The Economics of Information Security and Privacy edited by Rainer Böhme.

In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering i...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Böhme, Rainer (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Edition:1st ed. 2013.
Series:Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3296649
003 MWH
005 20191025003547.0
007 cr nn 008mamaa
008 131128s2013 gw | s |||| 0|eng d
020 |a 9783642394980 
024 7 |a 10.1007/978-3-642-39498-0  |2 doi 
035 |a (DE-He213)978-3-642-39498-0 
050 4 |a E-Book 
072 7 |a UMB  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
072 7 |a UMB  |2 thema 
072 7 |a GPF  |2 thema 
245 1 4 |a The Economics of Information Security and Privacy  |h [electronic resource] /  |c edited by Rainer Böhme. 
250 |a 1st ed. 2013. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2013. 
300 |a XIII, 321 p. 57 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Springer eBook Collection 
505 0 |a Part I - Management of Information Security -- A Closer Look at Information Security Costs -- To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool -- Ad-Blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance -- Software Security Economics: Theory, in Practice -- Part II - Economics of Information Security -- An Empirical Study on Information Security Behaviors and Awareness -- Sectoral and Regional Interdependency of Japanese Firms Under the Influence of Information Security Risks -- Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency -- Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections -- Part III - Economics of Privacy -- The Privacy Economics of Voluntary Over-disclosure in Web Forms -- Choice Architecture and Smartphone Privacy: There’s a Price for That -- Would You Sell Your Mother’s Data? Personal Data Disclosure in a Simulated Credit Card Application -- Part IV - Economics of Cybercrime -- Measuring the Cost of Cybercrime -- Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer. 
520 |a In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy, and, more recently, cybercrime, all studied from an interdisciplinary angle by combining methods from microeconomics, econometrics, qualitative social sciences, behavioral sciences, and experimental economics. This book is structured in four parts, reflecting the main areas: management of information security, economics of information security, economics of privacy, and economics of cybercrime. Each individual contribution documents, discusses, and advances the state of the art concerning its specific research questions. It will be of value to academics and practitioners in the related fields. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Data structures (Computer science). 
650 0 |a Economics. 
650 0 |a Management science. 
650 0 |a Computer security. 
690 |a Electronic resources (E-books) 
700 1 |a Böhme, Rainer.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-642-39498-0  |3 Click to view e-book  |t 0 
907 |a .b32966490  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g gw   |h 4  |i 1 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i22098112  |z 02-26-20 
999 f f |i 1d6697f3-8a41-5844-b6c3-d4813df82bea  |s 7733fe52-2ec7-5e91-864f-3ad160eaf78e  |t 0 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |t 0  |e E-Book  |h Library of Congress classification  |i Elec File