TY - BOOK ID - 8360378 TI - Economics of information security and privacy AU - Pym, David J. AU - Ioannidis, C. AU - Moore, Tyler. PY - 2010 SN - 1489997229 1441969667 1441969675 PB - New York : Springer, DB - UniCat KW - Electronic commerce -- Security measures. KW - Electronic data processing departments -- Security measures. KW - Privacy, Right of. KW - Computer networks KW - Data encryption (Computer science) KW - Electronic commerce KW - Computers KW - Engineering & Applied Sciences KW - Electrical & Computer Engineering KW - Computer Science KW - Telecommunications KW - Economic aspects KW - Security measures KW - Access control KW - Computer networks. KW - Computer network architectures. KW - Computer science. KW - Data protection. KW - Data structures (Computer science) KW - Economics. KW - Security measures. KW - Economic theory KW - Political economy KW - Information structures (Computer science) KW - Structures, Data (Computer science) KW - Structures, Information (Computer science) KW - Data governance KW - Data regulation KW - Personal data protection KW - Protection, Data KW - Informatics KW - Architectures, Computer network KW - Network architectures, Computer KW - Communication systems, Computer KW - Computer communication systems KW - Data networks, Computer KW - ECNs (Electronic communication networks) KW - Electronic communication networks KW - Networks, Computer KW - Teleprocessing networks KW - Computer network security KW - Network security, Computer KW - Security of computer networks KW - Business. KW - Management science. KW - Computer organization. KW - Computer communication systems. KW - Computer programming. KW - Computer security. KW - Data structures (Computer science). KW - Computer Science. KW - Systems and Data Security. KW - Business and Management, general. KW - Programming Techniques. KW - Computer Communication Networks. KW - Data Structures, Cryptology and Information Theory. KW - Computer Systems Organization and Communication Networks. KW - Science KW - Computer security KW - Social sciences KW - Economic man KW - Electronic data processing KW - File organization (Computer science) KW - Abstract data types (Computer science) KW - Computer architecture KW - Data transmission systems KW - Digital communications KW - Electronic systems KW - Information networks KW - Telecommunication KW - Cyberinfrastructure KW - Network computers KW - Distributed processing KW - Data structures (Computer scienc. KW - Data Structures and Information Theory. KW - Trade KW - Economics KW - Management KW - Commerce KW - Industrial management KW - Computer privacy KW - Computer system security KW - Computer systems KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Protection KW - Organization, Computer KW - Electronic computer programming KW - Programming (Electronic computers) KW - Coding theory KW - Quantitative business analysis KW - Problem solving KW - Operations research KW - Statistical decision KW - Programming UR - https://www.unicat.be/uniCat?func=search&query=sysid:8360378 AB - The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference. ER -