Author: L. Jean Camp
Publisher: Springer Science & Business Media
ISBN: 1402080891
Category : Business & Economics
Languages : en
Pages : 300
Book Description
Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.
Economics of Information Security
Author: L. Jean Camp
Publisher: Springer Science & Business Media
ISBN: 1402080891
Category : Business & Economics
Languages : en
Pages : 300
Book Description
Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.
Publisher: Springer Science & Business Media
ISBN: 1402080891
Category : Business & Economics
Languages : en
Pages : 300
Book Description
Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.
The Economics of Information Security and Privacy
Author: Rainer Böhme
Publisher: Springer Science & Business Media
ISBN: 3642394981
Category : Computers
Languages : en
Pages : 327
Book Description
In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy, and, more recently, cybercrime, all studied from an interdisciplinary angle by combining methods from microeconomics, econometrics, qualitative social sciences, behavioral sciences, and experimental economics. This book is structured in four parts, reflecting the main areas: management of information security, economics of information security, economics of privacy, and economics of cybercrime. Each individual contribution documents, discusses, and advances the state of the art concerning its specific research questions. It will be of value to academics and practitioners in the related fields.
Publisher: Springer Science & Business Media
ISBN: 3642394981
Category : Computers
Languages : en
Pages : 327
Book Description
In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy, and, more recently, cybercrime, all studied from an interdisciplinary angle by combining methods from microeconomics, econometrics, qualitative social sciences, behavioral sciences, and experimental economics. This book is structured in four parts, reflecting the main areas: management of information security, economics of information security, economics of privacy, and economics of cybercrime. Each individual contribution documents, discusses, and advances the state of the art concerning its specific research questions. It will be of value to academics and practitioners in the related fields.
The Law and Economics of Cybersecurity
Author: Mark F. Grady
Publisher: Cambridge University Press
ISBN: 9780521855273
Category : Business & Economics
Languages : en
Pages : 328
Book Description
Cybersecurity is an increasing problem for which the market may fail to produce a solution. The ultimate source is that computer owners lack adequate incentives to invest in security because they bear fully the costs of their security precautions but share the benefits with their network partners. In a world of positive transaction costs, individuals often select less than optimal security levels. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition of nations. This book brings together the views of leading law and economics scholars on the nature of the cybersecurity problem and possible solutions to it. Many of these solutions are market based, but they need some help, either from government or industry groups or both. Indeed, the cybersecurity problem prefigures a host of 21st century problems created by information technology and the globalization of markets.
Publisher: Cambridge University Press
ISBN: 9780521855273
Category : Business & Economics
Languages : en
Pages : 328
Book Description
Cybersecurity is an increasing problem for which the market may fail to produce a solution. The ultimate source is that computer owners lack adequate incentives to invest in security because they bear fully the costs of their security precautions but share the benefits with their network partners. In a world of positive transaction costs, individuals often select less than optimal security levels. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition of nations. This book brings together the views of leading law and economics scholars on the nature of the cybersecurity problem and possible solutions to it. Many of these solutions are market based, but they need some help, either from government or industry groups or both. Indeed, the cybersecurity problem prefigures a host of 21st century problems created by information technology and the globalization of markets.
Blackhatonomics
Author: Will Gragido
Publisher: Newnes
ISBN: 1597499765
Category : Computers
Languages : en
Pages : 213
Book Description
Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare. Written by an exceptional author team of Will Gragido, Daniel J Molina, John Pirc and Nick Selby, Blackhatonomics takes practical academic principles and backs them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal. - Historical perspectives of the development of malware as it evolved into a viable economic endeavour - Country specific cyber-crime analysis of the United States, China, and Russia, as well as an analysis of the impact of Globalization on cyber-crime - Presents the behind the scenes methods used to successfully execute financially motivated attacks in a globalized cybercrime economy - Provides unique insights, analysis, and useful tools for justifying corporate information security budgets - Provides multiple points of view, from pure research, to corporate, to academic, to law enforcement - Includes real world cybercrime case studies and profiles of high-profile cybercriminals
Publisher: Newnes
ISBN: 1597499765
Category : Computers
Languages : en
Pages : 213
Book Description
Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare. Written by an exceptional author team of Will Gragido, Daniel J Molina, John Pirc and Nick Selby, Blackhatonomics takes practical academic principles and backs them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal. - Historical perspectives of the development of malware as it evolved into a viable economic endeavour - Country specific cyber-crime analysis of the United States, China, and Russia, as well as an analysis of the impact of Globalization on cyber-crime - Presents the behind the scenes methods used to successfully execute financially motivated attacks in a globalized cybercrime economy - Provides unique insights, analysis, and useful tools for justifying corporate information security budgets - Provides multiple points of view, from pure research, to corporate, to academic, to law enforcement - Includes real world cybercrime case studies and profiles of high-profile cybercriminals
The Economics of Energy Security
Author: Douglas R. Bohi
Publisher: Springer Science & Business Media
ISBN: 9400918089
Category : Business & Economics
Languages : en
Pages : 155
Book Description
his volume brings together and expands on research on the subject of energy T security externalities that we have conducted over a twenty-year period. We were motivated to bring this work together by the lack of a comprehensive analysis of the issues involved that was conveniently located in a single document, by the desire to focus that disparate body of research on the assessment of energy security externalities for policy purposes, and by the continuing concern of researchers and policymakers regarding the issues involved. Many misconceptions about energy security continue to persist in spite of a large body of research to the contrary, and we hope that this volume will help to dispel them. Most of our original research was funded by either the U.S. Department of Energy or Resources for the Future (RFF), and all of it was conducted while we served as staff members of RFF. To these institutions, and to the many individuals who commented on our original work, we wish to express our sincere gratitude. We also wish to express our appreciation to our colleague Margaret Walls for her sub stantial contribution to Chapter 7 on transportation policy.
Publisher: Springer Science & Business Media
ISBN: 9400918089
Category : Business & Economics
Languages : en
Pages : 155
Book Description
his volume brings together and expands on research on the subject of energy T security externalities that we have conducted over a twenty-year period. We were motivated to bring this work together by the lack of a comprehensive analysis of the issues involved that was conveniently located in a single document, by the desire to focus that disparate body of research on the assessment of energy security externalities for policy purposes, and by the continuing concern of researchers and policymakers regarding the issues involved. Many misconceptions about energy security continue to persist in spite of a large body of research to the contrary, and we hope that this volume will help to dispel them. Most of our original research was funded by either the U.S. Department of Energy or Resources for the Future (RFF), and all of it was conducted while we served as staff members of RFF. To these institutions, and to the many individuals who commented on our original work, we wish to express our sincere gratitude. We also wish to express our appreciation to our colleague Margaret Walls for her sub stantial contribution to Chapter 7 on transportation policy.
Critical Infrastructure Protection
Author: E. Goetz
Publisher: Springer
ISBN: 0387754628
Category : Computers
Languages : en
Pages : 394
Book Description
The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. This book contains a selection of 27 edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection.
Publisher: Springer
ISBN: 0387754628
Category : Computers
Languages : en
Pages : 394
Book Description
The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. This book contains a selection of 27 edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection.
You'll See This Message When It Is Too Late
Author: Josephine Wolff
Publisher: MIT Press
ISBN: 026234954X
Category : Computers
Languages : en
Pages : 335
Book Description
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks—financial gain, espionage, and public humiliation of the victims—that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
Publisher: MIT Press
ISBN: 026234954X
Category : Computers
Languages : en
Pages : 335
Book Description
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks—financial gain, espionage, and public humiliation of the victims—that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
Information Economics
Author: Urs Birchler
Publisher: Routledge
ISBN: 1134190581
Category : Business & Economics
Languages : en
Pages : 487
Book Description
This new text book by Urs Birchler and Monika Butler is an introduction to the study of how information affects economic relations. The authors provide a narrative treatment of the more formal concepts of Information Economics, using easy to understand and lively illustrations from film and literature and nutshell examples. The book first covers the economics of information in a 'man versus nature' context, explaining basic concepts like rational updating or the value of information. Then in a 'man versus man' setting, Birchler and Butler describe strategic issues in the use of information: the make-buy-or-copy decision, the working and failure of markets and the important role of outguessing each other in a macroeconomic context. It closes with a 'man versus himself' perspective, focusing on information management within the individual. This book also comes with a supporting website (www.alicebob.info), maintained by the authors.
Publisher: Routledge
ISBN: 1134190581
Category : Business & Economics
Languages : en
Pages : 487
Book Description
This new text book by Urs Birchler and Monika Butler is an introduction to the study of how information affects economic relations. The authors provide a narrative treatment of the more formal concepts of Information Economics, using easy to understand and lively illustrations from film and literature and nutshell examples. The book first covers the economics of information in a 'man versus nature' context, explaining basic concepts like rational updating or the value of information. Then in a 'man versus man' setting, Birchler and Butler describe strategic issues in the use of information: the make-buy-or-copy decision, the working and failure of markets and the important role of outguessing each other in a macroeconomic context. It closes with a 'man versus himself' perspective, focusing on information management within the individual. This book also comes with a supporting website (www.alicebob.info), maintained by the authors.
Managing Risk and Information Security
Author: Malcolm Harkins
Publisher: Apress
ISBN: 143025114X
Category : Computers
Languages : en
Pages : 145
Book Description
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think. Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO. Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world.” Dave Cullinane, CISSP CEO Security Starfish, LLC “In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices.” Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University “Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University “Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives. It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this.” Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy “Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders. It equips organizations with the knowledge required to transform their security programs from a “culture of no” to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer.” Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA “For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book? It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today.” John Stewart, Chief Security Officer, Cisco “This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business. This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster. The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional.” Steven Proctor, VP, Audit & Risk Management, Flextronics
Publisher: Apress
ISBN: 143025114X
Category : Computers
Languages : en
Pages : 145
Book Description
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think. Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO. Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world.” Dave Cullinane, CISSP CEO Security Starfish, LLC “In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices.” Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University “Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University “Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives. It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this.” Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy “Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders. It equips organizations with the knowledge required to transform their security programs from a “culture of no” to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer.” Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA “For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book? It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today.” John Stewart, Chief Security Officer, Cisco “This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business. This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster. The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional.” Steven Proctor, VP, Audit & Risk Management, Flextronics
The economics of information
Author: Przemysław Deszczyński
Publisher: Wydawnictwo Poznańskiego Towarzystwa Przyjaciół Nauk
ISBN: 8376544896
Category : Business & Economics
Languages : en
Pages : 152
Book Description
The economics of information. Theory and practice is an English-language version of the monograph Ekonomia informacji written in September 2019 and published at the beginning of 2020. The idea of translating it into English was born after posting the texts on Research-Gate. Then requests to make it available in English appeared. Rapid changes that have taken place in the world economy over the past year caused some authors to consider it necessary to include them in their texts. Therefore, the update of the texts have been provided, mainly in the context of consequences of the pandemic, but also concerning the entry of Brexit into the next phase. Attention was paid not only to the theoretical but most of all to the practical dimension of information economics. Moreover, the comments that appeared in reviews published in scientific journals, including those concerning the structure of work, have been taken into account. The monograph consists of eight chapters. Each of them was written by a different author. In the first chapter, the conceptualization of the term ‘economics of information’ was presented. It covers the genesis of information economics, an original definition and methodological foundations. It is a starting point and supporting structure of the entire book. The authors of the remaining chapters refer to and comply with the adopted convention of analysis presented by the research editor. The second chapter is devoted to the economics of information in internal communication in the era of social media. It constitutes a sort of bridge between information economics and public relations narrowed down to internal communication. Jacek Trębecki refers to the relationship between behavioral economics and classical economics. He emphasizes that the consequence of information asymmetry may be its influence on distortion of decisions. Chapter three by Waldemar Rydzak – Changes in Access to Information in Crisis Situations – as intended by the author, is to be a starting point for a discussion about the role of information in the contemporary market, which is more and more frequently discussed in the context of the fourth digital wave of development, with significant influence of mass media and the Internet, also in the context of the COVID-related situation. In the fourth chapter, Filip Kaczmarek used the assumptions of counterfactual analysis in his considerations, and on the basis of its results he showed that the so-called opportunity costs, or ‘cost of non-Europe’, are used as an instrument of legitimizing the European Union. In chapter five by Aleksandra Rabczun, Brexit and the Economics of Information, the Brexit case was analyzed in the context of the role played by information economics in this process. Chapter six, written by Izabela Janicka, is an example of using the concept of economics of information to analyze one country, in this case Germany. It was also assumed that both macro and micro aspects are taken into account. The author points to the overriding role of information in the post-industrial economy and to the fact that information has become one of the basic production factors. She also introduces the concept of a functional information minimum and an information gap. In the seventh chapter Marcin Leszczyński defines the role of the state’s reputation in reducing information asymmetry in the global market. The chapter ends with the analysis of policy and diplomacy in shaping trust in a government and the demand for products from a given country on the example of the trade war between the US and China. In the eighth chapter, Information, Welfare and Migrations – Practical Remarks in the Context of the Economics of Information, Katarzyna Świerczyńska fitted into the scope of research on the impact of information on economy and economic decisions of entities at the mega-economic level.
Publisher: Wydawnictwo Poznańskiego Towarzystwa Przyjaciół Nauk
ISBN: 8376544896
Category : Business & Economics
Languages : en
Pages : 152
Book Description
The economics of information. Theory and practice is an English-language version of the monograph Ekonomia informacji written in September 2019 and published at the beginning of 2020. The idea of translating it into English was born after posting the texts on Research-Gate. Then requests to make it available in English appeared. Rapid changes that have taken place in the world economy over the past year caused some authors to consider it necessary to include them in their texts. Therefore, the update of the texts have been provided, mainly in the context of consequences of the pandemic, but also concerning the entry of Brexit into the next phase. Attention was paid not only to the theoretical but most of all to the practical dimension of information economics. Moreover, the comments that appeared in reviews published in scientific journals, including those concerning the structure of work, have been taken into account. The monograph consists of eight chapters. Each of them was written by a different author. In the first chapter, the conceptualization of the term ‘economics of information’ was presented. It covers the genesis of information economics, an original definition and methodological foundations. It is a starting point and supporting structure of the entire book. The authors of the remaining chapters refer to and comply with the adopted convention of analysis presented by the research editor. The second chapter is devoted to the economics of information in internal communication in the era of social media. It constitutes a sort of bridge between information economics and public relations narrowed down to internal communication. Jacek Trębecki refers to the relationship between behavioral economics and classical economics. He emphasizes that the consequence of information asymmetry may be its influence on distortion of decisions. Chapter three by Waldemar Rydzak – Changes in Access to Information in Crisis Situations – as intended by the author, is to be a starting point for a discussion about the role of information in the contemporary market, which is more and more frequently discussed in the context of the fourth digital wave of development, with significant influence of mass media and the Internet, also in the context of the COVID-related situation. In the fourth chapter, Filip Kaczmarek used the assumptions of counterfactual analysis in his considerations, and on the basis of its results he showed that the so-called opportunity costs, or ‘cost of non-Europe’, are used as an instrument of legitimizing the European Union. In chapter five by Aleksandra Rabczun, Brexit and the Economics of Information, the Brexit case was analyzed in the context of the role played by information economics in this process. Chapter six, written by Izabela Janicka, is an example of using the concept of economics of information to analyze one country, in this case Germany. It was also assumed that both macro and micro aspects are taken into account. The author points to the overriding role of information in the post-industrial economy and to the fact that information has become one of the basic production factors. She also introduces the concept of a functional information minimum and an information gap. In the seventh chapter Marcin Leszczyński defines the role of the state’s reputation in reducing information asymmetry in the global market. The chapter ends with the analysis of policy and diplomacy in shaping trust in a government and the demand for products from a given country on the example of the trade war between the US and China. In the eighth chapter, Information, Welfare and Migrations – Practical Remarks in the Context of the Economics of Information, Katarzyna Świerczyńska fitted into the scope of research on the impact of information on economy and economic decisions of entities at the mega-economic level.