


default search action
WEIS 2009: London, England, UK
- 8th Annual Workshop on the Economics of Information Security, WEIS 2009, University College London, England, UK, June 24-25, 2009. 2009
Session 1. Identity Theft
- Alessandro Acquisti, Ralph Gross:
Social Insecurity: The Unintended Consequences of Identity Fraud Prevention Policies. - William Roberds, Stacey L. Schreft:
Data Breaches and Identity Theft.
Session 2. Modelling uncertainty's effects
- Rainer Böhme, Tyler Moore:
The Iterated Weakest Link - A Model of Adaptive Security Investment. - Jens Grossklags, Benjamin Johnson, Nicolas Christin:
The Price of Uncertainty in Security Games. - Cormac Herley, Dinei A. F. Florêncio:
Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy.
Session 3. Future directions in the economics of information security
- Qui-Hong Wang, Seung-Huyn Kim:
Cyber Attacks: Cross-Country Interdependence and Enforcement.
Session 4. Economics of privacy
- Alessandro Acquisti, Leslie John, George Loewenstein:
The Impact of Relative Standards on Concern About Privacy. - Ramón Compañó, Wainer Lusoli:
The Policy Maker's Anguish: Regulating Personal Data Behaviour Between Paradoxes and Dilemmas. - Joseph Bonneau, Sören Preibusch:
The Privacy Jungle: On the Market for Data Protection in Social Networks. - Ajit Appari, Denise L. Anthony, M. Eric Johnson:
HIPAA Compliance: An Examination of Institutional and Market Forces.
Session 5. Options
- Stefan Berthold, Rainer Böhme:
Valuating Privacy with Option Pricing Theory. - Ken-ichi Tatsumi, Makoto Goto:
Optimal Timing of Information Security Investment: A Real Options Approach.
Session 6. Misaligned incentives in systems
- Ross J. Anderson, Shailendra Fuloria:
Security Economics and Critical National Infrastructure. - Richard Clayton:
Internet Multi-Homing Problems: Explanations from Economics.
Session 7. Security outsourcing and risk analysis
- Zach Zhizhong Zhou, M. Eric Johnson:
The Impact of Information Security Ratings on Vendor Competition. - Christian W. Probst, Jeffrey Hunker:
The Risk of Risk Analysis-And its relation to the Economics of Insider Threats.
Session 8. Cyber-insurance
- Nikhil Shetty, Galina Schwartz, Márk Félegyházi, Jean C. Walrand:
Competitive Cyber-Insurance and Internet Security. - Frank Innerhofer-Oberperfler, Ruth Breu:
Potential Rating Indicators for Cyberinsurance: An Exploratory Qualitative Study.
Session 9. Modelling security dynamics
- Marc Lelarge:
Economics of Malware: Epidemic Risks Model, Network Externalities and Incentives. - Vicente Segura, Javier Lahuerta:
Modeling the Economic Incentives of DDoS Attacks: femtocell case study. - Stefan Frei, Dominik Schatzmann, Bernhard Plattner, Brian Trammell:
Modelling the Security Ecosystem- The Dynamics of (In)Security.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.