information Security Policy in the U.S. Retail Payments Industry.
Session 5. Scale and the Economics of the Cloud
- David Molnar, Stuart E. Schechter:
Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud. - Rainer Böhme, Galina Schwartz:
Modeling Cyber-Insurance: Towards a Unifying Framework. - Cormac Herley:
The Plight of the Targeted Attacker in a World of Scale. - Ross J. Anderson, Shailendra Fuloria:
On the Security Economics of Electricity Metering.
Session 6. Open Source and Security Management
- Sam Ransbotham:
An Empirical Analysis of Exploitation Attempts Based on Vulnerabilities in Open Source Software. - Hermann Härtig, Claude-Joachim Hamann, Michael Roitzsch:
The Mathematics of Obscurity: On the Trustworthiness of Open Source. - Adam Beautement, David J. Pym:
Structured Systems Economics for Security Management.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.