An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
 
(One intermediate revision by one other user not shown)
Line 5: Line 5:
==Full Citation==
==Full Citation==


Bruce H. Kobayashi, ''An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods'', 14 Sup. Ct. Econ. Rev. (2005) [http://www.law.gmu.edu/faculty/papers/docs/05-11.pdf ''Web'']
Bruce H. Kobayashi, ''An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods'', 14 Sup. Ct. Econ. Rev. (2005). [http://www.law.gmu.edu/faculty/papers/docs/05-11.pdf ''Web'']
 
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=708562 SSRN]
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=708562 SSRN]


Line 13: Line 12:
==Categorization==
==Categorization==


Issues: [[Risk Management and Investment]], [[Incentives]], [[Public-Private Cooperation]]
Issues: [[Incentives]]; [[Public-Private Cooperation]]; [[Risk Management and Investment]]


==Key Words==  
==Key Words==  

Latest revision as of 11:20, 18 June 2010

Full Title of Reference

An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods

Full Citation

Bruce H. Kobayashi, An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods, 14 Sup. Ct. Econ. Rev. (2005). Web SSRN

BibTeX

Categorization

Issues: Incentives; Public-Private Cooperation; Risk Management and Investment

Key Words

Outreach and Collaboration, Risk Modeling

Synopsis

This paper examines the incentives of private actors to invest in cybersecurity. Prior analyses have examined investments in security goods, such as locks or safes that have the characteristics of private goods. The analysis in this paper extends this analysis to examine expenditures on security goods, such as information, that have the characteristics of public goods. In contrast to the private goods case, where individual uncoordinated security expenditures can lead to an overproduction of security, the public goods case can result in the underproduction of security expenditures, and incentives to free ride. Thus, the formation of collective organizations may be necessary to facilitate the production of public security goods, and the protection of information produced by the collective organization should be a central feature of such organizations.

Additional Notes and Highlights

Outline:

 1. Introduction
 2. The Private Production of Private Security Goods
 3. Public Security Goods
 4. The Private Production of Cybersecurity Goods
 5. Conclusion