• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

信息安全经济学

The economics of information security.

作者信息

Anderson Ross, Moore Tyler

机构信息

Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK.

出版信息

Science. 2006 Oct 27;314(5799):610-3. doi: 10.1126/science.1130992.

DOI:10.1126/science.1130992
PMID:17068253
Abstract

The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with divergent interests, we find that incentives are becoming as important as technical design in achieving dependability. The new field provides valuable insights not just into "security" topics (such as bugs, spam, phishing, and law enforcement strategy) but into more general areas such as the design of peer-to-peer systems, the optimal balance of effort by programmers and testers, why privacy gets eroded, and the politics of digital rights management.

摘要

信息安全经济学最近已成为一门蓬勃发展且发展迅速的学科。由于分布式系统是由属于不同利益主体的机器组装而成,我们发现激励措施在实现可靠性方面正变得与技术设计同等重要。这个新领域不仅为“安全”主题(如漏洞、垃圾邮件、网络钓鱼和执法策略)提供了有价值的见解,还为更广泛的领域提供了见解,如对等系统的设计、程序员和测试人员的最佳工作量平衡、隐私为何受到侵蚀以及数字版权管理的策略。

相似文献

1
The economics of information security.信息安全经济学
Science. 2006 Oct 27;314(5799):610-3. doi: 10.1126/science.1130992.
2
Information security: where computer science, economics and psychology meet.信息安全:计算机科学、经济学和心理学的交汇点。
Philos Trans A Math Phys Eng Sci. 2009 Jul 13;367(1898):2717-27. doi: 10.1098/rsta.2009.0027.
3
Security and privacy issues of personal health.
Stud Health Technol Inform. 2007;127:288-97.
4
Access and privacy rights using web security standards to increase patient empowerment.利用网络安全标准保障访问和隐私权,增强患者自主权。
Stud Health Technol Inform. 2008;137:275-85.
5
Privacy and security in Pennsylvania: ensuring privacy and security of health information exchange in Pennsylvania.宾夕法尼亚州的隐私与安全:确保宾夕法尼亚州健康信息交换的隐私与安全。
J Healthc Inf Manag. 2009 Spring;23(2):38-44.
6
Formal policies for flexible EHR security.灵活电子健康记录安全的正式政策。
Stud Health Technol Inform. 2006;121:307-16.
7
Threats to information security of real-time disease surveillance systems.实时疾病监测系统的信息安全威胁。
Stud Health Technol Inform. 2009;150:710-4.
8
Social Security cost-of-living adjustments and the Consumer Price Index.社会保障生活成本调整与消费者物价指数。
Soc Secur Bull. 2007;67(3):73-88.
9
Mobile health requires mobile security: challenges, solutions, and standardization.移动健康需要移动安全:挑战、解决方案与标准化。
Stud Health Technol Inform. 2008;136:697-702.
10
Impact of Homeland Security Alert level on calls to a law enforcement peer support hotline.
Int J Emerg Ment Health. 2007 Fall;9(4):253-7.

引用本文的文献

1
A Programmed DNA Dynamic Assembly-Guided Molecular Amplifier for Authentic Information Decryption.一种用于真实信息解密的程序化DNA动态组装引导分子放大器。
Adv Sci (Weinh). 2025 Jun;12(22):e2409586. doi: 10.1002/advs.202409586. Epub 2025 May 19.
2
Towards next-generation DNA encryption via an expanded genetic system.通过扩展遗传系统实现下一代DNA加密
Natl Sci Rev. 2024 Dec 23;12(4):nwae469. doi: 10.1093/nsr/nwae469. eCollection 2025 Apr.
3
Large-scale scattering-augmented optical encryption.大规模散射增强光学加密。
Nat Commun. 2024 Nov 12;15(1):9807. doi: 10.1038/s41467-024-54168-3.
4
Exposing Manipulated Photos and Videos in Digital Forensics Analysis.数字取证分析中揭露经过处理的照片和视频
J Imaging. 2021 Jun 24;7(7):102. doi: 10.3390/jimaging7070102.
5
Systematic Review of Authentication and Authorization Advancements for the Internet of Things.物联网身份验证和授权技术的系统评价
Sensors (Basel). 2022 Feb 10;22(4):1361. doi: 10.3390/s22041361.
6
DNA origami cryptography for secure communication.DNA 折纸密码学用于安全通信。
Nat Commun. 2019 Nov 29;10(1):5469. doi: 10.1038/s41467-019-13517-3.
7
An Evolutionary Game-Theoretic Approach for Assessing Privacy Protection in mHealth Systems.一种评估移动医疗系统中隐私保护的进化博弈论方法。
Int J Environ Res Public Health. 2018 Oct 8;15(10):2196. doi: 10.3390/ijerph15102196.
8
Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.打破网络安全困境:协调安全需求与消除漏洞。
Sci Eng Ethics. 2014 Sep;20(3):701-15. doi: 10.1007/s11948-014-9551-y. Epub 2014 Apr 30.