000 03589nam a22005415i 4500
001 978-1-4614-1981-5
003 DE-He213
005 20200420221254.0
007 cr nn 008mamaa
008 120925s2013 xxu| s |||| 0|eng d
020 _a9781461419815
_9978-1-4614-1981-5
024 7 _a10.1007/978-1-4614-1981-5
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
245 1 0 _aEconomics of Information Security and Privacy III
_h[electronic resource] /
_cedited by Bruce Schneier.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2013.
300 _aX, 283 p. 60 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aThe Impact of Immediate Disclosure on Attack Diffusion and Volume -- Where Do All the Attacks Go? -- Sex, Lies and Cyber-Crime Surveys -- The Underground Economy of Fake Antivirus Software -- The Inconvenient Truth about Web Certificates -- Resilience of the Internet Interconnection Ecosystem -- Modeling Internet-Scale Policies for Cleaning up Malware -- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security -- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security? -- Economic Methods and Decision Making by Security Professionals -- Real Name Verification Law on the Internet: A Poison or Cure for Privacy -- The Privacy Landscape: Product Differentiation on Data Collection.
520 _aThe Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
650 0 _aComputer science.
650 0 _aBusiness.
650 0 _aManagement science.
650 0 _aComputer organization.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData structures (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aBusiness and Management, general.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aComputer Systems Organization and Communication Networks.
700 1 _aSchneier, Bruce.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781461419808
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4614-1981-5
912 _aZDB-2-SCS
942 _cEBK
999 _c52798
_d52798