The potential for underinvestment in internet security: implications for regulatory policy

被引:14
作者
Garcia, Alfredo [1 ]
Horowitz, Barry [1 ]
机构
[1] Univ Virginia, Charlottesville, VA USA
关键词
internet security; market failure; game theory; Nash equilibrium; Markov perfect equilibrium;
D O I
10.1007/s11149-006-9011-y
中图分类号
F [经济];
学科分类号
02 ;
摘要
With the continuing growth of the use of the Internet for business purposes, the consequences of a possible cyber attack that could create a large scale outage of long time duration becomes a more and more serious economic issue. In this paper, we construct a game-theoretic model that addresses the economic motivations for investment in added Internet security and makes a case for a possible market failure in the form of underinvestment in the provision of Internet security. This result relies on the fact that the social value derived from consumption (which is at least equal to a fraction of the surplus derived from e-commerce) greatly exceeds the revenue at stake associated with the telecommunications companies' and ISP's security levels. If the ratio of social value to revenue at stake to Internet providers continues to grow, the likelihood of underinvestment in security becomes higher and some form of regulation may become necessary. We discuss the difficulties associated with designing and enforcing a regulatory scheme based upon mandatory security standards.
引用
收藏
页码:37 / 55
页数:19
相关论文
共 17 条
[1]  
ANDERSON R, 2001, P 17 ANN COMP SEC AP, P10
[2]  
Breyer Stephen., 1982, REGULATION ITS REFOR
[3]   The economics of the Internet: Infrastructure and regulation [J].
Cave, M ;
Mason, R .
OXFORD REVIEW OF ECONOMIC POLICY, 2001, 17 (02) :188-201
[4]   Compliance strategies and regulatory effectiveness of performance-based regulation of chemical accident risks [J].
Chinander, KR ;
Kleindorfer, PR ;
Kunreuther, HC .
RISK ANALYSIS, 1998, 18 (02) :135-143
[5]   MARKOV-PERFECT INDUSTRY DYNAMICS - A FRAMEWORK FOR EMPIRICAL WORK [J].
ERICSON, R ;
PAKES, A .
REVIEW OF ECONOMIC STUDIES, 1995, 62 (01) :53-82
[6]  
Fudenberg D., 1991, GAME THEORY
[7]   The economic incentives for sharing security information [J].
Gal-Or, E ;
Ghose, A .
INFORMATION SYSTEMS RESEARCH, 2005, 16 (02) :186-208
[8]   Perpetual leapfrogging in Bertrand duopoly [J].
Giovannetti, E .
INTERNATIONAL ECONOMIC REVIEW, 2001, 42 (03) :671-696
[9]  
Gordon L. A., 2002, ACM Transactions on Information and Systems Security, V5, P438, DOI 10.1145/581271.581274
[10]  
Haimes YY, 2004, Risk modeling, assessment, and management, V2nd