Accepted Papers
- Cyber Risk and the Cross-Section of Stock Returns
by Daniel Celeny and Loïc Maréchal
- Prioritizing Investments in Cybersecurity: Empirical Evidence from an Event Study on the Determinants of Cyberattack Costs
by Daniel Celeny , Loïc Maréchal, Evgueni Rousselot, Alain Mermoud, and Mathias Humbert
- Valuation of Confidentiality and Availability in a Personal Ransomware Attack Scenario
by Freya Gassmann, Janina Beck, Nora Gourmelon, and Zinaida Benenson
- Non-governmental Governance of Trust on the Internet: WebPKI as Public Good
by Karl Grindal, Milton Mueller, Vagisha Srivastava
- Breaking the Ice: Using Transparency to Overcome the Cold Start Problem in an Underground Market
by Tina Marjanov, Konstantinos Ioannidis, Tom Hyndman, Nicolas Seyedzadeh, Alice Hutchings
- Competition and Cybercrime: An Application to Healthcare Digitization
by Chitra Marti
- Implementation of Information Security Controls Now or Later: Delay Discounting of Losses and Gains
by Marte Søgnen, Adam Szekeres, and Einar Snekkenes
- A History of Cyber Risk Transfer
by Daniel W. Woods and Josephine Wolff
- Upgraded Software and Embedded Improvements: A Puzzle of User Heterogeneity
by Raviv Murciano-Goroff, Ran Zhuo, and Shane Greenstein
- Have I Seen you Before? Measuring the Value of Tracking for Digital Advertising
by Grazia Cecere and Sarah Lemaire
- Peer(ing) Pressure: Achieving Social Action at Scale in the Internet Infrastructure
by Ben Collier, University of Edinburgh and Richard Clayton
- Beyond Technicalities: Assessing Cyber Risk by Incorporating Human Factors
by Wenjing Huang, Sasha Romanosky, and Joe Uchill
- Role of International Organizations and Formal Alliances in the Global Diffusion of National Cybersecurity Strategies
by Nadiya Kostyuk and Jen Sidorova
- Data Risk, Firm Growth and Innovation
by Roxana Mihet, Kumar Rishabh, and Orlando Gomes
- What has the U.S. government gained by formalizing Team Telecom? ―Team Telecom and the FCC’s Dual Security Approach
by Anna Oriishi
- The Case for an Icelandic Cyber Exploitation and Defense (ICED) Force for NATO Coalition Operations
by Johan Sigholm, Bjarni Már Magnússon, Magnús Skjöld, Theodor Gislason, and Gregory Falco
- Using Simulations to Determine Economic Cost of a Cyber Attack
by Nina Sokol, Viktoria Kežman, Stjepan Groš