@article{Moore10elsevier,
author = {Tyler Moore},
title = {Phishing and the Economics of E-crime},
journal = {Elsevier Infosecurity Magazine},
volume = 4,
number = 6,
pages = {34--37},
year = 2007
}
@inproceedings{AndersonM07crypto,
author = {Ross Anderson and
Tyler Moore},
title = {Information Security Economics - and Beyond},
booktitle = {27th Annual International Cryptology Conference (CRYPTO)},
year = {2007},
pages = {68-91},
puburl = {http://dx.doi.org/10.1007/978-3-540-74143-5_5},
url = {https://tylermoore.utulsa.edu/crypto07.pdf},
editor = {Alfred Menezes},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {4622}
}
@misc{Moore07dimacs,
author = {Tyler Moore},
title = {Workshop Report: {DIMACS} Workshop on Information Security Economics},
location = {Rutgers University, Piscataway, NJ, USA},
month = jan,
days = {18--19},
year = 2007
}
@article{MooreA05enisa,
author = {Tyler Moore and Ross Anderson},
title = {Trends in Security Economics},
journal = {European Network and Information Security Agency Quarterly},
volume = 1,
number = 3,
pages = {6--7},
year = 2005
}
@article{Moore08VB,
author = {Tyler Moore},
title = {How wise are crowds when assessing phishing websites?},
journal = {Virus Bulletin},
month = apr,
year = 2008
}
@article{Moore11VB,
author = {Tyler Moore},
title = {Investigating the abuse of search engines to promote illicit online pharmacies},
journal = {Virus Bulletin},
month = nov,
year = 2011
}
@article{Moore13ijcip,
title = {The promise and perils of digital currencies},
author = {Tyler Moore},
journal = {International Journal of Critical Infrastructure Protection},
year = {2013},
url = {http://dx.doi.org/10.1016/j.ijcip.2013.08.002},
volume = 6,
number = {3--4},
pages = {147--149}
}
@inproceedings{HayashiMS15kcpay,
title = {The Economics of Retail Payments Security},
author = {Fumiko Hayashi Tyler Moore and Richard J. Sullivan},
booktitle = {Fifth International Payments Policy Conference: The Puzzle of Payments Security, Federal Reserve Bank of Kansas City},
year = 2015,
url = {https://tylermoore.utulsa.edu/kcpay15.pdf},
presurl = {https://tylermoore.utulsa.edu/kcpay-econ.pdf}
}
@article{moore_et_al:DR:2017:7039,
author = {Tyler Moore and Christian W. Probst and Kai Rannenberg and Michel van Eeten},
title = {{Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461)}},
pages = {63--89},
journal = {Dagstuhl Reports},
issn = {2192-5283},
year = {2017},
volume = {6},
number = {11},
editor = {Tyler W. Moore and Christian W. Probst and Kai Rannenberg and Michel van Eeten},
publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
address = {Dagstuhl, Germany},
url = {http://drops.dagstuhl.de/opus/volltexte/2017/7039},
urn = {urn:nbn:de:0030-drops-70390},
doi = {10.4230/DagRep.6.11.63},
annote = {Keywords: economics of risk assessment, human factor, return on security investment, security risk management, socio-technical security}
}
@inproceedings{KosloffMKMS03spie,
author = {Kosloff, Todd and Moore, Tyler and Keller, Jesse and Manes, Gavin and Shenoi, Sujeet},
title = {Attacks on public telephone networks: technologies and challenges},
booktitle = {{SPIE} 5071, Sensors, and Command, Control, Communications, and Intelligence {(C3I)} Technologies for Homeland Defense and Law Enforcement II, 72},
pages = {72-83},
year = {2003},
puburl = {http://dx.doi.org/10.1117/12.500826}
}
@inproceedings{KosloffMKMS02sact,
author = {Todd Kosloff and Tyler Moore and Jesse Keller and Gavin Manes and Sujeet Shenoi},
title = {{SS7} Messaging Attacks on Public Telephone Networks: Attack Scenarios and Detection},
booktitle = {Workshop on the Scientific Aspects of Cyber Terrorism},
publisher = {ACM},
month = {November},
day = 21,
year = 2002,
location = {Washington, DC}
}
@inproceedings{AndersonBCM08isse,
author = {Ross Anderson and
Rainer B{\"o}hme and
Richard Clayton and
Tyler Moore},
title = {Security Economics and {E}uropean Policy},
booktitle = {Information Security Solutions Europe (ISSE)},
year = {2008},
pages = {57-76},
puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6_6},
editor = {Norbert Pohlmann and
Helmut Reimer and
Wolfgang Schneider},
publisher = {Vieweg+Teubner}
}
@article{Moore:2017:HAE:3169408.3169773,
author = {Moore, Tyler},
title = {On the Harms Arising from the Equifax Data Breach of 2017},
journal = {Int. J. Crit. Infrastruct. Prot.},
issue_date = {December 2017},
volume = {19},
number = {C},
month = dec,
year = {2017},
issn = {1874-5482},
pages = {47--48},
numpages = {2},
url = {https://doi.org/10.1016/j.ijcip.2017.10.004},
doi = {10.1016/j.ijcip.2017.10.004},
acmid = {3169773},
publisher = {Elsevier Science Publishers B. V.},
address = {Amsterdam, The Netherlands, The Netherlands}
}
@incollection{cybok-security-economics-kg,
author = {Tyler Moore},
editor = {Awais Rashid and Yulia Cherdantseva and Andrew Martin and Steve Schneider},
title = {Security Economics Knowledge Guide},
booktitle = {CyBOK Knowledge Guides and Topic Guides},
publisher = {University of Bristol},
year = {2024},
puburl = {https://www.cybok.org/media/downloads/Security_Economics_KG_v1.0.0.pdf},
note = {KG Version 1.0.0}
}
@inproceedings{Moore:Rossfest,
author = {Tyler Moore},
title = {How Shifting Liability Explains Rising Cybercrime Costs},
booktitle = {Rossfest Festschrift},
year = 2025
}
This file was generated by bibtex2html 1.99.