Economics of Information Security and Privacy III

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Schneier, Bruce (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New York, NY [u.a.] Springer 2013
Schlagworte:
Online-Zugang:BTU01
FHA01
FHM01
FHN01
FKE01
UBG01
UBR01
UBT01
UBW01
UER01
UPA01
Volltext
Inhaltsverzeichnis
Abstract
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000 c 4500
001 BV040512201
003 DE-604
005 20130711
007 cr|uuu---uuuuu
008 121030s2013 |||| o||u| ||||||eng d
020 |a 9781461419815  |c Online  |9 978-1-461-41981-5 
024 7 |a 10.1007/978-1-4614-1981-5  |2 doi 
035 |a (OCoLC)812051662 
035 |a (DE-599)GBV728218755 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-473  |a DE-M347  |a DE-20  |a DE-703  |a DE-Aug4  |a DE-92  |a DE-29  |a DE-859  |a DE-634  |a DE-739  |a DE-355 
050 0 |a QA76.9.A25 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
100 1 |a Schneier, Bruce  |e Verfasser  |4 aut 
245 1 0 |a Economics of Information Security and Privacy III  |c Bruce Schneier (ed.) 
264 1 |a New York, NY [u.a.]  |b Springer  |c 2013 
300 |a X, 283 S.  |b graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
776 0 8 |i Erscheint auch als  |n Druckausgabe  |z 978-1-461-41980-8 
856 4 0 |u https://doi.org/10.1007/978-1-4614-1981-5  |x Verlag  |3 Volltext 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025358719&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025358719&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA  |3 Abstract 
912 |a ZDB-2-SCS 
999 |a oai:aleph.bib-bvb.de:BVB01-025358719 
966 e |u https://doi.org/10.1007/978-1-4614-1981-5  |l BTU01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-1981-5  |l FHA01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-1981-5  |l FHM01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-1981-5  |l FHN01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-1981-5  |l FKE01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-1981-5  |l UBG01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-1981-5  |l UBR01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-1981-5  |l UBT01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-1981-5  |l UBW01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-1981-5  |l UER01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-1981-5  |l UPA01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-UBG_katkey 2911832
_version_ 1811360017269391360
adam_text ECONOMICS OF INFORMATION SECURITY AND PRIVACY III / : 2013 TABLE OF CONTENTS / INHALTSVERZEICHNIS THE IMPACT OF IMMEDIATE DISCLOSURE ON ATTACK DIFFUSION AND VOLUME WHERE DO ALL THE ATTACKS GO? SEX, LIES AND CYBER-CRIME SURVEYS THE UNDERGROUND ECONOMY OF FAKE ANTIVIRUS SOFTWARE THE INCONVENIENT TRUTH ABOUT WEB CERTIFICATES RESILIENCE OF THE INTERNET INTERCONNECTION ECOSYSTEM MODELING INTERNET-SCALE POLICIES FOR CLEANING UP MALWARE FIXED COSTS, INVESTMENT RIGIDITIES, AND RISK AVERSION IN INFORMATION SECURITY ARE HOME INTERNET USERS WILLING TO PAY ISPS FOR IMPROVEMENTS IN CYBER SECURITY? ECONOMIC METHODS AND DECISION MAKING BY SECURITY PROFESSIONALS REAL NAME VERIFICATION LAW ON THE INTERNET: A POISON OR CURE FOR PRIVACY THE PRIVACY LANDSCAPE: PRODUCT DIFFERENTIATION ON DATA COLLECTION DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. ECONOMICS OF INFORMATION SECURITY AND PRIVACY III / : 2013 ABSTRACT / INHALTSTEXT THE WORKSHOP ON THE ECONOMICS OF INFORMATION SECURITY (WEIS) IS THE LEADING FORUM FOR INTERDISCIPLINARY SCHOLARSHIP ON INFORMATION SECURITY, COMBINING EXPERTISE FROM THE FIELDS OF ECONOMICS, SOCIAL SCIENCE, BUSINESS, LAW, POLICY AND COMPUTER SCIENCE. PRIOR WORKSHOPS HAVE EXPLORED THE ROLE OF INCENTIVES BETWEEN ATTACKERS AND DEFENDERS, IDENTIFIED MARKET FAILURES DOGGING INTERNET SECURITY, AND ASSESSED INVESTMENTS IN CYBER-DEFENSE. CURRENT CONTRIBUTIONS BUILD ON PAST EFFORTS USING EMPIRICAL AND ANALYTIC TOOLS TO NOT ONLY UNDERSTAND THREATS, BUT ALSO STRENGTHEN SECURITY THROUGH NOVEL EVALUATIONS OF AVAILABLE SOLUTIONS. ECONOMICS OF INFORMATION SECURITY AND PRIVACY III ADDRESSES THE FOLLOWING QUESTIONS: HOW SHOULD INFORMATION RISK BE MODELED GIVEN THE CONSTRAINTS OF RARE INCIDENCE AND HIGH INTERDEPENDENCE; HOW DO INDIVIDUALS AND ORGANIZATIONS PERCEPTIONS OF PRIVACY AND SECURITY COLOR THEIR DECISION MAKING; HOW CAN WE MOVE TOWARDS A MORE SECURE INFORMATION INFRASTRUCTURE AND CODE BASE WHILE ACCOUNTING FOR THE INCENTIVES OF STAKEHOLDERS? DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
any_adam_object 1
author Schneier, Bruce
author_facet Schneier, Bruce
author_role aut
author_sort Schneier, Bruce
author_variant b s bs
building Verbundindex
bvnumber BV040512201
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
classification_rvk ST 277
collection ZDB-2-SCS
ctrlnum (OCoLC)812051662
(DE-599)GBV728218755
discipline Informatik
doi_str_mv 10.1007/978-1-4614-1981-5
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02808nmm a2200517 c 4500</leader><controlfield tag="001">BV040512201</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130711 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">121030s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461419815</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-461-41981-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4614-1981-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)812051662</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV728218755</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schneier, Bruce</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Economics of Information Security and Privacy III</subfield><subfield code="c">Bruce Schneier (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 283 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-461-41980-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=025358719&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=025358719&amp;sequence=000003&amp;line_number=0002&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025358719</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1981-5</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV040512201
illustrated Not Illustrated
indexdate 2024-09-27T16:26:41Z
institution BVB
isbn 9781461419815
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-025358719
oclc_num 812051662
open_access_boolean
owner DE-473
DE-BY-UBG
DE-M347
DE-20
DE-703
DE-Aug4
DE-92
DE-29
DE-859
DE-634
DE-739
DE-355
DE-BY-UBR
owner_facet DE-473
DE-BY-UBG
DE-M347
DE-20
DE-703
DE-Aug4
DE-92
DE-29
DE-859
DE-634
DE-739
DE-355
DE-BY-UBR
physical X, 283 S. graph. Darst.
psigel ZDB-2-SCS
publishDate 2013
publishDateSearch 2013
publishDateSort 2013
publisher Springer
record_format marc
spellingShingle Schneier, Bruce
Economics of Information Security and Privacy III
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4274324-2
title Economics of Information Security and Privacy III
title_auth Economics of Information Security and Privacy III
title_exact_search Economics of Information Security and Privacy III
title_full Economics of Information Security and Privacy III Bruce Schneier (ed.)
title_fullStr Economics of Information Security and Privacy III Bruce Schneier (ed.)
title_full_unstemmed Economics of Information Security and Privacy III Bruce Schneier (ed.)
title_short Economics of Information Security and Privacy III
title_sort economics of information security and privacy iii
topic Computersicherheit (DE-588)4274324-2 gnd
topic_facet Computersicherheit
url https://doi.org/10.1007/978-1-4614-1981-5
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025358719&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025358719&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT schneierbruce economicsofinformationsecurityandprivacyiii