Photo of Joseph Swierzbinski

Joseph Swierzbinski

Professor

    • AB24 3QY

    • 101 Citations
    20012019
    If you made any changes in Pure these will be visible here soon.

    Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

    carbon emission Earth & Environmental Sciences
    enhanced oil recovery Earth & Environmental Sciences
    carbon Earth & Environmental Sciences
    Communication Business & Economics
    Knowledge protection Business & Economics
    Public policy Business & Economics
    Information security Business & Economics
    Rationality Business & Economics

    Network Recent external collaboration on country level. Dive into details by clicking on the dots.

    Research Output 2001 2019

    Knowledge protection in firms: A conceptual framework and Evidence from HP Labs

    Elliot, K., Patacconi, A., Swierzbinski, J. & Williams, J., 2019, In : European Management Review. 16, 1, p. 179-193 14 p.

    Research output: Contribution to journalArticle

    Knowledge protection
    Conceptual framework
    Communication
    Trade-offs
    Employees

    Cyberinsurance and Public Policy: Self-Protection and Insurance with Endogenous Security Risks

    Massacci, F., Swierzbinski, J. & Williams, J., 29 May 2017, p. 1-38. 38 p.

    Research output: Contribution to conferencePaper

    Liability
    Self-protection
    Public policy
    Self-insurance
    Risk mitigation

    Economics of exploration for and production of exhaustible resources

    Swierzbinski, J., 10 May 2013, Encyclopedia of Energy, Natural Resource, and Environmental Economics. Shogren, J. (ed.). Amsterdam: Elsevier Science , p. 1 - 9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    The Need for Public Policy Interventions in Information Security

    Pym, D., Swierzbinski, J. & Williams, J., 2013, Aberdeen: University of Aberdeen, p. 1-23, 23 p.

    Research output: Working paper

    File
    Information security
    Public policy
    Policy intervention
    Politicians
    Attack