Contents
LIST OF TABLES
LIST OF FIGURES
ABSTRACT
1 COMPUTER CRIME AND SECURITY: AN ECONOMIC ANALYSIS
2 AGENT-BASED APPROACH FOR ANALYZING THE INFORMATION SECURITY STRATEGIES FOR AN ORGANIZATION
3 GENETIC ALGORITHM BASED APPROACH FOR MATCHING SECURITY PROFILES TO VULNERABILITIES
LIST OF REFERENCES
APPENDIX
VITA