Economics of Information Security

The economics of information security is an emerging area of study. The economics of information security is cross-disciplinary as much as interdisciplinary. Economics of information security is the explicit combination of primary disciplines. Economics of informations security has the potential to inform security from policy and economics perspectives. Following its now confirmed tradition of cross-disciplinary publication, economics of information security is unified as an intellectual endeavor by a series of workshops. The best from those workshops develops into journal special issues and texts. This works reviews the organization and findings of economics of information security.

[1]  L. J. Camp Pricing Security , 2000 .

[2]  Yacov Y. Haimes,et al.  Are we forgetting the risks of information technology? , 2000, Computer.

[3]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[4]  Lawrence A. Gordon,et al.  Using information security as a response to competitor analysis systems , 2001, CACM.

[5]  L. Camp,et al.  Privacy-Enhancing Technologies for Internet Commerce , 2002 .

[6]  P. Samuelson,et al.  The Law and Economics of Reverse Engineering , 2002 .

[7]  Lawrence A. Gordon,et al.  An Economics Perspective on the Sharing of Information Related to Security Breaches: Concepts and Empirical Evidence , 2002 .

[8]  Ross J. Anderson Cryptography and competition policy: issues with 'trusted computing' , 2003, PODC '03.

[9]  Andrew M. Odlyzko,et al.  Privacy, economics, and price discrimination on the Internet , 2003, ICEC '03.

[10]  A. Arora,et al.  Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis , 2004 .

[11]  Karthik N. Kannan,et al.  An Economic Analysis of Market for Software Vulnerabilities , 2004 .

[12]  A. Ozment,et al.  Bug Auctions: Vulnerability Markets Reconsidered , 2004 .

[13]  Paul F. Syverson,et al.  What Price Privacy? - and why identity theft is about neither identity nor theft , 2004, Economics of Information Security.

[14]  Hal R. Varian,et al.  System Reliability and Free Riding , 2004, Economics of Information Security.

[15]  R. Adkins An Insurance Style Model for Determining the Appropriate Investment Level against Maximum Loss arising from an Information Security Breach , 2004 .

[16]  Michael D. Smith,et al.  Computer security strength and risk: a quantitative approach , 2004 .

[17]  Huseyin Cavusoglu,et al.  Economics of IT Security Management , 2004, Economics of Information Security.

[18]  Mauro Sandrini,et al.  We Want Security but We Hate It - The Foundations of security technoeconomics in the social worldfrom Control to Surveillance , 2004, Economics of Information Security.

[19]  Stephen Lewis,et al.  How Much is Stronger DRM Worth? , 2004, Economics of Information Security.

[20]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[21]  Anindya Ghose,et al.  The Economic Consequences of Sharing Security Information , 2004, Economics of Information Security.

[22]  Stuart E. Schechter Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.

[23]  Rahul Telang,et al.  Optimal Policy for Software Vulnerability Disclosure , 2005 .

[24]  Peter E. Sand The Privacy Value , 2005, WEIS.

[25]  Faking It: Criminal Sanctions and the Cost of Computer Intrusions , 2005, WEIS.

[26]  Lawrence A. Gordon,et al.  Managing Cybersecurity Resources: A Cost-Benefit Analysis , 2005 .

[27]  Michael P. Gallaher,et al.  Could IPv6 Improve Network Security? And, If So, at What Cost? , 2005, WEIS.

[28]  Eytan Adar,et al.  Valuating Privacy , 2005, WEIS.

[29]  Jens Grossklags,et al.  User Choices and Regret: Understanding Users’ Decision Process About Consensually Acquired Spyware , 2006 .

[30]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[31]  Xuxian Jiang,et al.  Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.