Skip to main content
Erschienen in:
Buchtitelbild

2009 | OriginalPaper | Buchkapitel

1. Managing Information Risk and the Economics of Security

verfasst von : M. Eric Johnson

Erschienen in: Managing Information Risk and the Economics of Security

Verlag: Springer US

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Information risk and the economics of managing security is a concern of private-sector executives, public policy makers, and citizens. In this introductory chapter, we examine the nature of information risk and security economics from multiple perspectives including chief information security officers of large firms, representatives from the media that cover information security for both technical and mass media publications, and agencies of the government involved in cyber crime investigation and prosecution. We also briefly introduce the major themes covered in the five primary sections of the book.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Many people contributed to this overview by framing panel discussions at WEIS, recording panelist discussions, and directly contributing to related publications. In particular, I thank Jane Applegate of Tuck’s Center for Digital Strategies and Eric Goetz of the I3Pfor their direct contributions to this manuscript. This material is based upon work partially supported by the U.S. Department of Homeland Security under Grant Award Numbers 2006-CS-001-000001 and 2003-TK-TX-0003, under the auspices of the Institute for Information Infrastructure Protection (I3P) and through the Institute for Security Technology Studies (ISTS). The I3P is managed by Dartmouth College. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security, the I3P, ISTS, or Dartmouth College.
 
Literatur
Zurück zum Zitat Acohido, B. and Swartz, J. Zero Day Threat, Steerling Publishing, New York, NY, 2008. Acohido, B. and Swartz, J. Zero Day Threat, Steerling Publishing, New York, NY, 2008.
Zurück zum Zitat Andrijcic, Eand Horowitz, B. “A Macro-Economic Framework for Evaluation of Cyber Security Risks Related to Protection of Intellectual Property,” Risk Analysis, Vol. 26(4), 2006, pp. 907–923.CrossRef Andrijcic, Eand Horowitz, B. “A Macro-Economic Framework for Evaluation of Cyber Security Risks Related to Protection of Intellectual Property,” Risk Analysis, Vol. 26(4), 2006, pp. 907–923.CrossRef
Zurück zum Zitat Anderson, R. Security Engineering, Second Edition, Wiley Publishing Inc, Indianapolis, IN, 2008. Anderson, R. Security Engineering, Second Edition, Wiley Publishing Inc, Indianapolis, IN, 2008.
Zurück zum Zitat Anderson, Rand Moore, T. “The Economics of Information Security,” Science 314(5799) 2006, pp. 610–613.CrossRef Anderson, Rand Moore, T. “The Economics of Information Security,” Science 314(5799) 2006, pp. 610–613.CrossRef
Zurück zum Zitat Camp, J.,Economics of Identity Theft, Springer Science+Business Media, New York, NY, 2007. Camp, J.,Economics of Identity Theft, Springer Science+Business Media, New York, NY, 2007.
Zurück zum Zitat Goetz, E. and Shenoi, S. Critical Infrastructure Protection, Springer Science+Business Media, New York, NY, 2008. Goetz, E. and Shenoi, S. Critical Infrastructure Protection, Springer Science+Business Media, New York, NY, 2008.
Zurück zum Zitat Gordon, L.A. and Loeb, M.P. “Process For Deciding on Information Security Expenditures: Empirical Evidence,” Communications of the ACM, (January), 2006, pp. 121–125. Gordon, L.A. and Loeb, M.P. “Process For Deciding on Information Security Expenditures: Empirical Evidence,” Communications of the ACM, (January), 2006, pp. 121–125.
Zurück zum Zitat Johnson, M.E., Goetz, E., and Pfleeger, S.L. “Security through Information Risk Management,” forthcoming in IEEE Security and Privacy, 2008. Johnson, M.E., Goetz, E., and Pfleeger, S.L. “Security through Information Risk Management,” forthcoming in IEEE Security and Privacy, 2008.
Zurück zum Zitat Johnson, M.E. and Goetz, E. “Embedding Information Security Risk Management into the Extended Enterprise,” IEEE Security and Privacy, 5(3), 2007, pp. 16–24.CrossRef Johnson, M.E. and Goetz, E. “Embedding Information Security Risk Management into the Extended Enterprise,” IEEE Security and Privacy, 5(3), 2007, pp. 16–24.CrossRef
Zurück zum Zitat Jolly, D. “Fraud Costs French Bank $7.1 Billion,” New York Times, 2008. Jolly, D. “Fraud Costs French Bank $7.1 Billion,” New York Times, 2008.
Zurück zum Zitat Kannan, K. and Telang, R. “Market for Software Vulnerabilities? Think Again,” Management Science (51:5), 2005, pp. 726–740.CrossRef Kannan, K. and Telang, R. “Market for Software Vulnerabilities? Think Again,” Management Science (51:5), 2005, pp. 726–740.CrossRef
Zurück zum Zitat Pereira, J., Levitz, J., and Singer-Vine, J. “Some Stores Quiet Over Card Breach,” Wall Street Journal, August 11, 2008, B1. Pereira, J., Levitz, J., and Singer-Vine, J. “Some Stores Quiet Over Card Breach,” Wall Street Journal, August 11, 2008, B1.
Zurück zum Zitat Sidel, R. “Stores Blame Checkout Software for Security Breaches,” Wall Street Journal, January 18, 2007, D1. Sidel, R. “Stores Blame Checkout Software for Security Breaches,” Wall Street Journal, January 18, 2007, D1.
Metadaten
Titel
Managing Information Risk and the Economics of Security
verfasst von
M. Eric Johnson
Copyright-Jahr
2009
Verlag
Springer US
DOI
https://doi.org/10.1007/978-0-387-09762-6_1

Premium Partner