Woohyun Shim
Woohyun Shim
Korea Institute of Public Administration
Verified email at kipa.re.kr
Title
Cited by
Cited by
Year
Quantitative assessment of risk reduction with cybercrime black market monitoring
L Allodi, W Shim, F Massacci
2013 IEEE Security and Privacy Workshops, 165-172, 2013
342013
An analysis of information security management strategies in the presence of interdependent security risk
WH Shim
Asia Pacific Journal of Information Systems 22 (1), 79-101, 2012
192012
Regulation and innovation in Telecommunications
JM Bauer, W Shim
Available at SSRN, 2012
152012
Interdependent risk and cyber security: An analysis of security investment and cyber insurance
W Shim
Michigan State University. Communication Arts and Sciences-Media and …, 2010
112010
IT interdependence and the economic fairness of cybersecurity regulations for civil aviation
M De Gramatica, F Massacci, W Shim, A Tedeschi, J Williams
IEEE Security & Privacy 13 (5), 52-61, 2015
102015
A relative cost-benefit approach for evaluating alternative airport security policies
W Shim, F Massacci, A Tedeschi, A Pollini
2014 Ninth International Conference on Availability, Reliability and …, 2014
92014
Crime pays if you are just an average hacker
W Shim, L Allodi, F Massacci
2012 International Conference on Cyber Security, 62-68, 2012
92012
Regulation and digital innovation: Theory and evidence
JM Bauer, W Shim
Wien: ITS, 2012
72012
Regulation and innovation behavior in telecommunications
JM Bauer, W Shim
Quello Center for Telecommunications Management and Law Working paper, 12-01, 2012
62012
Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities
WH Shim
The Journal of Society for e-Business Studies 16 (4), 53-73, 2011
62011
Agency problems and airport security: Quantitative and qualitative evidence on the impact of security training
M de Gramatica, F Massacci, W Shim, U Turhan, J Williams
Risk Analysis 37 (2), 372-395, 2017
52017
Vulnerability and information security investment under Interdependent Risks: A theoretical approach
W Shim
Available at SSRN 1830804, 2011
52011
The effect of security education and expertise on security assessments: the case of software vulnerabilities
L Allodi, M Cremonini, F Massacci, W Shim
arXiv preprint arXiv:1808.06547, 2018
22018
An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure
W Shim
Journal of Society for e-Business Studies 20 (4), 2016
22016
Evaluation of Airport Security Training Programs: Perspectives and Issues
W Shim, F Massacci, M de Gramatica, A Tedeschi, A Pollini
2013 International Conference on Availability, Reliability and Security, 753-758, 2013
22013
Effects of Regulation on Innovation in the Information and Communications Sector
JM Bauer, W Shim
22012
Crime pays if you are only an average hacker
W Shim, L Allodi, F Massacci
22012
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals
L Allodi, M Cremonini, F Massacci, W Shim
Empirical Software Engineering 25 (2), 1063-1094, 2020
12020
Agency problems in information security: theory and application to korean business
W Shim
인터넷전자상거래연구 15 (5), 1-15, 2015
12015
Crime Pays If You Are Just an Average Hacker
L Allodi, F Massacci, W Shim
Int. Conf. Cyber Security, Alexandria Va, 2012
12012
The system can't perform the operation now. Try again later.
Articles 1–20