Login / Signup
WEIS
2005
2009
2011
2015
2005
2015
Keyphrases
Publications
2015
Jeffrey Pawlick
,
Quanyan Zhu
Deception by Design: Evidence-Based Signaling Games for Network Defense.
WEIS
(2015)
Wing Man Wynne Lam
Attack-Deterring and Damage-Control Investments in Cybersecurity.
WEIS
(2015)
Shu He
,
Gene Moo Lee
,
John S. Quarterman
,
Andrew B. Whinston
Designing Cybersecurity Policies.
WEIS
(2015)
Peter Snyder
,
Chris Kanich
No Please, After You: Detecting Fraud in Affiliate Marketing Networks.
WEIS
(2015)
Benjamin Johnson
,
Paul Laskowski
,
Thomas Maillart
,
John C.-I. Chuang
,
Nicolas Christin
Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You.
WEIS
(2015)
Ignacio Cofone
The Value of Privacy: Keeping the Money Where the Mouth is.
WEIS
(2015)
Brian Glass
,
Michelle Baddeley
,
M. Angela Sasse
Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty.
WEIS
(2015)
Fabio Bisogni
Data Breaches and the Dilemmas in Notifying Customers.
WEIS
(2015)
Richard Clayton
,
Tyler Moore
,
Nicolas Christin
Concentrating Correctly on Cybercrime Concentration.
WEIS
(2015)
Benjamin Edwards
,
Steven A. Hofmeyr
,
Stephanie Forrest
Hype and Heavy Tails: A Closer Look at Data Breaches.
WEIS
(2015)
14th Annual Workshop on the Economics of Information Security, WEIS 2015, Delft, The Netherlands, 22-23 June, 2015
WEIS
(2015)
Harry A. Kalodner
,
Miles Carlsten
,
Paul Ellenbogen
,
Joseph Bonneau
,
Arvind Narayanan
An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design.
WEIS
(2015)
Alessandro Acquisti
,
Laura Brandimarte
,
Jeff T. Hancock
Online Self-Disclosure and Offline Threat Detection.
WEIS
(2015)
Orçun Çetin
,
Mohammad Hanif Jhaveri
,
Carlos Gañán
,
Michel van Eeten
,
Tyler Moore
Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup.
WEIS
(2015)
Juhee Kwon
,
M. Eric Johnson
The Market Effect of Healthcare Security: Do Patients Care about Data Breaches?
WEIS
(2015)
Kurt Thomas
,
Danny Yuxing Huang
,
David Y. Wang
,
Elie Bursztein
,
Chris Grier
,
Tom Holt
,
Christopher Kruegel
,
Damon McCoy
,
Stefan Savage
,
Giovanni Vigna
Framing Dependencies Introduced by Underground Commoditization.
WEIS
(2015)
Stefan Laube
,
Rainer Böhme
The Economics of Mandatory Security Breach Reporting to Authorities.
WEIS
(2015)
Zinaida Benenson
,
Anna Girard
,
Ioannis Krontiris
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation.
WEIS
(2015)
Chad Heitzenrater
,
Andrew C. Simpson
Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures.
WEIS
(2015)
Armin Sarabi
,
Parinaz Naghizadeh
,
Yang Liu
,
Mingyan Liu
Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles.
WEIS
(2015)
Arslan Aziz
,
Rahul Telang
What is a Cookie Worth?
WEIS
(2015)
Konstantinos Mersinas
,
Bjoern Hartig
,
Keith M. Martin
,
Andrew Seltzer
Experimental Elicitation of Risk Behaviour amongst Information Security Professionals.
WEIS
(2015)
2012
Adrian Baldwin
,
Iffat Gheyas
,
Christos Ioannidis
,
David J. Pym
,
Julian Williams
Contagion in Cybersecurity Attacks.
WEIS
(2012)
Serge Egelman
,
Adrienne Porter Felt
,
David A. Wagner
Choice Architecture and Smartphone Privacy: There's a Price for That.
WEIS
(2012)
Sören Preibusch
,
Kat Krol
,
Alastair R. Beresford
The Privacy Economics of Voluntary Over-disclosure in Web Forms.
WEIS
(2012)
Ross J. Anderson
,
Chris Barton
,
Rainer Böhme
,
Richard Clayton
,
Michel van Eeten
,
Michael Levi
,
Tyler Moore
,
Stefan Savage
Measuring the Cost of Cybercrime.
WEIS
(2012)
11th Annual Workshop on the Economics of Information Security, WEIS 2012, Berlin, Germany, 25-26 June, 2012
WEIS
(2012)
Miguel Malheiros
,
Sacha Brostoff
,
Charlene Jennett
,
M. Angela Sasse
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application.
WEIS
(2012)
Matthias Brecht
,
Thomas Nowey
A Closer Look at Information Security Costs.
WEIS
(2012)
Jörg Becker
,
Dominic Breuker
,
Tobias Heide
,
Justus Holler
,
Hans Peter Rauer
,
Rainer Böhme
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency.
WEIS
(2012)
Sasha Romanosky
,
David Hoffman
,
Alessandro Acquisti
Empirical Analysis of Data Breach Litigation.
WEIS
(2012)
Martin S. Gaynor
,
Muhammad Zia Hydari
,
Rahul Telang
Is Patient Data Better Protected in Competitive Healthcare Markets?
WEIS
(2012)
Vaibhav Garg
,
Chris Kanich
,
L. Jean Camp
Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer.
WEIS
(2012)
Juhee Kwon
,
M. Eric Johnson
Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance.
WEIS
(2012)
Timothy Kelley
,
L. Jean Camp
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections.
WEIS
(2012)
Yuliy Baryshnikov
IT Security Investment and Gordon-Loeb's 1/e Rule.
WEIS
(2012)
Stephan Neuhaus
,
Bernhard Plattner
Software Security Economics: Theory, in Practice.
WEIS
(2012)
Nevena Vratonjic
,
Mohammad Hossein Manshaei
,
Jens Grossklags
,
Jean-Pierre Hubaux
Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance.
WEIS
(2012)
Toshihiko Takemura
,
Ayako Komatsu
Who Sometimes Violates the Rule of the Organizations? An Empirical Study on Information Security Behaviors and Awareness.
WEIS
(2012)
Bongkot Jenjarrussakul
,
Hideyuki Tanaka
,
Kanta Matsuura
Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks.
WEIS
(2012)
Lukas Demetz
,
Daniel Bachlechner
To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool.
WEIS
(2012)
Cormac Herley
Why do Nigerian Scammers Say They are From Nigeria?
WEIS
(2012)
Min Chen
,
Varghese S. Jacob
,
Suresh Radhakrishnan
,
Young U. Ryu
The Effect of Fraud Investigation Cost on Pay-Per-Click Advertising.
WEIS
(2012)
2011
Dinei A. F. Florêncio
,
Cormac Herley
Where Do All the Attacks Go?
WEIS
(2011)
Dinei A. F. Florêncio
,
Cormac Herley
Sex, Lies and Cyber-crime Survey.
WEIS
(2011)
Matthew J. Hashim
,
Sandra Maximiano
,
Karthik N. Kannan
Information Targeting and Coordination: An Experimental Study.
WEIS
(2011)
Brett Stone-Gross
,
Ryan Abman
,
Richard A. Kemmerer
,
Christopher Kruegel
,
Douglas G. Steigerwald
The Underground Economy of Fake Antivirus Software.
WEIS
(2011)
Daegon Cho
Real Name Verification Law on the Internet: a Poison or Cure for Privacy?
WEIS
(2011)
Laura Brandimarte
,
Alessandro Acquisti
,
Joachim Vosgerau
Negative Information Looms Longer than Positive Information.
WEIS
(2011)
Sam Ransbotham
,
Sabyasachi Mitra
The Impact of Immediate Disclosure on Attack Diffusion and Volume.
WEIS
(2011)