Follow
Woohyun Shim
Woohyun Shim
Korea Institute of Public Administration
Verified email at kipa.re.kr
Title
Cited by
Cited by
Year
Quantitative assessment of risk reduction with cybercrime black market monitoring
L Allodi, W Shim, F Massacci
2013 IEEE Security and Privacy Workshops, 165-172, 2013
372013
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals
L Allodi, M Cremonini, F Massacci, W Shim
Empirical Software Engineering 25, 1063-1094, 2020
262020
An analysis of information security management strategies in the presence of interdependent security risk
WH Shim
Asia pacific journal of information systems 22 (1), 79-101, 2012
202012
Interdependent risk and cyber security: An analysis of security investment and cyber insurance
W Shim
Michigan State University. Communication Arts and Sciences-Media and …, 2010
172010
IT interdependence and the economic fairness of cybersecurity regulations for civil aviation
M De Gramatica, F Massacci, W Shim, A Tedeschi, J Williams
IEEE Security & Privacy 13 (5), 52-61, 2015
162015
Regulation and innovation in Telecommunications
JM Bauer, W Shim
Quello Center for Telecommunications Management and Law, Working Paper, 01-12, 2012
152012
Crime pays if you are just an average hacker
W Shim, L Allodi, F Massacci
2012 International Conference on Cyber Security, 62-68, 2012
122012
Who should pay for interdependent risk? Policy implications for security interdependence among airports
G Kuper, F Massacci, W Shim, J Williams
Risk Analysis 40 (5), 1001-1019, 2020
112020
Agency problems and airport security: Quantitative and qualitative evidence on the impact of security training
M de Gramatica, F Massacci, W Shim, U Turhan, J Williams
Risk analysis 37 (2), 372-395, 2017
102017
Regulation and digital innovation: Theory and evidence
JM Bauer, W Shim
Calgary: International Telecommunications Society (ITS), 2012
92012
Korea’s social media penetration rate ranks third in world
WH Shim
The Korea Herald. Retrieved September 27, 2021, 2020
82020
The effect of security education and expertise on security assessments: The case of software vulnerabilities
L Allodi, M Cremonini, F Massacci, W Shim
arXiv preprint arXiv:1808.06547, 2018
82018
A relative cost-benefit approach for evaluating alternative airport security policies
W Shim, F Massacci, A Tedeschi, A Pollini
2014 Ninth International Conference on Availability, Reliability and …, 2014
82014
Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities
WH Shim
The Journal of Society for e-Business Studies 16 (4), 53-73, 2011
72011
Regulation and innovation behavior in telecommunications
JM Bauer, W Shim
Available at SSRN 2028523, 2012
52012
Vulnerability and information security investment under Interdependent Risks: A theoretical approach
W Shim
Available at SSRN 1830804, 2011
52011
Evaluation of airport security training programs: Perspectives and issues
W Shim, F Massacci, M De Gramatica, A Tedeschi, A Pollini
2013 International Conference on Availability, Reliability and Security, 753-758, 2013
42013
An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure
W Shim
Journal of Society for e-Business Studies 20 (4), 2016
32016
Crime pays if you are only an average hacker
W Shim, L Allodi, F Massacci
32012
Agency problems in information security: theory and application to korean business
W Shim
인터넷전자상거래연구 15 (5), 1-15, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20