메뉴 건너뛰기




Volumn 6101 LNCS, Issue , 2010, Pages 323-336

Nudge: Intermediaries' role in interdependent network security

Author keywords

Enhancing Trust and Security with End Users; Internet Service Provider Incentives; Security Economics

Indexed keywords

END USERS; INVESTMENT DECISIONS; SECURITY ECONOMICS; TRUST AND SECURITY;

EID: 77954709222     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13869-0_24     Document Type: Conference Paper
Times cited : (21)

References (35)
  • 1
    • 75149142201 scopus 로고    scopus 로고
    • Nudging privacy: The behavioral economics of personal information
    • Acquisti, A.: Nudging privacy: The behavioral economics of personal information. IEEE Security & Privacy 7(6), 82-85 (2009)
    • (2009) IEEE Security & Privacy , vol.7 , Issue.6 , pp. 82-85
    • Acquisti, A.1
  • 2
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision making
    • DOI 10.1109/MSP.2005.22
    • Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1), 26-33 (2005) (Pubitemid 40325579)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 5
  • 6
    • 2342598277 scopus 로고    scopus 로고
    • Computer security impaired by legitimate users
    • Besnard, D., Arief, B.: Computer security impaired by legitimate users. Computers & Security 23(3), 253-264 (2004)
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 253-264
    • Besnard, D.1    Arief, B.2
  • 9
    • 84904818569 scopus 로고    scopus 로고
    • Using early results from the 'spamHINTS' project to estimate an ISP Abuse Team's task
    • Clayton, R.: Using early results from the 'spamHINTS' project to estimate an ISP Abuse Team's task. In: Proc. of CEAS 2006, Mountain View, CA (July 2006)
    • Proc. of CEAS 2006, Mountain View, CA (July 2006)
    • Clayton, R.1
  • 11
    • 70350389209 scopus 로고    scopus 로고
    • Blue versus red: Towards a model of distributed security attacks
    • Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg February
    • Fultz, N., Grossklags, J.: Blue versus red: Towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167-183. Springer, Heidelberg (February 2009)
    • (2009) LNCS , vol.5628 , pp. 167-183
    • Fultz, N.1    Grossklags, J.2
  • 12
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Information Systems Research 16(2), 186-208 (2005)
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 13
    • 77954698536 scopus 로고    scopus 로고
    • Cyber insurance
    • Geers, J., Goobic, J. (eds.): Cyber insurance. The CIP Report 6(3), 1-11 (2007)
    • (2007) The CIP Report , vol.6 , Issue.3 , pp. 1-11
    • Geers, J.1    Goobic, J.2
  • 15
    • 0005542095 scopus 로고    scopus 로고
    • Ten little treasures of game theory and ten intuitive contradictions
    • Goeree, J., Holt, C.: Ten little treasures of game theory and ten intuitive contradictions. American Economic Review 91(5), 1402-1422 (2001) (Pubitemid 33594707)
    • (2001) American Economic Review , vol.91 , Issue.5 , pp. 1402-1422
    • Goeree, J.K.1    Holt, C.A.2
  • 20
    • 34848845794 scopus 로고    scopus 로고
    • Solving coordination failure with "all-or-none" group-level incentives
    • Hamman, J., Rick, S., Weber, R.: Solving coordination failure with "all-or-none" group-level incentives. Experimental Economics 10(3), 285-303 (2007)
    • (2007) Experimental Economics , vol.10 , Issue.3 , pp. 285-303
    • Hamman, J.1    Rick, S.2    Weber, R.3
  • 27
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M.: A conceptual foundation for organizational information security awareness. Information Management & Computer Security 8(1), 31-41 (2000)
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 30
    • 75749141441 scopus 로고    scopus 로고
    • Economics of malware: Security decisions, incentives and externalities
    • May
    • van Eeten, M., Bauer, J.M.: Economics of malware: Security decisions, incentives and externalities. In: STI Working Paper (May 2008)
    • (2008) STI Working Paper
    • Van Eeten, M.1    Bauer, J.M.2
  • 31
    • 0000470297 scopus 로고
    • Tacit coordination games, strategic uncertainty, and coordination failure
    • Van Huyck, J., Battallio, R., Beil, R.: Tacit coordination games, strategic uncertainty, and coordination failure. American Economic Review, 80(1):234-248 (1990)
    • (1990) American Economic Review , vol.80 , Issue.1 , pp. 234-248
    • Van Huyck, J.1    Battallio, R.2    Beil, R.3
  • 32
    • 0344792106 scopus 로고    scopus 로고
    • Managing online security risks
    • June
    • Varian, H.: Managing online security risks. New York Times (June 2000)
    • (2000) New York Times
    • Varian, H.1
  • 33
  • 34
    • 21244475556 scopus 로고    scopus 로고
    • Service level agreements on IP networks
    • Verma, D.: Service level agreements on IP networks. Proceedings of the IEEE 92(9), 1382-1388 (2004)
    • (2004) Proceedings of the IEEE , vol.92 , Issue.9 , pp. 1382-1388
    • Verma, D.1
  • 35
    • 77954702800 scopus 로고    scopus 로고
    • BT abandons Phorm: Not looking good for ad tech
    • July
    • Williams, C.: BT abandons Phorm: Not looking good for ad tech. The Register (July 2009)
    • (2009) The Register
    • Williams, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.