Are information security professionals expected value maximizers- An experiment and survey-based test
(Login to Download)
Characterizing fraud and its ramifications in affiliate marketing networks
(Login to Download)
How would information disclosure influence organizations’ outbound spam volume- Evidence from a field experiment
(Login to Download)
Hype and heavy tails A closer look at data breaches
(Login to Download)
Increasing cybersecurity investments in private reporting to authorities
(Login to Download)
Policy, statistics and questions- Reflections on UK cyber security disclosures
(Login to Download)
Risky business Fine-grained data breach prediction using business profiles
(Login to Download)
Understanding the role of sender reputation in abuse reporting and cleanup
(Login to Download)
A grounded analysis of experts’ decision-making during security assessments
(Login to Download)
Examining signals of trust in criminal markets online
(Login to Download)
Examining the costs and causes of cyber incidents
(Login to Download)