000 03735nam a22005295i 4500
001 vtls000483545
003 RU-ToGU
005 20210922065649.0
007 cr nn 008mamaa
008 140715s2013 xxu| s |||| 0|eng d
020 _a9781461419815
_9978-1-4614-1981-5
024 7 _a10.1007/978-1-4614-1981-5
_2doi
035 _ato000483545
040 _aSpringer
_cSpringer
_dRU-ToGU
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aSchneier, Bruce.
_eeditor.
_9413843
245 1 0 _aEconomics of Information Security and Privacy III
_helectronic resource
_cedited by Bruce Schneier.
260 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2013.
300 _aX, 283 p. 60 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aThe Impact of Immediate Disclosure on Attack Diffusion and Volume -- Where Do All the Attacks Go? -- Sex, Lies and Cyber-Crime Surveys -- The Underground Economy of Fake Antivirus Software -- The Inconvenient Truth about Web Certificates -- Resilience of the Internet Interconnection Ecosystem -- Modeling Internet-Scale Policies for Cleaning up Malware -- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security -- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security? -- Economic Methods and Decision Making by Security Professionals -- Real Name Verification Law on the Internet: A Poison or Cure for Privacy -- The Privacy Landscape: Product Differentiation on Data Collection.
520 _aThe Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
650 0 _aComputer Science.
_9155490
650 0 _aComputer network architectures.
_9566231
650 0 _aComputer Communication Networks.
_9566243
650 0 _aData protection.
_9303937
650 0 _aData structures (Computer science).
_9566232
650 0 _aEconomics.
_9135154
650 1 4 _aComputer Science.
_9155490
650 2 4 _aSystems and Data Security.
_9303939
650 2 4 _aEconomics/Management Science, general.
_9304660
650 2 4 _aComputer Communication Networks.
_9566243
650 2 4 _aData Structures, Cryptology and Information Theory.
_9566234
650 2 4 _aComputer Systems Organization and Communication Networks.
_9566233
710 2 _aSpringerLink (Online service)
_9143950
773 0 _tSpringer eBooks
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4614-1981-5
912 _aZDB-2-SCS
999 _c356375