Buch, Englisch, 295 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 1370 g
Buch, Englisch, 295 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 1370 g
Reihe: Advances in Information Security
ISBN: 978-1-4020-8089-0
Verlag: Springer US
Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Betriebswirtschaft Management Forschung & Entwicklung (F&E), Innovation
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein EDV & Informatik: Ausbildung & Berufe
- Wirtschaftswissenschaften Volkswirtschaftslehre Wirtschaftssysteme, Wirtschaftsstrukturen
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
Weitere Infos & Material
System Reliability and Free Riding.- Pricing Security.- Cryptography and Competition Policy - Issues with ‘Trusted Computing’.- How Much is Stronger DRM Worth?.- Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment.- Economics of IT Security Management.- Evaluating Damages Caused by Information Systems Security Incidents.- The Economic Consequences of Sharing Security Information.- The Economics of Information Security Investment.- What Price Privacy?.- Why We Can’t Be Bothered to Read Privacy Policies.- Improving Information Flow in the Information Security Market.- Privacy Attitudes and Privacy Behavior.- Privacy and Security of Personal Information.- Privacy, Economics, and Price Discrimination on the Internet.- We Want Security but We Hate It.- Security and Lock-In.- How and Why More Secure Technologies Succeed in Legacy Markets.- Cognitive Hacking.- Evaluating Security Systems: A Five-Step Process.




