The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations…mehr
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
Artikelnr. des Verlages: 80075374, 978-1-4614-1980-8
1st Edition.
Seitenzahl: 296
Erscheinungstermin: 26. September 2012
Englisch
Abmessung: 241mm x 160mm x 20mm
Gewicht: 599g
ISBN-13: 9781461419808
ISBN-10: 1461419808
Artikelnr.: 34156706
Autorenporträt
Bruce Schneier ist Mitbegründer der Counterpane Interet Security Inc., einem Unternehmen das auf Sicherheitsbeobachtung spezialisiert ist. Sein Buch Applied Cryptograpghy wurde in den USA ein Bestseller. Schneier hat die Blowfish und Twofish-Encryption-Alogrithmen mitentwickelt, zahlreiche Beiträge zum Thema digitale Sicherheit verfasst und ist ein gefragter Redner.
Inhaltsangabe
The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Underground Economy of Fake Antivirus Software.- The Inconvenient Truth about Web Certificates.- Resilience of the Internet Interconnection Ecosystem.- Modeling Internet-Scale Policies for Cleaning up Malware.- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security.- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?.- Economic Methods and Decision Making by Security Professionals.- Real Name Verification Law on the Internet: A Poison or Cure for Privacy.- The Privacy Landscape: Product Differentiation on Data Collection.
The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Underground Economy of Fake Antivirus Software.- The Inconvenient Truth about Web Certificates.- Resilience of the Internet Interconnection Ecosystem.- Modeling Internet-Scale Policies for Cleaning up Malware.- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security.- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?.- Economic Methods and Decision Making by Security Professionals.- Real Name Verification Law on the Internet: A Poison or Cure for Privacy.- The Privacy Landscape: Product Differentiation on Data Collection.
The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Underground Economy of Fake Antivirus Software.- The Inconvenient Truth about Web Certificates.- Resilience of the Internet Interconnection Ecosystem.- Modeling Internet-Scale Policies for Cleaning up Malware.- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security.- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?.- Economic Methods and Decision Making by Security Professionals.- Real Name Verification Law on the Internet: A Poison or Cure for Privacy.- The Privacy Landscape: Product Differentiation on Data Collection.
The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Underground Economy of Fake Antivirus Software.- The Inconvenient Truth about Web Certificates.- Resilience of the Internet Interconnection Ecosystem.- Modeling Internet-Scale Policies for Cleaning up Malware.- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security.- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?.- Economic Methods and Decision Making by Security Professionals.- Real Name Verification Law on the Internet: A Poison or Cure for Privacy.- The Privacy Landscape: Product Differentiation on Data Collection.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/neu