How much should we spend to secure our computer systems? Can we determine which investments will provide the best protection? How will we know when we've reached our goals? Can market forces ensure that firms will act to improve security? Can incentives align the goals of employees with the security goals of their employers? Papers from the workshop include: "Is finding security holes a good idea?", by Eric Rescorla "Who Signed Up for the Do-Not-Call List?", by Hal Varian "The Economics of Censorship Resistance", by Ross Anderson "On dealing with adversaries fairly", by Ross Anderson "Free-Riding and Whitewashing in Peer-to-Peer Systems", by Ion Stoica "Towards an Economic Analysis of Trusted Systems", by Scott Shenker "A Worst-Case Worm", by Vern Paxon |