References
Cryptography’s Role in Securing the Information Society ." National Academy Press (1996). "
Five Reasons You’re not Secure." (2005). "
Shall We Dust Moscow." Security Survey of Key Internet Hosts & Various Semi-Relevant Reflections (1996). "
Security in Cyberspace: Combating Distributed Denial of Service Attacks." University of Ottawa Law & Technology Journal (2004): 231-261. "
Who Protects Cyberspace." George Mason University, Department of Economics, Global Prosperity Initiative, 2004. "
Is Cybersecurity a Public Good? Evidence from the Financial Services Industry. The Independent Institute, 2001.
The Dark Side of Private Ordering for Cybersecurity, Edited by Mark F. Grady and Francesco Parisi. Cambridge University Press, 2005.
An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Pubic Security Goods." Supreme Court Economic Review 14 (2005). "
Alternative Corporate Responses to Internet Data Theft." 17th Annual Institute on Computer Law (1997): 737-744 . "
The Doors Are Locked but the Thieves and Vandals Are Still Getting in: A Proposal in Tort to Alleviate Corporate America’s Cyber-Crime Problem." J. Marshall J. Computer & Information Law 167 (1997): 174-176. "
Computer Crimes." American Criminal Law Review 36, no. 397 (1999): 406. "
Calm Scene Isn’t Really, Police Say." New York Times (2000). "
They Shoot Trojan Horses, Don’t They? An Economic Analysis of Anti-Hacking Regulatory Models." Georgia Law Journal 89, no. 171 (2000): 214-217. "
Computer Crime." In A Crimefighter’s Handbook , 427. O’Reilly and Associates, Inc, 1995. "
Why the Police Don’t Care about Computer Crime." Harvard Journal of Law and Technology 10, no. 3 (1997): 465-494. "
The Problem of Social Cost." Journal of Law and Economics 3 (1960): 1-44. "
Computer Security Publications: Information Economics, Shifting Liability and the First Amendment." Whither Law Review 24, no. 71 (2002): 130. "
Electronic Publishing and Software." Computer Law (2000). "
Causes and Remedies for Social Acceptance of Network Insecurity." In Workshop on Economics and Internet Security. Berkeley: University of California, Berkeley, 2002. "