Economics of Information Security and Privacy III (Record no. 52798)

000 -LEADER
fixed length control field 03589nam a22005415i 4500
001 - CONTROL NUMBER
control field 978-1-4614-1981-5
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200420221254.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120925s2013 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781461419815
-- 978-1-4614-1981-5
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 10 - TITLE STATEMENT
Title Economics of Information Security and Privacy III
300 ## - PHYSICAL DESCRIPTION
Number of Pages X, 283 p. 60 illus.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 The Impact of Immediate Disclosure on Attack Diffusion and Volume -- Where Do All the Attacks Go? -- Sex, Lies and Cyber-Crime Surveys -- The Underground Economy of Fake Antivirus Software -- The Inconvenient Truth about Web Certificates -- Resilience of the Internet Interconnection Ecosystem -- Modeling Internet-Scale Policies for Cleaning up Malware -- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security -- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security? -- Economic Methods and Decision Making by Security Professionals -- Real Name Verification Law on the Internet: A Poison or Cure for Privacy -- The Privacy Landscape: Product Differentiation on Data Collection.
520 ## - SUMMARY, ETC.
Summary, etc The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
700 1# - AUTHOR 2
Author 2 Schneier, Bruce.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4614-1981-5
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- New York, NY :
-- Springer New York :
-- Imprint: Springer,
-- 2013.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Business.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Management science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer organization.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data structures (Computer science).
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Business and Management, general.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Structures, Cryptology and Information Theory.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Systems Organization and Communication Networks.
912 ## -
-- ZDB-2-SCS

No items available.