The Resource Economics of information security and privacy III, Bruce Schneier, editor
Economics of information security and privacy III, Bruce Schneier, editor
Resource Information
The item Economics of information security and privacy III, Bruce Schneier, editor represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Economics of information security and privacy III, Bruce Schneier, editor represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
- Language
- eng
- Extent
- 1 online resource
- Contents
-
- The Inconvenient Truth About Web Certificates
- Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler and Jean-Pierre Hubaux
- Resilience of the Internet Interconnection Ecosystem
- Chris Hall, Ross Anderson, Richard Clayton, Evangelos Ouzounis and Panagiotis Trimintzios
- Modeling Internet-Scale Policies for Cleaning up Malware
- Steven Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards and George Stelle
- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach
- Christos Ioannidis, David Pym and Julian Williams
- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?
- Brent Rowe and Dallas Wood
- The Impact of Immediate Disclosure on Attack Diffusion and Volume
- Economic Methods and Decision Making by Security Professionals
- Adrian Baldwin, Yolanta Beres, Geoffrey B. Duggan, Marco Casassa Mont and Hilary Johnson, et al.
- Real Name Verification Law on the Internet: A Poison or Cure for Privacy?
- Daegon Cho
- The Privacy Landscape: Product Differentiation on Data Collection
- Sören Preibusch and Joseph Bonneau
- Sam Ransbotham and Sabyasachi Mitra
- Where Do All the Attacks Go?
- Dinei Florêncio and Cormac Herley
- Sex, Lies and Cyber-Crime Surveys
- Dinei Florêncio and Cormac Herley
- The Underground Economy of Fake Antivirus Software
- Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel and Douglas G. Steigerwald, et al.
- Isbn
- 9781461419815
- Label
- Economics of information security and privacy III
- Title
- Economics of information security and privacy III
- Statement of responsibility
- Bruce Schneier, editor
- Title variation
- Economics of information security and privacy 3
- Subject
-
- Business and Management, general
- COMPUTERS / Security / General
- Computer Communication Networks
- Computer Communication Networks.
- Computer Science
- Computer Security
- Computer Systems Organization and Communication Networks
- Computer Systems Organization and Communication Networks.
- Computer network architectures.
- Computer science.
- Computer security -- Economic aspects -- Congresses
- Conference papers and proceedings
- Congress
- Data Structures, Cryptology and Information Theory
- Data Structures, Cryptology and Information Theory.
- Data protection -- Economic aspects -- Congresses
- Data protection.
- Economics
- Economics.
- Electronic books
- Electronic bookss
- Internet
- Internet -- Security measures | Economic aspects -- Congresses
- Systems and Data Security
- Systems and Data Security.
- Language
- eng
- Summary
- The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Index
- no index present
- Language note
- English
- LC call number
- QA76.9.A25
- LC item number
- E26 2013
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- NLM call number
- QA 76.9.A25
- http://library.link/vocab/relatedWorkOrContributorDate
- 1963-
- http://library.link/vocab/relatedWorkOrContributorName
- Schneier, Bruce
- http://library.link/vocab/subjectName
-
- Computer security
- Data protection
- Internet
- Computer Security
- Economics
- Internet
- COMPUTERS / Security / General
- Computer Science
- Systems and Data Security
- Business and Management, general
- Computer Communication Networks
- Data Structures, Cryptology and Information Theory
- Computer Systems Organization and Communication Networks
- Label
- Economics of information security and privacy III, Bruce Schneier, editor
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- The Inconvenient Truth About Web Certificates
- Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler and Jean-Pierre Hubaux
- Resilience of the Internet Interconnection Ecosystem
- Chris Hall, Ross Anderson, Richard Clayton, Evangelos Ouzounis and Panagiotis Trimintzios
- Modeling Internet-Scale Policies for Cleaning up Malware
- Steven Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards and George Stelle
- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach
- Christos Ioannidis, David Pym and Julian Williams
- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?
- Brent Rowe and Dallas Wood
- The Impact of Immediate Disclosure on Attack Diffusion and Volume
- Economic Methods and Decision Making by Security Professionals
- Adrian Baldwin, Yolanta Beres, Geoffrey B. Duggan, Marco Casassa Mont and Hilary Johnson, et al.
- Real Name Verification Law on the Internet: A Poison or Cure for Privacy?
- Daegon Cho
- The Privacy Landscape: Product Differentiation on Data Collection
- Sören Preibusch and Joseph Bonneau
- Sam Ransbotham and Sabyasachi Mitra
- Where Do All the Attacks Go?
- Dinei Florêncio and Cormac Herley
- Sex, Lies and Cyber-Crime Surveys
- Dinei Florêncio and Cormac Herley
- The Underground Economy of Fake Antivirus Software
- Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel and Douglas G. Steigerwald, et al.
- Control code
- 811840756
- Dimensions
- unknown
- Extent
- 1 online resource
- File format
- unknown
- Form of item
- online
- Isbn
- 9781461419815
- Lccn
- 2012944738
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-1-4614-1981-5
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)811840756
- Label
- Economics of information security and privacy III, Bruce Schneier, editor
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- The Inconvenient Truth About Web Certificates
- Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler and Jean-Pierre Hubaux
- Resilience of the Internet Interconnection Ecosystem
- Chris Hall, Ross Anderson, Richard Clayton, Evangelos Ouzounis and Panagiotis Trimintzios
- Modeling Internet-Scale Policies for Cleaning up Malware
- Steven Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards and George Stelle
- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach
- Christos Ioannidis, David Pym and Julian Williams
- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?
- Brent Rowe and Dallas Wood
- The Impact of Immediate Disclosure on Attack Diffusion and Volume
- Economic Methods and Decision Making by Security Professionals
- Adrian Baldwin, Yolanta Beres, Geoffrey B. Duggan, Marco Casassa Mont and Hilary Johnson, et al.
- Real Name Verification Law on the Internet: A Poison or Cure for Privacy?
- Daegon Cho
- The Privacy Landscape: Product Differentiation on Data Collection
- Sören Preibusch and Joseph Bonneau
- Sam Ransbotham and Sabyasachi Mitra
- Where Do All the Attacks Go?
- Dinei Florêncio and Cormac Herley
- Sex, Lies and Cyber-Crime Surveys
- Dinei Florêncio and Cormac Herley
- The Underground Economy of Fake Antivirus Software
- Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel and Douglas G. Steigerwald, et al.
- Control code
- 811840756
- Dimensions
- unknown
- Extent
- 1 online resource
- File format
- unknown
- Form of item
- online
- Isbn
- 9781461419815
- Lccn
- 2012944738
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-1-4614-1981-5
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)811840756
Subject
- Business and Management, general
- COMPUTERS / Security / General
- Computer Communication Networks
- Computer Communication Networks.
- Computer Science
- Computer Security
- Computer Systems Organization and Communication Networks
- Computer Systems Organization and Communication Networks.
- Computer network architectures.
- Computer science.
- Computer security -- Economic aspects -- Congresses
- Conference papers and proceedings
- Congress
- Data Structures, Cryptology and Information Theory
- Data Structures, Cryptology and Information Theory.
- Data protection -- Economic aspects -- Congresses
- Data protection.
- Economics
- Economics.
- Electronic books
- Electronic bookss
- Internet
- Internet -- Security measures | Economic aspects -- Congresses
- Systems and Data Security
- Systems and Data Security.
Genre
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Economics-of-information-security-and-privacy/x6sG_gRLv_4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Economics-of-information-security-and-privacy/x6sG_gRLv_4/">Economics of information security and privacy III, Bruce Schneier, editor</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Economics of information security and privacy III, Bruce Schneier, editor
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Economics-of-information-security-and-privacy/x6sG_gRLv_4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Economics-of-information-security-and-privacy/x6sG_gRLv_4/">Economics of information security and privacy III, Bruce Schneier, editor</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>