Workshop on the Economics of Information Security最新文献

筛选
英文 中文
Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security? 家庭互联网用户是否愿意为改善网络安全而向互联网服务提供商付费?
Workshop on the Economics of Information Security Pub Date : 2013-01-31 DOI: 10.1007/978-1-4614-1981-5_9
Brent R. Rowe, D. Wood
{"title":"Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?","authors":"Brent R. Rowe, D. Wood","doi":"10.1007/978-1-4614-1981-5_9","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_9","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122503407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency 我们能负担得起工作证明的完整性吗?受比特币启发的场景
Workshop on the Economics of Information Security Pub Date : 2012-02-24 DOI: 10.1007/978-3-642-39498-0_7
J. Becker, Dominic Breuker, T. Heide, J. Holler, H. Rauer, Rainer Böhme
{"title":"Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency","authors":"J. Becker, Dominic Breuker, T. Heide, J. Holler, H. Rauer, Rainer Böhme","doi":"10.1007/978-3-642-39498-0_7","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_7","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129520601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
Modeling Internet-Scale Policies for Cleaning up Malware 为清除恶意软件建模互联网规模的策略
Workshop on the Economics of Information Security Pub Date : 2012-02-17 DOI: 10.1007/978-1-4614-1981-5_7
S. Hofmeyr, T. Moore, S. Forrest, Benjamin Edwards, George Stelle
{"title":"Modeling Internet-Scale Policies for Cleaning up Malware","authors":"S. Hofmeyr, T. Moore, S. Forrest, Benjamin Edwards, George Stelle","doi":"10.1007/978-1-4614-1981-5_7","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_7","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133217527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
The Underground Economy of Fake Antivirus Software 假冒杀毒软件的地下经济
Workshop on the Economics of Information Security Pub Date : 2011-06-01 DOI: 10.1007/978-1-4614-1981-5_4
Brett Stone-Gross, Ryan Abman, R. Kemmerer, Christopher Krügel, D. Steigerwald
{"title":"The Underground Economy of Fake Antivirus Software","authors":"Brett Stone-Gross, Ryan Abman, R. Kemmerer, Christopher Krügel, D. Steigerwald","doi":"10.1007/978-1-4614-1981-5_4","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_4","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"34 2-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133734560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 140
Adverse selection in online "trust" certifications 在线“信任”认证中的逆向选择
Workshop on the Economics of Information Security Pub Date : 2009-08-12 DOI: 10.1145/1593254.1593286
Benjamin L. Edelman
{"title":"Adverse selection in online \"trust\" certifications","authors":"Benjamin L. Edelman","doi":"10.1145/1593254.1593286","DOIUrl":"https://doi.org/10.1145/1593254.1593286","url":null,"abstract":"Widely-used online \"trust\" authorities issue certifications without substantial verification of recipients' actual trustworthiness. This lax approach gives rise to adverse selection: The sites that seek and obtain trust certifications are actually less trustworthy than others. Using a new dataset on web site safety, I demonstrate that sites certified by the best-known authority, TRUSTe, are more than twice as likely to be untrustworthy as uncertified sites. This difference remains statistically and economically significant when restricted to \"complex\" commercial sites. In contrast, competing certification system BBBOnline imposes somewhat stricter requirements and appears to provide a certification of positive, albeit limited, value.","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130112571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
The Topology of Covert Conflict 隐蔽冲突的拓扑结构
Workshop on the Economics of Information Security Pub Date : 2005-04-20 DOI: 10.1007/978-3-540-77156-2_41
Shishir Nagaraja
{"title":"The Topology of Covert Conflict","authors":"Shishir Nagaraja","doi":"10.1007/978-3-540-77156-2_41","DOIUrl":"https://doi.org/10.1007/978-3-540-77156-2_41","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
BORIS - Business-Oriented Management of Information Security BORIS -面向业务的信息安全管理
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-09762-6_4
Sebastian Sowa, L. Tsinas, Roland Gabriel
{"title":"BORIS - Business-Oriented Management of Information Security","authors":"Sebastian Sowa, L. Tsinas, Roland Gabriel","doi":"10.1007/978-0-387-09762-6_4","DOIUrl":"https://doi.org/10.1007/978-0-387-09762-6_4","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133732317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Software Security Economics: Theory, in Practice 软件安全经济学:理论与实践
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-39498-0_4
S. Neuhaus, B. Plattner
{"title":"Software Security Economics: Theory, in Practice","authors":"S. Neuhaus, B. Plattner","doi":"10.1007/978-3-642-39498-0_4","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_4","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security 模拟USB记忆棒安全的人力和技术成本和收益
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-09762-6_7
A. Beautement, R. Coles, Jonathan Griffin, C. Ioannidis, B. Monahan, D. Pym, Angela Sasse, M. Wonham
{"title":"Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security","authors":"A. Beautement, R. Coles, Jonathan Griffin, C. Ioannidis, B. Monahan, D. Pym, Angela Sasse, M. Wonham","doi":"10.1007/978-0-387-09762-6_7","DOIUrl":"https://doi.org/10.1007/978-0-387-09762-6_7","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132383186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
Security Economics and European Policy 安全经济与欧洲政策
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-8348-9283-6_6
Ross J. Anderson, Rainer Böhme, R. Clayton, T. Moore
{"title":"Security Economics and European Policy","authors":"Ross J. Anderson, Rainer Böhme, R. Clayton, T. Moore","doi":"10.1007/978-3-8348-9283-6_6","DOIUrl":"https://doi.org/10.1007/978-3-8348-9283-6_6","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126073128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信