{"title":"Botnet Economics: Uncertainty Matters","authors":"Z. Li, Qi Liao, A. Striegel","doi":"10.1007/978-0-387-09762-6_12","DOIUrl":"https://doi.org/10.1007/978-0-387-09762-6_12","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129608295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sex, Lies and Cyber-Crime Surveys","authors":"D. Florêncio, Cormac Herley","doi":"10.1007/978-1-4614-1981-5_3","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_3","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"456 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116021214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Choice Architecture and Smartphone Privacy: There's a Price for That","authors":"Serge Egelman, A. Felt, D. Wagner","doi":"10.1007/978-3-642-39498-0_10","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_10","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Immediate Disclosure on Attack Diffusion and Volume","authors":"S. Ransbotham, Sabyasachi Mitra","doi":"10.1007/978-1-4614-1981-5_1","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_1","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132788768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections","authors":"T. Kelley, L. Camp","doi":"10.1007/978-3-642-39498-0_8","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_8","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133850522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Who Sometimes Violates the Rule of the Organizations? An Empirical Study on Information Security Behaviors and Awareness","authors":"T. Takemura, Ayako Komatsu","doi":"10.1007/978-3-642-39498-0_5","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_5","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114559094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reinterpreting the Disclosure Debate for Web Infections","authors":"Oliver Day, R. Greenstadt, Brandon Palmen","doi":"10.1007/978-0-387-09762-6_9","DOIUrl":"https://doi.org/10.1007/978-0-387-09762-6_9","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121797605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real Name Verification Law on the Internet: a Poison or Cure for Privacy?","authors":"D. Cho","doi":"10.1007/978-1-4614-1981-5_11","DOIUrl":"https://doi.org/10.1007/978-1-4614-1981-5_11","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model","authors":"Kanta Matsuura","doi":"10.1007/978-0-387-09762-6_5","DOIUrl":"https://doi.org/10.1007/978-0-387-09762-6_5","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124488332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer","authors":"Vaibhav Garg, L. Camp, Chris Kanich","doi":"10.1007/978-3-642-39498-0_13","DOIUrl":"https://doi.org/10.1007/978-3-642-39498-0_13","url":null,"abstract":"","PeriodicalId":329988,"journal":{"name":"Workshop on the Economics of Information Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125355103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}