The Market Consequences of Cybersecurity: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Full Title of Reference== The Market Consequences of Cybersecurity: Defining Externalities and Ways to Address Them ==Full Citation== OECD, ''The Market Consequences of Cybersecurity:...)
 
No edit summary
Line 8: Line 8:


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=&startkey=OECD:2009&f=wikibiblio.bib ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=&startkey=OECD:2009&f=wikibiblio.bib ''BibTeX'']


==Categorization==
==Categorization==
Line 16: Line 15:
==Key Words==  
==Key Words==  


ISPs, malware, risk management
[[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Internet_Service_Providers internet service providers]], [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Malware malware], [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Risk_Management risk management]


==Synopsis==
==Synopsis==


This chapter asks the follwoing questions: Are participants in the information and communication markets responding adequately to malware, or are improvements possible? Pointing to a variety of reports that show increases in malicious attack trends, one might conclude that markets are not responding adequately. Our analysis revealed a more nuanced picture.
This chapter asks the following questions: Are participants in the information and communication markets responding adequately to malware, or are improvements possible? Pointing to a variety of reports that show increases in malicious attack trends, one might conclude that markets are not responding adequately. The analysis revealed a more nuanced picture.




==Additional Notes and Highlights==
==Additional Notes and Highlights==
  '''Outline:'''
  Three major categories of externalities
    Category 1: No externalities; market participants absorb all the
costs of their security decisions.
    Category 2: Externalities are created, but they are borne by agents
that can manage them.
    The ISP example
    The case of online financial services
    Category 3: Externalities are borne fully by other market
participants or by society at large.
    The case of lax security by end users
  Distributional and efficiency effects
  Survey results on the costs of malware
  Key findings

Revision as of 12:00, 9 June 2010

Full Title of Reference

The Market Consequences of Cybersecurity: Defining Externalities and Ways to Address Them

Full Citation

OECD, The Market Consequences of Cybersecurity: Defining Externalities and Ways to Address Them, in Computer Viruses and Other Malicious Software (OECD, 2009). Purchase

BibTeX

Categorization

Issues: Economics of Cybersecurity

Key Words

[internet service providers], malware, risk management

Synopsis

This chapter asks the following questions: Are participants in the information and communication markets responding adequately to malware, or are improvements possible? Pointing to a variety of reports that show increases in malicious attack trends, one might conclude that markets are not responding adequately. The analysis revealed a more nuanced picture.


Additional Notes and Highlights

 Outline:
 Three major categories of externalities
   Category 1: No externalities; market participants absorb all the

costs of their security decisions.

   Category 2: Externalities are created, but they are borne by agents

that can manage them.

    The ISP example
    The case of online financial services
   Category 3: Externalities are borne fully by other market

participants or by society at large.

    The case of lax security by end users
 Distributional and efficiency effects
 Survey results on the costs of malware
 Key findings