I/S: Volume 2, Issue 2 (Spring/Summer 2006)
Browse by
Volume 2, Issue 2
Cybersecurity
2006
Table of Contents
Description | Full Text PDF
Symposium: Cybersecurity Policy
Foreword: I/S Symposium on Cybersecurity Policy
Shane, Peter M. pp. 185-187
Description | Full Text PDF
The State of Economics of Information Security
Camp, L. Jean pp. 189-205
Description | Full Text PDF
Faking It: Calculating Loss in Computer Crime Sentencing
Granick, Jennifer S. pp. 207-229
Description | Full Text PDF
Could IPv6 Improve Network Security? And If So, at What Cost?
Rowe, Brent; Gallaher, Michael pp. 231-267
Description | Full Text PDF
Commentaries
The Privacy Value
Sand, Peter E. pp. 269-282
Description | Full Text PDF
User Choices and Regret: Understanding Users' Decision Process about Consensually Acquired Spyware
Good, Nathaniel; Grossklags, Jens; Thaw, David; Perzanowski, Aaron; Mulligan, Deirdre; Konstan, Joseph pp. 283-344
Description | Full Text PDF
Book Review
A Dispatch From the Crypto Wars: Reviewing Matt Curtin, Brute Force: Cracking the Data Encryption Standard (2005).
Froomkin, A. Michael pp. 345-363
Description | Full Text PDF
Other Research
Development Theory and Foundations of Universal Access Policies
Pereira Neto, Caio M. Silva pp. 365-408
Description | Full Text PDF
No Direction Home: Will the Law Keep Pace With Human Tracking Technology to Protect Individual Privacy and Stop Geoslavery
Herbert, William A. pp. 409-473
Description | Full Text PDF