An incentive system for reducing malware attacks
Communications of the ACM - 3d hard copy
Communications of the ACM - Special issue: RFID
The management of access controls/biometrics in organizations
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Threats and countermeasures for information system security: A cross-industry study
Information and Management
Information security and risk management
Communications of the ACM - The psychology of security: why do good users make bad decisions?
Cyberinsurance: a risk management tool?
Proceedings of the 4th annual conference on Information security curriculum development
The near real time statistical asset priority driven (nrtsapd) risk assessment methodology
SIGITE '08 Proceedings of the 9th ACM SIGITE conference on Information technology education
Why IT managers don't go for cyber-insurance products
Communications of the ACM - Scratch Programming for All
Asset priority risk assessment using hidden markov models
Proceedings of the 10th ACM conference on SIG-information technology education
A formal model for pricing information systems insurance contracts
Computer Standards & Interfaces
Dependability metrics
Can competitive insurers improve network security?
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
A three dimensional sender anonymity metric
International Journal of Security and Networks
A comparison of market approaches to software vulnerability disclosure
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
On the limits of cyber-insurance
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
The human element in cyber security: a study on student motivation to act
Proceedings of the 2012 Information Security Curriculum Development Conference
Insurance-Based Business Web Services Composition
International Journal of Organizational and Collective Intelligence
Cyber-risk decision models: To insure IT or not?
Decision Support Systems
Hi-index | 48.22 |
Seeking to protect an organization against a new form of business losses.