The Economics of Information Security and Privacy (Record no. 98470)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04038nam a22004695i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-642-39498-0 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20140220082916.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 131128s2013 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783642394980 |
-- | 978-3-642-39498-0 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-642-39498-0 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.D35 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UMB |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM031000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.74 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Böhme, Rainer. |
Relator term | editor. |
245 14 - TITLE STATEMENT | |
Title | The Economics of Information Security and Privacy |
Medium | [electronic resource] / |
Statement of responsibility, etc | edited by Rainer Böhme. |
264 #1 - | |
-- | Berlin, Heidelberg : |
-- | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
-- | 2013. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIII, 321 p. 57 illus. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part I - Management of Information Security -- A Closer Look at Information Security Costs -- To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool -- Ad-Blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance -- Software Security Economics: Theory, in Practice -- Part II - Economics of Information Security -- An Empirical Study on Information Security Behaviors and Awareness -- Sectoral and Regional Interdependency of Japanese Firms Under the Influence of Information Security Risks -- Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency -- Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections -- Part III - Economics of Privacy -- The Privacy Economics of Voluntary Over-disclosure in Web Forms -- Choice Architecture and Smartphone Privacy: There’s a Price for That -- Would You Sell Your Mother’s Data? Personal Data Disclosure in a Simulated Credit Card Application -- Part IV - Economics of Cybercrime -- Measuring the Cost of Cybercrime -- Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer. |
520 ## - SUMMARY, ETC. | |
Summary, etc | In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy, and, more recently, cybercrime, all studied from an interdisciplinary angle by combining methods from microeconomics, econometrics, qualitative social sciences, behavioral sciences, and experimental economics. This book is structured in four parts, reflecting the main areas: management of information security, economics of information security, economics of privacy, and economics of cybercrime. Each individual contribution documents, discusses, and advances the state of the art concerning its specific research questions. It will be of value to academics and practitioners in the related fields. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data structures (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Economics. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data Structures, Cryptology and Information Theory. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Economics general. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Systems and Data Security. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783642394973 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-642-39498-0 |
912 ## - | |
-- | ZDB-2-SCS |
No items available.