Accepted Papers

Cyber Risk and the Cross-Section of Stock Returns
by Daniel Celeny and Loïc Maréchal
Prioritizing Investments in Cybersecurity: Empirical Evidence from an Event Study on the Determinants of Cyberattack Costs
by Daniel Celeny , Loïc Maréchal, Evgueni Rousselot, Alain Mermoud, and Mathias Humbert
Valuation of Confidentiality and Availability in a Personal Ransomware Attack Scenario
by Freya Gassmann, Janina Beck, Nora Gourmelon, and Zinaida Benenson
Non-governmental Governance of Trust on the Internet: WebPKI as Public Good
by Karl Grindal, Milton Mueller, Vagisha Srivastava
Breaking the Ice: Using Transparency to Overcome the Cold Start Problem in an Underground Market
by Tina Marjanov, Konstantinos Ioannidis, Tom Hyndman, Nicolas Seyedzadeh, Alice Hutchings
Competition and Cybercrime: An Application to Healthcare Digitization
by Chitra Marti
Implementation of Information Security Controls Now or Later: Delay Discounting of Losses and Gains
by Marte Søgnen, Adam Szekeres, and Einar Snekkenes
A History of Cyber Risk Transfer
by Daniel W. Woods and Josephine Wolff
Upgraded Software and Embedded Improvements: A Puzzle of User Heterogeneity
by Raviv Murciano-Goroff, Ran Zhuo, and Shane Greenstein
Have I Seen you Before? Measuring the Value of Tracking for Digital Advertising
by Grazia Cecere and Sarah Lemaire
Peer(ing) Pressure: Achieving Social Action at Scale in the Internet Infrastructure
by Ben Collier, University of Edinburgh and Richard Clayton
Beyond Technicalities: Assessing Cyber Risk by Incorporating Human Factors
by Wenjing Huang, Sasha Romanosky, and Joe Uchill
Role of International Organizations and Formal Alliances in the Global Diffusion of National Cybersecurity Strategies
by Nadiya Kostyuk and Jen Sidorova
Data Risk, Firm Growth and Innovation
by Roxana Mihet, Kumar Rishabh, and Orlando Gomes
What has the U.S. government gained by formalizing Team Telecom? ―Team Telecom and the FCC’s Dual Security Approach
by Anna Oriishi
The Case for an Icelandic Cyber Exploitation and Defense (ICED) Force for NATO Coalition Operations
by Johan Sigholm, Bjarni Már Magnússon, Magnús Skjöld, Theodor Gislason, and Gregory Falco
Using Simulations to Determine Economic Cost of a Cyber Attack
by Nina Sokol, Viktoria Kežman, Stjepan Groš