Economics of Information Security: Difference between revisions
(10 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
==Full Citation== | ==Full Citation== | ||
L. Jean Camp and Stephen Lewis, Economics of Information Security (2004). | L. Jean Camp and Stephen Lewis, Economics of Information Security (2004). | ||
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=&action=&keyword=Camp_Lewis:2004 ''BibTeX''] | [http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=&action=&keyword=Camp_Lewis:2004 ''BibTeX''] | ||
[http://books.google.com/books?id=PbzP9tgeDcAC&printsec=frontcover&dq=Economics+of+Information+Security&ei=zdpRTMWoL4KsywS8i5jhCQ&cd=1#v=onepage&q&f=false ''Google Books''] | |||
[http://www.worldcat.org/title/economics-of-information-security/oclc/55681519&referer=brief_results ''World Cat''] | |||
[http://www.amazon.com/Economics-Information-Security-Advances/dp/1402080891 ''Amazon''] | |||
==Categorization== | ==Categorization== | ||
* | * Resource by Type: [[Books]] | ||
* Issues: [[Economics of Cybersecurity]]; [[Risk Management and Investment]] | * Issues: [[Economics of Cybersecurity]]; [[Information Sharing/Disclosure]]; [[Privacy]]; [[Risk Management and Investment]] | ||
* Approaches: [[Regulation/Liability]] | * Approaches: [[Regulation/Liability]] | ||
Line 19: | Line 22: | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Security_as_an_Externality | Cybersecurity as an Externality]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Security_as_an_Externality | Cybersecurity as an Externality]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Security_as_a_Public_Good | Cybersecurity as a Public Good]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Security_as_a_Public_Good | Cybersecurity as a Public Good]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Identity_Fraud/Theft | Identity Fraud/Theft]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Information_Asymmetries | Information Asymmetries]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Information_Asymmetries | Information Asymmetries]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Tragedy_of_Commons | Tragedy of Commons]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Tragedy_of_Commons | Tragedy of Commons]], | ||
Line 24: | Line 28: | ||
==Synopsis== | ==Synopsis== | ||
Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system. The authors apply classical economic theory to cyber security issues such as capping computer vulnerabilities through trading in vulnerability credits | Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system. The authors apply classical economic theory to cyber security issues such as capping computer vulnerabilities through trading in vulnerability credits, the economics of disclosure and the cost of privacy. | ||
Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and management. | Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and management. | ||
Line 30: | Line 34: | ||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== | ||
[http://books.google.com/books?id=PbzP9tgeDcAC&dq=L.+Jean+Camp+and+Stephen+Lewis,+Economics+of+Information+Security&printsec=frontcover&source=bn&hl=en&ei=5PEoTLr2H4K78gbTiIXNBw&sa=X&oi=book_result&ct=result&resnum=4&ved=0CCMQ6AEwAw#v=onepage&q&f=false | Expertise Required: Economics - High | ||
[http://books.google.com/books?id=PbzP9tgeDcAC&dq=L.+Jean+Camp+and+Stephen+Lewis,+Economics+of+Information+Security&printsec=frontcover&source=bn&hl=en&ei=5PEoTLr2H4K78gbTiIXNBw&sa=X&oi=book_result&ct=result&resnum=4&ved=0CCMQ6AEwAw#v=onepage&q&f=false Table of Contents and first two plus chapters.] |
Latest revision as of 14:48, 29 July 2010
Full Title of Reference
Economics of Information Security
Full Citation
L. Jean Camp and Stephen Lewis, Economics of Information Security (2004).
BibTeX Google Books World Cat Amazon
Categorization
- Resource by Type: Books
- Issues: Economics of Cybersecurity; Information Sharing/Disclosure; Privacy; Risk Management and Investment
- Approaches: Regulation/Liability
Key Words
Cybersecurity as an Externality, Cybersecurity as a Public Good, Identity Fraud/Theft, Information Asymmetries, Tragedy of Commons,
Synopsis
Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system. The authors apply classical economic theory to cyber security issues such as capping computer vulnerabilities through trading in vulnerability credits, the economics of disclosure and the cost of privacy.
Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and management.
Additional Notes and Highlights
Expertise Required: Economics - High