Follow
Woohyun Shim
Woohyun Shim
Korea Institute of Public Administration
Verified email at kipa.re.kr
Title
Cited by
Cited by
Year
Quantitative assessment of risk reduction with cybercrime black market monitoring
L Allodi, W Shim, F Massacci
2013 IEEE Security and Privacy Workshops, 165-172, 2013
372013
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals
L Allodi, M Cremonini, F Massacci, W Shim
Empirical Software Engineering 25, 1063-1094, 2020
282020
An analysis of information security management strategies in the presence of interdependent security risk
WH Shim
Asia pacific journal of information systems 22 (1), 79-101, 2012
202012
Interdependent risk and cyber security: An analysis of security investment and cyber insurance
W Shim
Michigan State University. Communication Arts and Sciences-Media and …, 2010
172010
IT interdependence and the economic fairness of cybersecurity regulations for civil aviation
M De Gramatica, F Massacci, W Shim, A Tedeschi, J Williams
IEEE Security & Privacy 13 (5), 52-61, 2015
162015
Regulation and innovation in Telecommunications
JM Bauer, W Shim
Quello Center for Telecommunications Management and Law, Working Paper, 01-12, 2012
152012
Crime pays if you are just an average hacker
W Shim, L Allodi, F Massacci
2012 International Conference on Cyber Security, 62-68, 2012
122012
Who should pay for interdependent risk? Policy implications for security interdependence among airports
G Kuper, F Massacci, W Shim, J Williams
Risk Analysis 40 (5), 1001-1019, 2020
112020
Agency problems and airport security: Quantitative and qualitative evidence on the impact of security training
M de Gramatica, F Massacci, W Shim, U Turhan, J Williams
Risk analysis 37 (2), 372-395, 2017
102017
Regulation and digital innovation: Theory and evidence
JM Bauer, W Shim
Calgary: International Telecommunications Society (ITS), 2012
102012
Korea˘s social media penetration rate ranks third in world
WH Shim
The Korea Herald. Retrieved September 27, 2021, 2020
82020
The effect of security education and expertise on security assessments: The case of software vulnerabilities
L Allodi, M Cremonini, F Massacci, W Shim
arXiv preprint arXiv:1808.06547, 2018
82018
A relative cost-benefit approach for evaluating alternative airport security policies
W Shim, F Massacci, A Tedeschi, A Pollini
2014 Ninth International Conference on Availability, Reliability and …, 2014
82014
Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities
WH Shim
The Journal of Society for e-Business Studies 16 (4), 53-73, 2011
72011
Regulation and innovation behavior in telecommunications
JM Bauer, W Shim
Available at SSRN 2028523, 2012
52012
Vulnerability and information security investment under Interdependent Risks: A theoretical approach
W Shim
Available at SSRN 1830804, 2011
52011
Evaluation of airport security training programs: Perspectives and issues
W Shim, F Massacci, M De Gramatica, A Tedeschi, A Pollini
2013 International Conference on Availability, Reliability and Security, 753-758, 2013
42013
An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure
W Shim
Journal of Society for e-Business Studies 20 (4), 2016
32016
Crime pays if you are only an average hacker
W Shim, L Allodi, F Massacci
32012
Agency problems in information security: theory and application to korean business
W Shim
인터넷전자상거래연구 15 (5), 1-15, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20