000 -LEADER |
fixed length control field |
03885nam a22005175i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310151109.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100721s2010 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781441969675 |
|
978-1-4419-6967-5 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
264 #1 - |
-- |
Boston, MA : |
-- |
Springer US, |
-- |
2010. |
912 ## - |
-- |
ZDB-2-SCS |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Moore, Tyler. |
Relator term |
editor. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Economics of Information Security and Privacy |
Medium |
[electronic resource] / |
Statement of responsibility, etc |
edited by Tyler Moore, David Pym, Christos Ioannidis. |
250 ## - EDITION STATEMENT |
Edition statement |
1. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XVI, 320p. 100 illus., 50 illus. in color. |
Other physical details |
online resource. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
and Overview -- The Price of Uncertainty in Security Games -- Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the UndergroundEconomy -- Security Economics and Critical National Infrastructure -- Internet Multi-Homing Problems: Explanations from Economics -- Modeling the Security Ecosystem - The Dynamics of (In)Security -- Modeling the Economic Incentives of DDoS Attacks: Femtocell Case Study -- The Privacy Jungle:On the Market for Data Protection in Social Networks -- The Policy Maker's Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas -- Valuating Privacy with Option Pricing Theory -- Optimal Timing of Information Security Investment: A Real Options Approach -- Competitive Cyber-Insurance and Internet Security -- Potential Rating Indicators for Cyberinsurance: An Exploratory Qualitative Study -- The Risk of Risk Analysis And its Relation to the Economics of Insider Threats -- Competition, Speculative Risks, and IT Security Outsourcing. |
520 ## - SUMMARY, ETC. |
Summary, etc |
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Computer network architectures. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Data protection. |
|
Topical term or geographic name as entry element |
Data structures (Computer science). |
|
Topical term or geographic name as entry element |
Economics. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Systems and Data Security. |
|
Topical term or geographic name as entry element |
Economics/Management Science, general. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Data Structures, Cryptology and Information Theory. |
|
Topical term or geographic name as entry element |
Computer Systems Organization and Communication Networks. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Pym, David. |
Relator term |
editor. |
|
Personal name |
Ioannidis, Christos. |
Relator term |
editor. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9781441969668 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-1-4419-6967-5 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |