Workshop on the Economics of Information Security最新文献

筛选
英文 中文
Botnet Economics: Uncertainty Matters 僵尸网络经济学:不确定性很重要
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-09762-6_12
Z. Li, Qi Liao, A. Striegel
{"title":"Botnet Economics: Uncertainty Matters","authors":"Z. Li, Qi Liao, A. Striegel","doi":"10.1007/978-0-387-09762-6_12","DOIUrl":"https://doi.org/10.1007/978-0-387-09762-6_12","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129608295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
Sex, Lies and Cyber-Crime Surveys 性,谎言和网络犯罪调查
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-1981-5_3
D. Florêncio, Cormac Herley
{"title":"Sex, Lies and Cyber-Crime Surveys","authors":"D. Florêncio, Cormac Herley","doi":"10.1007/978-1-4614-1981-5_3","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_3","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"456 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116021214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
Choice Architecture and Smartphone Privacy: There's a Price for That 选择架构和智能手机隐私:这是有代价的
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-39498-0_10
Serge Egelman, A. Felt, D. Wagner
{"title":"Choice Architecture and Smartphone Privacy: There's a Price for That","authors":"Serge Egelman, A. Felt, D. Wagner","doi":"10.1007/978-3-642-39498-0_10","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_10","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 151
The Impact of Immediate Disclosure on Attack Diffusion and Volume 即时披露对攻击扩散和数量的影响
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-1981-5_1
S. Ransbotham, Sabyasachi Mitra
{"title":"The Impact of Immediate Disclosure on Attack Diffusion and Volume","authors":"S. Ransbotham, Sabyasachi Mitra","doi":"10.1007/978-1-4614-1981-5_1","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_1","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132788768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections 网上滥交:预防性打补丁和计算机传播感染的传播
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-39498-0_8
T. Kelley, L. Camp
{"title":"Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections","authors":"T. Kelley, L. Camp","doi":"10.1007/978-3-642-39498-0_8","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_8","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133850522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Who Sometimes Violates the Rule of the Organizations? An Empirical Study on Information Security Behaviors and Awareness 谁有时会违反组织规则?信息安全行为与意识的实证研究
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-39498-0_5
T. Takemura, Ayako Komatsu
{"title":"Who Sometimes Violates the Rule of the Organizations? An Empirical Study on Information Security Behaviors and Awareness","authors":"T. Takemura, Ayako Komatsu","doi":"10.1007/978-3-642-39498-0_5","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_5","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114559094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reinterpreting the Disclosure Debate for Web Infections 重新解读网络感染的信息披露之争
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-09762-6_9
Oliver Day, R. Greenstadt, Brandon Palmen
{"title":"Reinterpreting the Disclosure Debate for Web Infections","authors":"Oliver Day, R. Greenstadt, Brandon Palmen","doi":"10.1007/978-0-387-09762-6_9","DOIUrl":"https://doi.org/10.1007/978-0-387-09762-6_9","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121797605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Real Name Verification Law on the Internet: a Poison or Cure for Privacy? 互联网实名法:隐私的毒药还是良药?
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-1981-5_11
D. Cho
{"title":"Real Name Verification Law on the Internet: a Poison or Cure for Privacy?","authors":"D. Cho","doi":"10.1007/978-1-4614-1981-5_11","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_11","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model Gordon-Loeb投资模型扩展中的信息安全生产力空间
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-0-387-09762-6_5
Kanta Matsuura
{"title":"Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model","authors":"Kanta Matsuura","doi":"10.1007/978-0-387-09762-6_5","DOIUrl":"https://doi.org/10.1007/978-0-387-09762-6_5","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124488332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer 众包劳动力市场中的犯罪分析:机械土耳其人与自由职业者
Workshop on the Economics of Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-39498-0_13
Vaibhav Garg, L. Camp, Chris Kanich
{"title":"Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer","authors":"Vaibhav Garg, L. Camp, Chris Kanich","doi":"10.1007/978-3-642-39498-0_13","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_13","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125355103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信