The Economics of Cybersecurity: Principles and Policy Options1
نویسنده
چکیده
Economics puts the challenges facing cybersecurity into perspective better than a purely technical approach does. Systems often fail because the organizations that defend them do not bear the full costs of failure. For instance, companies operating critical infrastructures have integrated control systems with the Internet to reduce near-term, measurable costs while raising the risk of catastrophic failure, whose losses will be primarily borne by society. As long as anti-virus software is left to individuals to purchase and install, there may be a less than optimal level of protection when infected machines cause trouble for other machines rather than their owners. In order to solve the problems of growing vulnerability and increasing crime, policy and legislation must coherently allocate responsibilities and liabilities so that the parties in a position to fix problems have an incentive to do so. In this paper, we outline the various economic challenges plaguing cybersecurity in greater detail: misaligned incentives, information asymmetries and externalities. We then discuss the regulatory options that are available to overcome these barriers in the cybersecurity context: ex ante safety regulation, ex post liability, information disclosure, and indirect intermediary liability. Finally, we make several recommendations for policy changes to improve cybersecurity: mitigating malware infections via ISPs by subsidized cleanup, mandatory disclosure of fraud losses and security incidents, mandatory disclosure of control system incidents and intrusions, and aggregating reports of cyber espionage and reporting to the World Trade Organization (WTO).
منابع مشابه
The economics of cybersecurity: Principles and policy options
Economics puts the challenges facing cybersecurity into perspective better than a purely technical approach does. Systems often fail because the organizations that defend them do not bear the full costs of failure. For instance, companies operating critical infrastructures have integrated control systems with the Internet to reduce near-term, measurable costs while raising the risk of catastrop...
متن کاملAttack-prevention and damage-control investments in cybersecurity
This paper examines investments in cybersecurity made by users and software providers with a focus on the latter’s concerning attack prevention and damage control. I show that full liability, whereby the provider is liable for all damage, is inefficient, owing namely to underinvestment in attack prevention and overinvestment in damage control. On the other hand, the joint use of an optimal stan...
متن کاملRearticulating Internet Literacy
As a simple explanation, Internet literacy is a capability constitutive to utilizing the advantages of the Internet. But, due to the constant changes of digital technologies, what kinds of necessary capabilities are required to gain the advantages? In fact, more than focusing on the essential capabilities to benefit users from the Internet advantages, existing perceptions of Internet literacy h...
متن کاملEconomic Impacts of Rules-based versus Risk-based Cybersecurity Regulations in Critical Infrastructure Providers (Bulk Electricity Providers)i
Policy makers are currently proposing new regulatory mechanisms to enhance the security of critical national infrastructure operators. The key question in this scenario is which is the right way to regulate the cybersecurity of critical infrastructure operators in charge of electricity transmission? Should optimal cybersecurity regulation follow a US style, mostly ‘rules-based’ model, or the Eu...
متن کاملValues in Health Policy – A Concept Analysis
Background Despite the significant role “values” play in decision-making no definition or attributes regarding the concept have been provided in health policy-making. This study aimed to clarify the defining attributes of a concept of value and its irrelevant structures in health policy-making. We anticipate our findings will help reduce the semantic ambiguities associated with the use of “valu...
متن کامل