|
![]() |
|||
|
||||
OverviewEconomics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system. Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and management. Full Product DetailsAuthor: L. Jean Camp , Stephen LewisPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: Softcover reprint of the original 1st ed. 2004 Volume: 12 Dimensions: Width: 15.50cm , Height: 1.60cm , Length: 23.50cm Weight: 0.486kg ISBN: 9781441954732ISBN 10: 1441954732 Pages: 295 Publication Date: 08 December 2010 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsSystem Reliability and Free Riding.- Pricing Security.- Cryptography and Competition Policy - Issues with ‘Trusted Computing’.- How Much is Stronger DRM Worth?.- Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment.- Economics of IT Security Management.- Evaluating Damages Caused by Information Systems Security Incidents.- The Economic Consequences of Sharing Security Information.- The Economics of Information Security Investment.- What Price Privacy?.- Why We Can’t Be Bothered to Read Privacy Policies.- Improving Information Flow in the Information Security Market.- Privacy Attitudes and Privacy Behavior.- Privacy and Security of Personal Information.- Privacy, Economics, and Price Discrimination on the Internet.- We Want Security but We Hate It.- Security and Lock-In.- How and Why More Secure Technologies Succeed in Legacy Markets.- Cognitive Hacking.- Evaluating Security Systems: A Five-Step Process.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |