메뉴 건너뛰기




Volumn 367, Issue 1898, 2009, Pages 2717-2727

Information security: Where computer science, economics and psychology meet

Author keywords

Economics; Incentives; Information security; Psychology

Indexed keywords

COMPUTER SCIENCE; CRYPTOGRAPHY; MACHINE DESIGN; NETWORK PROTOCOLS; RESEARCH; USABILITY ENGINEERING;

EID: 67650283950     PISSN: 1364503X     EISSN: None     Source Type: Journal    
DOI: 10.1098/rsta.2009.0027     Document Type: Article
Times cited : (64)

References (40)
  • 2
    • 85005305538 scopus 로고
    • The market for'lemons': Quality uncertainty and the market mechanism
    • (doi:10.2307/1879431)
    • Akerlof, G. A. 1970 The market for 'lemons': quality uncertainty and the market mechanism. Q. J. Econ. 84, 488-500. (doi:10.2307/1879431)
    • (1970) Q. J. Econ. , vol.84 , pp. 488-500
    • Akerlof, G.A.1
  • 3
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • DOI 10.1038/35019019
    • Albert, R., Jeong, H. & Barabási, A.-L. 2000 Error and attack tolerance of complex networks. Nature 406, 378-382. (doi:10.1038/ 35019019) (Pubitemid 30625551)
    • (2000) Nature , vol.406 , Issue.6794 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabasi, A.-L.3
  • 4
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • (doi:10.1145/188280. 188291)
    • Anderson, R. J. 1994 Why cryptosystems fail. Commun. ACM 37, 32-40. (doi:10.1145/188280. 188291)
    • (1994) Commun. ACM , vol.37 , pp. 32-40
    • Anderson, R.J.1
  • 5
    • 84925838576 scopus 로고    scopus 로고
    • Why information security is hard-an economic perspective
    • New Orleans, LA, 11-14 December
    • Anderson, R. J. 2001 Why information security is hard-an economic perspective. In Proc. Seventeenth Annual Computer Security Applications Conf., New Orleans, LA, 11-14 December, 2001, pp. 358-365.
    • (2001) Proc. Seventeenth Annual Computer Security Applications Conf. , pp. 358-365
    • Anderson, R.J.1
  • 6
    • 67650336988 scopus 로고    scopus 로고
    • Open and closed source systems are equivalent (that is, in an ideal world)
    • Cambridge, MA: MIT Press
    • Anderson, R. J. 2005 Open and closed source systems are equivalent (that is, in an ideal world). In Perspectives on free and open source software, pp. 127-142. Cambridge, MA: MIT Press.
    • (2005) Perspectives on free and open source software , pp. 127-142
    • Anderson, R.J.1
  • 10
    • 0037423840 scopus 로고    scopus 로고
    • Genesis of suicide terrorism
    • DOI 10.1126/science.1078854
    • Atran, S. 2003 Genesis of suicide terrorism. Science 299, 1534-1539. (doi:10.1126/science.1078854) (Pubitemid 36297695)
    • (2003) Science , vol.299 , Issue.5612 , pp. 1534-1539
    • Atran, S.1
  • 11
    • 0040679785 scopus 로고    scopus 로고
    • Measuring positive externalities from unobservable victim precaution: An empirical analysis of Lojack
    • (doi:10.1162/003355398555522)
    • Ayres, I. & Levitt, S. 1997 Measuring positive externalities from unobservable victim precaution: an empirical analysis of Lojack. Q. J. Econ. 113, 43-77. (doi:10.1162/003355398555522)
    • (1997) Q. J. Econ. , vol.113 , pp. 43-77
    • Ayres, I.1    Levitt, S.2
  • 15
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell, K., Gordon, L. A., Loeb, M. P. & Zhou, L. 2003 The economic cost of publicly announced information security breaches: empirical evidence from the stock market. J. Comput. Secur. 11, 431.
    • (2003) J. Comput. Secur. , vol.11 , pp. 431
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 16
    • 14744271851 scopus 로고    scopus 로고
    • The economics of resisting censorship
    • DOI 10.1109/MSP.2005.29
    • Danezis, G. & Anderson, R. 2005 The economics of resisting censorship. IEEE Security Privacy 3, 45-50. (doi:10.1109/MSP.2005.29) (Pubitemid 40325582)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 45-50
    • Danezis, G.1    Anderson, R.2
  • 18
    • 38149020960 scopus 로고    scopus 로고
    • If only gay sex caused global warming
    • 2 July
    • Gilbert, D. 2006 If only gay sex caused global warming. Los Angeles Times 2 July 2006.
    • (2006) Los Angeles Times
    • Gilbert, D.1
  • 19
    • 15844371695 scopus 로고    scopus 로고
    • Too diverse?
    • Goodhart, D. 2004 Too diverse? Prospect. See http://www.guardian.co.uk/ race/story/ 0,11374,1154684,00.html.
    • (2004) Prospect
    • Goodhart, D.1
  • 22
    • 85020616309 scopus 로고
    • Network externalities, competition, and compatibility
    • Katz, M. L. & Shapiro, C. 1985 Network externalities, competition, and compatibility. Am. Econ. Rev. 75, 424-440.
    • (1985) Am. Econ. Rev. , vol.75 , pp. 424-440
    • Katz, M.L.1    Shapiro, C.2
  • 23
    • 0037786763 scopus 로고    scopus 로고
    • Interdependent security
    • (doi:10. 1023/A:1024119208153)
    • Kunreuther, H. & Heal, G. 2003 Interdependent security. J. Risk Uncertain. 26, 231-249. (doi:10. 1023/A:1024119208153)
    • (2003) J. Risk Uncertain , vol.26 , pp. 231-249
    • Kunreuther, H.1    Heal, G.2
  • 29
    • 0038718854 scopus 로고    scopus 로고
    • The structure and function of complex networks
    • (doi:10.1137/S003614450342480)
    • Newman, M. E. J. 2003 The structure and function of complex networks. SIAM Rev. 45, 167-256. (doi:10.1137/S003614450342480)
    • (2003) SIAM Rev. , vol.45 , pp. 167-256
    • Newman, M.E.J.1
  • 30
    • 1142268161 scopus 로고    scopus 로고
    • Privacy, economics and price discrimination on the Internet
    • New York, NY: ACM Press
    • Odlyzko, A. M. O. 2003 Privacy, economics and price discrimination on the Internet. In Fifth Int. Conf. Electronic Commerce, pp. 355-366. New York, NY: ACM Press.
    • (2003) Fifth Int. Conf. Electronic Commerce , pp. 355-366
    • Odlyzko, A.M.O.1
  • 31
    • 67650336989 scopus 로고    scopus 로고
    • The likelihood of vulnerability rediscovery and the social utility of vulnerability hunting
    • Cambridge, MA, 2-3 June
    • Ozment, A. 2005 The likelihood of vulnerability rediscovery and the social utility of vulnerability hunting. In Proc. Fourth Workshop on the Economics of Information Security, Cambridge, MA, 2-3 June 2005.
    • (2005) Proc. Fourth Workshop on the Economics of Information Security
    • Ozment, A.1
  • 33
    • 84877999984 scopus 로고    scopus 로고
    • Milk or wine: Does software security improve with age?
    • Vancouver, BC, 31 July-4 August
    • Ozment, A. & Schechter S. E. 2006b Milk or wine: does software security improve with age? In Proc. Fifteenth USENIX Security Symposium, Vancouver, BC, 31 July-4 August 2006, pp. 93-104.
    • (2006) Proc Fifteenth USENIX Security Symposium , pp. 93-104
    • Ozment, A.1    Schechter, S.E.2
  • 37
    • 33750482906 scopus 로고    scopus 로고
    • System reliability and free riding
    • (eds L. J. Camp & S. Lewis), Dordrecht, The Netherlands: Kluwer
    • Varian, H. 2004 System reliability and free riding. In Economics of information security (eds L. J. Camp & S. Lewis), pp. 1-15. Dordrecht, The Netherlands: Kluwer.
    • (2004) Economics of information security , pp. 1-15
    • Varian, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.