Economics of Information Security: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
 
(One intermediate revision by the same user not shown)
Line 8: Line 8:


[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=&action=&keyword=Camp_Lewis:2004 ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=&action=&keyword=Camp_Lewis:2004 ''BibTeX'']
 
[http://books.google.com/books?id=PbzP9tgeDcAC&printsec=frontcover&dq=Economics+of+Information+Security&ei=zdpRTMWoL4KsywS8i5jhCQ&cd=1#v=onepage&q&f=false ''Google Books'']
[http://www.worldcat.org/title/economics-of-information-security/oclc/55681519&referer=brief_results ''World Cat'']
[http://www.amazon.com/Economics-Information-Security-Advances/dp/1402080891  ''Amazon'']
[http://www.amazon.com/Economics-Information-Security-Advances/dp/1402080891  ''Amazon'']



Latest revision as of 14:48, 29 July 2010

Full Title of Reference

Economics of Information Security

Full Citation

L. Jean Camp and Stephen Lewis, Economics of Information Security (2004).

BibTeX Google Books World Cat Amazon

Categorization

Key Words

Cybersecurity as an Externality, Cybersecurity as a Public Good, Identity Fraud/Theft, Information Asymmetries, Tragedy of Commons,

Synopsis

Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system. The authors apply classical economic theory to cyber security issues such as capping computer vulnerabilities through trading in vulnerability credits, the economics of disclosure and the cost of privacy.

Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and management.

Additional Notes and Highlights

Expertise Required: Economics - High

Table of Contents and first two plus chapters.