메뉴 건너뛰기




Volumn 4622 LNCS, Issue , 2007, Pages 68-91

Information security economics - And beyond

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; PROGRAM DEBUGGING;

EID: 38149088764     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74143-5_5     Document Type: Conference Paper
Times cited : (43)

References (108)
  • 1
    • 84937257562 scopus 로고    scopus 로고
    • Economies and Security in Statecraft and Scholarship
    • Mastanduno, M.: Economies and Security in Statecraft and Scholarship. International Organization 52(4) (1998)
    • (1998) International Organization , vol.52 , Issue.4
    • Mastanduno, M.1
  • 2
  • 5
    • 38149082970 scopus 로고    scopus 로고
    • Economic Science Column, The New York Times June 1
    • Varian, H.: Managing Online Security Risks, Economic Science Column, The New York Times (June 1, 2000)
    • (2000) Managing Online Security Risks
    • Varian, H.1
  • 7
    • 79953844957 scopus 로고    scopus 로고
    • Closing the Phishing Hole - Fraud, Risk and Nonbanks
    • Santa Fe May
    • Anderson, R. J.: Closing the Phishing Hole - Fraud, Risk and Nonbanks. In: Nonbanks in the Payment System, Santa Fe (May 2007)
    • (2007) Nonbanks in the Payment System
    • Anderson, R.J.1
  • 9
    • 0001495881 scopus 로고    scopus 로고
    • The Eternity Service
    • Anderson, R.J.: The Eternity Service. In: Pragocrypt 96 (1996)
    • (1996) Pragocrypt , vol.96
    • Anderson, R.J.1
  • 10
    • 14744271851 scopus 로고    scopus 로고
    • The Economics of Resisting Censorship
    • Danezis, G., Anderson, R.J.: The Economics of Resisting Censorship. IEEE Security & Privacy 3(1), 45-50 (2005)
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 45-50
    • Danezis, G.1    Anderson, R.J.2
  • 11
    • 38149020963 scopus 로고    scopus 로고
    • Goodhart, D.: Too Diverse? In: Prospect (February 2004) at http://www.guardian.co.uk/race/story/0,11374,1154684,00.html
    • Goodhart, D.: Too Diverse? In: Prospect (February 2004) at http://www.guardian.co.uk/race/story/0,11374,1154684,00.html
  • 12
    • 84925838576 scopus 로고    scopus 로고
    • Anderson, R.J.: Why Information Security is Hard - An Economic Perspective. In: 17th Annual Computer Security Applications Conference, December 2001 (2001), and at http://www.cl.cam.ac.uk/users/rjal4/Papers/econ.pdf
    • Anderson, R.J.: Why Information Security is Hard - An Economic Perspective. In: 17th Annual Computer Security Applications Conference, December 2001 (2001), and at http://www.cl.cam.ac.uk/users/rjal4/Papers/econ.pdf
  • 13
    • 0000071449 scopus 로고
    • From weakest-link to best-shot: The voluntary provision of public goods
    • Hirshleifer, J.: From weakest-link to best-shot: the voluntary provision of public goods. Public Choice 41, 371-386 (1983)
    • (1983) Public Choice , vol.41 , pp. 371-386
    • Hirshleifer, J.1
  • 14
    • 33750482906 scopus 로고    scopus 로고
    • System Reliability and Free Riding
    • Kluwer, Dordrecht
    • Varian, H.: System Reliability and Free Riding. In: Economics of Information Security, pp. 1-15. Kluwer, Dordrecht (2004)
    • (2004) Economics of Information Security , pp. 1-15
    • Varian, H.1
  • 16
    • 85020616309 scopus 로고
    • Network Externalities, Competition, and Compatibility
    • Katz, M., Shapiro, C.: Network Externalities, Competition, and Compatibility. The American Economic Review 75(3), 424-440 (1985)
    • (1985) The American Economic Review , vol.75 , Issue.3 , pp. 424-440
    • Katz, M.1    Shapiro, C.2
  • 18
    • 38149114332 scopus 로고    scopus 로고
    • Anderson, R.J.: Open and Closed Systems are Equivalent (that is, in an ideal world. In: Perspectives on Free and Open Source Software, pp. 127-142. MIT Press, Cambridge (2005)
    • Anderson, R.J.: Open and Closed Systems are Equivalent (that is, in an ideal world. In: Perspectives on Free and Open Source Software, pp. 127-142. MIT Press, Cambridge (2005)
  • 19
    • 38149095281 scopus 로고    scopus 로고
    • Rescorla, E.: Is Finding Security Holes a Good Idea? In: Third Workshop on the Economics of Information Security (2004)
    • Rescorla, E.: Is Finding Security Holes a Good Idea? In: Third Workshop on the Economics of Information Security (2004)
  • 20
    • 67650336989 scopus 로고    scopus 로고
    • The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting
    • Ozment, J.A.: The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting. In: Fourth Workshop on the Economics of Information Security (2005)
    • (2005) Fourth Workshop on the Economics of Information Security
    • Ozment, J.A.1
  • 24
    • 0024105910 scopus 로고
    • A Field Study of the Software Design Process for Large Systems
    • Curtis, B., Krasner, H., Iscoe, N.: A Field Study of the Software Design Process for Large Systems. Communications of the ACM 31(11), 1268-1287 (1988)
    • (1988) Communications of the ACM , vol.31 , Issue.11 , pp. 1268-1287
    • Curtis, B.1    Krasner, H.2    Iscoe, N.3
  • 26
    • 85005305538 scopus 로고
    • The Market for 'Lemons: Quality Uncertainty and the Market Mechanism
    • Akerlof, G.: The Market for 'Lemons: Quality Uncertainty and the Market Mechanism. The Quarterly Journal of Economics 84(3), 488-500 (1970)
    • (1970) The Quarterly Journal of Economics , vol.84 , Issue.3 , pp. 488-500
    • Akerlof, G.1
  • 31
    • 33746613622 scopus 로고    scopus 로고
    • A Comparison of Market Approaches to Software Vulnerability Disclosure
    • Müller, G, ed, ETRICS 2006, Springer, Heidelberg
    • Böhme, R.: A Comparison of Market Approaches to Software Vulnerability Disclosure. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 298-311. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3995 , pp. 298-311
    • Böhme, R.1
  • 35
    • 0038086632 scopus 로고
    • An Economic Theory of Privacy
    • Posner, R.: An Economic Theory of Privacy. Regulation, 19-26 (1978)
    • (1978) Regulation , vol.19-26
    • Posner, R.1
  • 36
    • 84938052547 scopus 로고
    • Privacy, Secrecy and Reputation
    • Posner, R.: Privacy, Secrecy and Reputation. Buffalo Law Review 28(1) (1979)
    • (1979) Buffalo Law Review , vol.28 , Issue.1
    • Posner, R.1
  • 37
    • 0013229314 scopus 로고
    • Privacy: Its Origin, Function and Future
    • Hirshleifer, J.: Privacy: its Origin, Function and Future. Journal of Legal Studies 9, 649-664 (1980)
    • (1980) Journal of Legal Studies , vol.9 , pp. 649-664
    • Hirshleifer, J.1
  • 38
    • 1142268291 scopus 로고    scopus 로고
    • Economic Apects of Personal Privacy
    • National Telecommunications and Information Administration report
    • Varian, H.: Economic Apects of Personal Privacy. In: Privacy and Self-Regulation in the Information Age, National Telecommunications and Information Administration report (1996)
    • (1996) Privacy and Self-Regulation in the Information Age
    • Varian, H.1
  • 40
    • 14744280530 scopus 로고    scopus 로고
    • Conditioning Prices on Purchase History
    • Acquisti, A., Varian, H.: Conditioning Prices on Purchase History. Marketing Science 24(3) (2005)
    • (2005) Marketing Science , vol.24 , Issue.3
    • Acquisti, A.1    Varian, H.2
  • 42
    • 14744272698 scopus 로고    scopus 로고
    • Why we can't be bothered to read privacy policies
    • Kluwer, Dordrecht
    • Vila, T., Greenstadt, R., Moinar, D.: Why we can't be bothered to read privacy policies. In: Economics of Information Security, pp. 143-154. Kluwer, Dordrecht (2004)
    • (2004) Economics of Information Security , pp. 143-154
    • Vila, T.1    Greenstadt, R.2    Moinar, D.3
  • 43
    • 33645241822 scopus 로고    scopus 로고
    • Efficient Confidentiality for Privacy, Security, and Confidential Business Information. Brookings-Wharton
    • Papers on Financial Services Brookings
    • Swire, P.: Efficient Confidentiality for Privacy, Security, and Confidential Business Information. Brookings-Wharton Papers on Financial Services Brookings (2003)
    • (2003)
    • Swire, P.1
  • 44
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell, K., Gordon, L.A., Loeb, M., Zhou, L.: The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security 11(3), 431-448 (2003)
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.3    Zhou, L.4
  • 49
    • 38149025851 scopus 로고    scopus 로고
    • http://tor.eff.org
  • 50
    • 0346256488 scopus 로고    scopus 로고
    • New chips and keep a tight rein on consumers, even after they buy a product
    • July 4
    • Varian, H.: New chips and keep a tight rein on consumers, even after they buy a product. New York Times (July 4, 2002)
    • (2002) New York Times
    • Varian, H.1
  • 52
    • 33749179451 scopus 로고    scopus 로고
    • Open Source Software Projects as User Innovation Networks
    • Toulouse
    • von Hippel, E.: Open Source Software Projects as User Innovation Networks. Open Source Software Economics (Toulouse) (2002)
    • (2002) Open Source Software Economics
    • von Hippel, E.1
  • 56
    • 76749149151 scopus 로고    scopus 로고
    • The Economics of Spam
    • Cobb, S.: The Economics of Spam. ePrivacy Group (2003), http://www.spamhelp.org/articles/economics_of_spam.pdf
    • (2003) ePrivacy Group
    • Cobb, S.1
  • 59
    • 18144409187 scopus 로고    scopus 로고
    • Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP
    • Akella, A., Seshan, S., Karp, R., Shenker, S., Papadimitriou, C.: Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP. ACM SIGCOMM, 117-130
    • ACM SIGCOMM , pp. 117-130
    • Akella, A.1    Seshan, S.2    Karp, R.3    Shenker, S.4    Papadimitriou, C.5
  • 60
    • 84864657941 scopus 로고    scopus 로고
    • Worst-case equilibria
    • Meinel, C, Tison, S, eds, STACS, 1563, pp, Springer, Heidelberg
    • Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: Meinel, C., Tison, S. (eds.) STACS 99. LNCS, vol. 1563, pp. 387-396. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.99 , pp. 387-396
    • Koutsoupias, E.1    Papadimitriou, C.2
  • 61
    • 0038183237 scopus 로고    scopus 로고
    • How bad is selfish routing?
    • Roughgarden, T., Tardos, E.: How bad is selfish routing? Journal of the ACM 49(2), 236-259 (2002)
    • (2002) Journal of the ACM , vol.49 , Issue.2 , pp. 236-259
    • Roughgarden, T.1    Tardos, E.2
  • 66
  • 67
    • 84943235829 scopus 로고    scopus 로고
    • Pricing via processing or combatting junk mail
    • Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Crypto 92, pp. 139-147.
    • Crypto , vol.92 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 71
    • 0011921476 scopus 로고    scopus 로고
    • Analyzing the economic efficiency of eBay-like online reputation mechanisms
    • Dellarocas, C.: Analyzing the economic efficiency of eBay-like online reputation mechanisms. In: Third ACM Conference on Electronic Commerce (2001)
    • (2001) Third ACM Conference on Electronic Commerce
    • Dellarocas, C.1
  • 73
    • 38149003294 scopus 로고    scopus 로고
    • Improving Information Flow in the Information Security Market
    • Kluwer, Dordrecht
    • Landwehr, C.: Improving Information Flow in the Information Security Market. In: Economics of Information Security, pp. 155-164. Kluwer, Dordrecht (2004)
    • (2004) Economics of Information Security , pp. 155-164
    • Landwehr, C.1
  • 75
    • 38149121792 scopus 로고    scopus 로고
    • European Commission proposal for a Council framework decision on attacks against information systems April 2002
    • European Commission proposal for a Council framework decision on attacks against information systems (April 2002)
  • 76
    • 38149018803 scopus 로고    scopus 로고
    • German Federal Government's Comments on the TCG and NGSCB in the Field of Trusted Computing , at
    • German Federal Government's Comments on the TCG and NGSCB in the Field of Trusted Computing (2004), at http://www.bsi.bund.de/sichere_plattformen/ index.htm
    • (2004)
  • 77
    • 11144344876 scopus 로고    scopus 로고
    • Deworming the Internet
    • Barnes, D.: Deworming the Internet. Texas Law Journal 83(279), 279-329 (2004)
    • (2004) Texas Law Journal , vol.83 , Issue.279 , pp. 279-329
    • Barnes, D.1
  • 80
    • 72249120536 scopus 로고    scopus 로고
    • The Economic Impact of Regulatory Information Disclosure on Information Security Investments, Competition, and Social Welfare
    • Ghose, A., Rajan, U.: The Economic Impact of Regulatory Information Disclosure on Information Security Investments, Competition, and Social Welfare. In: Fifth Workshop on the Economics of Information Security (2006)
    • (2006) Fifth Workshop on the Economics of Information Security
    • Ghose, A.1    Rajan, U.2
  • 84
    • 30344462995 scopus 로고    scopus 로고
    • Economic Consequences of Sharing Security Information
    • Gal-Or, E., Ghose, A.: Economic Consequences of Sharing Security Information. In: Information System Research, pp. 186-208 (2005)
    • (2005) Information System Research , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 85
    • 0345386339 scopus 로고    scopus 로고
    • An Economics Perspective on the Sharing of Information Related to Security Breaches
    • Berkeley, CA, May 16-17
    • Gordon, L.A., Loeb, M., Lucyshyn, W.: An Economics Perspective on the Sharing of Information Related to Security Breaches. In: First Workshop on the Economics of Information Security, Berkeley, CA, May 16-17 2002, pp. 16-17 (2002)
    • (2002) First Workshop on the Economics of Information Security , pp. 16-17
    • Gordon, L.A.1    Loeb, M.2    Lucyshyn, W.3
  • 86
    • 0032686324 scopus 로고    scopus 로고
    • Nisan, N., Ronen, A.: Algorithmic mechanism design (extended abstract). In: STOC '99, pp. 129-140 (1999)
    • Nisan, N., Ronen, A.: Algorithmic mechanism design (extended abstract). In: STOC '99, pp. 129-140 (1999)
  • 87
    • 38149094607 scopus 로고    scopus 로고
    • The communication complexity of efficient allocation problems. Draft
    • March 5
    • Nisan, N., Segal, I.: The communication complexity of efficient allocation problems. Draft. Second version (March 5, 2002)
    • (2002) Second version
    • Nisan, N.1    Segal, I.2
  • 88
    • 0036957186 scopus 로고    scopus 로고
    • Feigenbaum, J., Papadimitriou, C., Sami, R., Shenker, S.: A BGP-based mechanism for lowest-cost routing. In: PODC '02, pp. 173-182 (2002)
    • Feigenbaum, J., Papadimitriou, C., Sami, R., Shenker, S.: A BGP-based mechanism for lowest-cost routing. In: PODC '02, pp. 173-182 (2002)
  • 89
    • 11244261310 scopus 로고    scopus 로고
    • Shneidman, J., Parkes, D.C., Massouli, L.: Faithfulness in internet algorithms. In: PINS '04: Proceedings of the ACM SIGCOMM workshop on Practice and theory of Incentives in Networked Systems (2004)
    • Shneidman, J., Parkes, D.C., Massouli, L.: Faithfulness in internet algorithms. In: PINS '04: Proceedings of the ACM SIGCOMM workshop on Practice and theory of Incentives in Networked Systems (2004)
  • 90
    • 0038718854 scopus 로고    scopus 로고
    • The structure and function of complex networks
    • Newman, M.: The structure and function of complex networks. SIAM Review 45, 167-256
    • SIAM Review , vol.45 , pp. 167-256
    • Newman, M.1
  • 91
    • 84935436950 scopus 로고
    • Social osmosis and patterns of crime
    • Sah, R.: Social osmosis and patterns of crime. Journal of Political Economy 99(6), 1272-1295 (1991)
    • (1991) Journal of Political Economy , vol.99 , Issue.6 , pp. 1272-1295
    • Sah, R.1
  • 92
    • 38149032001 scopus 로고    scopus 로고
    • Who's, who in crime networks? Wanted - The Key Player
    • Working Paper from Research Institute of Industrial Economics
    • Ballester, C., Calvó-Armengol, A., Zenou, Y.: 'Who's, who in crime networks? Wanted - The Key Player, No 617, Working Paper Series from Research Institute of Industrial Economics
    • Series , Issue.617
    • Ballester, C.1    Calvó-Armengol, A.2    Zenou, Y.3
  • 94
    • 33749392771 scopus 로고    scopus 로고
    • The economics of social networks
    • CalTech Division of the Humanities and Social Sciences Working Paper 1237
    • Jackson, M.: The economics of social networks. CalTech Division of the Humanities and Social Sciences Working Paper 1237. In: Proceedings of the 9th World Congress of the Econometric Society CUP (2006)
    • (2006) Proceedings of the 9th World Congress of the Econometric Society CUP
    • Jackson, M.1
  • 96
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • Albert, R., Jeong, H., Barabsi, A.-L.: Error and attack tolerance of complex networks. Nature 406(1), 387-482 (2000)
    • (2000) Nature , vol.406 , Issue.1 , pp. 387-482
    • Albert, R.1    Jeong, H.2    Barabsi, A.-L.3
  • 98
    • 21144457911 scopus 로고    scopus 로고
    • A first-principles approach to understanding the internet's router-level topology
    • Li, L., Alderson, D., Willinger, W., Doyle, J.: A first-principles approach to understanding the internet's router-level topology. In: SIGCOMM 2004, pp. 3-14 (2004)
    • (2004) SIGCOMM 2004 , pp. 3-14
    • Li, L.1    Alderson, D.2    Willinger, W.3    Doyle, J.4
  • 100
    • 38149127722 scopus 로고    scopus 로고
    • Harley, J.: keynote talk, Government UK IT Summit, (May 2007)
    • Harley, J.: keynote talk, Government UK IT Summit, (May 2007)
  • 104
    • 38149028724 scopus 로고    scopus 로고
    • cruel. The Courier-Journal
    • Wolfson, A.: A hoax most cruel. The Courier-Journal (2005)
    • (2005) A hoax most
    • Wolfson, A.1
  • 106
    • 38149101297 scopus 로고    scopus 로고
    • Schneier, B.: The Psychology of Security. In: RSA (2007), at http ://www.schneier.com
    • Schneier, B.: The Psychology of Security. In: RSA (2007), at http ://www.schneier.com
  • 107
    • 38149020960 scopus 로고    scopus 로고
    • If only gay sex caused global warming
    • July 2
    • Gilbert, D.: If only gay sex caused global warming, LA Times (July 2, 2006)
    • (2006) LA Times
    • Gilbert, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.