<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> .
<> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/20102> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/title> "Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/abstract> "Organizations deploy systems technologies in order to support their operations and achieve their business\r\nobjectives. In so doing, they encounter tensions between the confidentiality, integrity, and availability of information,\r\nand must make investments in information security measures to address these concerns. We discuss\r\nhow a macroeconomics-inspired model, analogous to models of interest rate policy used by central banks,\r\ncan be used to understand trade-offs between investments against threats to confidentiality and availability.\r\nWe investigate how such a model might be formulated by constructing a process model, based on empirically\r\nobtained data, of the use of USB memory sticks by employees of a financial services company."^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/date> "2008-06-28" .
<https://discovery.ucl.ac.uk/id/document/7896> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/volume> "7" .
<https://discovery.ucl.ac.uk/id/org/ext-3fb3f784c571ddd224b2c56e6bd9b109> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> .
<https://discovery.ucl.ac.uk/id/org/ext-3fb3f784c571ddd224b2c56e6bd9b109> <http://xmlns.com/foaf/0.1/name> "Workshop on the Economics of Information Security (WEIS)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-3fb3f784c571ddd224b2c56e6bd9b109> .
<https://discovery.ucl.ac.uk/id/publication/ext-b5caf438ebc44f19eb336258f6e8b720> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Collection> .
<https://discovery.ucl.ac.uk/id/publication/ext-b5caf438ebc44f19eb336258f6e8b720> <http://xmlns.com/foaf/0.1/name> "WEIS"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/publication/ext-b5caf438ebc44f19eb336258f6e8b720> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-3d9ff248146ea377ddfb14e646dc861c> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/20102#authors> .
<https://discovery.ucl.ac.uk/id/eprint/20102#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-3d9ff248146ea377ddfb14e646dc861c> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-bbfdd616b56dfba894d908855ff853fe> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/20102#authors> .
<https://discovery.ucl.ac.uk/id/eprint/20102#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-bbfdd616b56dfba894d908855ff853fe> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-7b74b5cdffe2feb5ec1ce06612e622e9> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/20102#authors> .
<https://discovery.ucl.ac.uk/id/eprint/20102#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_3> <https://discovery.ucl.ac.uk/id/person/ext-7b74b5cdffe2feb5ec1ce06612e622e9> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-264c9b6b926c5fa0fcb59de119cad957> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/20102#authors> .
<https://discovery.ucl.ac.uk/id/eprint/20102#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_4> <https://discovery.ucl.ac.uk/id/person/ext-264c9b6b926c5fa0fcb59de119cad957> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-cc071fe377aa12c51c391756cfa30495> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/20102#authors> .
<https://discovery.ucl.ac.uk/id/eprint/20102#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_5> <https://discovery.ucl.ac.uk/id/person/ext-cc071fe377aa12c51c391756cfa30495> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-aa695c70589bab764fb60cd278d2f40d> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/20102#authors> .
<https://discovery.ucl.ac.uk/id/eprint/20102#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_6> <https://discovery.ucl.ac.uk/id/person/ext-aa695c70589bab764fb60cd278d2f40d> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-23069aaa7cc432aa4fca815a015cc029> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/20102#authors> .
<https://discovery.ucl.ac.uk/id/eprint/20102#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_7> <https://discovery.ucl.ac.uk/id/person/ext-23069aaa7cc432aa4fca815a015cc029> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-073a27d00693d5a89be6d465c0c02792> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/20102#authors> .
<https://discovery.ucl.ac.uk/id/eprint/20102#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_8> <https://discovery.ucl.ac.uk/id/person/ext-073a27d00693d5a89be6d465c0c02792> .
<https://discovery.ucl.ac.uk/id/person/ext-3d9ff248146ea377ddfb14e646dc861c> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-3d9ff248146ea377ddfb14e646dc861c> <http://xmlns.com/foaf/0.1/givenName> "A"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-3d9ff248146ea377ddfb14e646dc861c> <http://xmlns.com/foaf/0.1/familyName> "Beautement"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-3d9ff248146ea377ddfb14e646dc861c> <http://xmlns.com/foaf/0.1/name> "A Beautement"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-aa695c70589bab764fb60cd278d2f40d> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-aa695c70589bab764fb60cd278d2f40d> <http://xmlns.com/foaf/0.1/givenName> "DJ"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-aa695c70589bab764fb60cd278d2f40d> <http://xmlns.com/foaf/0.1/familyName> "Pym"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-aa695c70589bab764fb60cd278d2f40d> <http://xmlns.com/foaf/0.1/name> "DJ Pym"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-cc071fe377aa12c51c391756cfa30495> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-cc071fe377aa12c51c391756cfa30495> <http://xmlns.com/foaf/0.1/givenName> "B"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-cc071fe377aa12c51c391756cfa30495> <http://xmlns.com/foaf/0.1/familyName> "Monahan"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-cc071fe377aa12c51c391756cfa30495> <http://xmlns.com/foaf/0.1/name> "B Monahan"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-23069aaa7cc432aa4fca815a015cc029> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-23069aaa7cc432aa4fca815a015cc029> <http://xmlns.com/foaf/0.1/givenName> "MA"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-23069aaa7cc432aa4fca815a015cc029> <http://xmlns.com/foaf/0.1/familyName> "Sasse"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-23069aaa7cc432aa4fca815a015cc029> <http://xmlns.com/foaf/0.1/name> "MA Sasse"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-7b74b5cdffe2feb5ec1ce06612e622e9> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-7b74b5cdffe2feb5ec1ce06612e622e9> <http://xmlns.com/foaf/0.1/givenName> "J"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-7b74b5cdffe2feb5ec1ce06612e622e9> <http://xmlns.com/foaf/0.1/familyName> "Griffin"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-7b74b5cdffe2feb5ec1ce06612e622e9> <http://xmlns.com/foaf/0.1/name> "J Griffin"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-bbfdd616b56dfba894d908855ff853fe> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-bbfdd616b56dfba894d908855ff853fe> <http://xmlns.com/foaf/0.1/givenName> "R"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-bbfdd616b56dfba894d908855ff853fe> <http://xmlns.com/foaf/0.1/familyName> "Coles"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-bbfdd616b56dfba894d908855ff853fe> <http://xmlns.com/foaf/0.1/name> "R Coles"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-073a27d00693d5a89be6d465c0c02792> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-073a27d00693d5a89be6d465c0c02792> <http://xmlns.com/foaf/0.1/givenName> "M"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-073a27d00693d5a89be6d465c0c02792> <http://xmlns.com/foaf/0.1/familyName> "Wonham"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-073a27d00693d5a89be6d465c0c02792> <http://xmlns.com/foaf/0.1/name> "M Wonham"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-264c9b6b926c5fa0fcb59de119cad957> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-264c9b6b926c5fa0fcb59de119cad957> <http://xmlns.com/foaf/0.1/givenName> "C"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-264c9b6b926c5fa0fcb59de119cad957> <http://xmlns.com/foaf/0.1/familyName> "Ioannidis"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-264c9b6b926c5fa0fcb59de119cad957> <http://xmlns.com/foaf/0.1/name> "C Ioannidis"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/ontology/bibo/presentedAt> <https://discovery.ucl.ac.uk/id/event/ext-906f14e31724e1162cede57965848cbc> .
<https://discovery.ucl.ac.uk/id/event/ext-906f14e31724e1162cede57965848cbc> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Conference> .
<https://discovery.ucl.ac.uk/id/event/ext-906f14e31724e1162cede57965848cbc> <http://purl.org/dc/terms/title> "7th Annual Workshop on the Economics of Information Security (WEIS 2008)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/ProceedingsSectionEPrint> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/7896> .
<https://discovery.ucl.ac.uk/id/document/7896> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/7896> <http://www.w3.org/2000/01/rdf-schema#label> "Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security (Text)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/7896> <http://eprints.org/relation/hasVolatileVersion> <https://discovery.ucl.ac.uk/id/document/82110> .
<https://discovery.ucl.ac.uk/id/document/7896> <http://eprints.org/relation/haspreviewThumbnailVersion> <https://discovery.ucl.ac.uk/id/document/82110> .
<https://discovery.ucl.ac.uk/id/document/7896> <http://eprints.org/relation/hasVersion> <https://discovery.ucl.ac.uk/id/document/82110> .
<https://discovery.ucl.ac.uk/id/document/7896> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/20102/2/pym-weis-2008.pdf> .
<https://discovery.ucl.ac.uk/id/document/7896> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/20102/2/pym-weis-2008.pdf> .
<https://discovery.ucl.ac.uk/id/eprint/20102/2/pym-weis-2008.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "pym-weis-2008.pdf"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/82110> .
<https://discovery.ucl.ac.uk/id/document/82110> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/82110> <http://www.w3.org/2000/01/rdf-schema#label> "Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security (Image (PNG))"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/82110> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/7896> .
<https://discovery.ucl.ac.uk/id/document/82110> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/7896> .
<https://discovery.ucl.ac.uk/id/document/82110> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/7896> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/107217> .
<https://discovery.ucl.ac.uk/id/document/107217> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/107217> <http://www.w3.org/2000/01/rdf-schema#label> "Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/107217> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/7896> .
<https://discovery.ucl.ac.uk/id/document/107217> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/7896> .
<https://discovery.ucl.ac.uk/id/document/107217> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/7896> .
<https://discovery.ucl.ac.uk/id/eprint/20102> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/20102/> .
<https://discovery.ucl.ac.uk/id/eprint/20102/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #20102 \n\nModelling the Human and Technological Costs and Benefits of USB Memory Stick Security\n\n" .
<https://discovery.ucl.ac.uk/id/eprint/20102/> <http://purl.org/dc/elements/1.1/format> "text/html" .
<https://discovery.ucl.ac.uk/id/eprint/20102/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/20102> .