This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Cybersecurity and Economics
November/December 2011 (vol. 9 no. 6)
pp. 76-79
Michael Lesk, Rutgers University
For bank robbery, we spend more on prevention than we lose; for cybercrime, the reverse is true. How can we increase the effort on cybersecurity so that the situation improves?

1. D.N. Laband and J.P. Sophocleus, "An Estimate of Resource Expenditures on Transfer Activity in the United States," Quarterly J. Economics, vol. 107, no. 3, 1992, pp. 959–983.
2. C. DeTotto and M. Vannini, "Counting the Cost of Crime in Italy," Global Crime, vol. 11, no. 4, 2010; www.tandfonline.com/doi/full/10.108017440572.2010.519523 .
3. "US Cybercrime Losses Double," Homeland Security Newswire,16 Mar. 2010; http://homelandsecuritynewswire.comus-cybercrime-losses-double .
4. D. Shinder, "Calculating the True Cost of Cybercrime," Tech Republic,14 Sept. 2010; www.techrepublic.com/blog/security/calculating-the-true-cost-of-cybercrime 4438.
5. D. Bartz and J. Finkle, "US Shuts Down Massive Cybertheft Ring," Reuters,13 Apr. 2011; www.reuters.com/article/2011/04/13us-cybersecurity-coreflood-idUSTRE73C7NQ20110413 .
6. "UK Cybercrime Costs £27bn a Year—Government Report," BBC News,17 Feb. 2011; www.bbc.co.uk/newsuk-politics-12492309.
7. B. Prince, "Cost of Cybercrime Reaches $7B," e-week,6 Aug. 2007; www.eweek.com/c/a/SecuritySurvey-Cost-of-Cybercrime-Reaches-7B .
8. B. Krebs, "Calculating the Costs of Cyber Crime," Washington Post,27 Sept. 2007; http://voices.washingtonpost.com/securityfix/ 2007/09counting_the_cost_of_cyber_cri.html .
9. J.M. Bauer and M. van Eeten, "Securing Cyberspace: Realigning Economic Incentives in the ICT Value Net," Web Science (WebSci 09), Webscience Trust, Univ. of Southampton, 2009; http://journal.webscience.org/171/1Bauer_VanEeten_WebSci09_Athens_fin.pdf .
10. B. Zvalfier, "The Cost of Cyber Security," Tech Axcess,21 Oct. 2010; http://techaxcess.com/2010/10the-cost-of-cyber-security .
11. S. Savage and F. Schneider, "Security Is Not a Commodity: The Road Forward for Cybersecurity Research," Computing Research Assoc., 2009; www.cra.org/ccc/docs/initCybersecurity.pdf .
12. "Passwords Revealed by Sweet Deal," BBC News,20 Apr. 2004; http://news.bbc.co.uk/2/hi/technology3639679.stm .
13. A. Melek et al., 2004 Global Security Survey, Deloitte, 2004; www.deloitte.com/assets/Dcom-Argentina/Local%20Assets/ Documentsglobal_security.pdf .
14. D. Assaf, "Infrastructure Protection," International Federation for Information Processing, vol. 253, E. Goetz, and S. Shenoi eds., Springer-Verlag, 2008, pp. 29–39.
15. "Fact Sheet: Cybersecurity Legislative Proposal," 2011; www.whitehouse.gov/the-press-office/2011/ 05/12fact-sheet-cybersecurity-legislative-proposal .
16. T. Moore,, "Introducing the Economics of Cybersecurity: Principles and Policy Options," Proc. Workshop Deterring CyberAttacks: Informing Strategies and Developing Options for US Policy, Nat'l Academies Press, 2010; www.cs.brown.edu/courses/csci1950-p/sources/ lec27Moore.pdf.
17. G. Akerlof, "The Market for 'Lemons': Quality Uncertainty and the Market Mechanism," Quarterly J. Economics, vol. 84, no. 3, 1970, pp. 488–500.

Index Terms:
cybercrime, bank robbery, incentives for security
Citation:
Michael Lesk, "Cybersecurity and Economics," IEEE Security & Privacy, vol. 9, no. 6, pp. 76-79, Nov.-Dec. 2011, doi:10.1109/MSP.2011.160
Usage of this product signifies your acceptance of the Terms of Use.