My Account Log in

1 option

Economics of Information Security and Privacy III / edited by Bruce Schneier.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Schneier, Bruce, 1963- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Language:
English
Subjects (All):
Computer security.
Business.
Management science.
Computer networks.
Data structures (Computer science).
Computer organization.
Systems and Data Security.
Business and Management, general.
Computer Communication Networks.
Data Structures and Information Theory.
Computer Systems Organization and Communication Networks.
Local Subjects:
Systems and Data Security.
Business and Management, general.
Computer Communication Networks.
Data Structures and Information Theory.
Computer Systems Organization and Communication Networks.
Physical Description:
1 online resource (X, 283 pages) : 60 illustrations
Edition:
First edition 2013.
Contained In:
Springer eBooks
Place of Publication:
New York, NY : Springer New York : Imprint: Springer, 2013.
System Details:
text file PDF
Summary:
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
Contents:
The Impact of Immediate Disclosure on Attack Diffusion and Volume
Where Do All the Attacks Go?
Sex, Lies and Cyber-Crime Surveys
The Underground Economy of Fake Antivirus Software
The Inconvenient Truth about Web Certificates
Resilience of the Internet Interconnection Ecosystem
Modeling Internet-Scale Policies for Cleaning up Malware
Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security
Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?
Economic Methods and Decision Making by Security Professionals
Real Name Verification Law on the Internet: A Poison or Cure for Privacy
The Privacy Landscape: Product Differentiation on Data Collection.
Other Format:
Printed edition:
ISBN:
978-1-4614-1981-5
9781461419815
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account