99 microsoft

This preview shows page 100 - 103 out of 114 pages.

[99] Microsoft Corporation (2007): Microsoft Security Intelligence Report (January – June 2007) . 4EDE2572-1D39-46EA-94C6-4851750A2CB0&displaylang=en (last access: 10 Jan 2008) 100
Image of page 100
[100] Miller, C. (2007): The legitimate vulnerability market. Workshop on the Economics of Information Security (WEIS) , Carnegie Mellon Univ., Pittsburgh, PA. http: //weis2007.econinfosec.org/papers/29.pdf (last access: 13 Nov 2007) [101] Moore, T., Clayton, R. (2007): Examining the impact of website take-down on phishing. Proc. of Anti-Phishing Working Group eCrime Researcher’s Summit (APWG eCrime) , ACM Press, New York, 1–13 [102] Mozilla Corporation (2007): Mozilla security bug bounty program. . mozilla.org/security/bug-bounty.html (last access: 22 December 2007) [103] Mulligan, D. K., Bamberger, K. A. (2007): Security breach notification laws: Views from chief security officers. Samuelson Law, Technology & Public Policy Clinic, Univ. of California, Berkeley School of Law. clinics/samuelson/cso study.pdf (last access: 7 Dec 2007) [104] Nader, R. (1965): Unsafe at Any Speed . Grossman Publishers Inc., New York. [105] Nardo, M. et al. (2005): Handbook on constructing composite indicators: Method- ology and user guide. OECD Statistical Working Paper. [106] National Conference of State Legislatures (2007): Breach of information. http: // [107] Office of Fair Trading (2003): Payment systems. and resources/resource base/market-studies/payment-systems [108] Ogut, H., Menon N., Ragunathan, S. (2005): Cyber insurance and IT security investment: Impact of independent risk. Workshop in the Economics of Information Security (WEIS) , Harvard University, Cambridge, MA. . net/workshop/pdf/56.pdf (last access: 3 Dec 2007) [109] OpenDNS (2007): OpenDNS shares April 2007 PhishTank statistics, Press Release, 1 May. release.php?id=14 [110] Ozment, A. (2004): Bug auctions: Vulnerability markets reconsidered. Workshop on the Economics of Information Security (WEIS) , University of Minnesota, Min- neapolis, MN. (last access: 13 Nov 2007) [111] Ozment, A. (2005): The likelihood of vulnerability rediscovery and the social util- ity of vulnerability hunting. Workshop in the Economics of Information Secur- ity (WEIS) , Harvard University, Cambridge, MA. workshop/pdf/10.pdf (last access: 16 Nov 2007) [112] Ramzan, Z., W¨uest, C. (2007): Phishing attacks: Analyzing trends in 2006. Fourth Conference on Email and Anti-Spam , Mountain View, CA. 2007/papers/paper-34.pdf 101
Image of page 101
[113] PITCOM (2006): Critical national infrastructure, briefings for parliamentarians on the politics of information technology. PitComms1-CNI.doc (last access: 10 Jan 2008) [114] Privacy Rights Clearinghouse (2005): A chronology of data breaches. .
Image of page 102
Image of page 103

You've reached the end of your free preview.

Want to read all 114 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture