Learn More
Regulators in many countries enact security breach notification laws to address a lack of information security in their economies. Some of these laws designate authorities to handle reported security breaches and advise firms. We devise a principal–agent model to analyze the economic effect of mandatory security breach reporting to authorities. In practice,(More)
BACKGROUND AND AIMS A possible role of host tree identity in the structuring of vascular epiphyte communities has attracted scientific attention for decades. Specifically, it has been suggested that each host tree species has a specific subset of the local species pool according to its own set of properties, e.g. physicochemical characteristics of the bark,(More)
New regulations mandating firms to share information on security breaches and security practices with authorities are high on the policy agenda around the globe. These initiatives are based on the hope that authorities can effectively advise and warn other firms, thereby strengthening overall defense and response to cyberthreats in an economy. If this(More)
  • Dominique Machuletz, Henrik Sendt, Stefan Laube, Rainer Böhmex
  • 2016
—Most notebooks sold today come with a built-in webcam, placed above the screen to facilitate users' visual communication. What is intended to be a service seems to raise privacy concerns to some users, who may seek protection by covering the webcams of their devices. No matter how effective, this habit makes users' actual privacy protection behavior(More)
  • 1