Skip to main content

Economics, Psychology, and Sociology of Security

  • Conference paper
Financial Cryptography (FC 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2742))

Included in the following conference series:

Abstract

Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human nature suggest that security will continue being applied as an afterthought. We will have to put up with the equivalent of bailing wire and chewing gum, and to live on the edge of intolerable frustration. However, that is not likely to to be a fatal impediment to the development and deployment of information technology. It will be most productive to think of security not as a way to provide ironclad protection, but the equivalent of speed bumps, decreasing the velocity and impact of electronic attacks to a level where other protection mechanisms can operate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Anderson, R.J.: Liability and Computer Security – Nine Principles. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875. Springer, Heidelberg (1994), Available at http://www.cl.cam.ac.uk/~rja14

    Google Scholar 

  2. Anderson, R.J.: Security Engineering – A Guide to Building Dependable Distributed Systems. Wiley, Chichester (2001)

    Google Scholar 

  3. Cosmides, L., Tooby, J.: Evolutionary Psychology: A Primer, Available at http://www.psych.ucsb.edu/research/cep/primer.html

  4. Geer, D.: Risk Management is Where the Money Is. Risks Digest 20(6) ( Novemnber 12, 1998), Available at http://catless.ncl.ac.uk/Risks/20.06.html

  5. Norris, F.: No positives in this legal double negative. New York Times (January 24, 2003)

    Google Scholar 

  6. Odlyzko, A.M.: The Bumpy Road of Electronic Commerce. In: Maurer, H. (ed.) WebNet 1996 – World Conf. Web Soc. Proc. AACE, pp. 378–389 (1996), Available at http://www.dtc.umn.edu/~odlyzko/doc/recent.html

  7. Odlyzko, A.M.: The Visible Problems of the Invisible Computer: A Skeptical Look at Information Appliances. First Monday 4(9) (September 1999), http://www.firstmonday.org/issues/issue4_9/odlyzko/index.html , Also available at http://www.dtc.umn.edu/~odlyzko/doc/recent.html

  8. Odlyzko, A.M.: Cryptographic Abundance and Pervasive Computing. iMP: Information Impacts Magazine (June 2000), http://www.cisp.org/imp/june_2000/06_00odlyzko-insight.htm , Also available at http://www.dtc.umn.edu/~odlyzko/doc/recent.html

  9. Static Control Corporation: Computer Chip Usage in Toner Cartridges and Impact on the Market: Past, Current and Future. White paper, October 23 (2002), available at http://www.scc-inc.com/special/oemwarfare/default.htm

  10. Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley, Chichester (2000)

    Google Scholar 

  11. Workshop on Economics and Information Security, May 16-17 (2002), Program and papers or abstracts available at http://www.sims.berkeley.edu/resources/affiliates/workshops/econsecurity/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Odlyzko, A. (2003). Economics, Psychology, and Sociology of Security. In: Wright, R.N. (eds) Financial Cryptography. FC 2003. Lecture Notes in Computer Science, vol 2742. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45126-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45126-6_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40663-1

  • Online ISBN: 978-3-540-45126-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics