{"title":"Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?","authors":"Brent R. Rowe, D. Wood","doi":"10.1007/978-1-4614-1981-5_9","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_9","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122503407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Becker, Dominic Breuker, T. Heide, J. Holler, H. Rauer, Rainer Böhme
{"title":"Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency","authors":"J. Becker, Dominic Breuker, T. Heide, J. Holler, H. Rauer, Rainer Böhme","doi":"10.1007/978-3-642-39498-0_7","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_7","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129520601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Hofmeyr, T. Moore, S. Forrest, Benjamin Edwards, George Stelle
{"title":"Modeling Internet-Scale Policies for Cleaning up Malware","authors":"S. Hofmeyr, T. Moore, S. Forrest, Benjamin Edwards, George Stelle","doi":"10.1007/978-1-4614-1981-5_7","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_7","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133217527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Brett Stone-Gross, Ryan Abman, R. Kemmerer, Christopher Krügel, D. Steigerwald
{"title":"The Underground Economy of Fake Antivirus Software","authors":"Brett Stone-Gross, Ryan Abman, R. Kemmerer, Christopher Krügel, D. Steigerwald","doi":"10.1007/978-1-4614-1981-5_4","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_4","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"34 2-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133734560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adverse selection in online \"trust\" certifications","authors":"Benjamin L. Edelman","doi":"10.1145/1593254.1593286","DOIUrl":"https://doi.org/10.1145/1593254.1593286","url":null,"abstract":"Widely-used online \"trust\" authorities issue certifications without substantial verification of recipients' actual trustworthiness. This lax approach gives rise to adverse selection: The sites that seek and obtain trust certifications are actually less trustworthy than others. Using a new dataset on web site safety, I demonstrate that sites certified by the best-known authority, TRUSTe, are more than twice as likely to be untrustworthy as uncertified sites. This difference remains statistically and economically significant when restricted to \"complex\" commercial sites. In contrast, competing certification system BBBOnline imposes somewhat stricter requirements and appears to provide a certification of positive, albeit limited, value.","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130112571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Topology of Covert Conflict","authors":"Shishir Nagaraja","doi":"10.1007/978-3-540-77156-2_41","DOIUrl":"https://doi.org/10.1007/978-3-540-77156-2_41","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BORIS - Business-Oriented Management of Information Security","authors":"Sebastian Sowa, L. Tsinas, Roland Gabriel","doi":"10.1007/978-0-387-09762-6_4","DOIUrl":"https://doi.org/10.1007/978-0-387-09762-6_4","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133732317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Security Economics: Theory, in Practice","authors":"S. Neuhaus, B. Plattner","doi":"10.1007/978-3-642-39498-0_4","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_4","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Beautement, R. Coles, Jonathan Griffin, C. Ioannidis, B. Monahan, D. Pym, Angela Sasse, M. Wonham
{"title":"Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security","authors":"A. Beautement, R. Coles, Jonathan Griffin, C. Ioannidis, B. Monahan, D. Pym, Angela Sasse, M. Wonham","doi":"10.1007/978-0-387-09762-6_7","DOIUrl":"https://doi.org/10.1007/978-0-387-09762-6_7","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132383186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ross J. Anderson, Rainer Böhme, R. Clayton, T. Moore
{"title":"Security Economics and European Policy","authors":"Ross J. Anderson, Rainer Böhme, R. Clayton, T. Moore","doi":"10.1007/978-3-8348-9283-6_6","DOIUrl":"https://doi.org/10.1007/978-3-8348-9283-6_6","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126073128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}