Economics of Information Security: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
 
(7 intermediate revisions by the same user not shown)
Line 5: Line 5:
==Full Citation==
==Full Citation==


L. Jean Camp and Stephen Lewis, Economics of Information Security (2004). [http://www.amazon.com/Economics-Information-Security-Advances/dp/1402080891  ''Purchase'']
L. Jean Camp and Stephen Lewis, Economics of Information Security (2004).  


[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=&action=&keyword=Camp_Lewis:2004 ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=&action=&keyword=Camp_Lewis:2004 ''BibTeX'']
[http://books.google.com/books?id=PbzP9tgeDcAC&printsec=frontcover&dq=Economics+of+Information+Security&ei=zdpRTMWoL4KsywS8i5jhCQ&cd=1#v=onepage&q&f=false ''Google Books'']
[http://www.worldcat.org/title/economics-of-information-security/oclc/55681519&referer=brief_results ''World Cat'']
[http://www.amazon.com/Economics-Information-Security-Advances/dp/1402080891  ''Amazon'']


==Categorization==
==Categorization==


* Overview: [[Books]]
* Resource by Type: [[Books]]
* Issues: [[Economics of Cybersecurity]]; [[Information Sharing/Disclosure]]; [[Privacy]]; [[Risk Management and Investment]]
* Issues: [[Economics of Cybersecurity]]; [[Information Sharing/Disclosure]]; [[Privacy]]; [[Risk Management and Investment]]
* Approaches: [[Regulation/Liability]]
* Approaches: [[Regulation/Liability]]
Line 19: Line 22:
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Security_as_an_Externality | Cybersecurity as an Externality]],  
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Security_as_an_Externality | Cybersecurity as an Externality]],  
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Security_as_a_Public_Good | Cybersecurity as a Public Good]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Security_as_a_Public_Good | Cybersecurity as a Public Good]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Identity_Fraud/Theft | Identity Fraud/Theft]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Information_Asymmetries | Information Asymmetries]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Information_Asymmetries | Information Asymmetries]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Tragedy_of_Commons | Tragedy of Commons]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Tragedy_of_Commons | Tragedy of Commons]],
Line 24: Line 28:
==Synopsis==
==Synopsis==


Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system. The authors apply classical economic theory to cyber security issues such as capping computer vulnerabilities through trading in vulnerability credits and the economics of disclosure.
Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system. The authors apply classical economic theory to cyber security issues such as capping computer vulnerabilities through trading in vulnerability credits, the economics of disclosure and the cost of privacy.


Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and management.
Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and management.


==Additional Notes and Highlights==
==Additional Notes and Highlights==
Expertise Required: Economics - High


[http://books.google.com/books?id=PbzP9tgeDcAC&dq=L.+Jean+Camp+and+Stephen+Lewis,+Economics+of+Information+Security&printsec=frontcover&source=bn&hl=en&ei=5PEoTLr2H4K78gbTiIXNBw&sa=X&oi=book_result&ct=result&resnum=4&ved=0CCMQ6AEwAw#v=onepage&q&f=false Table of Contents and first two plus chapters.]
[http://books.google.com/books?id=PbzP9tgeDcAC&dq=L.+Jean+Camp+and+Stephen+Lewis,+Economics+of+Information+Security&printsec=frontcover&source=bn&hl=en&ei=5PEoTLr2H4K78gbTiIXNBw&sa=X&oi=book_result&ct=result&resnum=4&ved=0CCMQ6AEwAw#v=onepage&q&f=false Table of Contents and first two plus chapters.]

Latest revision as of 15:48, 29 July 2010

Full Title of Reference

Economics of Information Security

Full Citation

L. Jean Camp and Stephen Lewis, Economics of Information Security (2004).

BibTeX Google Books World Cat Amazon

Categorization

Key Words

Cybersecurity as an Externality, Cybersecurity as a Public Good, Identity Fraud/Theft, Information Asymmetries, Tragedy of Commons,

Synopsis

Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system. The authors apply classical economic theory to cyber security issues such as capping computer vulnerabilities through trading in vulnerability credits, the economics of disclosure and the cost of privacy.

Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and management.

Additional Notes and Highlights

Expertise Required: Economics - High

Table of Contents and first two plus chapters.