Hilfe Warenkorb Konto Anmelden
 
 
   Schnellsuche   
     zur Expertensuche                      
Economics of Information Security
  Großes Bild
 
Economics of Information Security
von: L. Jean Camp, Stephen Lewis (Eds.)
Springer-Verlag, 2004
ISBN: 9781402080906
300 Seiten, Download: 3546 KB
 
Format:  PDF
geeignet für: Apple iPad, Android Tablet PC's Online-Lesen PC, MAC, Laptop

Typ: A (einfacher Zugriff)

 

 
eBook anfordern
Inhaltsverzeichnis

  Contents 6  
  Preface 8  
  Acknowledgments 16  
  SYSTEM RELIABILITY AND FREE RIDING 17  
     1. Literature 18  
     2. Notation 18  
     3. Nash equilibria 19  
     4. Social optimum 22  
     5. Identical values, different costs 23  
     6. Increasing the number of agents 23  
     7. Fines and liability 24  
     8. Sequential moves 27  
     9. Adversaries 29  
     10. Sum of efforts and weakest link 30  
     11. Future work 30  
     References 31  
  PRICING SECURITY 32  
     1. Security as an externality 33  
     2. Existing measures 37  
     3. Defining the good 40  
     4. Allocating property rights 43  
     5. Conclusions 47  
     References 48  
  CRYPTOGRAPHY AND COMPETITION POLICY – ISSUES WITH ‘TRUSTED COMPUTING’ 50  
     1. Trusted Computing 52  
     2. Value to corporate and government users 55  
     3. Value to content owners 57  
     4. Value to hardware vendors 58  
     5. Value to software vendors 59  
     6. Conclusion and Scope for Future Work 63  
     References 65  
  HOW MUCH IS STRONGER DRM WORTH? 68  
     References 72  
  TRUSTED COMPUTING, PEER-TO-PEER DISTRIBUTION, AND THE ECONOMICS OF PIRATED ENTERTAINMENT 73  
     1. Protecting Content 76  
     2. Attacking Peer-to-Peer Distribution 78  
     3. Defending Peer-to-Peer Distribution 80  
     4. Conclusion 81  
     Acknowledgments 81  
     References 82  
  ECONOMICS OF IT SECURITY MANAGEMENT 84  
     1. An economics perspective to IT security management 86  
     2. Assessing the total cost of security breaches 87  
     3. Assessing the Value of Security Controls 89  
     4. Effective level of investment 91  
     5. Other economics-based IT security studies 93  
     6. Conclusions and Future Research Directions 94  
     References 95  
  EVALUATING DAMAGES CAUSED BY INFORMATION SYSTEMS SECURITY INCIDENTS 97  
     1. Cost of Information Security Incidents 97  
     2. Threat-Agent Classification 100  
     3. Threat Agent 103  
     4. Techniques 103  
     5. Risk Management System 104  
     References 105  
  THE ECONOMIC CONSEQUENCES OF SHARING SECURITY INFORMATION 107  
     1. Introduction 107  
     2. Economic Modelling 111  
     3. Results 112  
     4. Conclusion 114  
     References 115  
  THE ECONOMICS OF INFORMATION SECURITY INVESTMENT 117  
     1. The Model 119  
     2. How Vulnerability Affects the Optimal Level of Investment in information security 125  
     3. Concluding Comments 133  
     Acknowledgements 135  
     References 135  
     Appendix 138  
  WHAT PRICE PRIVACY? 140  
     1. The Meanings of Privacy 141  
     2. Privacy People Pay For 142  
     3. The Irrational Privacy Consumer: Selling your virtual self for a hamburger 143  
     4. Analysis 146  
     5. Default States 147  
     6. Why Identity Theft is Not About Identity or Theft 148  
     7. Infrastructure Cost 151  
     8. Conclusion 152  
     References 153  
  WHY WE CAN’T BE BOTHERED TO READ PRIVACY POLICIES 154  
     1. Related Work 155  
     2. Privacy as a Lemons Market 156  
     3. Privacy Signals 156  
     4. Testing in the Lemons Market 158  
     5. Conclusions and Future Directions 161  
     Acknowledgements 163  
     References 163  
  IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET 165  
     1. U. S. Defense Efforts to bring security information to the marketplace Early Years 166  
     2. Globalization 171  
     3. Conclusions and future directions 172  
     References 173  
  PRIVACY ATTITUDES AND PRIVACY BEHAVIOR 174  
     1. Personal Information Security and Privacy: Attitudes versus Behavior 175  
     2. Exploring the Dichotomy 177  
     3. Factors Affecting the Rational Decision Process 179  
     4. An Experimental Design 184  
     References 185  
  PRIVACY AND SECURITY OF PERSONAL INFORMATION 188  
     1. On-line and Off-line Identities 189  
     2. The Economics of On-line Identities 190  
     3. The Economics of Off-line Identities 192  
     4. Economics and Technology of Privacy 193  
     References 194  
  PRIVACY, ECONOMICS, AND PRICE DISCRIMINATION ON THE INTERNET 196  
     1. The important role and prevalence of price discrimination 202  
     2. Versioning and damaged goods 207  
     3. The convergence of capitalism and communism 208  
     4. Fairness, behavioral economics, and railroads 209  
     5. 19th century railroad pricing revolution 210  
     6. 19th century railroad pricing counterrevolution 212  
     7. Transportation regulation and deregulation and general observations on pricing 214  
     8. Overt or covert price discrimination? 216  
     9. The many ways to skin a cat, or how to hide price discrimination 216  
     10. Conclusions 217  
     References 218  
  WE WANT SECURITY BUT WE HATE IT 221  
     1. Security and Society 224  
     2. Surveillance at the supermarket 224  
     3. Security as control or community infrastructure? 226  
     4. Towards ‘Surveillance Computing’ 226  
     5. Beyond Privacy. Think different 228  
     Notes 229  
     References 230  
  SECURITY AND LOCK-IN 232  
     1. Theoretical Framework The Role of Security in Lock-In 233  
     2. The US Cable Industry 240  
     3. The Video Gaming and Printer Cartridge Industries 244  
     4. Implications 247  
     5. Conclusion 251  
     Acknowledgements 252  
     References 252  
  HOW AND WHY MORE SECURE TECHNOLOGIES SUCCEED IN LEGACY MARKETS 254  
     1. Background 255  
     2. Analysis 255  
     3. Secure File Transfer 257  
     4. Conclusion 260  
     Acknowledgements 261  
     References 261  
  COGNITIVE HACKING 262  
     1. Background 262  
     2. Examples of Cognitive Hacking 268  
     3. Value of Information – Information Theoretic and Economic Models 277  
     4. Cognitive Hacking Countermeasures 280  
     5. Future Work 286  
     6. Summary and Conclusions 286  
     Acknowledgments 287  
     References 287  
  EVALUATING SECURITY SYSTEMS: A FIVE- STEP PROCESS 295  
  Index 300  
  More eBooks at www.ciando.com 0  


nach oben


  Mehr zum Inhalt
Kapitelübersicht
Kurzinformation
Inhaltsverzeichnis
Leseprobe
Blick ins Buch
Fragen zu eBooks?

  Medientyp
  eBooks
  eJournal
  alle

  Navigation
Belletristik / Romane
Computer
Geschichte
Kultur
Medizin / Gesundheit
Philosophie / Religion
Politik
Psychologie / Pädagogik
Ratgeber
Recht
Reise / Hobbys
Sexualität / Erotik
Technik / Wissen
Wirtschaft

  Info
Hier gelangen Sie wieder zum Online-Auftritt Ihrer Bibliothek
© 2008-2024 ciando GmbH | Impressum | Kontakt | F.A.Q. | Datenschutz