Information rules: a strategic guide to the network economy
Information rules: a strategic guide to the network economy
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Why Information Security is Hard-An Economic Perspective
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
An economic answer to unsolicited communication
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
The Simple Economics of Cybercrimes
IEEE Security and Privacy
Economics of Identity Theft
Industrial Organization and the Digital Economy
Industrial Organization and the Digital Economy
The Wealth of Networks: How Social Production Transforms Markets and Freedom
The Wealth of Networks: How Social Production Transforms Markets and Freedom
An inquiry into the nature and causes of the wealth of internet miscreants
Proceedings of the 14th ACM conference on Computer and communications security
The Black Swan: The Impact of the Highly Improbable
The Black Swan: The Impact of the Highly Improbable
Promoting personal responsibility for internet safety
Communications of the ACM - Urban sensing: out of the woods
The Future of the Internet--And How to Stop It
The Future of the Internet--And How to Stop It
Crimeware: understanding new attacks and defenses
Crimeware: understanding new attacks and defenses
Spamalytics: an empirical analysis of spam marketing conversion
Proceedings of the 15th ACM conference on Computer and communications security
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Journal of Management Information Systems
Computer Viruses and Other Malicious Software: A Threat to the Internet Economy
Computer Viruses and Other Malicious Software: A Threat to the Internet Economy
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Social Science Computer Review
Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users
International Journal of Information Security and Privacy
Hi-index | 0.00 |
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducing their considerable costs has become a pressing issue. Although cybersecurity has strong public good characteristics, most information security decisions are made by individual stakeholders. Due to the interconnectedness of cyberspace, these decentralized decisions are afflicted with externalities that can result in sub-optimal security levels. Devising effective solutions to this problem is complicated by the global nature of cyberspace, the interdependence of stakeholders, as well as the diversity and heterogeneity of players. The paper develops a framework for studying the co-evolution of the markets for cybercrime and cybersecurity. It examines the incentives of stakeholders to provide for security and their implications for the ICT ecosystem. The findings show that market and non-market relations in the information infrastructure generate many security-enhancing incentives. However, pervasive externalities remain that can only be corrected by voluntary or government-led collective measures.