The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2011 vol.9)
pp: 76-79
Michael Lesk , Rutgers University
ABSTRACT
For bank robbery, we spend more on prevention than we lose; for cybercrime, the reverse is true. How can we increase the effort on cybersecurity so that the situation improves?
INDEX TERMS
cybercrime, bank robbery, incentives for security
CITATION
Michael Lesk, "Cybersecurity and Economics", IEEE Security & Privacy, vol.9, no. 6, pp. 76-79, November/December 2011, doi:10.1109/MSP.2011.160
REFERENCES
1. D.N. Laband and J.P. Sophocleus, "An Estimate of Resource Expenditures on Transfer Activity in the United States," Quarterly J. Economics, vol. 107, no. 3, 1992, pp. 959–983.
2. C. DeTotto and M. Vannini, "Counting the Cost of Crime in Italy," Global Crime, vol. 11, no. 4, 2010; www.tandfonline.com/doi/full/10.108017440572.2010.519523 .
3. "US Cybercrime Losses Double," Homeland Security Newswire,16 Mar. 2010; http://homelandsecuritynewswire.comus-cybercrime-losses-double .
4. D. Shinder, "Calculating the True Cost of Cybercrime," Tech Republic,14 Sept. 2010; www.techrepublic.com/blog/security/calculating-the-true-cost-of-cybercrime 4438.
5. D. Bartz and J. Finkle, "US Shuts Down Massive Cybertheft Ring," Reuters,13 Apr. 2011; www.reuters.com/article/2011/04/13us-cybersecurity-coreflood-idUSTRE73C7NQ20110413 .
6. "UK Cybercrime Costs £27bn a Year—Government Report," BBC News,17 Feb. 2011; www.bbc.co.uk/newsuk-politics-12492309.
7. B. Prince, "Cost of Cybercrime Reaches $7B," e-week,6 Aug. 2007; www.eweek.com/c/a/SecuritySurvey-Cost-of-Cybercrime-Reaches-7B .
8. B. Krebs, "Calculating the Costs of Cyber Crime," Washington Post,27 Sept. 2007; http://voices.washingtonpost.com/securityfix/ 2007/09counting_the_cost_of_cyber_cri.html .
9. J.M. Bauer and M. van Eeten, "Securing Cyberspace: Realigning Economic Incentives in the ICT Value Net," Web Science (WebSci 09), Webscience Trust, Univ. of Southampton, 2009; http://journal.webscience.org/171/1Bauer_VanEeten_WebSci09_Athens_fin.pdf .
10. B. Zvalfier, "The Cost of Cyber Security," Tech Axcess,21 Oct. 2010; http://techaxcess.com/2010/10the-cost-of-cyber-security .
11. S. Savage and F. Schneider, "Security Is Not a Commodity: The Road Forward for Cybersecurity Research," Computing Research Assoc., 2009; www.cra.org/ccc/docs/initCybersecurity.pdf .
12. "Passwords Revealed by Sweet Deal," BBC News,20 Apr. 2004; http://news.bbc.co.uk/2/hi/technology3639679.stm .
13. A. Melek et al., 2004 Global Security Survey, Deloitte, 2004; www.deloitte.com/assets/Dcom-Argentina/Local%20Assets/ Documentsglobal_security.pdf .
14. D. Assaf, "Infrastructure Protection," International Federation for Information Processing, vol. 253, E. Goetz, and S. Shenoi eds., Springer-Verlag, 2008, pp. 29–39.
15. "Fact Sheet: Cybersecurity Legislative Proposal," 2011; www.whitehouse.gov/the-press-office/2011/ 05/12fact-sheet-cybersecurity-legislative-proposal .
16. T. Moore,, "Introducing the Economics of Cybersecurity: Principles and Policy Options," Proc. Workshop Deterring CyberAttacks: Informing Strategies and Developing Options for US Policy, Nat'l Academies Press, 2010; www.cs.brown.edu/courses/csci1950-p/sources/ lec27Moore.pdf.
17. G. Akerlof, "The Market for 'Lemons': Quality Uncertainty and the Market Mechanism," Quarterly J. Economics, vol. 84, no. 3, 1970, pp. 488–500.
51 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool