Managing Information Risk and the Economics of Security

The lifeblood of the global economy, information has become a source of growing risk as more firms maintain information online. With risks now fueled by sophisticated, organized, malicious groups, information security requires not only technology, but a clear understanding of potential risks, decisi...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Johnson, M. Eric (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US : Imprint: Springer, 2009.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03727nam a22005295i 4500
001 978-0-387-09762-6
003 DE-He213
005 20151204155006.0
007 cr nn 008mamaa
008 100715s2009 xxu| s |||| 0|eng d
020 |a 9780387097626  |9 978-0-387-09762-6 
024 7 |a 10.1007/978-0-387-09762-6  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Managing Information Risk and the Economics of Security  |h [electronic resource] /  |c edited by M. Eric Johnson. 
264 1 |a Boston, MA :  |b Springer US :  |b Imprint: Springer,  |c 2009. 
300 |a XIV, 347 p. 20 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Managing Information Risk and the Economics of Security -- Nonbanks and Risk in Retail Payments: EU and U.S. -- Security Economics and European Policy -- BORIS –Business ORiented management of Information Security -- Productivity Space of Information Security in an Extension of the Gordon-Loeb’s InvestmentModel -- Communicating the Economic Value of Security Investments: Value at Security Risk -- Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security -- The Value of Escalation and Incentives in Managing Information Access -- Reinterpreting the Disclosure Debate for Web Infections -- The Impact of Incentives on Notice and Take-down -- Studying Malicious Websites and the Underground Economy on the Chinese Web -- Botnet Economics: Uncertainty Matters -- Cyber Insurance as an Incentivefor Internet Security -- Conformity or Diversity: Social Implications of Transparency in Personal Data Processing -- Is Distributed Trust More Trustworthy?. 
520 |a The lifeblood of the global economy, information has become a source of growing risk as more firms maintain information online. With risks now fueled by sophisticated, organized, malicious groups, information security requires not only technology, but a clear understanding of potential risks, decision-making behaviors, and metrics for evaluating business and policy options. Managing Information Risk and the Economics of Security, an edited volume contributed by well-established researchers in the field worldwide, presents the latest research on economics driving both the risks and the solutions. Covering the implications of policy within firms and across countries, this volume provides managers and policy makers with new thinking on how to manage risk. Managing Information Risk and the Economics of Security is designed for managers, policy makers, and researchers focusing on economics of information security, as well as for advanced-level students in computer science, business management and economics. . 
650 0 |a Computer science. 
650 0 |a Business. 
650 0 |a Management science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Economics. 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Business and Management, general. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Encryption. 
650 2 4 |a Economic Systems. 
700 1 |a Johnson, M. Eric.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9780387097619 
856 4 0 |u http://dx.doi.org/10.1007/978-0-387-09762-6  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)