[1] Information technology-Guidelines for the management of IT Security: ISO/IEC TR 13335[S]. [2] AS/NZS4360: 1999 Risk Manag ement Standard[S]. [3] ISO/IEC 17799 Information security management-part 1: Code of practice for information security management[S]. [4] 刘彤. 构造复杂信息系统安全基线的研究[J]. 中国管理科学, 2000, 11: 636-644 [5] Enders,W. and Sandler, T. Transnational terrorism 1968-2000: Thresholds, persistence, and forecasts [J]. Southern Economic Journal, 2005,(1): 467-483 [6] Sandler, T., Arce M.Pure public goods versus commons:Benefit-cost duality [J]. Land Economics, 2003, 79(3):355-368 [7] Sandler, T., Lapan, H.E.The calculus of dissent: An analysis of terrorists. choice of targets[J]. Synthese, 1988, 76(2): 245-261. [8] Orszag, Peter, Stiglitz, et al. Optimal Fire Departments: Evaluating Public Policy in the Face of Externalities [C].Brookings Working Paper, 2002, January. [9] Kunreuther, Howard, Onculer, et al. Time Insensitivity for Protective Measures[J]. Journal of Risk and Uncertainty,1998, 16: 279-299. [10] Heal, Geoffrey, Kunreuther, et al. You Only Die Once: The General Case of Interdependent Security [C]. Wharton Risk Management and Decision Processes Center Working Paper Philadelphia: University of Pennsy lvania, 2002. [11] Kunreuther, Howard, Heal, et al. Interdependent Security:The Case of Identical Agents[C]. National Bureau of Economic Research Working Paper Cambridge, MA: National Bureau of Economic Research, 2002. [12] Kunreuther, Howard, Heal, et al. A Firm Can Only Go Bankrupt Once[C]. Wharton Risk Manag ement and Dec-ision Processes Center Wor king Paper Philadelphia: University of Pennsylvania, 2002. [13] Kunreuther, Howard, Geoffr ey, et al. Interdependent Security[J]. Journal of Risk and Uncertainty, 2003, 26(2/3):231-249. [14] Anderson, Ross.Why Information Security is Hard-an Economic Perspective[R]. Working Paper, Computer Laboratory, Cambridge, 2001. [15] Baron, Jonathan, Howard, et al.Determinants of priority for risk reduction: the role of worry [J]. Risk Analysis,2000, 20: 413-427. [16] Ayres, Ian and Steven Levitt.Measuring the Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack [J]. Quarterly Journal of Economics,1998, 113: 43-77. [17] McClelland, G. and Schulze, W. and Coursey, D.I nsurance for Low-Probability Hazar d: A Bimodal Response to Unlikely Events[J]. Journal of Risk and Uncertainty, 1993, 7:95-116. [18] Crawford, Vincent, Hans, et al. Learning How to Cooperate:Optimal Play in Repeated Coordination Games[J]. Econometrica,1990, 58(5): Issue 3571-595. |