Woohyun Shim
Woohyun Shim
Korea Institute of Public Administration
Verified email at kipa.re.kr
Title
Cited by
Cited by
Year
Quantitative assessment of risk reduction with cybercrime black market monitoring
L Allodi, W Shim, F Massacci
2013 IEEE Security and Privacy Workshops, 165-172, 2013
332013
An analysis of information security management strategies in the presence of interdependent security risk
WH Shim
Asia Pacific Journal of Information Systems 22 (1), 79-101, 2012
192012
Regulation and innovation in Telecommunications
JM Bauer, W Shim
Quello Center for Telecommunications Management and Law, Working Paper, 01-12, 2012
152012
Interdependent risk and cyber security: An analysis of security investment and cyber insurance
W Shim
Michigan State University. Communication Arts and Sciences-Media and …, 2010
152010
Crime pays if you are just an average hacker
W Shim, L Allodi, F Massacci
2012 International Conference on Cyber Security, 62-68, 2012
112012
IT interdependence and the economic fairness of cybersecurity regulations for civil aviation
M De Gramatica, F Massacci, W Shim, A Tedeschi, J Williams
IEEE Security & Privacy 13 (5), 52-61, 2015
102015
A relative cost-benefit approach for evaluating alternative airport security policies
W Shim, F Massacci, A Tedeschi, A Pollini
2014 Ninth International Conference on Availability, Reliability and …, 2014
92014
Who should pay for interdependent risk? Policy implications for security interdependence among airports
G Kuper, F Massacci, W Shim, J Williams
Risk Analysis 40 (5), 1001-1019, 2020
82020
Regulation and digital innovation: Theory and evidence
JM Bauer, W Shim
Calgary: International Telecommunications Society (ITS), 2012
72012
Vulnerability and information security investment under Interdependent Risks: A theoretical approach
W Shim
Available at SSRN 1830804, 2011
72011
Regulation and innovation behavior in telecommunications
JM Bauer, W Shim
Quello Center for Telecommunications Management and Law Working paper, 12-01, 2012
62012
Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities
WH Shim
The Journal of Society for e-Business Studies 16 (4), 53-73, 2011
62011
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals
L Allodi, M Cremonini, F Massacci, W Shim
Empirical Software Engineering 25 (2), 1063-1094, 2020
52020
Agency problems and airport security: Quantitative and qualitative evidence on the impact of security training
M de Gramatica, F Massacci, W Shim, U Turhan, J Williams
Risk Analysis 37 (2), 372-395, 2017
52017
The effect of security education and expertise on security assessments: The case of software vulnerabilities
L Allodi, M Cremonini, F Massacci, W Shim
arXiv preprint arXiv:1808.06547, 2018
42018
An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure
W Shim
Journal of Society for e-Business Studies 20 (4), 2016
32016
Evaluation of Airport Security Training Programs: Perspectives and Issues
W Shim, F Massacci, M De Gramatica, A Tedeschi, A Pollini
2013 International Conference on Availability, Reliability and Security, 753-758, 2013
32013
Crime pays if you are only an average hacker
W Shim, L Allodi, F Massacci
32012
Agency problems in information security: theory and application to korean business
W Shim
인터넷전자상거래연구 15 (5), 1-15, 2015
22015
Effects of Regulation on Innovation in the Information and Communications Sector
JM Bauer, W Shim
22012
The system can't perform the operation now. Try again later.
Articles 1–20