[IP] The Third Annual Workshop on Economics and Information Security

Dave Farber dave at farber.net
Thu Dec 4 08:25:27 PST 2003


>
>                  The Third Annual Workshop on
>                Economics and Information Security
>                            (WEIS04)
> 		       May 13-14, 2004
>                    University of Minnesota
> 	       http://www.dtc.umn.edu/weis2004
>
> Submissions due: March 1, 2004
>
>    How much should we spend to secure our computer systems?  Can we
> determine a.which investments will provide the best protection?
>  How will
> we know when we've reached our goals?  Can market forces ensure that
> firms will act to improve security?  Can incentives align the goals of
> employees with the security goals of their employers?
>
>    While security technologies have benefited from decades of study,
> there has been a dearth of research into decision making
> tools required
> to choose among these technologies and employ them properly.  The
> growing importance of information security and the failings of
> technology-centric approaches have made security economics an
> area ripe
> for new research.  There is much work to be done both in applying
> existing economic tools to today's security questions and in
> pioneering
> new economic approaches to address problems unique to the study of
> security.
>
>    The Third Annual Workshop on Economics and Information
> Security (WEIS04)
> is a successor to the two pioneering workshops on this
> subject, held in
> 2002 at UC Berkeley and in 2003 at Univ. Maryland.
> Information about them
> is available at URLs given at end.
>
>    We encourage economists, computer scientists, security specialists,
> business school faculty, and industry experts to submit
> original research
> to the 2004 conference.  We would especially like to
> encourage collaborative
> research from authors in multiple fields.  Among past and
> suggested topics are:
>
>    Game theoretic security models      Analysis of security
> solutions market
>    Security investment optimization    Threat modeling
>    Information sharing                 Risk management
>    Algorithmic mechanism design        Security metrics
>    DRM and customer lock-in            Security loss estimation
>    Economics of privacy                Cyberterrorism
>    Behavioral security economics       Economics of pseudonyms
>    Reputation systems                  Case studies
>
>    There will be no printed proceedings of this workshop, but
> as with the
> preceding workshops, authors of accepted papers will be
> encouraged to post
> their papers and presentation decks on the conference site.
> There may later be
> a printed volume of selected papers from the workshop,
> similar to the volume
> based on the first two workshops that is in preparation.
>
>    Submissions should not exceed approximately 8,000 words
> (i.e., about 12 single
> spaced pages in a standard 11 point font). They must be
> submitted by March 1,
> 2004. Position papers of significantly shorter length are
> also welcome.
> Notification of acceptance for the program will be sent by
> April 1, 2004.
> Submissions should be sent, preferably in PDF format, to
> weissub at dtc.umn.edu.
> For general information about the conference, check the website:
> http://www.dtc.umn.edu/weis2004/ or email weisinfo at dtc.umn.edu.
>
> Program Committee:
>
>    Alessandro Acquisti, Heinz School, Carnegie Mellon University
>    Ross Anderson, Computer Laboratory, Cambridge University
>    Jean Camp, Kennedy School of Government, Harvard University
>    Li Gong, Sun Microsystems
>    Larry Gordon, Smith School of Business, University of Maryland
>    Marty Loeb, Smith School of Business, University of Maryland
>    Andrew Odlyzko (co-chair), Digital Technology Center,
> University of
>                      Minnesota
>    Stuart Schechter, Division of Engineering and Applied
> Sciences, Harvard
>    Bruce Schneier (co-chair), Counterpane Internet Security
>    Doug Tygar, Computer Science and Information Management,
> UC Berkeley
>    Hal Varian, School of Information Management and Systems
> and Economics
>                      Dept., UC Berkeley

-------------------------------------
You are subscribed as eugen at leitl.org
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

----- End forwarded message -----
-- Eugen* Leitl <a href="http://leitl.org">leitl</a>
______________________________________________________________
ICBM: 48.07078, 11.61144            http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org         http://nanomachines.net

[demime 0.97c removed an attachment of type application/pgp-signature]





More information about the cypherpunks-legacy mailing list