Cybersecurity and Economic Incentives: Difference between revisions
(New page: ==Full Title of Reference== Cybersecurity and Economic Incentives ==Full Citation== OECD, ''Cybersecurity and Economic Incentives'', ''in'' Computer Viruses and Other Malicious Software...) |
No edit summary |
||
(4 intermediate revisions by one other user not shown) | |||
Line 11: | Line 11: | ||
==Categorization== | ==Categorization== | ||
Issues: [[Economics of Cybersecurity]] | Issues: [[Economics of Cybersecurity]], [[Incentives]] | ||
[[Incentives]] | |||
==Key Words== | ==Key Words== | ||
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas# | [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Malware malware], [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Interdependencies interdependencies] | ||
==Synopsis== | ==Synopsis== | ||
Line 26: | Line 24: | ||
Accessible and pragmatic approach to security concerns, underlining the fact that, if the openness of the Internet makes end-points vulnerable to security threats, it is also this very openness that allows for growth in innovation and productivity, which has so far outweighed the costs associated with security risks. Comes back on earlier OECD works on security. Underlines that the current trend in research is to focus of the economic approaches to dealing with cybersecurity (rather critical of such trend). Outlines orientations for future research (fieldwork, importance of understanding the incentives of different Internet-market players). | Accessible and pragmatic approach to security concerns, underlining the fact that, if the openness of the Internet makes end-points vulnerable to security threats, it is also this very openness that allows for growth in innovation and productivity, which has so far outweighed the costs associated with security risks. Comes back on earlier OECD works on security. Underlines that the current trend in research is to focus of the economic approaches to dealing with cybersecurity (rather critical of such trend). Outlines orientations for future research (fieldwork, importance of understanding the incentives of different Internet-market players). | ||
'''Table of Contents''' | |||
Executive Summary | |||
Background | |||
PART I. THE SCOPE OF MALWARE | |||
Chapter 1. An Overview of Malware | |||
Chapter 2. Malware Attacks: Why, When and How? | |||
Chapter 3. Malware: Why Should We Be Concerned? | |||
PART II.THE ECONOMICS OF MALWARE | |||
Chapter 4. Cybersecurity and Economic Incentives | |||
Chapter 5. Survey of Market Participants: What Drives Their Security Decisions? | |||
Chapter 6. The Market Consequences of Cybersecurity: Defining Externalities and Ways to Address Them | |||
Chapter 7. The Role of End Users, Business and Government | |||
Chapter 8. What Is Already Being Done? | |||
Chapter 9. Possible Next Steps | |||
Annex A. Background Data on Malware | |||
Annex B. Research Design for Economic of Malware | |||
Annex C. A Framework for Studying the Economics of Malware | |||
Bibliography | |||
'''Outline:''' | '''Outline:''' | ||
Increased focus on incentive structures | Increased focus on incentive structures | ||
''OECD Guidelines and the Economics of Cybersecurity'' | |||
The economic perspective | The economic perspective | ||
The problem with prevailing research methods | ''The problem with prevailing research methods'' |
Latest revision as of 08:45, 14 June 2010
Full Title of Reference
Cybersecurity and Economic Incentives
Full Citation
OECD, Cybersecurity and Economic Incentives, in Computer Viruses and Other Malicious Software (OECD, 2009). Purchase
Categorization
Issues: Economics of Cybersecurity, Incentives
Key Words
Synopsis
The past five years have witnessed the emergence of comprehensive efforts to improve the security of information systems and networks. A recent survey by the OECD (2005a) demonstrates that governments have developed national policy frameworks, as well as partnerships with the private sector and civil society, to combat cybercrime. Measures include Computer Security Incident Response Teams (CSIRTs), raising awareness, information sharing and education.
Additional Notes and Highlights
Accessible and pragmatic approach to security concerns, underlining the fact that, if the openness of the Internet makes end-points vulnerable to security threats, it is also this very openness that allows for growth in innovation and productivity, which has so far outweighed the costs associated with security risks. Comes back on earlier OECD works on security. Underlines that the current trend in research is to focus of the economic approaches to dealing with cybersecurity (rather critical of such trend). Outlines orientations for future research (fieldwork, importance of understanding the incentives of different Internet-market players).
Table of Contents
Executive Summary Background PART I. THE SCOPE OF MALWARE Chapter 1. An Overview of Malware Chapter 2. Malware Attacks: Why, When and How? Chapter 3. Malware: Why Should We Be Concerned? PART II.THE ECONOMICS OF MALWARE Chapter 4. Cybersecurity and Economic Incentives Chapter 5. Survey of Market Participants: What Drives Their Security Decisions? Chapter 6. The Market Consequences of Cybersecurity: Defining Externalities and Ways to Address Them Chapter 7. The Role of End Users, Business and Government Chapter 8. What Is Already Being Done? Chapter 9. Possible Next Steps Annex A. Background Data on Malware Annex B. Research Design for Economic of Malware Annex C. A Framework for Studying the Economics of Malware Bibliography
Outline:
Increased focus on incentive structures OECD Guidelines and the Economics of Cybersecurity The economic perspective The problem with prevailing research methods