default search action
WEIS 2007: Pittsburgh, PA, USA
- 6th Annual Workshop on the Economics of Information Security, WEIS 2007, The Heinz School and CyLab at Carnegie Mellon University, Pittsburgh, PA, USA, June 7-8, 2007. 2007
Session 1. Disclosure
- Charles Miller:
The Legitimate vulnerability market: the secretive world of 0-day exploit sales. - M. Eric Johnson, Scott Dynes:
Inadvertent Disclosure - Information Leaks in the Extended Enterprise. - Jay Pil Choi, Chaim Fershtman, Neil Gandal:
Network Security: Vulnerabilities and Disclosure Policy. - Mohammad Saifur Rahman, Karthik N. Kannan, Mohit Tawarmalani:
The Countervailing Incentive of Restricted Patch Distribution: Economic and Policy Implications.
Session 2. Privacy
- Rainer Böhme, Sven Koble:
On the Viability of Privacy-Enhancing Technologies in a Self-Regulated Business-to-Consumer Market: Will Privacy Remain a Luxury Good? - Jens Grossklags, Alessandro Acquisti:
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information.
Session 3. Security Investments
- Vineet Kumar, Rahul Telang, Tridas Mukhopadhyay:
Optimally Securing Enterprise Information Systems and Assets. - Peter Honeyman, Galina A. Schwartz, Ari Can Assche:
Interdependence of Reliability and Security. - Rachel Rue:
A Framework for Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision-Making.
Session 4. Managed Security Service Providers
- Alok Gupta, Dmitry Zhdanov:
Growth and Sustainability of MSSP Networks. - Brent Rowe:
Will Outsourcing IT Security Lead to a Higher Social Level of Security? - Yue Chen:
Measuring Security Investment Benefit for Off the Shelf Software Systems - A Stakeholder Value Driven Approach.
Session 5. Privacy-Personalization
- Ramnath K. Chellappa, Shivendu Shivendu:
Incentive Design for Free But No Free Disposal Services: The Case of Personalization under Privacy Concerns. - Janice Y. Tsai, Serge Egelman, Lorrie Faith Cranor, Alessandro Acquisti:
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. - Srinivasan Raghunathan, Huseyin Cavusoglu, Byungwan Koh:
Economics of User Segmentation, Profiling, and Detection in Security.
Session 6. Empirics of Information Security
- Ivan P. L. Png, Chen-Yu Wang:
The Deterrent Effect of Enforcement Against Computer Hackers: Cross-Country Evidence. - Tyler Moore, Richard Clayton:
An Empirical Analysis of the Current State of Phishing Attack and Defence. - Amalia R. Miller, Catherine Tucker:
Privacy, Network Effects and Electronic Medical Record Technology Adoption.
Session 7. Rump Sessions
- Jonathan Griffin, Brian Monahan, David J. Pym, Mike Wonham, Mike Yearworth:
Assessing the Value of Investments in Network Security Operations: A Systems Analytics Approach. WEIS 2007 - Rolf Hulthén:
The Gordon-Loeb Investment Model Generalized: Time Dependent Multiple Threats and Breach Losses over an Investment Period. WEIS 2007 - Aaron J. Burstein:
An Uneasy Relationship: Cyber Security Information Sharing, Communications Privacy, and the Boundaries of the Firm. WEIS 2007 - Stefan Dodds:
Hiding, Seeking, and the Evolution of Privacy Behavior. WEIS 2007 - Xia Zhao, Jianqing Chen, Andrew B. Whinston:
A Reputation Mechanism for Software Vulnerability Disclosure and Patch Release. WEIS 2007 - Xiaodong Jin, Dan Yomine:
A Survival Analysis of Disclosed Security Breaches. WEIS 2007
Session 8. Risk
- Farzaneh Asgharpour, Debin Liu, L. Jean Camp:
Mental Models of Computer Security Risks. - Hemantha S. B. Herath, Tejaswini C. Herath:
Cyber-Insurance: Copula Pricing Framework and Implication for Risk Management. - Kjell Hausken:
Strategic Defense and Attack of Complex Networks.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.