Microsoft Corporation (2007): Microsoft Security Intelligence Report (January – June 2007) . 4EDE2572-1D39-46EA-94C6-4851750A2CB0&displaylang=en (last access: 10 Jan 2008) 100
 Miller, C. (2007): The legitimate vulnerability market. Workshop on the Economics of Information Security (WEIS) , Carnegie Mellon Univ., Pittsburgh, PA. http: //weis2007.econinfosec.org/papers/29.pdf (last access: 13 Nov 2007)  Moore, T., Clayton, R. (2007): Examining the impact of website take-down on phishing. Proc. of Anti-Phishing Working Group eCrime Researcher’s Summit (APWG eCrime) , ACM Press, New York, 1–13  Mozilla Corporation (2007): Mozilla security bug bounty program. . mozilla.org/security/bug-bounty.html (last access: 22 December 2007)  Mulligan, D. K., Bamberger, K. A. (2007): Security breach notification laws: Views from chief security officers. Samuelson Law, Technology & Public Policy Clinic, Univ. of California, Berkeley School of Law. clinics/samuelson/cso study.pdf (last access: 7 Dec 2007)  Nader, R. (1965): Unsafe at Any Speed . Grossman Publishers Inc., New York.  Nardo, M. et al. (2005): Handbook on constructing composite indicators: Method- ology and user guide. OECD Statistical Working Paper.  National Conference of State Legislatures (2007): Breach of information. http: //  Office of Fair Trading (2003): Payment systems. and resources/resource base/market-studies/payment-systems  Ogut, H., Menon N., Ragunathan, S. (2005): Cyber insurance and IT security investment: Impact of independent risk. Workshop in the Economics of Information Security (WEIS) , Harvard University, Cambridge, MA. . net/workshop/pdf/56.pdf (last access: 3 Dec 2007)  OpenDNS (2007): OpenDNS shares April 2007 PhishTank statistics, Press Release, 1 May. release.php?id=14  Ozment, A. (2004): Bug auctions: Vulnerability markets reconsidered. Workshop on the Economics of Information Security (WEIS) , University of Minnesota, Min- neapolis, MN. (last access: 13 Nov 2007)  Ozment, A. (2005): The likelihood of vulnerability rediscovery and the social util- ity of vulnerability hunting. Workshop in the Economics of Information Secur- ity (WEIS) , Harvard University, Cambridge, MA. workshop/pdf/10.pdf (last access: 16 Nov 2007)  Ramzan, Z., W¨uest, C. (2007): Phishing attacks: Analyzing trends in 2006. Fourth Conference on Email and Anti-Spam , Mountain View, CA. 2007/papers/paper-34.pdf 101
 PITCOM (2006): Critical national infrastructure, briefings for parliamentarians on the politics of information technology. PitComms1-CNI.doc (last access: 10 Jan 2008)  Privacy Rights Clearinghouse (2005): A chronology of data breaches. .
You've reached the end of your free preview.
Want to read all 114 pages?