Cyber Risk and the Cross-Section of Stock Returns by Daniel Celeny and Loïc Maréchal |
Prioritizing Investments in Cybersecurity: Empirical Evidence from an Event Study on the Determinants of Cyberattack Costs by Daniel Celeny , Loïc Maréchal, Evgueni Rousselot, Alain Mermoud, and Mathias Humbert |
Valuation of Confidentiality and Availability in a Personal Ransomware Attack Scenario by Freya Gassmann, Janina Beck, Nora Gourmelon, and Zinaida Benenson |
Non-governmental Governance of Trust on the Internet: WebPKI as Public Good by Karl Grindal, Milton Mueller, Vagisha Srivastava |
Breaking the Ice: Using Transparency to Overcome the Cold Start Problem in an Underground Market by Tina Marjanov, Konstantinos Ioannidis, Tom Hyndman, Nicolas Seyedzadeh, Alice Hutchings |
Competition and Cybercrime: An Application to Healthcare Digitization by Chitra Marti |
Implementation of Information Security Controls Now or Later: Delay Discounting of Losses and Gains by Marte Søgnen, Adam Szekeres, and Einar Snekkenes |
A History of Cyber Risk Transfer by Daniel W. Woods and Josephine Wolff |
Upgraded Software and Embedded Improvements: A Puzzle of User Heterogeneity by Raviv Murciano-Goroff, Ran Zhuo, and Shane Greenstein |
Have I Seen you Before? Measuring the Value of Tracking for Digital Advertising by Grazia Cecere and Sarah Lemaire |
Peer(ing) Pressure: Achieving Social Action at Scale in the Internet Infrastructure by Ben Collier, University of Edinburgh and Richard Clayton |
Beyond Technicalities: Assessing Cyber Risk by Incorporating Human Factors by Wenjing Huang, Sasha Romanosky, and Joe Uchill |
Role of International Organizations and Formal Alliances in the Global Diffusion of National Cybersecurity Strategies by Nadiya Kostyuk and Jen Sidorova |
Data Risk, Firm Growth and Innovation by Roxana Mihet, Kumar Rishabh, and Orlando Gomes |
What has the U.S. government gained by formalizing Team Telecom? ―Team Telecom and the FCC’s Dual Security Approach by Anna Oriishi |
The Case for an Icelandic Cyber Exploitation and Defense (ICED) Force for NATO Coalition Operations by Johan Sigholm, Bjarni Már Magnússon, Magnús Skjöld, Theodor Gislason, and Gregory Falco |
Using Simulations to Determine Economic Cost of a Cyber Attack by Nina Sokol, Viktoria Kežman, Stjepan Groš |