Economics of Information Security

Editors:

ISBN: 978-1-4020-8089-0 (Print) 978-1-4020-8090-6 (Online)

Table of contents (20 chapters)

  1. No Access

    Book Chapter

    Pages 1-15

    System Reliability and Free Riding

  2. No Access

    Book Chapter

    Pages 17-34

    Pricing Security

  3. No Access

    Book Chapter

    Pages 35-52

    Cryptography and Competition Policy - Issues with ‘Trusted Computing’

  4. No Access

    Book Chapter

    Pages 53-57

    How Much is Stronger DRM Worth?

  5. No Access

    Book Chapter

    Pages 59-69

    Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment

  6. No Access

    Book Chapter

    Pages 71-83

    Economics of IT Security Management

  7. No Access

    Book Chapter

    Pages 85-94

    Evaluating Damages Caused by Information Systems Security Incidents

  8. No Access

    Book Chapter

    Pages 95-104

    The Economic Consequences of Sharing Security Information

  9. No Access

    Book Chapter

    Pages 105-125

    The Economics of Information Security Investment

  10. No Access

    Book Chapter

    Pages 129-142

    What Price Privacy?

  11. No Access

    Book Chapter

    Pages 143-153

    Why We Can’t Be Bothered to Read Privacy Policies

  12. No Access

    Book Chapter

    Pages 155-163

    Improving Information Flow in the Information Security Market

  13. No Access

    Book Chapter

    Pages 165-178

    Privacy Attitudes and Privacy Behavior

  14. No Access

    Book Chapter

    Pages 179-186

    Privacy and Security of Personal Information

  15. No Access

    Book Chapter

    Pages 187-211

    Privacy, Economics, and Price Discrimination on the Internet

  16. No Access

    Book Chapter

    Pages 213-223

    We Want Security but We Hate It

  17. No Access

    Book Chapter

    Pages 225-246

    Security and Lock-In

  18. No Access

    Book Chapter

    Pages 247-254

    How and Why More Secure Technologies Succeed in Legacy Markets

  19. No Access

    Book Chapter

    Pages 255-287

    Cognitive Hacking

  20. No Access

    Book Chapter

    Pages 289-293

    Evaluating Security Systems: A Five-Step Process