• Economics of Information Security and Privacy III See large image

    Economics of Information Security and Privacy III (Hardback) Edited by Bruce Schneier

    $153.28 - Save $62.58 28% off - RRP $215.86 Free delivery worldwide Available
    Dispatched in 4 business days
    When will my order arrive?
    Add to basket | Add to wishlist |

    DescriptionThe Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?


Other books

Other people who viewed this bought | Other books in this category
Showing items 1 to 10 of 10

 

Reviews | Bibliographic data
  • Full bibliographic data for Economics of Information Security and Privacy III

    Title
    Economics of Information Security and Privacy III
    Authors and contributors
    Edited by Bruce Schneier
    Physical properties
    Format: Hardback
    Number of pages: 293
    Width: 156 mm
    Height: 234 mm
    Thickness: 17 mm
    Weight: 592 g
    Language
    English
    ISBN
    ISBN 13: 9781461419808
    ISBN 10: 1461419808
    Classifications

    BIC E4L: COM
    Nielsen BookScan Product Class 3: S10.2
    B&T Book Type: NF
    B&T Modifier: Region of Publication: 01
    BIC subject category V2: KC
    B&T Modifier: Academic Level: 05
    BIC subject category V2: UT
    LC subject heading: ,
    Ingram Subject Code: BE
    B&T Modifier: Continuations: 02
    BISAC V2.8: COM031000
    Warengruppen-Systematik des deutschen Buchhandels: 16320
    LC classification: QA
    B&T General Subject: 229
    B&T Modifier: Text Format: 01
    LC classification: QA76.9.D35
    B&T Merchandise Category: COM
    Abridged Dewey: 005
    B&T Approval Code: A93661400
    LC classification: QA76.9.A25
    B&T Approval Code: A93663050
    BISAC V2.8: COM053000
    DC22: 005.8
    LC subject heading: ,
    BISAC V2.8: COM075000, BUS000000
    BIC subject category V2: UR, UKN
    Libri: OEKO8000, WIRU8000
    BISAC V2.8: COM067000
    Libri: DATE6300, DATE6400, SICH0722, NETZ9800, DATE6996
    LC subject heading:
    LC classification: HB71-74
    DC23: 005.8
    LC subject heading:
    LC classification: QA75.5-76.95, TK5105.5-5105.9, QA76.9.C643
    LC subject heading:
    Edition statement
    2012
    Illustrations note
    60 black & white illustrations, 35 black & white tables, biography
    Publisher
    Springer-Verlag New York Inc.
    Imprint name
    Springer-Verlag New York Inc.
    Publication date
    01 October 2012
    Publication City/Country
    New York, NY
    Table of contents
    The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Underground Economy of Fake Antivirus Software.- The Inconvenient Truth about Web Certificates.- Resilience of the Internet Interconnection Ecosystem.- Modeling Internet-Scale Policies for Cleaning up Malware.- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security.- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?.- Economic Methods and Decision Making by Security Professionals.- Real Name Verification Law on the Internet: A Poison or Cure for Privacy.- The Privacy Landscape: Product Differentiation on Data Collection.