The Economics of Information Security and Privacy (Record no. 98470)

000 -LEADER
fixed length control field 04038nam a22004695i 4500
001 - CONTROL NUMBER
control field 978-3-642-39498-0
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220082916.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131128s2013 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642394980
-- 978-3-642-39498-0
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-642-39498-0
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.D35
072 #7 - SUBJECT CATEGORY CODE
Subject category code UMB
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM031000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.74
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Böhme, Rainer.
Relator term editor.
245 14 - TITLE STATEMENT
Title The Economics of Information Security and Privacy
Medium [electronic resource] /
Statement of responsibility, etc edited by Rainer Böhme.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2013.
300 ## - PHYSICAL DESCRIPTION
Extent XIII, 321 p. 57 illus.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part I - Management of Information Security -- A Closer Look at Information Security Costs -- To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool -- Ad-Blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance -- Software Security Economics: Theory, in Practice -- Part II - Economics of Information Security -- An Empirical Study on Information Security Behaviors and Awareness -- Sectoral and Regional Interdependency of Japanese Firms Under the Influence of Information Security Risks -- Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency -- Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections -- Part III - Economics of Privacy -- The Privacy Economics of Voluntary Over-disclosure in Web Forms -- Choice Architecture and Smartphone Privacy: There’s a Price for That -- Would You Sell Your Mother’s Data? Personal Data Disclosure in a Simulated Credit Card Application -- Part IV - Economics of Cybercrime -- Measuring the Cost of Cybercrime -- Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer.
520 ## - SUMMARY, ETC.
Summary, etc In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy, and, more recently, cybercrime, all studied from an interdisciplinary angle by combining methods from microeconomics, econometrics, qualitative social sciences, behavioral sciences, and experimental economics. This book is structured in four parts, reflecting the main areas: management of information security, economics of information security, economics of privacy, and economics of cybercrime. Each individual contribution documents, discusses, and advances the state of the art concerning its specific research questions. It will be of value to academics and practitioners in the related fields.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data structures (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Economics.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Structures, Cryptology and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Economics general.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Systems and Data Security.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642394973
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-39498-0
912 ## -
-- ZDB-2-SCS

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue