Cyber security: economic strategies and public policy alternatives
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cheltenham [u.a.]
Elgar
2008
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XI, 266 S. graph. Darst. |
ISBN: | 9781847203557 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023025746 | ||
003 | DE-604 | ||
005 | 20080604 | ||
007 | t | ||
008 | 071128s2008 xxkd||| |||| 00||| eng d | ||
010 | |a 2007039429 | ||
020 | |a 9781847203557 |9 978-1-84720-355-7 | ||
035 | |a (OCoLC)173659518 | ||
035 | |a (DE-599)BVBBV023025746 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-355 |a DE-12 |a DE-11 |a DE-188 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
100 | 1 | |a Gallaher, Michael P. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber security |b economic strategies and public policy alternatives |c Michael P. Gallaher ; Albert N. Link ; Brent R. Rowe |
264 | 1 | |a Cheltenham [u.a.] |b Elgar |c 2008 | |
300 | |a XI, 266 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Politik | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Computer security |x Government policy | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Staatsaufsicht |0 (DE-588)4056636-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Staatsaufsicht |0 (DE-588)4056636-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Link, Albert |e Sonstige |4 oth | |
700 | 1 | |a Rowe, Brent R. |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016229712&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016229712&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-016229712 |
Datensatz im Suchindex
_version_ | 1804137247679709184 |
---|---|
adam_text | Contents
List of Figures
vii
List of Tables
ix
Acknowledgments
xi
PART
1 :
TECHNICAL AND ECONOMIC FRAMEWORK
1
1.
The Cyber Security Imperative
3
2.
Cyber Security Trends and Issues
16
3.
Vulnerabilities and Cyber Security Technologies
33
4.
Cyber Security Investment and Implementation Strategies:
Theories
60
5.
Cyber Security Investment and Implementation Strategies:
Empirical Evidence
82
6.
Industry-Specific Cyber Security Investment Decisions
111
7.
Cyber Security as a Public Good: Toward Public Policy
Recommendations
130
PART
2:
PUBLIC POLICY: CASE STUDIES AND
RECOMMENDATIONS
141
8.
Data Encryption Standards
143
9.
Improving Internet Standards
153
10.
Infrastructure for Software Testing
183
11.
Insider Threats and the Case for Role-Based Access Control
211
vi Cyber
Security
12.
Public
Policy Alternatives
246
References
253
Index
263
Cyberspace is the nervous system of today s advanced economies, linking
critical infrastructures across public and private institutions. The authors of
this book comprehensively explore the many issues surrounding this unique
system, including private sector cyber security investment decisions and
implementation strategies, public policy efforts to ensure overall security,
and government s role in the process.
The authors draw primarily on case-based information and focused survey
data to describe and critique the economic strategies and broad technical
approaches that private sector organizations adopt to secure their
information technology infrastructure. Based on an analysis of these
strategies, they propose several public policy responses that go beyond
those that have come from recent policy reports. These responses include
the construction of a national database of reliable and cost-effective
information suitable for benchmarking, and public research and
development support for innovations and infrastructures. The authors
discuss the goal of such efforts: to shift private investments toward more
socially-optimal proactive levels and to develop standards and protocols to
ensure a more effective use of cyber security technologies.
The first systematic analysis of the economics of cyber security, this
insightful book will be of great interest to private and public sector
managers and strategists involved in cyber security, as well as academics
and researchers in the fields of economics, management, information
systems, systems engineering, political science, and public policy.
Michael P. Galiaher is Director of the Technology, Energy and the
Environment Group at RTI International, Albert
N.
Link is Professor
of Economics at the University of North Carolina at Greensboro and
Brent R. Rowe is Research Economist in the Technology, Energy and
the Environment Group at RTI International, USA.
|
adam_txt |
Contents
List of Figures
vii
List of Tables
ix
Acknowledgments
xi
PART
1 :
TECHNICAL AND ECONOMIC FRAMEWORK
1
1.
The Cyber Security Imperative
3
2.
Cyber Security Trends and Issues
16
3.
Vulnerabilities and Cyber Security Technologies
33
4.
Cyber Security Investment and Implementation Strategies:
Theories
60
5.
Cyber Security Investment and Implementation Strategies:
Empirical Evidence
82
6.
Industry-Specific Cyber Security Investment Decisions
111
7.
Cyber Security as a Public Good: Toward Public Policy
Recommendations
130
PART
2:
PUBLIC POLICY: CASE STUDIES AND
RECOMMENDATIONS
141
8.
Data Encryption Standards
143
9.
Improving Internet Standards
153
10.
Infrastructure for Software Testing
183
11.
Insider Threats and the Case for Role-Based Access Control
211
vi Cyber
Security
12.
Public
Policy Alternatives
246
References
253
Index
263
Cyberspace is the nervous system of today's advanced economies, linking
critical infrastructures across public and private institutions. The authors of
this book comprehensively explore the many issues surrounding this unique
system, including private sector cyber security investment decisions and
implementation strategies, public policy efforts to ensure overall security,
and government's role in the process.
The authors draw primarily on case-based information and focused survey
data to describe and critique the economic strategies and broad technical
approaches that private sector organizations adopt to secure their
information technology infrastructure. Based on an analysis of these
strategies, they propose several public policy responses that go beyond
those that have come from recent policy reports. These responses include
the construction of a national database of reliable and cost-effective
information suitable for benchmarking, and public research and
development support for innovations and infrastructures. The authors
discuss the goal of such efforts: to shift private investments toward more
socially-optimal proactive levels and to develop standards and protocols to
ensure a more effective use of cyber security technologies.
The first systematic analysis of the economics of cyber security, this
insightful book will be of great interest to private and public sector
managers and strategists involved in cyber security, as well as academics
and researchers in the fields of economics, management, information
systems, systems engineering, political science, and public policy.
Michael P. Galiaher is Director of the Technology, Energy and the
Environment Group at RTI International, Albert
N.
Link is Professor
of Economics at the University of North Carolina at Greensboro and
Brent R. Rowe is Research Economist in the Technology, Energy and
the Environment Group at RTI International, USA. |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Gallaher, Michael P. |
author_facet | Gallaher, Michael P. |
author_role | aut |
author_sort | Gallaher, Michael P. |
author_variant | m p g mp mpg |
building | Verbundindex |
bvnumber | BV023025746 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | QP 345 |
ctrlnum | (OCoLC)173659518 (DE-599)BVBBV023025746 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02333nam a2200541zc 4500</leader><controlfield tag="001">BV023025746</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080604 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">071128s2008 xxkd||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007039429</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781847203557</subfield><subfield code="9">978-1-84720-355-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)173659518</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023025746</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gallaher, Michael P.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security</subfield><subfield code="b">economic strategies and public policy alternatives</subfield><subfield code="c">Michael P. Gallaher ; Albert N. Link ; Brent R. Rowe</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cheltenham [u.a.]</subfield><subfield code="b">Elgar</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 266 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Government policy</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Staatsaufsicht</subfield><subfield code="0">(DE-588)4056636-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Staatsaufsicht</subfield><subfield code="0">(DE-588)4056636-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Link, Albert</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rowe, Brent R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016229712&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016229712&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016229712</subfield></datafield></record></collection> |
id | DE-604.BV023025746 |
illustrated | Illustrated |
index_date | 2024-07-02T19:14:59Z |
indexdate | 2024-07-09T21:09:16Z |
institution | BVB |
isbn | 9781847203557 |
language | English |
lccn | 2007039429 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016229712 |
oclc_num | 173659518 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-12 DE-11 DE-188 |
owner_facet | DE-355 DE-BY-UBR DE-12 DE-11 DE-188 |
physical | XI, 266 S. graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Elgar |
record_format | marc |
spelling | Gallaher, Michael P. Verfasser aut Cyber security economic strategies and public policy alternatives Michael P. Gallaher ; Albert N. Link ; Brent R. Rowe Cheltenham [u.a.] Elgar 2008 XI, 266 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Politik Unternehmen Computer networks Security measures Business enterprises Computer networks Security measures Computer security Government policy Computersicherheit (DE-588)4274324-2 gnd rswk-swf Staatsaufsicht (DE-588)4056636-5 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Unternehmen (DE-588)4061963-1 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Staatsaufsicht (DE-588)4056636-5 s DE-604 Link, Albert Sonstige oth Rowe, Brent R. Sonstige oth Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016229712&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016229712&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Gallaher, Michael P. Cyber security economic strategies and public policy alternatives Politik Unternehmen Computer networks Security measures Business enterprises Computer networks Security measures Computer security Government policy Computersicherheit (DE-588)4274324-2 gnd Staatsaufsicht (DE-588)4056636-5 gnd Rechnernetz (DE-588)4070085-9 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4056636-5 (DE-588)4070085-9 (DE-588)4061963-1 |
title | Cyber security economic strategies and public policy alternatives |
title_auth | Cyber security economic strategies and public policy alternatives |
title_exact_search | Cyber security economic strategies and public policy alternatives |
title_exact_search_txtP | Cyber security economic strategies and public policy alternatives |
title_full | Cyber security economic strategies and public policy alternatives Michael P. Gallaher ; Albert N. Link ; Brent R. Rowe |
title_fullStr | Cyber security economic strategies and public policy alternatives Michael P. Gallaher ; Albert N. Link ; Brent R. Rowe |
title_full_unstemmed | Cyber security economic strategies and public policy alternatives Michael P. Gallaher ; Albert N. Link ; Brent R. Rowe |
title_short | Cyber security |
title_sort | cyber security economic strategies and public policy alternatives |
title_sub | economic strategies and public policy alternatives |
topic | Politik Unternehmen Computer networks Security measures Business enterprises Computer networks Security measures Computer security Government policy Computersicherheit (DE-588)4274324-2 gnd Staatsaufsicht (DE-588)4056636-5 gnd Rechnernetz (DE-588)4070085-9 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | Politik Unternehmen Computer networks Security measures Business enterprises Computer networks Security measures Computer security Government policy Computersicherheit Staatsaufsicht Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016229712&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016229712&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT gallahermichaelp cybersecurityeconomicstrategiesandpublicpolicyalternatives AT linkalbert cybersecurityeconomicstrategiesandpublicpolicyalternatives AT rowebrentr cybersecurityeconomicstrategiesandpublicpolicyalternatives |