메뉴 건너뛰기




Volumn 9780521872829, Issue , 2007, Pages 633-650

Incentives and information security

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; COMMERCE; COMPUTER SOFTWARE SELECTION AND EVALUATION; DISTRIBUTED COMPUTER SYSTEMS; ECONOMICS; GAME THEORY; NETWORK SECURITY; PUBLIC RISKS; SECURITY OF DATA;

EID: 84926093593     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1017/CBO9780511800481.027     Document Type: Chapter
Times cited : (14)

References (25)
  • 1
    • 85005305538 scopus 로고
    • The market for “lemons”: Quality uncertainty and the market mechanism
    • G.A. Akerlof. The market for “lemons”: Quality uncertainty and the market mechanism. Q. J. Econ., 84(3):488–500, 1970.
    • (1970) Q. J. Econ , vol.84 , Issue.3 , pp. 488-500
    • Akerlof, G.A.1
  • 2
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • R. Albert, H. Jeong, and A.l. Barabási. Error and attack tolerance of complex networks. Nature, 406(1):387–482, 2000.
    • (2000) Nature , vol.406 , Issue.1 , pp. 387-482
    • Albert, R.1    Jeong, H.2    Barabási, A.L.3
  • 3
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • R.J. Anderson. Why cryptosystems fail. Commun. ACM, 37(11):32–40, 1994.
    • (1994) Commun. ACM , vol.37 , Issue.11 , pp. 32-40
    • Anderson, R.J.1
  • 5
    • 84925838576 scopus 로고    scopus 로고
    • Why information security is hard – an economic perspective
    • December, New Orleans, LA
    • R. Anderson. Why information security is hard – an economic perspective. In 17th Annual Computer Security Applications Conf., December 2001. New Orleans, LA.
    • (2001) 17Th Annual Computer Security Applications Conf
    • Anderson, R.1
  • 6
    • 33746613622 scopus 로고    scopus 로고
    • A comparison of market approaches to software vulnerability disclosure
    • LNCS, Springer
    • R. Böhme. A comparison of market approaches to software vulnerability disclosure. In Proc. of ETRICS, LNCS 2995:298–311, Springer, 2006.
    • (2006) Proc. of ETRICS , vol.2995 , pp. 298-311
    • Böhme, R.1
  • 8
    • 37249061695 scopus 로고    scopus 로고
    • Who’s who in crime networks – wanted the key player
    • The Research Institute of Industrial Economics
    • A. Calvó-Armengol, C. Ballester, and Y. Zenou. Who’s who in crime networks – wanted the key player. In IUI Working Paper Series 617, 2004. The Research Institute of Industrial Economics.
    • (2004) IUI Working Paper Series 617
    • Calvó-Armengol, A.1    Ballester, C.2    Zenou, Y.3
  • 10
    • 14744271851 scopus 로고    scopus 로고
    • The economics of resisting censorship
    • G. Danezis and R.J. Anderson. The economics of resisting censorship. IEEE Security & Privacy, 3(1):45–50, 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 45-50
    • Danezis, G.1    Anderson, R.J.2
  • 11
    • 78650383918 scopus 로고    scopus 로고
    • February
    • D. Goodhart. Too diverse? Prospect, February 2004. http://www.guardian.co.uk/race/story/0,11374,1154684,00.html.
    • (2004) Too Diverse? Prospect
    • Goodhart, D.1
  • 13
    • 85020616309 scopus 로고
    • Network externalities, competition, and compatibility
    • June
    • M.L. Katz and C. Shapiro. Network externalities, competition, and compatibility. Amer. Econ. Rev., 75(3):424–440, June 1985.
    • (1985) Amer. Econ. Rev , vol.75 , Issue.3 , pp. 424-440
    • Katz, M.L.1    Shapiro, C.2
  • 14
    • 0037786763 scopus 로고    scopus 로고
    • Interdependent security
    • March–May 2003
    • H. Kunreuther and G. Heal. Interdependent security. J. Risk and Uncertainty, 26(2–3):231–249, March–May 2003.
    • J. Risk and Uncertainty , vol.26 , Issue.2-3 , pp. 231-249
    • Kunreuther, H.1    Heal, G.2
  • 21
    • 84944051648 scopus 로고    scopus 로고
    • How to buy better testing
    • George I. Davida, Yair Frankel, and Owen Rees, editors, LNCS, Springer
    • S.E. Schechter. How to buy better testing. In George I. Davida, Yair Frankel, and Owen Rees, editors, InfraSec, LNCS 2437:73–87. Springer, 2002.
    • (2002) Infrasec , vol.2437 , pp. 73-87
    • Schechter, S.E.1
  • 22
    • 0012254042 scopus 로고
    • The application of network analysis to criminal intelligence: An assessment of the prospects
    • M. Sparrow. The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13:253–274, 1990.
    • (1990) Social Networks , vol.13 , pp. 253-274
    • Sparrow, M.1
  • 23
    • 0344792106 scopus 로고    scopus 로고
    • Managing online security risks
    • June, Available at
    • H. Varian. Managing online security risks. The New York Times, June 2000. Available at: http://www.nytimes.com/library/financial/columns/060100econ-scene.html.
    • (2000) The New York Times
    • Varian, H.1
  • 24
    • 33750482906 scopus 로고    scopus 로고
    • System reliability and free riding
    • L. Jean Camp and Stephen Lewis, editors, Kluwer Academic Publishers
    • H. Varian. System reliability and free riding. In L. Jean Camp and Stephen Lewis, editors, Economics of Information Security, Advances in Information Security, 12:1–15. Kluwer Academic Publishers, 2004.
    • (2004) Economics of Information Security , vol.12 , pp. 1-15
    • Varian, H.1
  • 25
    • 85032409386 scopus 로고    scopus 로고
    • Available at
    • PIN management requirements: PIN entry device security requirements manual, 2004. Available at: http://partnernetwork.visa.com/dv/pin/pdf/Visa_ATM_Security_Requirements.pdf.
    • (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.