Quantitative assessment of risk reduction with cybercrime black market monitoring L Allodi, W Shim, F Massacci 2013 IEEE Security and Privacy Workshops, 165-172, 2013 | 37 | 2013 |
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals L Allodi, M Cremonini, F Massacci, W Shim Empirical Software Engineering 25, 1063-1094, 2020 | 27 | 2020 |
An analysis of information security management strategies in the presence of interdependent security risk WH Shim Asia pacific journal of information systems 22 (1), 79-101, 2012 | 20 | 2012 |
Interdependent risk and cyber security: An analysis of security investment and cyber insurance W Shim Michigan State University. Communication Arts and Sciences-Media and …, 2010 | 17 | 2010 |
IT interdependence and the economic fairness of cybersecurity regulations for civil aviation M De Gramatica, F Massacci, W Shim, A Tedeschi, J Williams IEEE Security & Privacy 13 (5), 52-61, 2015 | 16 | 2015 |
Regulation and innovation in Telecommunications JM Bauer, W Shim Quello Center for Telecommunications Management and Law, Working Paper, 01-12, 2012 | 15 | 2012 |
Crime pays if you are just an average hacker W Shim, L Allodi, F Massacci 2012 International Conference on Cyber Security, 62-68, 2012 | 12 | 2012 |
Who should pay for interdependent risk? Policy implications for security interdependence among airports G Kuper, F Massacci, W Shim, J Williams Risk Analysis 40 (5), 1001-1019, 2020 | 11 | 2020 |
Agency problems and airport security: Quantitative and qualitative evidence on the impact of security training M de Gramatica, F Massacci, W Shim, U Turhan, J Williams Risk analysis 37 (2), 372-395, 2017 | 10 | 2017 |
Regulation and digital innovation: Theory and evidence JM Bauer, W Shim Calgary: International Telecommunications Society (ITS), 2012 | 10 | 2012 |
Korea’s social media penetration rate ranks third in world WH Shim The Korea Herald. Retrieved September 27, 2021, 2020 | 8 | 2020 |
The effect of security education and expertise on security assessments: The case of software vulnerabilities L Allodi, M Cremonini, F Massacci, W Shim arXiv preprint arXiv:1808.06547, 2018 | 8 | 2018 |
A relative cost-benefit approach for evaluating alternative airport security policies W Shim, F Massacci, A Tedeschi, A Pollini 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 8 | 2014 |
Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities WH Shim The Journal of Society for e-Business Studies 16 (4), 53-73, 2011 | 7 | 2011 |
Regulation and innovation behavior in telecommunications JM Bauer, W Shim Available at SSRN 2028523, 2012 | 5 | 2012 |
Vulnerability and information security investment under Interdependent Risks: A theoretical approach W Shim Available at SSRN 1830804, 2011 | 5 | 2011 |
Evaluation of airport security training programs: Perspectives and issues W Shim, F Massacci, M De Gramatica, A Tedeschi, A Pollini 2013 International Conference on Availability, Reliability and Security, 753-758, 2013 | 4 | 2013 |
An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure W Shim Journal of Society for e-Business Studies 20 (4), 2016 | 3 | 2016 |
Crime pays if you are only an average hacker W Shim, L Allodi, F Massacci | 3 | 2012 |
Agency problems in information security: theory and application to korean business W Shim 인터넷전자상거래연구 15 (5), 1-15, 2015 | 2 | 2015 |