//]]>

Economics of Information Security and Privacy (Record no. 21027)

000 -LEADER
fixed length control field 03885nam a22005175i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310151109.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100721s2010 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781441969675
978-1-4419-6967-5
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
264 #1 -
-- Boston, MA :
-- Springer US,
-- 2010.
912 ## -
-- ZDB-2-SCS
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Moore, Tyler.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Economics of Information Security and Privacy
Medium [electronic resource] /
Statement of responsibility, etc edited by Tyler Moore, David Pym, Christos Ioannidis.
250 ## - EDITION STATEMENT
Edition statement 1.
300 ## - PHYSICAL DESCRIPTION
Extent XVI, 320p. 100 illus., 50 illus. in color.
Other physical details online resource.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note and Overview -- The Price of Uncertainty in Security Games -- Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the UndergroundEconomy -- Security Economics and Critical National Infrastructure -- Internet Multi-Homing Problems: Explanations from Economics -- Modeling the Security Ecosystem - The Dynamics of (In)Security -- Modeling the Economic Incentives of DDoS Attacks: Femtocell Case Study -- The Privacy Jungle:On the Market for Data Protection in Social Networks -- The Policy Maker's Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas -- Valuating Privacy with Option Pricing Theory -- Optimal Timing of Information Security Investment: A Real Options Approach -- Competitive Cyber-Insurance and Internet Security -- Potential Rating Indicators for Cyberinsurance: An Exploratory Qualitative Study -- The Risk of Risk Analysis And its Relation to the Economics of Insider Threats -- Competition, Speculative Risks, and IT Security Outsourcing.
520 ## - SUMMARY, ETC.
Summary, etc The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Computer network architectures.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Data protection.
Topical term or geographic name as entry element Data structures (Computer science).
Topical term or geographic name as entry element Economics.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Systems and Data Security.
Topical term or geographic name as entry element Economics/Management Science, general.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Data Structures, Cryptology and Information Theory.
Topical term or geographic name as entry element Computer Systems Organization and Communication Networks.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Pym, David.
Relator term editor.
Personal name Ioannidis, Christos.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781441969668
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4419-6967-5
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-08AUM Main Library2014-04-08 2014-04-08 E-Book   AUM Main Library005.8

Languages: 
English |
العربية