• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

信息安全:计算机科学、经济学和心理学的交汇点。

Information security: where computer science, economics and psychology meet.

机构信息

Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK.

出版信息

Philos Trans A Math Phys Eng Sci. 2009 Jul 13;367(1898):2717-27. doi: 10.1098/rsta.2009.0027.

DOI:10.1098/rsta.2009.0027
PMID:19487207
Abstract

Until ca. 2000, information security was seen as a technological discipline, based on computer science but with mathematics helping in the design of ciphers and protocols. That perspective started to change as researchers and practitioners realized the importance of economics. As distributed systems are increasingly composed of machines that belong to principals with divergent interests, incentives are becoming as important to dependability as technical design. A thriving new field of information security economics provides valuable insights not just into 'security' topics such as privacy, bugs, spam and phishing, but into more general areas of system dependability and policy. This research programme has recently started to interact with psychology. One thread is in response to phishing, the most rapidly growing form of online crime, in which fraudsters trick people into giving their credentials to bogus websites; a second is through the increasing importance of security usability; and a third comes through the psychology-and-economics tradition. The promise of this multidisciplinary research programme is a novel framework for analysing information security problems-one that is both principled and effective.

摘要

直到大约 2000 年,信息安全被视为一门基于计算机科学的技术学科,但数学在密码学和协议设计中有所帮助。随着研究人员和从业者意识到经济学的重要性,这种观点开始发生变化。随着分布式系统越来越多地由属于具有不同利益的主体的机器组成,激励措施对于可靠性与技术设计同等重要。信息安全经济学这一蓬勃发展的新领域不仅为“安全”主题(如隐私、漏洞、垃圾邮件和网络钓鱼)提供了有价值的见解,还为系统可靠性和政策的更广泛领域提供了有价值的见解。这个研究项目最近开始与心理学互动。其中一个方面是针对网络钓鱼这一增长最快的在线犯罪形式,欺诈者诱骗人们将凭证提供给虚假网站;另一个方面是通过安全可用性的重要性日益增加;第三个方面则来自心理学和经济学传统。这种多学科研究项目的前景是一个分析信息安全问题的新框架——一个既原则又有效的框架。

相似文献

1
Information security: where computer science, economics and psychology meet.信息安全:计算机科学、经济学和心理学的交汇点。
Philos Trans A Math Phys Eng Sci. 2009 Jul 13;367(1898):2717-27. doi: 10.1098/rsta.2009.0027.
2
The economics of information security.信息安全经济学
Science. 2006 Oct 27;314(5799):610-3. doi: 10.1126/science.1130992.
3
Security threats and solutions in distributed, interoperable health information systems using middleware.使用中间件的分布式、可互操作健康信息系统中的安全威胁与解决方案
Stud Health Technol Inform. 1997;45:66-73.
4
The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace.人为因素/工效学在安全科学中的作用:网络空间中的决策与行动选择
Hum Factors. 2015 Aug;57(5):721-7. doi: 10.1177/0018720815585906. Epub 2015 May 20.
5
Detecting phishing websites using machine learning technique.利用机器学习技术检测钓鱼网站。
PLoS One. 2021 Oct 11;16(10):e0258361. doi: 10.1371/journal.pone.0258361. eCollection 2021.
6
HIPAA--a real world perspective.《健康保险流通与责任法案》——现实视角
Radiol Manage. 2001 Mar-Apr;23(2):29-37; quiz 38-40.
7
The Role of User Behaviour in Improving Cyber Security Management.用户行为在改善网络安全管理中的作用。
Front Psychol. 2021 Jun 18;12:561011. doi: 10.3389/fpsyg.2021.561011. eCollection 2021.
8
Security and confidentiality approach for the Clinical E-Science Framework (CLEF).临床电子科学框架(CLEF)的安全与保密方法。
Methods Inf Med. 2005;44(2):193-7.
9
Working towards a national health information system in Australia.致力于建立澳大利亚国家卫生信息系统。
Medinfo. 1995;8 Pt 2:1633.
10
Lecture held at the Royal Society, 14 November 2002The Clifford Paterson Lecture, 2002. Computer security?
Philos Trans A Math Phys Eng Sci. 2003 Jul 15;361(1808):1549-55. doi: 10.1098/rsta.2003.1181.

引用本文的文献

1
Many phish in the : A coexisting-choice-criteria model of security behavior.大量的网络钓鱼攻击:安全行为的共存选择标准模型。
Risk Anal. 2023 Apr;43(4):783-799. doi: 10.1111/risa.13947. Epub 2022 May 14.
2
Can You Hear Me Now? Audio and Visual Interactions That Change App Choices.你现在能听到我说话吗?改变应用选择的音频和视觉交互。
Front Psychol. 2020 Oct 15;11:2227. doi: 10.3389/fpsyg.2020.02227. eCollection 2020.