Difference between revisions of "Is Cybersecurity a Public Good"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 16: Line 16:
==Key Words==  
==Key Words==  
''See the article itself for any key words as a starting point''
[http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Security_as_an_Externality Cybersecurity as an Externality],
[http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Security_as_a_Public_Good Cybersecurity as a Public Good],
[http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas#Distributed_Denial_of_Service_.28DDoS.29 Distributed Denial of Service],
[http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas#Information_Asymetries Information Asymetries],
[http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas#Tragedy_of_Commons The Tragedy of Commons],

Revision as of 12:12, 25 June 2010

Full Title of Reference

Is Cybersecurity a Public Good? Evidence from the Financial Services Industry

Full Citation

Benjamin Powell, Is Cybersecurity a Public Good? Evidence from the Financial Services Industry, 1 J. L. Econ. & Pol'y 497 (2005). Web




Key Words

Cybersecurity as an Externality, Cybersecurity as a Public Good, Distributed Denial of Service, Information Asymetries, The Tragedy of Commons,


After September 11th many government officials have become concerned with the possibility of terrorists launching attacks on the U.S. through the internet. Cybersecurity in industries that form our economy's “critical infrastructure” have been of particular concern. This paper examines the economics of cybersecurity. The economics of externalities, public goods, market failure, and government failure are all explored as they relate to cybersecurity. The financial services industry is clearly an area of critical infrastructure in our economy. This industry provides a case study to examine whether the market is providing the efficient level of cybersecurity or whether government intervention is required.

Additional Notes and Highlights

* Outline key points of interest