Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Adam Smith is to Blame for that user Authentication Failure: The ‘Economics of Security’ Effect on the Security and Usability of IT Systems
2015 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Information Security and Microeconomics are at first view two separate disciplines. But as Ross Anderson at the University of Cambridge first showed, the two can work seamlessly together to improve the protection of digital data. In this thesis the work of Anderson and his colleagues on encountering information security not with a mere technical approach but from a microeconomics perspective will be reviewed and analyzed. It will be revealed that information asymmetries, externalities, moral hazard effects and lack of proper incentive strategies can heavily affect information security. Having this as a basis, information security will be extended to the notion of the public good and it will be showed that information security almost always is about the public and not the private. The problems of enforcing the security in information will be examined and a way of managing information security as a public commodity will be proposed having at its epicentre the idea of uniformity. Finally, two case studies in information security will be deployed and analyzed according to the theory of microeconomics and it will be shown that flaws in the security and usability of IT systems can be anticipated if the role of microeconomics in information security is acknowledged ex ante.

Place, publisher, year, edition, pages
2015. , 57 p.
Keyword [en]
Technology, Information security, Microeconomics, Asymmetric information, Externalities, Uniformity, Incentives
Keyword [sv]
Teknik
Identifiers
URN: urn:nbn:se:ltu:diva-45176Local ID: 2e78d216-9bf5-492f-92e3-0b6b9156ce71OAI: oai:DiVA.org:ltu-45176DiVA: diva2:1018460
Subject / course
Student thesis, at least 30 credits
Educational program
Information Security, master's level
Examiners
Note
Validerat; 20150626 (global_studentproject_submitter)Available from: 2016-10-04 Created: 2016-10-04Bibliographically approved

Open Access in DiVA

fulltext(807 kB)47 downloads
File information
File name FULLTEXT02.pdfFile size 807 kBChecksum SHA-512
dd791735c8715d3149e49755fda52c8a5483f646d6e09d7110a28720214b957f0481c560793cf8e30fba1316bf91bcc8b2a2571f1b11d68af03a809d628f6fb7
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Vasilopoulos, Konstantinos

Search outside of DiVA

GoogleGoogle Scholar
Total: 47 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 6023 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf