Camp / Lewis | Economics of Information Security | E-Book | www.sack.de
E-Book

E-Book, Englisch, Band 12, 300 Seiten

Reihe: Advances in Information Security

Camp / Lewis Economics of Information Security


1. Auflage 2006
ISBN: 978-1-4020-8090-6
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, Band 12, 300 Seiten

Reihe: Advances in Information Security

ISBN: 978-1-4020-8090-6
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark



Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system.

Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and management.

Written for:
Managers trying to understand the risks in organizations dependent on secure networks, researchers, students in computer science, policy and management

Camp / Lewis Economics of Information Security jetzt bestellen!

Weitere Infos & Material


1;Contents;6
2;Preface;8
3;Acknowledgments;16
4;SYSTEM RELIABILITY AND FREE RIDING;17
4.1;1. Literature;18
4.2;2. Notation;18
4.3;3. Nash equilibria;19
4.4;4. Social optimum;22
4.5;5. Identical values, different costs;23
4.6;6. Increasing the number of agents;23
4.7;7. Fines and liability;24
4.8;8. Sequential moves;27
4.9;9. Adversaries;29
4.10;10. Sum of efforts and weakest link;30
4.11;11. Future work;30
4.12;References;31
5;PRICING SECURITY;32
5.1;1. Security as an externality;33
5.2;2. Existing measures;37
5.3;3. Defining the good;40
5.4;4. Allocating property rights;43
5.5;5. Conclusions;47
5.6;References;48
6;CRYPTOGRAPHY AND COMPETITION POLICY – ISSUES WITH ‘TRUSTED COMPUTING’;50
6.1;1. Trusted Computing;52
6.2;2. Value to corporate and government users;55
6.3;3. Value to content owners;57
6.4;4. Value to hardware vendors;58
6.5;5. Value to software vendors;59
6.6;6. Conclusion and Scope for Future Work;63
6.7;References;65
7;HOW MUCH IS STRONGER DRM WORTH?;68
7.1;References;72
8;TRUSTED COMPUTING, PEER-TO-PEER DISTRIBUTION, AND THE ECONOMICS OF PIRATED ENTERTAINMENT;73
8.1;1. Protecting Content;76
8.2;2. Attacking Peer-to-Peer Distribution;78
8.3;3. Defending Peer-to-Peer Distribution;80
8.4;4. Conclusion;81
8.5;Acknowledgments;81
8.6;References;82
9;ECONOMICS OF IT SECURITY MANAGEMENT;84
9.1;1. An economics perspective to IT security management;86
9.2;2. Assessing the total cost of security breaches;87
9.3;3. Assessing the Value of Security Controls;89
9.4;4. Effective level of investment;91
9.5;5. Other economics-based IT security studies;93
9.6;6. Conclusions and Future Research Directions;94
9.7;References;95
10;EVALUATING DAMAGES CAUSED BY INFORMATION SYSTEMS SECURITY INCIDENTS;97
10.1;1. Cost of Information Security Incidents;97
10.2;2. Threat-Agent Classification;100
10.3;3. Threat Agent;103
10.4;4. Techniques;103
10.5;5. Risk Management System;104
10.6;References;105
11;THE ECONOMIC CONSEQUENCES OF SHARING SECURITY INFORMATION;107
11.1;1. Introduction;107
11.2;2. Economic Modelling;111
11.3;3. Results;112
11.4;4. Conclusion;114
11.5;References;115
12;THE ECONOMICS OF INFORMATION SECURITY INVESTMENT;117
12.1;1. The Model;119
12.2;2. How Vulnerability Affects the Optimal Level of Investment in information security;125
12.3;3. Concluding Comments;133
12.4;Acknowledgements;135
12.5;References;135
12.6;Appendix;138
13;WHAT PRICE PRIVACY?;140
13.1;1. The Meanings of Privacy;141
13.2;2. Privacy People Pay For;142
13.3;3. The Irrational Privacy Consumer: Selling your virtual self for a hamburger;143
13.4;4. Analysis;146
13.5;5. Default States;147
13.6;6. Why Identity Theft is Not About Identity or Theft;148
13.7;7. Infrastructure Cost;151
13.8;8. Conclusion;152
13.9;References;153
14;WHY WE CAN’T BE BOTHERED TO READ PRIVACY POLICIES;154
14.1;1. Related Work;155
14.2;2. Privacy as a Lemons Market;156
14.3;3. Privacy Signals;156
14.4;4. Testing in the Lemons Market;158
14.5;5. Conclusions and Future Directions;161
14.6;Acknowledgements;163
14.7;References;163
15;IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET;165
15.1;1. U. S. Defense Efforts to bring security information to the marketplace Early Years;166
15.2;2. Globalization;171
15.3;3. Conclusions and future directions;172
15.4;References;173
16;PRIVACY ATTITUDES AND PRIVACY BEHAVIOR;174
16.1;1. Personal Information Security and Privacy: Attitudes versus Behavior;175
16.2;2. Exploring the Dichotomy;177
16.3;3. Factors Affecting the Rational Decision Process;179
16.4;4. An Experimental Design;184
16.5;References;185
17;PRIVACY AND SECURITY OF PERSONAL INFORMATION;188
17.1;1. On-line and Off-line Identities;189
17.2;2. The Economics of On-line Identities;190
17.3;3. The Economics of Off-line Identities;192
17.4;4. Economics and Technology of Privacy;193
17.5;References;194
18;PRIVACY, ECONOMICS, AND PRICE DISCRIMINATION ON THE INTERNET;196
18.1;1. The important role and prevalence of price discrimination;202
18.2;2. Versioning and damaged goods;207
18.3;3. The convergence of capitalism and communism;208
18.4;4. Fairness, behavioral economics, and railroads;209
18.5;5. 19th century railroad pricing revolution;210
18.6;6. 19th century railroad pricing counterrevolution;212
18.7;7. Transportation regulation and deregulation and general observations on pricing;214
18.8;8. Overt or covert price discrimination?;216
18.9;9. The many ways to skin a cat, or how to hide price discrimination;216
18.10;10. Conclusions;217
18.11;References;218
19;WE WANT SECURITY BUT WE HATE IT;221
19.1;1. Security and Society;224
19.2;2. Surveillance at the supermarket;224
19.3;3. Security as control or community infrastructure?;226
19.4;4. Towards ‘Surveillance Computing’;226
19.5;5. Beyond Privacy. Think different;228
19.6;Notes;229
19.7;References;230
20;SECURITY AND LOCK-IN;232
20.1;1. Theoretical Framework The Role of Security in Lock-In;233
20.2;2. The US Cable Industry;240
20.3;3. The Video Gaming and Printer Cartridge Industries;244
20.4;4. Implications;247
20.5;5. Conclusion;251
20.6;Acknowledgements;252
20.7;References;252
21;HOW AND WHY MORE SECURE TECHNOLOGIES SUCCEED IN LEGACY MARKETS;254
21.1;1. Background;255
21.2;2. Analysis;255
21.3;3. Secure File Transfer;257
21.4;4. Conclusion;260
21.5;Acknowledgements;261
21.6;References;261
22;COGNITIVE HACKING;262
22.1;1. Background;262
22.2;2. Examples of Cognitive Hacking;268
22.3;3. Value of Information – Information Theoretic and Economic Models;277
22.4;4. Cognitive Hacking Countermeasures;280
22.5;5. Future Work;286
22.6;6. Summary and Conclusions;286
22.7;Acknowledgments;287
22.8;References;287
23;EVALUATING SECURITY SYSTEMS: A FIVE- STEP PROCESS;295
24;Index;300
25;More eBooks at www.ciando.com;0



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.