Skip to main content
Log in

Economic aspects of information security: An emerging field of research

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

This paper chronicles the development of economics of information security as an academic area of research. It also describes the contributions of the papers in the special section of this issue devoted to the topic.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Notes

  1. The agenda for WEIS 2002 (and links to papers) can be found at: http://www.sims.berkeley.edu:8000/resources/affiliates/workshops/econsecurity/

  2. The agenda for WEIS 2003 (and links to the papers) can be found at: http://www.cpppe.umd.edu/rhsmith3/agenda.htm

  3. The agenda for WEIS 2004 (and links to the papers) can be found at: http://www.dtc.umn.edu/weis2004/agenda.html

  4. The agenda for WEIS 2005 (and links to the papers) can be found at http://infosecon.net/workshop/schedule.php

  5. The agenda for WEIS 2006 (and links to the papers) can be found at: http://weis2006.econinfosec.org/prog.html

  6. The agenda for WEIS 2006 (and links to the papers) can be found at: http://wesii.econinfosec.org/workshop/program.php

References

  • Anderson, R. (2001). Why information security is hard—an economic perspective. In Proceedings of 17th Annual Computer Security Applications Conference, New Orleans, Louisiana.

  • Arora, A., Nandkumar, A., & Telang, R. (2006). Does information security attack frequency increase with vulnerability disclosure?—An empirical analysis. Information Systems Frontiers, 8(5).

  • Camp, L. J., & Lewis, S. (Eds.) (2004). Economics of information security. Boston: Klewer Academic Publishers.

  • Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security, 5(4), 438–457 (November).

    Article  Google Scholar 

  • Gordon, L. A., & Loeb, M. P. (2006). Managing cybersecurity resources: A cost–benefit analysis. New York: McGraw-Hill.

    Google Scholar 

  • Hausken, K. (2006). Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers, 8(5).

  • Poindexter, J. C., Earp, J. B., & Baumer, D. L. (2006). An experimental economics approach toward quantifying online privacy choices. Information Systems Frontiers, 8(5).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lawrence A. Gordon.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gordon, L.A., Loeb, M.P. Economic aspects of information security: An emerging field of research. Inf Syst Front 8, 335–337 (2006). https://doi.org/10.1007/s10796-006-9010-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-006-9010-7

Keywords

Navigation