Skip to main content

2009 | OriginalPaper | Buchkapitel

3. Security Economics and European Policy

verfasst von : Ross Anderson, Rainer Böhme, Richard Clayton, Tyler Moore

Erschienen in: Managing Information Risk and the Economics of Security

Verlag: Springer US

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In September 2007, we were awarded a contract by the European Network and Information Security Agency (ENISA) to investigate failures in the market for secure electronic communications within the European Union, and come up with policy recommendations. In the process, we spoke to a large number of stakeholders, and held a consultative meeting in December 2007 in Brussels to present draft proposals, which established most had wide stakeholder support. The formal outcome of our work was a detailed report, “Security Economics and the Internal Market”, published by ENISA in March 2008. This chapter presents a much abridged version: in it, we present the recommendations we made, along with a summary of our reasoning.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Acquisti, A., Friedman, A., and Telang, R. “Is There a Cost to Privacy Breaches? An Event Study”, in 5th Workshop on the Economics of Information Security (WEIS), Cambridge, United Kingdom, 2006June. Acquisti, A., Friedman, A., and Telang, R. “Is There a Cost to Privacy Breaches? An Event Study”, in 5th Workshop on the Economics of Information Security (WEIS), Cambridge, United Kingdom, 2006June.
Zurück zum Zitat Akerlof, G. “The Market for ‘Lemons’: Quality Uncertainty and the Market Mechanism”. Quart. J. Economics (84), 1970, pp. 488–500.CrossRef Akerlof, G. “The Market for ‘Lemons’: Quality Uncertainty and the Market Mechanism”. Quart. J. Economics (84), 1970, pp. 488–500.CrossRef
Zurück zum Zitat Anderson, R., and Moore, T. “The Economics of Information Security”, Science (314:5799), 2006, pp. 610–613October.CrossRef Anderson, R., and Moore, T. “The Economics of Information Security”, Science (314:5799), 2006, pp. 610–613October.CrossRef
Zurück zum Zitat Arora, A., Krishnan, R., Telang, R., and Yang, Y. “An Empirical Analysis of Vendor Response to DisclosurePolicy”, in 4th WEIS, Cambridge, Massachusetts, 2005June. Arora, A., Krishnan, R., Telang, R., and Yang, Y. “An Empirical Analysis of Vendor Response to DisclosurePolicy”, in 4th WEIS, Cambridge, Massachusetts, 2005June.
Zurück zum Zitat BBC. “Devices Attached to Cash Machines”, BBC News, 15 October 2007.http://news.bbc. co.uk/1/hi/england/cambridgeshire/7044894.stm BBC. “Devices Attached to Cash Machines”, BBC News, 15 October 2007.http://​news.​bbc.​ co.uk/1/hi/england/cambridgeshire/7044894.stm
Zurück zum Zitat Casper, C. “Examining the Feasibility of a Data Collection Framework”, ENISA, February 2008. Casper, C. “Examining the Feasibility of a Data Collection Framework”, ENISA, February 2008.
Zurück zum Zitat Cavusoʇlu, H., Cavusoʇlu, H., and Zhang, J. “Economics of Patch Management”, in 5th WEIS, Cambridge, United Kingdom, 2006June. Cavusoʇlu, H., Cavusoʇlu, H., and Zhang, J. “Economics of Patch Management”, in 5th WEIS, Cambridge, United Kingdom, 2006June.
Zurück zum Zitat Edelman, B. “Spyware: Research, Testing, Legislation, and Suits”, June 2008.http:/www. benedelman.org/spyware/ Edelman, B. “Spyware: Research, Testing, Legislation, and Suits”, June 2008.http:/www. benedelman.org/spyware/
Zurück zum Zitat European Commission. “i2010 Benchmarking Framework”, November 2006.http://ec. europa.eu/information_society/eeurope/i2010/docs/benchmarking/060220_i2010_Benchmarking_Framework_final_nov_2006.doc European Commission. “i2010 Benchmarking Framework”, November 2006.http://​ec.​ europa.eu/information_society/eeurope/i2010/docs/benchmarking/060220_i2010_Benchmarking_Framework_final_nov_2006.doc
Zurück zum Zitat European Economic Community. “Council Directive of 25 July 1985 on the Approximation of the Laws, Regulations and Administrative Provisions of the Member States Concerning Liabilityfor Defective Products (85/374/EEC)”, July 1985. European Economic Community. “Council Directive of 25 July 1985 on the Approximation of the Laws, Regulations and Administrative Provisions of the Member States Concerning Liabilityfor Defective Products (85/374/EEC)”, July 1985.
Zurück zum Zitat House of Lords Science and Technology Committee. Personal Internet Security, 5th Report of 2006—07, The Stationery Office, London, August 2007. House of Lords Science and Technology Committee. Personal Internet Security, 5th Report of 2006—07, The Stationery Office, London, August 2007.
Zurück zum Zitat D’Ignazio, A., and Giovannetti, E. “Spatial Dispersion of Peering Clusters in the European Internet”, Cambridge Working Papers in Economics 0601, January 2006.http:// econpapers.repec.org/paper/camcamdae/0601.htm D’Ignazio, A., and Giovannetti, E. “Spatial Dispersion of Peering Clusters in the European Internet”, Cambridge Working Papers in Economics 0601, January 2006.http:// econpapers.repec.org/paper/camcamdae/0601.htm
Zurück zum Zitat Jakobsson, M., and Ramzan Z. Crimeware: Understanding New Attacks and Defenses, Addison Wesley, Upper Saddle River, New Jersey, 2008. Jakobsson, M., and Ramzan Z. Crimeware: Understanding New Attacks and Defenses, Addison Wesley, Upper Saddle River, New Jersey, 2008.
Zurück zum Zitat Moore, T., and Clayton, R. “Examining the Impact of Website Take-down on Phishing” in 2nd Anti-Phishing Working Group eCrime Researcher’s Summit (APWG eCrime), Pittsburgh, Pennsylvania, October 2007, pp. 1—13. Moore, T., and Clayton, R. “Examining the Impact of Website Take-down on Phishing” in 2nd Anti-Phishing Working Group eCrime Researcher’s Summit (APWG eCrime), Pittsburgh, Pennsylvania, October 2007, pp. 1—13.
Zurück zum Zitat Serjantov, A., and Clayton, R. “Modelling Incentives for E-mail Blocking Strategies”, in 4th WEIS, Cambridge, Massachusetts, 2005June. Serjantov, A., and Clayton, R. “Modelling Incentives for E-mail Blocking Strategies”, in 4th WEIS, Cambridge, Massachusetts, 2005June.
Zurück zum Zitat Shapiro, C., and Varian, H. Information Rules. A Strategic Guide to the Network Economy, Harvard Business School Press, Boston, Massachusetts, 1999. Shapiro, C., and Varian, H. Information Rules. A Strategic Guide to the Network Economy, Harvard Business School Press, Boston, Massachusetts, 1999.
Zurück zum Zitat Symantec. “Internet Security Threat Report Volume XII”, September 2007. http://www. symantec. com/business/theme.jsp?themeid=threatreport Symantec. “Internet Security Threat Report Volume XII”, September 2007. http://​www.​ symantec. com/business/theme.jsp?themeid=threatreport
Zurück zum Zitat Zetter, K. “Router Flaw is a Ticking Bomb”, Wired, 1 August 2005. http://www.wired. com/politics/security/news/2005/08/68365 Zetter, K. “Router Flaw is a Ticking Bomb”, Wired, 1 August 2005. http://​www.​wired.​ com/politics/security/news/2005/08/68365
Metadaten
Titel
Security Economics and European Policy
verfasst von
Ross Anderson
Rainer Böhme
Richard Clayton
Tyler Moore
Copyright-Jahr
2009
Verlag
Springer US
DOI
https://doi.org/10.1007/978-0-387-09762-6_3

Premium Partner