Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis. | 2 | 0.41 | 2013 |
Using the Conflicting Incentives Risk Analysis Method. | 6 | 0.72 | 2013 |
Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management | 0 | 0.34 | 2013 |
Intended actions: risk is conflicting incentives | 4 | 0.78 | 2012 |
Flexible Regulation with Privacy Points. | 1 | 0.40 | 2012 |
Privacy Implications of Identity References in Biometrics Databases | 0 | 0.34 | 2012 |
Mapping between classical risk management and game theoretical approaches | 6 | 0.76 | 2011 |
An approach to measure effectiveness of control for risk analysis with game theory | 2 | 0.39 | 2011 |
Using Game Theory To Analyze Risk To Privacy: An Initial Insight | 3 | 0.42 | 2010 |