Measuring the accuracy of software vulnerability assessments: experiments with students and professionals L Allodi, M Cremonini, F Massacci, W Shim Empirical Software Engineering 25, 1063-1094, 2020 | 45 | 2020 |
Quantitative assessment of risk reduction with cybercrime black market monitoring L Allodi, W Shim, F Massacci 2013 IEEE Security and Privacy Workshops, 165-172, 2013 | 39 | 2013 |
IT interdependence and the economic fairness of cybersecurity regulations for civil aviation M De Gramatica, F Massacci, W Shim, A Tedeschi, J Williams IEEE Security & Privacy 13 (5), 52-61, 2015 | 21 | 2015 |
An analysis of information security management strategies in the presence of interdependent security risk WH Shim Asia pacific journal of information systems 22 (1), 79-101, 2012 | 21 | 2012 |
Regulation and innovation in Telecommunications JM Bauer, W Shim Quello Center for Telecommunications Management and Law, Working Paper, 01-12, 2012 | 18 | 2012 |
Interdependent risk and cyber security: An analysis of security investment and cyber insurance W Shim Michigan State University. Communication Arts and Sciences-Media and …, 2010 | 16 | 2010 |
Who should pay for interdependent risk? Policy implications for security interdependence among airports G Kuper, F Massacci, W Shim, J Williams Risk Analysis 40 (5), 1001-1019, 2020 | 13 | 2020 |
The effect of security education and expertise on security assessments: The case of software vulnerabilities L Allodi, M Cremonini, F Massacci, W Shim arXiv preprint arXiv:1808.06547, 2018 | 13 | 2018 |
Crime pays if you are just an average hacker W Shim, L Allodi, F Massacci 2012 International Conference on Cyber Security, 62-68, 2012 | 13 | 2012 |
Agency problems and airport security: Quantitative and qualitative evidence on the impact of security training M de Gramatica, F Massacci, W Shim, U Turhan, J Williams Risk analysis 37 (2), 372-395, 2017 | 12 | 2017 |
Regulation and digital innovation: Theory and evidence JM Bauer, W Shim Calgary: International Telecommunications Society (ITS), 2012 | 11 | 2012 |
정부역량 측정을 위한 지표체계 구성에 관한 연구: 전문· 윤리· 협치역량을 중심으로: 전문· 윤리· 협치역량을 중심으로 윤건, 심우현, 박정원, 김윤희 한국사회와 행정연구 29 (3), 143-158, 2018 | 10 | 2018 |
정부업무평가에서 빅데이터 활용방안 연구 강정석, 윤건, 박정원, 심우현 기본연구과제 2015, 1-256, 2015 | 8 | 2015 |
A relative cost-benefit approach for evaluating alternative airport security policies W Shim, F Massacci, A Tedeschi, A Pollini 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 8 | 2014 |
Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities WH Shim The Journal of Society for e-Business Studies 16 (4), 53-73, 2011 | 6 | 2011 |
Vulnerability and information security investment under Interdependent Risks: A theoretical approach WH Shim Asia pacific journal of information systems 21 (4), 27-43, 2011 | 6 | 2011 |
정부역량 지수화 방안 연구 강정석, 윤건, 박정원, 심우현 기본연구과제 2016, 1-343, 2016 | 5 | 2016 |
Regulation and innovation behavior in telecommunications JM Bauer, W Shim Quello Center for Telecommunications Management and Law Working paper, 12-01, 2012 | 5 | 2012 |
디지털 헬스케어 규제 개선방안에 관한 연구 심우현, 박정원 규제연구 27 (1), 33-65, 2018 | 4 | 2018 |
An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure W Shim Journal of Society for e-Business Studies 20 (4), 2016 | 4 | 2016 |