The economic costs and implications of high-technology hardware theft /:
This report presents the results of a study undertaken at the request of the American Electronics Association and a consortium of high-tech industries. Based on a nine-month survey of 95 firms, representing approximately 40 percent of the sales volume for the computer, semiconductor, hard disk drive...
Gespeichert in:
1. Verfasser: | |
---|---|
Körperschaften: | , , |
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA :
Rand,
1999.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This report presents the results of a study undertaken at the request of the American Electronics Association and a consortium of high-tech industries. Based on a nine-month survey of 95 firms, representing approximately 40 percent of the sales volume for the computer, semiconductor, hard disk drive, and cellular telephone industries, the authors estimate that direct costs of hardware theft are almost $250 million. Indirect costs (such as lost sales and expensive theft-reduction strategies) and industry losses could push total losses past $5 billion. Industry and consumers share the price of high-tech losses, but firms do not always have the economic incentive to invest in appropriate security measures. Since 1996, hardware theft has declined significantly, and recent security measures adopted by individual firms appear to be very cost-effective. The authors recommend more such investments and suggest that the largest payoff will come from anticipating what products are most vulnerable and devising targeted procedures to protect them. In addition, they recommend strengthening collaborative industry-law enforcement efforts to help track the threat, anticipate targets, and identify and disable stolen property. -- Provided by publisher. |
Beschreibung: | "Prepared for the International Electronics Security Group and the American Electronics Association." "Science and Techology [sic] Program." |
Beschreibung: | 1 online resource (xxi, 63 pages) : illustrations |
Bibliographie: | Includes bibliographical references (pages 61-63). |
ISBN: | 0585247676 9780585247670 0833043404 9780833043405 9780833027276 0833027271 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm44962912 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 000807s1999 caua obs 000 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCL |d OCLCQ |d OCLCG |d OCLCQ |d AXJ |d E7B |d OCLCQ |d TUU |d OCLCQ |d TNF |d YDXCP |d FVL |d DKDLA |d OCLCQ |d NLGGC |d OCLCO |d OCLCQ |d EBLCP |d OCLCQ |d AZK |d OCLCQ |d AGLDB |d MOR |d PLS |d PIFBR |d ZCU |d MERUC |d OCLCQ |d SAV |d OCLCQ |d QT7 |d U3W |d LUE |d STF |d WRM |d VNS |d OCLCQ |d VTS |d NRAMU |d ICG |d OCLCQ |d INT |d VT2 |d TOF |d OCLCQ |d AU@ |d WYU |d DKC |d OCLCQ |d JZ6 |d OCLCQ |d HF9 |d CHBRC |d INARC |d BOL |d VLY |d AJS |d HS0 |d TUHNV |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d OCLCL | ||
019 | |a 191925675 |a 263594553 |a 532633890 |a 649214950 |a 649801142 |a 722748730 |a 728049360 |a 756508877 |a 760289608 |a 961622267 |a 962710489 |a 988404332 |a 992108280 |a 1007391861 |a 1037927471 |a 1038558931 |a 1045468518 |a 1049757146 |a 1052961045 |a 1055333586 |a 1058780474 |a 1063953624 |a 1081291347 |a 1114483079 |a 1135420133 |a 1162270876 |a 1227629910 |a 1228567563 |a 1243603257 |a 1259221349 | ||
020 | |a 0585247676 |q (electronic bk.) | ||
020 | |a 9780585247670 |q (electronic bk.) | ||
020 | |a 0833043404 | ||
020 | |a 9780833043405 | ||
020 | |a 9780833027276 | ||
020 | |a 0833027271 | ||
020 | |z 0833027271 | ||
035 | |a (OCoLC)44962912 |z (OCoLC)191925675 |z (OCoLC)263594553 |z (OCoLC)532633890 |z (OCoLC)649214950 |z (OCoLC)649801142 |z (OCoLC)722748730 |z (OCoLC)728049360 |z (OCoLC)756508877 |z (OCoLC)760289608 |z (OCoLC)961622267 |z (OCoLC)962710489 |z (OCoLC)988404332 |z (OCoLC)992108280 |z (OCoLC)1007391861 |z (OCoLC)1037927471 |z (OCoLC)1038558931 |z (OCoLC)1045468518 |z (OCoLC)1049757146 |z (OCoLC)1052961045 |z (OCoLC)1055333586 |z (OCoLC)1058780474 |z (OCoLC)1063953624 |z (OCoLC)1081291347 |z (OCoLC)1114483079 |z (OCoLC)1135420133 |z (OCoLC)1162270876 |z (OCoLC)1227629910 |z (OCoLC)1228567563 |z (OCoLC)1243603257 |z (OCoLC)1259221349 | ||
050 | 4 | |a HV6773 |b .D47 1999eb | |
072 | 7 | |a TRU |x 005000 |2 bisacsh | |
082 | 7 | |a 364.168 |2 21 | |
049 | |a MAIN | ||
100 | 1 | |a Dertouzos, James N., |d 1950- |1 https://id.oclc.org/worldcat/entity/E39PCjDRyYp9xqRF8gX9WcJfVP |0 http://id.loc.gov/authorities/names/n82100965 | |
245 | 1 | 4 | |a The economic costs and implications of high-technology hardware theft / |c James N. Dertouzos, Eric V. Larson, Patricia A. Ebener. |
260 | |a Santa Monica, CA : |b Rand, |c 1999. | ||
300 | |a 1 online resource (xxi, 63 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
340 | |g polychrome. |2 rdacc |0 http://rdaregistry.info/termList/RDAColourContent/1003 | ||
347 | |a text file |2 rdaft |0 http://rdaregistry.info/termList/fileType/1002 | ||
500 | |a "Prepared for the International Electronics Security Group and the American Electronics Association." | ||
500 | |a "Science and Techology [sic] Program." | ||
504 | |a Includes bibliographical references (pages 61-63). | ||
520 | |a This report presents the results of a study undertaken at the request of the American Electronics Association and a consortium of high-tech industries. Based on a nine-month survey of 95 firms, representing approximately 40 percent of the sales volume for the computer, semiconductor, hard disk drive, and cellular telephone industries, the authors estimate that direct costs of hardware theft are almost $250 million. Indirect costs (such as lost sales and expensive theft-reduction strategies) and industry losses could push total losses past $5 billion. Industry and consumers share the price of high-tech losses, but firms do not always have the economic incentive to invest in appropriate security measures. Since 1996, hardware theft has declined significantly, and recent security measures adopted by individual firms appear to be very cost-effective. The authors recommend more such investments and suggest that the largest payoff will come from anticipating what products are most vulnerable and devising targeted procedures to protect them. In addition, they recommend strengthening collaborative industry-law enforcement efforts to help track the threat, anticipate targets, and identify and disable stolen property. -- Provided by publisher. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a ""PREFACE""; ""FIGURES""; ""TABLES""; ""EXECUTIVE SUMMARY""; ""OVERVIEW""; ""STUDY METHODS""; ""SUMMARY OF FINDINGS Direct Costs of Hardware Theft Are Almost 250 Million""; ""Magnitude of Indirect Losses Exceeds That of Direct Losses by a Factor Greater Than Five""; ""Industry Losses Include Cost of Thefts from Business Customers""; ""Total Losses Could Exceed 5 Billion""; ""Industry and Customers Share the Price of High-Tech Losses""; ""Firms Don�t Have the Correct Incentives to Invest in Security Measures""; ""There Has Been a Significant Decline in Hardware Theft"" | |
505 | 8 | |a POLICY IMPLICATIONS FOR FIRMS, INDUSTRY, AND THE PUBLIC SECTORACKNOWLEDGMENTS -- ACRONYMS -- INTRODUCTION -- BACKGROUND -- THE MANY DIMENSIONS OF HIGH-TECH HARDWARE THEFT -- METHOD -- ORGANIZATION OF THIS REPORT -- THE DIRECT COSTS OF HIGH-TECH HARDWARE THEFT -- ESTIMATE OF INDUSTRY DIRECT LOSSES -- KEY PATTERNS IN THE LOSS DATA -- Losses by Value -- Losses by Product Category -- Thefts by Incident Scenario -- Geographic Patterns -- Location of Thefts -- PREDICTING COMPANY LOSS EXPERIENCES -- THE INDIRECT COSTS OF HIGH-TECH HARDWARE THEFT | |
505 | 8 | |a DISPLACED DEMAND, OR LOST SALESSECURITY INVESTMENTS AND INSURANCE -- PRICING INCREASES DUE TO INCREASED COSTS -- EFFECTS ON MANUFACTURERS OF THEFTS FROM FINAL BUSINESS CUSTOMERS -- SIMULATING THE EFFECTS OF INDIRECT COSTS -- SECOND-ORDER EFFECTS OF HARDWARE THEFT -- RETURNS ON SECURITY INVESTMENTS -- SUMMARY OF FINDINGS AND POLICY CONCLUSIONS -- SUMMARY OF FINDINGS -- POLICY CONCLUSIONS Policy Implications for Firms -- Policy Implications for Industry -- Policy Implications for Society | |
505 | 8 | |a OVERVIEW OF THEFT INCIDENT REPORTING SYSTEM (TIRS) AND DATA COLLECTION PROTOCOLSRECRUITMENT, PARTICIPATION, AND VALIDATION -- THE THEFT INCIDENT REPORTING SYSTEM DATA COLLECTION INSTRUMENT -- Incident Report Variables and Codes -- MERCHANDISE REPORT VARIABLES AND CODES -- OPERATIONS -- CASE STUDY PROTOCOL -- MODELS OF THE INDIRECT COSTS OF THEFT -- STATISTICAL ANALYSIS OF LOSS PATTERNS -- BIBLIOGRAPHY | |
546 | |a English. | ||
650 | 0 | |a Computer crimes |x Costs. | |
650 | 0 | |a Data protection |x Costs. | |
650 | 0 | |a High technology industries |x Security measures |x Costs. | |
650 | 6 | |a Criminalité informatique |x Coût. | |
650 | 6 | |a Protection de l'information (Informatique) |x Coût. | |
650 | 6 | |a Industries de pointe |x Sécurité |x Mesures |x Coût. | |
650 | 7 | |a TRUE CRIME |x White Collar Crime. |2 bisacsh | |
700 | 1 | |a Larson, Eric V. |q (Eric Victor), |d 1957- |1 https://id.oclc.org/worldcat/entity/E39PCjtTH4tXjdMHdGfY76T7Md |0 http://id.loc.gov/authorities/names/n92040970 | |
700 | 1 | |a Ebener, Patricia A. |q (Patricia Anne), |d 1949- |1 https://id.oclc.org/worldcat/entity/E39PCjMfq3FqRhwW9d64TYK7jK |0 http://id.loc.gov/authorities/names/n81014247 | |
710 | 2 | |a International Electronics Security Group. |0 http://id.loc.gov/authorities/names/no99032179 | |
710 | 2 | |a American Electronics Association. |0 http://id.loc.gov/authorities/names/n79027381 | |
710 | 2 | |a Rand Corporation. |0 http://id.loc.gov/authorities/names/n78083407 | |
758 | |i has work: |a The economic costs and implications of high-technology hardware theft (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGhFpYTfBXG7bdfptkTTBK |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Dertouzos, James N., 1950- |t Economic costs and implications of high-technology hardware theft. |d Santa Monica, CA : Rand, 1999 |z 0833027271 |w (DLC) 99202909 |w (OCoLC)41272144 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=20463 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL3031473 | ||
938 | |a ebrary |b EBRY |n ebr2002070 | ||
938 | |a EBSCOhost |b EBSC |n 20463 | ||
938 | |a Internet Archive |b INAR |n economiccostsimp0000dert | ||
938 | |a YBP Library Services |b YANK |n 2771218 | ||
938 | |a YBP Library Services |b YANK |n 2316167 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm44962912 |
---|---|
_version_ | 1816881588032503808 |
adam_text | |
any_adam_object | |
author | Dertouzos, James N., 1950- |
author2 | Larson, Eric V. (Eric Victor), 1957- Ebener, Patricia A. (Patricia Anne), 1949- |
author2_role | |
author2_variant | e v l ev evl p a e pa pae |
author_GND | http://id.loc.gov/authorities/names/n82100965 http://id.loc.gov/authorities/names/n92040970 http://id.loc.gov/authorities/names/n81014247 |
author_corporate | International Electronics Security Group American Electronics Association Rand Corporation |
author_corporate_role | |
author_facet | Dertouzos, James N., 1950- Larson, Eric V. (Eric Victor), 1957- Ebener, Patricia A. (Patricia Anne), 1949- International Electronics Security Group American Electronics Association Rand Corporation |
author_role | |
author_sort | Dertouzos, James N., 1950- |
author_variant | j n d jn jnd |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 .D47 1999eb |
callnumber-search | HV6773 .D47 1999eb |
callnumber-sort | HV 46773 D47 41999EB |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | ""PREFACE""; ""FIGURES""; ""TABLES""; ""EXECUTIVE SUMMARY""; ""OVERVIEW""; ""STUDY METHODS""; ""SUMMARY OF FINDINGS Direct Costs of Hardware Theft Are Almost 250 Million""; ""Magnitude of Indirect Losses Exceeds That of Direct Losses by a Factor Greater Than Five""; ""Industry Losses Include Cost of Thefts from Business Customers""; ""Total Losses Could Exceed 5 Billion""; ""Industry and Customers Share the Price of High-Tech Losses""; ""Firms Don�t Have the Correct Incentives to Invest in Security Measures""; ""There Has Been a Significant Decline in Hardware Theft"" POLICY IMPLICATIONS FOR FIRMS, INDUSTRY, AND THE PUBLIC SECTORACKNOWLEDGMENTS -- ACRONYMS -- INTRODUCTION -- BACKGROUND -- THE MANY DIMENSIONS OF HIGH-TECH HARDWARE THEFT -- METHOD -- ORGANIZATION OF THIS REPORT -- THE DIRECT COSTS OF HIGH-TECH HARDWARE THEFT -- ESTIMATE OF INDUSTRY DIRECT LOSSES -- KEY PATTERNS IN THE LOSS DATA -- Losses by Value -- Losses by Product Category -- Thefts by Incident Scenario -- Geographic Patterns -- Location of Thefts -- PREDICTING COMPANY LOSS EXPERIENCES -- THE INDIRECT COSTS OF HIGH-TECH HARDWARE THEFT DISPLACED DEMAND, OR LOST SALESSECURITY INVESTMENTS AND INSURANCE -- PRICING INCREASES DUE TO INCREASED COSTS -- EFFECTS ON MANUFACTURERS OF THEFTS FROM FINAL BUSINESS CUSTOMERS -- SIMULATING THE EFFECTS OF INDIRECT COSTS -- SECOND-ORDER EFFECTS OF HARDWARE THEFT -- RETURNS ON SECURITY INVESTMENTS -- SUMMARY OF FINDINGS AND POLICY CONCLUSIONS -- SUMMARY OF FINDINGS -- POLICY CONCLUSIONS Policy Implications for Firms -- Policy Implications for Industry -- Policy Implications for Society OVERVIEW OF THEFT INCIDENT REPORTING SYSTEM (TIRS) AND DATA COLLECTION PROTOCOLSRECRUITMENT, PARTICIPATION, AND VALIDATION -- THE THEFT INCIDENT REPORTING SYSTEM DATA COLLECTION INSTRUMENT -- Incident Report Variables and Codes -- MERCHANDISE REPORT VARIABLES AND CODES -- OPERATIONS -- CASE STUDY PROTOCOL -- MODELS OF THE INDIRECT COSTS OF THEFT -- STATISTICAL ANALYSIS OF LOSS PATTERNS -- BIBLIOGRAPHY |
ctrlnum | (OCoLC)44962912 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08195cam a2200769 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm44962912 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">000807s1999 caua obs 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AXJ</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TNF</subfield><subfield code="d">YDXCP</subfield><subfield code="d">FVL</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PLS</subfield><subfield code="d">PIFBR</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QT7</subfield><subfield code="d">U3W</subfield><subfield code="d">LUE</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VNS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">TOF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">WYU</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JZ6</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HF9</subfield><subfield code="d">CHBRC</subfield><subfield code="d">INARC</subfield><subfield code="d">BOL</subfield><subfield code="d">VLY</subfield><subfield code="d">AJS</subfield><subfield code="d">HS0</subfield><subfield code="d">TUHNV</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">191925675</subfield><subfield code="a">263594553</subfield><subfield code="a">532633890</subfield><subfield code="a">649214950</subfield><subfield code="a">649801142</subfield><subfield code="a">722748730</subfield><subfield code="a">728049360</subfield><subfield code="a">756508877</subfield><subfield code="a">760289608</subfield><subfield code="a">961622267</subfield><subfield code="a">962710489</subfield><subfield code="a">988404332</subfield><subfield code="a">992108280</subfield><subfield code="a">1007391861</subfield><subfield code="a">1037927471</subfield><subfield code="a">1038558931</subfield><subfield code="a">1045468518</subfield><subfield code="a">1049757146</subfield><subfield code="a">1052961045</subfield><subfield code="a">1055333586</subfield><subfield code="a">1058780474</subfield><subfield code="a">1063953624</subfield><subfield code="a">1081291347</subfield><subfield code="a">1114483079</subfield><subfield code="a">1135420133</subfield><subfield code="a">1162270876</subfield><subfield code="a">1227629910</subfield><subfield code="a">1228567563</subfield><subfield code="a">1243603257</subfield><subfield code="a">1259221349</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0585247676</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780585247670</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833043404</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833043405</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833027276</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833027271</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0833027271</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)44962912</subfield><subfield code="z">(OCoLC)191925675</subfield><subfield code="z">(OCoLC)263594553</subfield><subfield code="z">(OCoLC)532633890</subfield><subfield code="z">(OCoLC)649214950</subfield><subfield code="z">(OCoLC)649801142</subfield><subfield code="z">(OCoLC)722748730</subfield><subfield code="z">(OCoLC)728049360</subfield><subfield code="z">(OCoLC)756508877</subfield><subfield code="z">(OCoLC)760289608</subfield><subfield code="z">(OCoLC)961622267</subfield><subfield code="z">(OCoLC)962710489</subfield><subfield code="z">(OCoLC)988404332</subfield><subfield code="z">(OCoLC)992108280</subfield><subfield code="z">(OCoLC)1007391861</subfield><subfield code="z">(OCoLC)1037927471</subfield><subfield code="z">(OCoLC)1038558931</subfield><subfield code="z">(OCoLC)1045468518</subfield><subfield code="z">(OCoLC)1049757146</subfield><subfield code="z">(OCoLC)1052961045</subfield><subfield code="z">(OCoLC)1055333586</subfield><subfield code="z">(OCoLC)1058780474</subfield><subfield code="z">(OCoLC)1063953624</subfield><subfield code="z">(OCoLC)1081291347</subfield><subfield code="z">(OCoLC)1114483079</subfield><subfield code="z">(OCoLC)1135420133</subfield><subfield code="z">(OCoLC)1162270876</subfield><subfield code="z">(OCoLC)1227629910</subfield><subfield code="z">(OCoLC)1228567563</subfield><subfield code="z">(OCoLC)1243603257</subfield><subfield code="z">(OCoLC)1259221349</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773</subfield><subfield code="b">.D47 1999eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TRU</subfield><subfield code="x">005000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dertouzos, James N.,</subfield><subfield code="d">1950-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjDRyYp9xqRF8gX9WcJfVP</subfield><subfield code="0">http://id.loc.gov/authorities/names/n82100965</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The economic costs and implications of high-technology hardware theft /</subfield><subfield code="c">James N. Dertouzos, Eric V. Larson, Patricia A. Ebener.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">Rand,</subfield><subfield code="c">1999.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxi, 63 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="340" ind1=" " ind2=" "><subfield code="g">polychrome.</subfield><subfield code="2">rdacc</subfield><subfield code="0">http://rdaregistry.info/termList/RDAColourContent/1003</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="2">rdaft</subfield><subfield code="0">http://rdaregistry.info/termList/fileType/1002</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Prepared for the International Electronics Security Group and the American Electronics Association."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Science and Techology [sic] Program."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 61-63).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This report presents the results of a study undertaken at the request of the American Electronics Association and a consortium of high-tech industries. Based on a nine-month survey of 95 firms, representing approximately 40 percent of the sales volume for the computer, semiconductor, hard disk drive, and cellular telephone industries, the authors estimate that direct costs of hardware theft are almost $250 million. Indirect costs (such as lost sales and expensive theft-reduction strategies) and industry losses could push total losses past $5 billion. Industry and consumers share the price of high-tech losses, but firms do not always have the economic incentive to invest in appropriate security measures. Since 1996, hardware theft has declined significantly, and recent security measures adopted by individual firms appear to be very cost-effective. The authors recommend more such investments and suggest that the largest payoff will come from anticipating what products are most vulnerable and devising targeted procedures to protect them. In addition, they recommend strengthening collaborative industry-law enforcement efforts to help track the threat, anticipate targets, and identify and disable stolen property. -- Provided by publisher.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">""PREFACE""; ""FIGURES""; ""TABLES""; ""EXECUTIVE SUMMARY""; ""OVERVIEW""; ""STUDY METHODS""; ""SUMMARY OF FINDINGS Direct Costs of Hardware Theft Are Almost 250 Million""; ""Magnitude of Indirect Losses Exceeds That of Direct Losses by a Factor Greater Than Five""; ""Industry Losses Include Cost of Thefts from Business Customers""; ""Total Losses Could Exceed 5 Billion""; ""Industry and Customers Share the Price of High-Tech Losses""; ""Firms Donâ€?t Have the Correct Incentives to Invest in Security Measures""; ""There Has Been a Significant Decline in Hardware Theft""</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">POLICY IMPLICATIONS FOR FIRMS, INDUSTRY, AND THE PUBLIC SECTORACKNOWLEDGMENTS -- ACRONYMS -- INTRODUCTION -- BACKGROUND -- THE MANY DIMENSIONS OF HIGH-TECH HARDWARE THEFT -- METHOD -- ORGANIZATION OF THIS REPORT -- THE DIRECT COSTS OF HIGH-TECH HARDWARE THEFT -- ESTIMATE OF INDUSTRY DIRECT LOSSES -- KEY PATTERNS IN THE LOSS DATA -- Losses by Value -- Losses by Product Category -- Thefts by Incident Scenario -- Geographic Patterns -- Location of Thefts -- PREDICTING COMPANY LOSS EXPERIENCES -- THE INDIRECT COSTS OF HIGH-TECH HARDWARE THEFT</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">DISPLACED DEMAND, OR LOST SALESSECURITY INVESTMENTS AND INSURANCE -- PRICING INCREASES DUE TO INCREASED COSTS -- EFFECTS ON MANUFACTURERS OF THEFTS FROM FINAL BUSINESS CUSTOMERS -- SIMULATING THE EFFECTS OF INDIRECT COSTS -- SECOND-ORDER EFFECTS OF HARDWARE THEFT -- RETURNS ON SECURITY INVESTMENTS -- SUMMARY OF FINDINGS AND POLICY CONCLUSIONS -- SUMMARY OF FINDINGS -- POLICY CONCLUSIONS Policy Implications for Firms -- Policy Implications for Industry -- Policy Implications for Society</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">OVERVIEW OF THEFT INCIDENT REPORTING SYSTEM (TIRS) AND DATA COLLECTION PROTOCOLSRECRUITMENT, PARTICIPATION, AND VALIDATION -- THE THEFT INCIDENT REPORTING SYSTEM DATA COLLECTION INSTRUMENT -- Incident Report Variables and Codes -- MERCHANDISE REPORT VARIABLES AND CODES -- OPERATIONS -- CASE STUDY PROTOCOL -- MODELS OF THE INDIRECT COSTS OF THEFT -- STATISTICAL ANALYSIS OF LOSS PATTERNS -- BIBLIOGRAPHY</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Costs.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Costs.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">High technology industries</subfield><subfield code="x">Security measures</subfield><subfield code="x">Costs.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique</subfield><subfield code="x">Coût.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="x">Coût.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Industries de pointe</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="x">Coût.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME</subfield><subfield code="x">White Collar Crime.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Larson, Eric V.</subfield><subfield code="q">(Eric Victor),</subfield><subfield code="d">1957-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjtTH4tXjdMHdGfY76T7Md</subfield><subfield code="0">http://id.loc.gov/authorities/names/n92040970</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ebener, Patricia A.</subfield><subfield code="q">(Patricia Anne),</subfield><subfield code="d">1949-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjMfq3FqRhwW9d64TYK7jK</subfield><subfield code="0">http://id.loc.gov/authorities/names/n81014247</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Electronics Security Group.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no99032179</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">American Electronics Association.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n79027381</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n78083407</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The economic costs and implications of high-technology hardware theft (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGhFpYTfBXG7bdfptkTTBK</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Dertouzos, James N., 1950-</subfield><subfield code="t">Economic costs and implications of high-technology hardware theft.</subfield><subfield code="d">Santa Monica, CA : Rand, 1999</subfield><subfield code="z">0833027271</subfield><subfield code="w">(DLC) 99202909</subfield><subfield code="w">(OCoLC)41272144</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=20463</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL3031473</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr2002070</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">20463</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">economiccostsimp0000dert</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2771218</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2316167</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm44962912 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:06Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no99032179 http://id.loc.gov/authorities/names/n79027381 http://id.loc.gov/authorities/names/n78083407 |
isbn | 0585247676 9780585247670 0833043404 9780833043405 9780833027276 0833027271 |
language | English |
oclc_num | 44962912 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxi, 63 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 1999 |
publishDateSearch | 1999 |
publishDateSort | 1999 |
publisher | Rand, |
record_format | marc |
spelling | Dertouzos, James N., 1950- https://id.oclc.org/worldcat/entity/E39PCjDRyYp9xqRF8gX9WcJfVP http://id.loc.gov/authorities/names/n82100965 The economic costs and implications of high-technology hardware theft / James N. Dertouzos, Eric V. Larson, Patricia A. Ebener. Santa Monica, CA : Rand, 1999. 1 online resource (xxi, 63 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier polychrome. rdacc http://rdaregistry.info/termList/RDAColourContent/1003 text file rdaft http://rdaregistry.info/termList/fileType/1002 "Prepared for the International Electronics Security Group and the American Electronics Association." "Science and Techology [sic] Program." Includes bibliographical references (pages 61-63). This report presents the results of a study undertaken at the request of the American Electronics Association and a consortium of high-tech industries. Based on a nine-month survey of 95 firms, representing approximately 40 percent of the sales volume for the computer, semiconductor, hard disk drive, and cellular telephone industries, the authors estimate that direct costs of hardware theft are almost $250 million. Indirect costs (such as lost sales and expensive theft-reduction strategies) and industry losses could push total losses past $5 billion. Industry and consumers share the price of high-tech losses, but firms do not always have the economic incentive to invest in appropriate security measures. Since 1996, hardware theft has declined significantly, and recent security measures adopted by individual firms appear to be very cost-effective. The authors recommend more such investments and suggest that the largest payoff will come from anticipating what products are most vulnerable and devising targeted procedures to protect them. In addition, they recommend strengthening collaborative industry-law enforcement efforts to help track the threat, anticipate targets, and identify and disable stolen property. -- Provided by publisher. Print version record. ""PREFACE""; ""FIGURES""; ""TABLES""; ""EXECUTIVE SUMMARY""; ""OVERVIEW""; ""STUDY METHODS""; ""SUMMARY OF FINDINGS Direct Costs of Hardware Theft Are Almost 250 Million""; ""Magnitude of Indirect Losses Exceeds That of Direct Losses by a Factor Greater Than Five""; ""Industry Losses Include Cost of Thefts from Business Customers""; ""Total Losses Could Exceed 5 Billion""; ""Industry and Customers Share the Price of High-Tech Losses""; ""Firms Donâ€?t Have the Correct Incentives to Invest in Security Measures""; ""There Has Been a Significant Decline in Hardware Theft"" POLICY IMPLICATIONS FOR FIRMS, INDUSTRY, AND THE PUBLIC SECTORACKNOWLEDGMENTS -- ACRONYMS -- INTRODUCTION -- BACKGROUND -- THE MANY DIMENSIONS OF HIGH-TECH HARDWARE THEFT -- METHOD -- ORGANIZATION OF THIS REPORT -- THE DIRECT COSTS OF HIGH-TECH HARDWARE THEFT -- ESTIMATE OF INDUSTRY DIRECT LOSSES -- KEY PATTERNS IN THE LOSS DATA -- Losses by Value -- Losses by Product Category -- Thefts by Incident Scenario -- Geographic Patterns -- Location of Thefts -- PREDICTING COMPANY LOSS EXPERIENCES -- THE INDIRECT COSTS OF HIGH-TECH HARDWARE THEFT DISPLACED DEMAND, OR LOST SALESSECURITY INVESTMENTS AND INSURANCE -- PRICING INCREASES DUE TO INCREASED COSTS -- EFFECTS ON MANUFACTURERS OF THEFTS FROM FINAL BUSINESS CUSTOMERS -- SIMULATING THE EFFECTS OF INDIRECT COSTS -- SECOND-ORDER EFFECTS OF HARDWARE THEFT -- RETURNS ON SECURITY INVESTMENTS -- SUMMARY OF FINDINGS AND POLICY CONCLUSIONS -- SUMMARY OF FINDINGS -- POLICY CONCLUSIONS Policy Implications for Firms -- Policy Implications for Industry -- Policy Implications for Society OVERVIEW OF THEFT INCIDENT REPORTING SYSTEM (TIRS) AND DATA COLLECTION PROTOCOLSRECRUITMENT, PARTICIPATION, AND VALIDATION -- THE THEFT INCIDENT REPORTING SYSTEM DATA COLLECTION INSTRUMENT -- Incident Report Variables and Codes -- MERCHANDISE REPORT VARIABLES AND CODES -- OPERATIONS -- CASE STUDY PROTOCOL -- MODELS OF THE INDIRECT COSTS OF THEFT -- STATISTICAL ANALYSIS OF LOSS PATTERNS -- BIBLIOGRAPHY English. Computer crimes Costs. Data protection Costs. High technology industries Security measures Costs. Criminalité informatique Coût. Protection de l'information (Informatique) Coût. Industries de pointe Sécurité Mesures Coût. TRUE CRIME White Collar Crime. bisacsh Larson, Eric V. (Eric Victor), 1957- https://id.oclc.org/worldcat/entity/E39PCjtTH4tXjdMHdGfY76T7Md http://id.loc.gov/authorities/names/n92040970 Ebener, Patricia A. (Patricia Anne), 1949- https://id.oclc.org/worldcat/entity/E39PCjMfq3FqRhwW9d64TYK7jK http://id.loc.gov/authorities/names/n81014247 International Electronics Security Group. http://id.loc.gov/authorities/names/no99032179 American Electronics Association. http://id.loc.gov/authorities/names/n79027381 Rand Corporation. http://id.loc.gov/authorities/names/n78083407 has work: The economic costs and implications of high-technology hardware theft (Text) https://id.oclc.org/worldcat/entity/E39PCGhFpYTfBXG7bdfptkTTBK https://id.oclc.org/worldcat/ontology/hasWork Print version: Dertouzos, James N., 1950- Economic costs and implications of high-technology hardware theft. Santa Monica, CA : Rand, 1999 0833027271 (DLC) 99202909 (OCoLC)41272144 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=20463 Volltext |
spellingShingle | Dertouzos, James N., 1950- The economic costs and implications of high-technology hardware theft / ""PREFACE""; ""FIGURES""; ""TABLES""; ""EXECUTIVE SUMMARY""; ""OVERVIEW""; ""STUDY METHODS""; ""SUMMARY OF FINDINGS Direct Costs of Hardware Theft Are Almost 250 Million""; ""Magnitude of Indirect Losses Exceeds That of Direct Losses by a Factor Greater Than Five""; ""Industry Losses Include Cost of Thefts from Business Customers""; ""Total Losses Could Exceed 5 Billion""; ""Industry and Customers Share the Price of High-Tech Losses""; ""Firms Donâ€?t Have the Correct Incentives to Invest in Security Measures""; ""There Has Been a Significant Decline in Hardware Theft"" POLICY IMPLICATIONS FOR FIRMS, INDUSTRY, AND THE PUBLIC SECTORACKNOWLEDGMENTS -- ACRONYMS -- INTRODUCTION -- BACKGROUND -- THE MANY DIMENSIONS OF HIGH-TECH HARDWARE THEFT -- METHOD -- ORGANIZATION OF THIS REPORT -- THE DIRECT COSTS OF HIGH-TECH HARDWARE THEFT -- ESTIMATE OF INDUSTRY DIRECT LOSSES -- KEY PATTERNS IN THE LOSS DATA -- Losses by Value -- Losses by Product Category -- Thefts by Incident Scenario -- Geographic Patterns -- Location of Thefts -- PREDICTING COMPANY LOSS EXPERIENCES -- THE INDIRECT COSTS OF HIGH-TECH HARDWARE THEFT DISPLACED DEMAND, OR LOST SALESSECURITY INVESTMENTS AND INSURANCE -- PRICING INCREASES DUE TO INCREASED COSTS -- EFFECTS ON MANUFACTURERS OF THEFTS FROM FINAL BUSINESS CUSTOMERS -- SIMULATING THE EFFECTS OF INDIRECT COSTS -- SECOND-ORDER EFFECTS OF HARDWARE THEFT -- RETURNS ON SECURITY INVESTMENTS -- SUMMARY OF FINDINGS AND POLICY CONCLUSIONS -- SUMMARY OF FINDINGS -- POLICY CONCLUSIONS Policy Implications for Firms -- Policy Implications for Industry -- Policy Implications for Society OVERVIEW OF THEFT INCIDENT REPORTING SYSTEM (TIRS) AND DATA COLLECTION PROTOCOLSRECRUITMENT, PARTICIPATION, AND VALIDATION -- THE THEFT INCIDENT REPORTING SYSTEM DATA COLLECTION INSTRUMENT -- Incident Report Variables and Codes -- MERCHANDISE REPORT VARIABLES AND CODES -- OPERATIONS -- CASE STUDY PROTOCOL -- MODELS OF THE INDIRECT COSTS OF THEFT -- STATISTICAL ANALYSIS OF LOSS PATTERNS -- BIBLIOGRAPHY Computer crimes Costs. Data protection Costs. High technology industries Security measures Costs. Criminalité informatique Coût. Protection de l'information (Informatique) Coût. Industries de pointe Sécurité Mesures Coût. TRUE CRIME White Collar Crime. bisacsh |
title | The economic costs and implications of high-technology hardware theft / |
title_auth | The economic costs and implications of high-technology hardware theft / |
title_exact_search | The economic costs and implications of high-technology hardware theft / |
title_full | The economic costs and implications of high-technology hardware theft / James N. Dertouzos, Eric V. Larson, Patricia A. Ebener. |
title_fullStr | The economic costs and implications of high-technology hardware theft / James N. Dertouzos, Eric V. Larson, Patricia A. Ebener. |
title_full_unstemmed | The economic costs and implications of high-technology hardware theft / James N. Dertouzos, Eric V. Larson, Patricia A. Ebener. |
title_short | The economic costs and implications of high-technology hardware theft / |
title_sort | economic costs and implications of high technology hardware theft |
topic | Computer crimes Costs. Data protection Costs. High technology industries Security measures Costs. Criminalité informatique Coût. Protection de l'information (Informatique) Coût. Industries de pointe Sécurité Mesures Coût. TRUE CRIME White Collar Crime. bisacsh |
topic_facet | Computer crimes Costs. Data protection Costs. High technology industries Security measures Costs. Criminalité informatique Coût. Protection de l'information (Informatique) Coût. Industries de pointe Sécurité Mesures Coût. TRUE CRIME White Collar Crime. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=20463 |
work_keys_str_mv | AT dertouzosjamesn theeconomiccostsandimplicationsofhightechnologyhardwaretheft AT larsonericv theeconomiccostsandimplicationsofhightechnologyhardwaretheft AT ebenerpatriciaa theeconomiccostsandimplicationsofhightechnologyhardwaretheft AT internationalelectronicssecuritygroup theeconomiccostsandimplicationsofhightechnologyhardwaretheft AT americanelectronicsassociation theeconomiccostsandimplicationsofhightechnologyhardwaretheft AT randcorporation theeconomiccostsandimplicationsofhightechnologyhardwaretheft AT dertouzosjamesn economiccostsandimplicationsofhightechnologyhardwaretheft AT larsonericv economiccostsandimplicationsofhightechnologyhardwaretheft AT ebenerpatriciaa economiccostsandimplicationsofhightechnologyhardwaretheft AT internationalelectronicssecuritygroup economiccostsandimplicationsofhightechnologyhardwaretheft AT americanelectronicsassociation economiccostsandimplicationsofhightechnologyhardwaretheft AT randcorporation economiccostsandimplicationsofhightechnologyhardwaretheft |