Economics of Information Security -

Economics of Information Security (eBook)

eBook Download: PDF
2006 | 1. Auflage
300 Seiten
Springer US (Verlag)
978-1-4020-8090-6 (ISBN)
Systemvoraussetzungen
92,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system.

Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and management.

Written for:
Managers trying to understand the risks in organizations dependent on secure networks, researchers, students in computer science, policy and management 
Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system. Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and management.

Contents 6
Preface 8
Acknowledgments 16
SYSTEM RELIABILITY AND FREE RIDING 17
1. Literature 18
2. Notation 18
3. Nash equilibria 19
4. Social optimum 22
5. Identical values, different costs 23
6. Increasing the number of agents 23
7. Fines and liability 24
8. Sequential moves 27
9. Adversaries 29
10. Sum of efforts and weakest link 30
11. Future work 30
References 31
PRICING SECURITY 32
1. Security as an externality 33
2. Existing measures 37
3. Defining the good 40
4. Allocating property rights 43
5. Conclusions 47
References 48
CRYPTOGRAPHY AND COMPETITION POLICY – ISSUES WITH ‘TRUSTED COMPUTING’ 50
1. Trusted Computing 52
2. Value to corporate and government users 55
3. Value to content owners 57
4. Value to hardware vendors 58
5. Value to software vendors 59
6. Conclusion and Scope for Future Work 63
References 65
HOW MUCH IS STRONGER DRM WORTH? 68
References 72
TRUSTED COMPUTING, PEER-TO-PEER DISTRIBUTION, AND THE ECONOMICS OF PIRATED ENTERTAINMENT 73
1. Protecting Content 76
2. Attacking Peer-to-Peer Distribution 78
3. Defending Peer-to-Peer Distribution 80
4. Conclusion 81
Acknowledgments 81
References 82
ECONOMICS OF IT SECURITY MANAGEMENT 84
1. An economics perspective to IT security management 86
2. Assessing the total cost of security breaches 87
3. Assessing the Value of Security Controls 89
4. Effective level of investment 91
5. Other economics-based IT security studies 93
6. Conclusions and Future Research Directions 94
References 95
EVALUATING DAMAGES CAUSED BY INFORMATION SYSTEMS SECURITY INCIDENTS 97
1. Cost of Information Security Incidents 97
2. Threat-Agent Classification 100
3. Threat Agent 103
4. Techniques 103
5. Risk Management System 104
References 105
THE ECONOMIC CONSEQUENCES OF SHARING SECURITY INFORMATION 107
1. Introduction 107
2. Economic Modelling 111
3. Results 112
4. Conclusion 114
References 115
THE ECONOMICS OF INFORMATION SECURITY INVESTMENT 117
1. The Model 119
2. How Vulnerability Affects the Optimal Level of Investment in information security 125
3. Concluding Comments 133
Acknowledgements 135
References 135
Appendix 138
WHAT PRICE PRIVACY? 140
1. The Meanings of Privacy 141
2. Privacy People Pay For 142
3. The Irrational Privacy Consumer: Selling your virtual self for a hamburger 143
4. Analysis 146
5. Default States 147
6. Why Identity Theft is Not About Identity or Theft 148
7. Infrastructure Cost 151
8. Conclusion 152
References 153
WHY WE CAN’T BE BOTHERED TO READ PRIVACY POLICIES 154
1. Related Work 155
2. Privacy as a Lemons Market 156
3. Privacy Signals 156
4. Testing in the Lemons Market 158
5. Conclusions and Future Directions 161
Acknowledgements 163
References 163
IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET 165
1. U. S. Defense Efforts to bring security information to the marketplace Early Years 166
2. Globalization 171
3. Conclusions and future directions 172
References 173
PRIVACY ATTITUDES AND PRIVACY BEHAVIOR 174
1. Personal Information Security and Privacy: Attitudes versus Behavior 175
2. Exploring the Dichotomy 177
3. Factors Affecting the Rational Decision Process 179
4. An Experimental Design 184
References 185
PRIVACY AND SECURITY OF PERSONAL INFORMATION 188
1. On-line and Off-line Identities 189
2. The Economics of On-line Identities 190
3. The Economics of Off-line Identities 192
4. Economics and Technology of Privacy 193
References 194
PRIVACY, ECONOMICS, AND PRICE DISCRIMINATION ON THE INTERNET 196
1. The important role and prevalence of price discrimination 202
2. Versioning and damaged goods 207
3. The convergence of capitalism and communism 208
4. Fairness, behavioral economics, and railroads 209
5. 19th century railroad pricing revolution 210
6. 19th century railroad pricing counterrevolution 212
7. Transportation regulation and deregulation and general observations on pricing 214
8. Overt or covert price discrimination? 216
9. The many ways to skin a cat, or how to hide price discrimination 216
10. Conclusions 217
References 218
WE WANT SECURITY BUT WE HATE IT 221
1. Security and Society 224
2. Surveillance at the supermarket 224
3. Security as control or community infrastructure? 226
4. Towards ‘Surveillance Computing’ 226
5. Beyond Privacy. Think different 228
Notes 229
References 230
SECURITY AND LOCK-IN 232
1. Theoretical Framework The Role of Security in Lock-In 233
2. The US Cable Industry 240
3. The Video Gaming and Printer Cartridge Industries 244
4. Implications 247
5. Conclusion 251
Acknowledgements 252
References 252
HOW AND WHY MORE SECURE TECHNOLOGIES SUCCEED IN LEGACY MARKETS 254
1. Background 255
2. Analysis 255
3. Secure File Transfer 257
4. Conclusion 260
Acknowledgements 261
References 261
COGNITIVE HACKING 262
1. Background 262
2. Examples of Cognitive Hacking 268
3. Value of Information – Information Theoretic and Economic Models 277
4. Cognitive Hacking Countermeasures 280
5. Future Work 286
6. Summary and Conclusions 286
Acknowledgments 287
References 287
EVALUATING SECURITY SYSTEMS: A FIVE- STEP PROCESS 295
Index 300
More eBooks at www.ciando.com 0

PDFPDF (Wasserzeichen)
Größe: 3,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99