Models and Measures for Correlation in Cyber-Insurance (paper)
Rainer Boehme and Gaurav Kataria
The Effect of Stock Spam on Financial Markets (paper)
Rainer Boehme and Thorsten Holz
The Economics of Digital Forensics (paper)
Tyler Moore
Understanding and Influencing Attackers' Decisions: Implications for
Security Investment Strategies (paper)
Marco Cremonini and Dmitri Nizovtsev
On the Gordon & Loeb Model for Information Security Investment (paper)
Jan Willemson
Economics of Information Security Investment in the Case of
Simultaneous Attacks (paper)
C. Derrick Huang, Qing Hu and Ravi S. Behara
Enterprise Information Security: Who Should Manage it and How? (paper)
Vineet Kumar, Rahul Telang and Tridas Mukhopadhyay
Hackers, Users, Information Security (paper)
I.P.L. Png, Candy Q. Tang and Qiu-Hong Wang
A Model for Opportunistic Network Exploits: The Case of P2P Worms (paper)
Michael Collins, Carrie Gates and Gaurav Kataria
Predictors of Home-Based Wireless Security (paper)
Matthew Hottell, Drew Carter and Matthew Deniszczuk
Proof of Work can Work (paper)
Debin Liu and L Jean Camp
The Topology of Covert Conflict (paper)
Shishir Nagaraja and Ross Anderson
Costs to the U.S. Economy of Information Infrastructure Failures:
Estimates from Field Studies and Economic Data (paper)
Scott Dynes, Eva Andrijicic and M Eric Johnson
The Potential for Underinvestment in Internet Security: Implications
for Regulatory Policy (paper)
Alfredo Garcia and Barry Horowitz
Bootstrapping the Adoption of Internet Security Protocols (paper)
Andy Ozment and Stuart E. Schechter
The Economic Impact of Regulatory Information Disclosure on
Information Security Investments, Competition, and Social Welfare (paper)
Anindya Ghose and Uday Rajan
Opt In Versus Opt Out: A Free-Entry Analysis of Privacy Policies (paper)
Jan Bouckaert and Hans Degryse
Reliable, Usable Signaling to Defeat Masquerade Attacks (paper)
L Jean Camp
Economics of Security Patch Management (paper)
Huseyin Cavusoglu, Hasan Cavusoglu and Jun Zhang
Emerging Economic Models for Vulnerability Research (paper)
Michael Sutton and Frank Nagle
Competitive and Strategic Effects in the Timing of Patch Release (paper)
Ashish Arora, Christopher M. Forman, Anand Nandkumar and Rahul Telang
Private Sector Cyber Security Investment: An Empirical Analysis (paper)
Brent R. Rowe and Michael P. Gallaher
An Empirical Analysis of Security Investment in Countermeasures
Based on an Enterprise Survey in Japan (paper)
Wei Liu, Hideyuki Tanaka and Kanta Matsuura
Justifying Spam and E-mail Virus Security Investments: A Case Study (paper)
Hemantha Herath and Tejaswini Herath
The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications (paper)
George Danezis and Bettina Wittneben
Is There a Cost to Privacy Breaches? An Event Study (paper)
Alessandro Acquisti, Allan Friedman and Rahul Telang
Financial Privacy for Free? US Consumers' Response to FACTA (paper)
Alessandro Acquisti and Bin Zhang
Anonymity Loves Company: Usability and the Network Effect (paper)
Roger Dingledine and Nick Mathewson
Collaborative Scheduling: Threats and Promises (paper)
Rachel Greenstadt and Michael D. Smith
Adverse Selection in Online 'Trust' Certifications (paper)
Benjamin Edelman
The Sixth Workshop on Privacy-Enhancing Technologies begins at Robinson College immediately following WEIS. WEIS participants are invited to attend the Wednesday afternoon PET session free of charge. Click here for more information.
WEIS 2006 is sponsored by the Institute for Information Infrastructure Protection (I3P), Microsoft Research and the Foundation for Information Policy Research.
For more information, please contact [email protected]. Website maintained by Tyler.Moore at cl.cam.ac.uk