Information security economics - and beyond

被引:0
|
作者
Anderson, Ross [1 ]
Moore, Tyler [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB3 0FD, England
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with divergent interests, incentives are becoming as important to dependability as technical design. The now field provides valuable insights not just into 'security' topics such as privacy, bugs, spam, and phishing, but into more general areas such as system dependability (the design of peer-to-peer systems and the optimal balance of effort by programmers and testers), and policy (particularly digital rights management). This research program has been starting to spill over into more general security questions (such as law-enforcement strategy), and into the interface between security and sociology. Most recently it has started to interact with psychology, both through the psychology-and-economics tradition and in response to phishing. The promise of this research program is a novel framework for analyzing information security problems - one that is both principled and effective.
引用
收藏
页码:68 / 91
页数:24
相关论文
共 50 条
  • [31] Back to the Roots: Information Sharing Economics and What We Can Learn for Security
    Boehme, Rainer
    [J]. WISCS'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON INFORMATION SHARING AND COLLABORATIVE SECURITY, 2016, : 1 - 2
  • [32] Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints
    Huang, C. Derrick
    Behara, Ravi S.
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2013, 141 (01) : 255 - 268
  • [33] Persistent information security - Beyond the e-commerce threat model
    Matson, Merv
    Ulieru, Mihaela
    [J]. 2006 ICEC: Eighth International Conference on Electronic Commerce, Proceedings: THE NEW E-COMMERCE: INNOVATIONS FOR CONQUERING CURRENT BARRIERS, OBSTACLES AND LIMITATIONS TO CONDUCTING SUCCESSFUL BUSINESS ON THE INTERNET, 2006, : 271 - 277
  • [34] STORAGE AND USE OF INFORMATION IN AN INTELLIGENCE AND SECURITY CONTEXT-BEYOND 2014
    Patrikeef, Felix
    [J]. SALUS JOURNAL, 2014, (02) : 1 - 1
  • [35] Beyond Transaction Cost Economics: Towards an endogenous theory of Information Technology Outsourcing
    Lacity, Mary C.
    Willcocks, Leslie P.
    Khan, Shaji
    [J]. JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2011, 20 (02): : 139 - 157
  • [36] Economics, Security and Innovation
    Felici, Massimo
    [J]. ECONOMICS OF GRIDS, CLOUDS, SYSTEMS, AND SERVICES (GECON 2014), 2014, 8914 : 3 - 15
  • [37] The Economics of Energy Security
    Metcalf, Gilbert E.
    [J]. ANNUAL REVIEW OF RESOURCE ECONOMICS, VOL 6, 2014, 6 : 155 - 174
  • [38] The Economics Of Cyber Security
    Mills, Peter
    [J]. FORBES, 2013, 192 (09): : 137 - +
  • [39] Economics of Social Security
    Robinson, Joan
    [J]. ECONOMIC JOURNAL, 1942, 52 (206-07): : 241 - 243
  • [40] The Economics of Security Analysis
    Hou, Kewei
    Mo, Haitao
    Xue, Chen
    Zhang, Lu
    [J]. MANAGEMENT SCIENCE, 2024, 70 (01) : 164 - 186