I/S: A Journal of Law and Policy for the Information Society
Volume 2, Issue 2
Cybersecurity
2006


Table of Contents
Description | Full Text PDF

Symposium: Cybersecurity Policy

Foreword: I/S Symposium on Cybersecurity Policy
Shane, Peter M. pp. 185-187
Description | Full Text PDF

The State of Economics of Information Security
Camp, L. Jean pp. 189-205
Description | Full Text PDF

Faking It: Calculating Loss in Computer Crime Sentencing
Granick, Jennifer S. pp. 207-229
Description | Full Text PDF

Could IPv6 Improve Network Security? And If So, at What Cost?
Rowe, Brent; Gallaher, Michael pp. 231-267
Description | Full Text PDF

Commentaries

The Privacy Value
Sand, Peter E. pp. 269-282
Description | Full Text PDF

User Choices and Regret: Understanding Users' Decision Process about Consensually Acquired Spyware
Good, Nathaniel; Grossklags, Jens; Thaw, David; Perzanowski, Aaron; Mulligan, Deirdre; Konstan, Joseph pp. 283-344
Description | Full Text PDF

Book Review

A Dispatch From the Crypto Wars: Reviewing Matt Curtin, Brute Force: Cracking the Data Encryption Standard (2005).
Froomkin, A. Michael pp. 345-363
Description | Full Text PDF

Other Research

Development Theory and Foundations of Universal Access Policies
Pereira Neto, Caio M. Silva pp. 365-408
Description | Full Text PDF

No Direction Home: Will the Law Keep Pace With Human Tracking Technology to Protect Individual Privacy and Stop Geoslavery
Herbert, William A. pp. 409-473
Description | Full Text PDF


Recent Submissions