Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Amoroso, E. G. (1994), Fundamentals of Computer Security Technology, Prentice-Hall PTR, Upper Saddle River, NJ, 1994.
Aslam, Krsul, and Spafford (1996), “A Taxonomy of Security Vulnerabilities”, Proceedings of the 19th National Information Systems Security Conference, pages 551–560, Baltimore, Maryland, October.
Ayres and Levitt (1998), “Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack”, The Quarterly Journal of Economics, Vol. 113, p 43–77. February.
Coase, R.H. (1960). “The problem of social cost”, Journal of Law and Economics, Vol. 3, pp. 1–44.
President’s Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America’s Infrastructure: The Report of the President’s Commission on Critical Infrastructure Protection, 1997, President’s Commission on Critical Infrastructure Protection, Washington DC.
The Computer Science and Telecommunications Board (1999). Trust in Cyberspace, National Academy Press; Washington, DC.
Department of Defense (1985). Department of Defense Trusted Computer System Evaluation Criteria, National Computer Security Center, Fort George G. Meade, MD.
Farmer (1999). Security Survey of Key Internet Hosts & Various Semi-Relevant Reflection, http://www.fish.com/survey/
Howard, J. (1997). An Analysis Of Security Incidents On The Internet 1989–1995, Ph.D. dissertation, Carnegie Mellon University. Available at http://www.cert.org/research/JHThesis/Start.html.
Landwehr, Bull, McDermott and Choi (1994). “A Taxonomy of Computer Program Security Flaws, with Examples”, ACM Computing Surveys, Vol. 26, Sept. pp. 3–39.
National Bureau of Standards (1977). Federal Information Processing Publication 46: Specifications for the Digital Encryption Standard, United States Government Printing Office; Gaithersburg, MA.
National Institute of Standards and Technology (1994). Federal Information Processing Standards Publications 185: Escrowed Encryption Standard, United States Government Printing Office; Gaithersburg, MA.
National Research Council (1996). Cryptography’s Role in Securing the Information Society, National Academy Press, Washington, DC.
Shapiro, Carl and Hal Varian (1999). Information Rules: A Strategic Guide to the Network Economy, Harvard Business School Press, Boston, MA.
Schmalensee, R., Joskow, L., Ellerman, A.D., Montero, J.P., and Bailey, E. M. (1998). “An Interim Evaluation of Sulfur Dioxide Emissions Trading”, Journal of Economic Perspectives. Vol. 12(3). p 53–68. Summer.
Tygar and Whitten (1996). “WWW Electronic Commerce and Java Trojan Horses”, Second Usenix Electronic Commerce Workshop, Barkeley, CA. Also at http://www.cs.cmu.edu/afs/cs/project/decaf/web/usenix96/main.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
Jean Camp, L., Wolfram, C. (2004). Pricing Security. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_2
Download citation
DOI: https://doi.org/10.1007/1-4020-8090-5_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8089-0
Online ISBN: 978-1-4020-8090-6
eBook Packages: Springer Book Archive