|
|
|
|
LEADER |
03402nam a22005655i 4500 |
001 |
978-1-4020-8090-6 |
003 |
DE-He213 |
005 |
20151029231448.0 |
007 |
cr nn 008mamaa |
008 |
100301s2004 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781402080906
|9 978-1-4020-8090-6
|
024 |
7 |
|
|a 10.1007/b116816
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA75.5-76.95
|
072 |
|
7 |
|a UY
|2 bicssc
|
072 |
|
7 |
|a UYA
|2 bicssc
|
072 |
|
7 |
|a COM014000
|2 bisacsh
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.0151
|2 23
|
245 |
1 |
0 |
|a Economics of Information Security
|h [electronic resource] /
|c edited by L. Jean Camp, Stephen Lewis.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2004.
|
300 |
|
|
|a XV, 295 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 1568-2633 ;
|v 12
|
505 |
0 |
|
|a System Reliability and Free Riding -- Pricing Security -- Cryptography and Competition Policy - Issues with ‘Trusted Computing’ -- How Much is Stronger DRM Worth? -- Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment -- Economics of IT Security Management -- Evaluating Damages Caused by Information Systems Security Incidents -- The Economic Consequences of Sharing Security Information -- The Economics of Information Security Investment -- What Price Privacy? -- Why We Can’t Be Bothered to Read Privacy Policies -- Improving Information Flow in the Information Security Market -- Privacy Attitudes and Privacy Behavior -- Privacy and Security of Personal Information -- Privacy, Economics, and Price Discrimination on the Internet -- We Want Security but We Hate It -- Security and Lock-In -- How and Why More Secure Technologies Succeed in Legacy Markets -- Cognitive Hacking -- Evaluating Security Systems: A Five-Step Process.
|
520 |
|
|
|a Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system. Economics of Information Security is designed for managers struggling to understand the risks in organizations dependent on secure networks, as well as researchers. This book is also suitable for students in computer science, policy and management.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Economic policy.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a The Computing Profession.
|
650 |
2 |
4 |
|a R & D/Technology Policy.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
700 |
1 |
|
|a Camp, L. Jean.
|e editor.
|
700 |
1 |
|
|a Lewis, Stephen.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781402080890
|
830 |
|
0 |
|a Advances in Information Security,
|x 1568-2633 ;
|v 12
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/b116816
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|