- Full Description
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.
- Table of Contents
Table of Contents
- Introduction and Overview.
- The Iterated Weakest Link
- A Model of Adaptive Security Investment.
- The Price of Uncertainty in Security Games.
- Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy.
- The Policy Maker's Anguish: regulating personal data behaviour between paradoxes and dilemmas.
- The Privacy Jungle: On the Market for Data Protection in Social Networks.
- Valuating Privacy with Option Pricing Theory.
- Security Economics and Critical National Infrastructure.
- Internet Multi
- Homing Problems: Explanations from Economics.
- The Risk of Risk Analysis
- And its relation to the Economics of Insider Threats.
- Competitive Cyber
- Insurance and Internet Security.
- Potential Rating Indicators for Cyberinsurance: An Exploratory Qualitative Study.
- Modeling the economic incentives of DDoS attacks: femtocell case study.
- Modelling the Security Ecosystem
- The Dynamics of (In)Security
Please Login to submit errata.No errata are currently published