MODELING)THE)LOJACK)EFFECT)IN)THE)) CYBER)SECURITY)MARKET))
|
|
|
- Alvin Hodges
- 10 years ago
- Views:
Transcription
1 CasatrinaLee 3May2014 i MODELING)THE)LOJACK)EFFECT)IN)THE)) CYBER)SECURITY)MARKET)) )A)STUDY)OF)INCENTIVES) Abstract:) Cybersecurityhasbecomeapertinentconcernamongbusinessesfollowing theincreasingdigitizationofoperations.hackingmethodsareeverevolvingand businessesstruggletodetectandrespondpromptly,aswellasdeveloppreventive measuresagainstfutureattacks.itiswidelyacknowledgedthatcooperationiskey inanindustry seffortsincombatingcybercrime,andinmypaper,ifocusmainlyon thefinancialservicessector.thereexistsanetworkofcollaborationwithinthe sector,suchasthefinancialservicesinformationsecurityanalysiscenterfsm ISAC),whichfacilitatesthesharingofanonymizeddataaboutattackinformation amongcompaniestoimprovesituationawareness.however,inlightoftheprivate costsinvolvedininvestinginresearch,companiesarereluctanttoinvestinr&d, preferringtoactasfreeriders.iturnmyfocustothelojackindustrywithinthe autotheftmarket,whichfacessimilarexternalitiesandincentiveproblems.imodel theincentiveproblemsofbothmarkets,analyzingthesimilaritiesanddifferencesin networkeffects.resultsshowthatalthoughthelojackmodelhassignificant positiveexternalities,excludableprivatebenefitsincentivizecarownerstoinvestin alojack.however,inthecybersecuritymarket,companieshavelittleincentiveto investmorethanthebareminimuminresearchduetothecontagioneffectsofboth negativeandpositiveexternalities.finally,idrawonthesuccessesofthelojackin deterringautothefttoapplythemtobetteroutlinetheopportunitiesfor collaborationforcybersecuritywithinvariousindustries. ) Keywords:cybersecurity,incentives,modeling,LoJack,contagioneffect,network effects,freerider,externalities,financialservices ANHONORSTHESIS SUBMITTEDTOTHEDEPARTMENTOFECONOMICS OFSTANFORDUNIVERSITY PRESENTEDBY: CASATRINALEE [email protected] MAY2014 HONORSADVISOR: PROFESSORTIMOTHYBRESNAHAN DEPARTMENTOFECONOMICS
2 CasatrinaLee 3May2014 ii Acknowledgments) ) IamdeeplygratefultomyHonorsAdvisor,ProfessorTimothyBresnahan,for hisinvaluableguidanceandpatiencethroughoutthecompletionofthehonors Thesis.Despitehisbusyschedule,heisalwayseagertomeetforadiscussionand guidemethroughformulatingaconvincingeconomicmodel.iamgratefulforhis instructionthroughouttheprocessofpinningdownmythesistopic,pointingmein thedirectionofrelevantliteratureandironingoutthekinksinmypaper. IamalsothankfultoProfessorMarceloClericiMAriasforhiscontinued guidanceandsupportsinceiembarkedonthisjourneytowriteanhonorsthesis.i amgratefulthatheplantedtheinspirationinmeduringthejuniorhonorsseminar classitookunderhim. Finally,Iamthankfultomyfriendsandfortheirsupport,withoutwhichthis honorsthesiswouldnothavebeenpossible. ) )
3 CasatrinaLee 3May2014 iii ) Contents) ) Acknowledgments ii 1))Introduction 1 2))Literature)Review 5 3))Economic)Models LoJackModel CyberSecurityModel 14 4))Comparing)Models ComparativeAnalysis ContagionEffect 23 5))Discussion)&)Analysis 25 6))Conclusion) 29 7))Bibliography 32 )
4 CasatrinaLee 3May2014 CHAPTER1:INTRODUCTION 1 Chapter1 Introduction Asthemarketplacebecomesincreasinglydigitized,businessesmoveagreater partoftheiroperationsonline,anddataisincreasinglybeingmigratedtothecloud. Naturally,theneedtoprotectdatahasbecomemorepertinent.Hackingmethodshave evolvedtobecomemoresophisticated,withmillionsofattackshappeningeveryday. Newmodesofattackarebeingdevelopedrapidly,morespecificallyzeroPdayattacks, 1 makingitdifficulttoincentivizecompaniestoinvestinattackpreventionresearch,or eventorespondefficientlytotheseattacks. Therearenumerousexistingproblemsassociatedwithinformationsecurity. Companiesoftenlackinsightintothesourceandeffectofattacks,makingitdifficultfor themtotakepreventivemeasuresorrespondeffectively.companiesalsoacknowledge thatresearchincybersecurityisoftentootimepconsumingandcostpinefficient.with thehighcostsandlowreturnsofresearch,companieslackincentivestoinvestincyber securityresearch. 1 ZeroPdayattacksareattackswhichexploitapreviouslyunknownvulnerability,such thatdevelopershavenotimetoaddressandpatch
5 CasatrinaLee 3May2014 CHAPTER1:INTRODUCTION 2 NetworkeffectsoftheInternetfurtherexacerbatethisunderprovisionof research.thehighinterconnectivityoffirmsandnetworkshasresultedinhigh negativeexternalitiesonothermembersofthenetwork.onceamemberofanetwork hasbeenhacked,othermembersofthenetworkaremorevulnerableasitisnoweasier forthehackertoinfiltrateothermembersofthenetwork.positiveexternalities, however,canalsoresultfromthesenetworkeffectsiffirmsarewillingtoinvestin securitymeasures.asecurenetworkwouldbenefitthenetworkasawhole,andthis mutuallybeneficialrelationshipprovidesopportunityforcollaborationamong membersbysharinginformation.usefulinformationwouldincludeattacksources, attackvectors,aswellaseffectivemethodsofresponseandrecovery. Theautotheftindustryfacessimilarexternalities,andresearchhas demonstratedthatthelojack,despiteitsprivatecosts,hasbeensuccessfulin overcomingfreeriderproblems,thereforeincreasingpositiveexternalities,deterring criminalsandloweringcrimerate.iaimtoexaminethismodelinthehopesofapplying ittothecybercrimemarket. TheLoJackisahiddenradiotransmitterusedtoretrievestolenvehiclesandhas proventobeveryeffectiveinachievinggeneraldeterrenceamongcarthieves.lojacks facilitatecostandtimeefficienttheftdetectionandrecoveryofstolencarsasthepolice arebetterabletotrackthem.consequently,ahigherarrestratehasbeenassociated withtheincreaseduseoflojacks. AnimportantfeatureoftheLoJackisthatitisinvisibletocriminals.Thisfeature iskeyinachievinggeneraldeterrenceamongautothievesbecausecriminalsareunable todistinguishacarwithalojackinstalledfromacarwithoutalojackinstalled.witha
6 CasatrinaLee 3May2014 CHAPTER1:INTRODUCTION 3 higherprobabilityofbeingarrestediftheyhappentostealacarwithalojack,thieves arereluctanttotaketheriskofstealingarandomcarinthefirstplace.similartothe cybersecuritymarket,networkeffectsalsocomeintoplayhereintheformofpositive externalities.forexample,iflojacksarepopularinaparticularneighborhood, residentsofthatneighborhoodbenefitfromthehighincidenceoflojacksandenjoya lowerriskofthefteveniftheydonotinstallalojackthemselves.imodelthisincentive structureinmypaperbelow. GiventhesuccessofLoJackindeterringcrime,Iaimtoapplyasimilarmodelto themarketofcybercrime.inbothmarkets,weseeabarrieragainstinvestment car ownersarereluctanttoinvestinalojackandcompaniesarereluctanttoinvestin research becauseatthetimeofinvestment,themarginalbenefittothecarownerand companyiszero.noattackhastakenplaceyet,andthustheyaredisincentivizedto incuradditionalcostsininvesting.however,thebenefitsofcollectiveinvestmentare amplifiedwithgroupinvestment.asinvestmentisincreasedinbothmarkets,thethreat offallingpreytoasuccessfulattackislowered.thisimpliesthatthesocialbenefitof investingincrimepreventionclearlyexceedstheprivatebenefitofinvestment. However,thisresultalsoconsequentlysuggeststheclearpossibilityoffreeridersin bothmarkets. Specifictothecybercrimemarket,themodelshowsthatsharingofinformation amongcompaniesisoptimal,assumingthatsharingincursnocost.thisisbecause companiesareindifferentbetweensharingandnotsharinginformation,butthe collectivepoolingofinformationhelpsprovidebettersituationalawarenessofthe cybercrimelandscapeandthereforedecreasestheriskoffallingvictimtoanattack.
7 CasatrinaLee 3May2014 CHAPTER1:INTRODUCTION 4 Furthermore,themodelshowedthattheamountthatcompaniesarewillingto investincybersecurityresearchisinfactalowconstant,independentofthevaluethey placeontheirinformation,andindependentofthecurrentriskofattack.thissuggests againthatcompaniesareunwillingtoinvestbeyondthatequilibriumconstant, resultinginasevereunderprovisioninthecybersecuritymarket. Inmypaper,Ibreakdownthedifferencesbetweentheautotheftandcyber crimemarkets,morespecificallyintermsofthefreeriderandnetworkeffects.while theautotheftmarketisdiscreteie.breakingintoacardoesnotgainoneaccessinto another),thecybercrimemarketisrelativelylessdiscreteduetothehighlevelof interdependenceandconnectivity.thisresultsinhighnetworkeffects,whichcan compoundpositiveexternalitiesofcollaborativeresearch,butcanalsocompound negativeexternalitiesofacompanyinthenetworkgettinghackedandexposingother memberstoahigherriskofinfiltration. IaimtodrawonthesuccessesoftheLoJackindeterringautotheftandapply theminbetteranalyzingtheopportunitiesforcollaborationforcybersecurityamong networkmembers.mythesisisoutlinedasfollows.abriefliteraturereviewisprovided inchapter2,followedbymyeconomicmodelsoftheautotheftandcybercrime marketsinchapter3.inchapter4,icomparethecybercrimemarkettotheautotheft marketandsubsequentlyapplymyfindingsandprovidemoreinpdepthanalysisand suggestionsforthefinancialindustrytobetterreaptherewardsofcollaborationin cybersecurity.
8 CasatrinaLee 3May2014 CHAPTER2:LITERATUREREVIEW 5 Chapter2 LiteratureReview Companieshavethusfarfailedtodevelopaneffectivewaytodealwiththe threatofcybercrime.whiletheywidelyacknowledgethatpreventionisideal,itis impossibletodetermineastocksolutionormodeofpreventionforattacks,giventhe highrateatwhichattackvectorsevolve.this,ontheotherhand,hasincentivized criminalstopersistintheirhackingattempts,undeterredbythelegalramificationsor thepossibilityofbeingcaught.infact,researchhasshownthatthelikelihoodof detectingcybercrimeissolowthatthepenaltyinflictedwouldhavetobeofenormous magnitudetodetercybercrimegrady&parisi,2006).asaresult,companieshave provedtobemoreinclinedtochoose cure over prevention choosingtotackle attacksbypatchingtheproblem,ratherthanresolvingtherootvulnerability. However,inrespondingtoattacks,companiesfaceseveralchallenges.Firstly, thesystemneedstobeabletodetectwhenithasbeenhackedbeforeresponsecaneven begintotakeplace.secondly,thesystemneedstoundertakethemosteffectivepatchin
9 CasatrinaLee 3May2014 CHAPTER2:LITERATUREREVIEW 6 responsetotheinfiltration iftheattackwereazeropdayattack,responsebecomes evenmoreproblematic.thirdly,thesystemneedstohaveadequateresourcestodeal withtheattack;often,smallandmediumenterpriseslacktheseresourcesbauer&van Eeten,2008).Duetothesefactors,responseisslow,anddamageisrarelymitigated efficiently. Marketfailureispresentinthecybersecuritymarket,manifestingitselfinthe formofexternalities.whenafirmiscompromised,itpassesonthedamagetoits consumersintheeventofadatabreach.financialinstitutionshavechosento internalizesuchnegativeexternalitiesbycompensatingcustomersintheeventofa securitybreach,ratherthaninvestinginsecuritymeasuresbauer&vaneeten2011). Anotherformofnegativeexternalitiesisalsopresentamongmembersofacomputer network.duetothehighinterconnectivityofcomputersystems,abreachinamember s systemwouldresultinthesecurityofothermembersbeingcompromised.asexplained inapaperbyneilgandal,largenetworksaremorevulnerabletosecuritybreaches, preciselybecauseofthesuccessofthenetwork.inexamplegivenbygandal,inpart becauseofitslargeinstalledbase,microsoft sinternetexplorerislikelytobemore vulnerabletoattackthanmosaic sfirefoxbrowser.thisisbecausethepayoffto hackersfromexploitingsecurityvulnerabilitiesininternetexplorerismuchgreater thanthepayofftoexploitingsimilarvulnerabilitiesinfirefox. Ontheflipside,positiveexternalitiescanbecreatedwhencompaniesinvestin securitymeasuresandresearchtostrengthentheirsystems.viathesamenetwork effects,theentirenetworkisconsequentlystrengthened.suchmutuallydependent relationshipsofferanopportunityforcollaborationamongmembersofanetwork.
10 CasatrinaLee 3May2014 CHAPTER2:LITERATUREREVIEW 7 AndersonusesthenetworkeffecttobetterillustratethisinthecontextoftheInternet 2001).ThemorepeopleusetheInternet,themorevalueithasforitsusers.Inthe realmofcybersecurity,themorecompaniesshareinformationwitheachother,the largerandmoreexhaustivethepoolofresources,andthereforethemoreeffectiveitis inpreventingsecuritybreaches.thesharingofinformationrelatedtomethodsfor preventing,detectingandcorrectingsecuritybreachesisdesirableasithelpsprevent organizationsfromfallingpreytosecuritybreachespreviouslyexperiencedgordon, Loeb&Lucyshyn,2003).Thisknowledgeofthecybersecuritylandscapeistermed situationalawareness.additionally,suchinformationhelpsorganizationsrespond morequicklyandefficientlywithfocusedsolutionsifanactualbreachoccurs.threats canbemoreeffectivelyprepemptedandattackscanbemoreefficientlypatched, thereforealleviatingpotentialdamagesofthecyberattack.situationalawareness thereforeinvolvesachievingvisibilityofemergingthreats,andiskeyinfacilitatingthe anticipationandmanagementofattacks. Asmuchasinformationsharinghasbeentoutedapossiblesolutionforcyber security,thereisamajorinherentproblempcompanieslackadequateeconomic incentivestofacilitatesuchsharing.andersonandmooreindicatemisaligned incentivesasthemainreasonforthefailureofinformationsharing2006).thisis corroboratedbyapaperbyvaneetenandbauer,highlightingtheissueofthefreerider problem2009).individualbusinessesandusersmaysufferfromtheperceptionthat theirownriskexposureislow,coupledwiththeinterconnectivityassociatedwith computernetworks,whenafirminvestsincybersecurityactivities,itbearsallthe costsbutdoesn treapallthebenefits.thelargertheshareofbenefitsthataccrueto
11 CasatrinaLee 3May2014 CHAPTER2:LITERATUREREVIEW 8 otherfirms,thesmallertheincentiveforafirmtoincreaseitsinvestments.companies arethereforedisinclinedtoinvestinandsharetheirsecuritysolutionsbecauseitwould allowothercompaniesinthenetworktobenefitfreelyfromit.forexample,joiningand reportingtoinformationsecurityanalysiscentersisacs)isvoluntary,withno incentivesinplacetoencouragefullreportinganddiscouragefreeriding.membersmay underpinvestinthedevelopmentofinformationsecuritymeasuresinanticipationof obtainingthemforfreefromotherisacmembersgordon,loeb&lucyshyn,2003).as aresult,thesecuritylevelofthenetworkislessthanideal. Zoominginonthefinancialservicessector,thereisanexistingframeworkfor informationsharingunderthefspisacfinancialservicesinformationsharing& AnalysisCenter).Itisuniqueinthatitseemstohavesucceededincreatingasuccessful partnershipininformationsharingdespitethepotentialpitfallsasmentioned previously.accordingtothecurrentpresidentandceoofthefspisacbillnelson,most oftheinformationsharedcomprisesofanonymizeddataaboutattackvectorsand sources.however,littleresearchisdonebytheisaconsecuritymeasures;without extractingvaluefromthesharedinformationtodevelopnewsolutions,thefspisac simplybecomesadatacollectioncenter. Wefirsthavetodistillthefactorsthathavecontributedtothesuccessofthe LoJackintheautotheftmarket.WiththeLoJack,asmallradiotransmitterishiddenin oneofmanypossiblelocationswithinacar.whenthecarisreportedtobestolen,the transmitterisremotelyactivatedbythepolice,allowingthepolicetotrackthestolen car spreciselocation.lojackpequippedstolenvehicleshavea90%recoveryrate,
12 CasatrinaLee 3May2014 CHAPTER2:LITERATUREREVIEW 9 comparedtoa63%recoveryrateforvehiclesthatlackatrackingsystem.helperin, 2009). InanempiricalpaperbyAyresandLevitt,itisfoundthattherearestrong positiveexternalitiesbythelojackinachievinggeneraldeterrence1998).they furtherfoundthateachdollarspentonlojackresultedinareductioninthecostsof autotheftofapproximately$10.becausethereisnoexternalindicationthatthelojack hasbeeninstalledinacar,itdoesnotdirectlyaffectthelikelihoodthataprotectedcar willbestolen.however,itwasfoundthattheavailabilityandadoptionoflojacksina particularareaisassociatedwithasharpfallinautotheft.morespecifically,the introductionoflojackinacityhasbeenshowntoreduceautotheft,eventhoughthe initialusemaybeverysmall.thereasonforthisisthatwhiletheoddsofastolencar havingalojackinstalledareverysmall,anautothiefmaytypicallystealmanycarsa year.onceheunknowinglystealsacarwithalojackinstalled,heiscaught,aswiththe restofhisaccomplicesbankman,2001). However,similartothecaseofcybersecurity,thereisthephenomenonof underprovision.whileitwasfoundthatthemarginalsocialbenefitofanadditionalunit oflojackhasbeenfifteentimesgreaterthanthemarginalsocialcostinhighcrime areas,thosewhoinstalllojack,however,obtainlessthantenpercentofthetotalsocial benefits,leadingtounderprovisionbythemarketayres&levitt,1998).inother words,peopleareinclinedtofreerideondeterrencephenomenonofthepresenceof thelojackintheneighborhood,butarereluctanttopersonallyinvestinone.an individualcarowner sdecisiontoinstallthelojackonlytriviallyaffectsthelikelihood ofhisorhercarbeingstolensincethievestypicallybasetheirtheftdecisionsonmean
13 CasatrinaLee 3May2014 CHAPTER2:LITERATUREREVIEW 10 LoJackinstallationrates.AsthievesareunabletodistinguishcarswithLoJacksfrom carswithout,thedeterrenceeffectisverystrong,andtheextentofpositiveexternalities arisingfromlojackusageisverylarge.itisthereforecrucialthatoneisableto incentivizecarownerstoinvestinalojack. Movingon,weexaminetheexactmechanismbywhichtheLoJackhasachieved itslargesocialbenefits.itdisruptstheoperationsof choppshops. 2 Intheabsenceof LoJacks,identifyingthesechopPshopsrequireoperationsthatarehighlytimeand resourceintensive,whereastheinstallationofthelojackoftenleadspolicedirectlyto theheartofcriminaloperations.however,itiscrucialtonotethatthereisan interestingsubstitutioneffectintheformofoldervehicles;oldervehiclesarelesslikely tohavelojacksinstalledandarethereforemoretargetedbycriminals.consequently, whiletheoverallautotheftratedecreases,thetheftrateforoldervehiclesincreases. LoJacksareexpensive$700),andwhiletheyhaveprovenveryeffectivein reducingautotheftrates,thesereductionsarepurelyanexternalityfromthe perspectiveofthecarownerinstallingalojack.theonlyinternalizedbenefitsof installingalojackarehigherretrievalratesandlowertheftdamagesonceavehicleis stolenayres&levitt,1998).inlightoftheseeffects,iwillcomparetheexternalities andnetworkeffectsinbothmarketsingreaterdetailinthefollowingsections. 2 Wherestolenvehiclesaredisassembledforresaleofparts.
14 CasatrinaLee 3May2014 CHAPTER3:ECONOMICMODELS 11 Chapter3 LoJackModel Wedefinethevariablesasfollows: = "#$%""#""#$%& = "#$%"#$""#$%&&"'"#$%& = "##$"#$"%&'; = 1"h"#h""#$%&"#$%&&', 0"h"#$% = "#$%$&'&h""#""#$%&"#$, h" = = "#$%&""#"#$%&""#$%& Tisdefinedasafunctionofthefractionofthepopulationofcarownersinthe marketwhochoosetoinvestinalojack.
15 CasatrinaLee 3May2014 CHAPTER3:ECONOMICMODELS 12 WedefinePersoni sutility )asfollows: " = 0, = 1 " = 1, = WithoutaLoJack,Personi sutilityofhiscarisdiscountedbytheriskoftheft. WithaLoJack,hisutilityisunaffectedbytheriskoftheft,andhisvaluationisonly reducedbythefixedcostofbuyingandinstallingalojack. ToincentivizePersoni"toinvestinaLoJack, : = 1 > : = 0 > 1 < 1) LetusassumethatmisthenumberofpeoplewhochoosetoinvestinaLoJack ie.mpeoplehave < ).Inthismodel,weseektofindequilibriumvaluesof, andsuchthattheyfulfillthefollowingconditions: 1. = 2. = "#$%&""#$"h" 3. = Utilizingtheseequations,wecanderivetheequilibriumvaluesofanindividual s valueofhiscar),theequilibriumriskofcartheft),aswellasthenumberofpeople whowouldinstallalojack).
16 CasatrinaLee 3May2014 CHAPTER3:ECONOMICMODELS 13 WhenPersonichoosestoinstallaLoJack,hisprivatebenefitis0,sincenotheft hasoccurredyet.however,theprobabilityofatheftoccurringt)decreasesasthe numberoflojacksinstalledincreasesie.mincreases).thisisclearlyasocialbenefit andindicatespositiveexternalitiesoflojackusage.weexpressthesocialvalueofa higherfractionoflojackadoptionhigher )onthemarketasawholeasfollows: Socialbenefit=totalprivatevalue +socialbenefitofdecreasedriskoftheft "" =0 + " 2) Notetheterm0isobtainedfromthezeromarginalbenefitthataLoJack adopterexperiencesafterinstallingalojackbecausenothefthasoccurredand therefore,notangiblebenefitcanbefelt.thesecondterm "" " representsthesumofsocialbenefitsovereachcarowner.thefirstderivativeoftis negativebecausethetheftratedecreaseswithanincreasedfractionoflojackadoption. ThisbenefitisnotexclusiveonlytothosepeoplewhohaveinstalledtheLoJacksince theoveralltheftrateforbothlojackadoptersandnonpadoptersdecreasesalike.the benefitisthusrepresentedbytheproductoftheirindividualvaluationofthecar ) andthemarginaldecreaseinriskoftheftonsocietyasawholeborneoutofagreater fractionoflojackadoptionamongcarownersintheregion. Here,wecanseethatbecausethegeneraldecreaseintheftratebenefitsthe entirecarownerpopulation,theexcessofsocialbenefitsascomparedtoindividual marginalbenefithasencouragedfreeridingandresultedinunderprovisioninthe marketforlojacks.
17 CasatrinaLee 3May2014 CHAPTER3:ECONOMICMODELS 14 CyberSecurityModel Weexaminethefinancialindustrywithrespecttothemarketforcybersecurity, specificallybecausethefinancialindustryisthemostdevelopedintherealmofcyber security,andbecausecybersecurityisattheforefrontofcompanies priorities.the financialindustryhasanexistingorganization,thefinancialservicesinformation SharingandAnalysisCenterFSPISAC),inwhichbankscooperateandshare anonymizeddataoncyberattacks. Wedefinethevariablesasfollows: = "#$%""#$%&$%'"#$%&'$"""#$ = "##$"#$"%&'; = 1""#$%&'h"#$"#$%&'$", 0"h"#$" = "#$""#$#%"#""#"$%h = "##$"#$"%&'; = 1""#$%&'"#$#%""#"$%h, 0"h"#$% = "#$%$&'&)""##$%h"#$%, h" =,,, < 0 = "#$%&""#$%""#$%& Tisdefinedasafunctionofthefractionofbanksthatchosetoshareattack informationandthecumulativeamountofmoneyinvestedinresearch.thisassumes thatthesharingofattackinformationandresearchhavevaluablepayoffs. Wefirstconsidertheissueofsharinginformationwithintheorganization.We canassumethatthecostofsharinginformationis0,sincecompaniesarenotengaging inadditionaleffortsinthecourseofsharinginformationwithothercompaniesinthe
18 CasatrinaLee 3May2014 CHAPTER3:ECONOMICMODELS 15 organization.sincethecostofsharinginformationis0,companieswouldbeindifferent betweenchoosingtoshare = 1)andnottoshareinformation = 0).GiventhatT isdependentonsand <0ie.thegreaterthenumberofcompanieswhoshare information,thelowertheriskofbeinghacked),companiesareincentivizedtoshare ie. = 1). Therefore,sharingofinformationS)isassumedtobeefficientlyprovidedinthis model,giventhatallbanksshareatzerocost.thisassumptionissupportedbythefsp ISAC,whichconfirmsthatallbankscontributeanonymizeddatatotheorganization voluntarily.thisisattributedtothefactthatsharingofdataincurslittletimeor monetarycosttoindividualbanksaslongassufficientinfrastructuretocollectrelevant datawasalreadyinplace. IfBanki"choosesnottoengageinresearch = 0), Payoff= 1 ), = 0, = h"#"#$"#h"#"#$ "#$%&'"#$%) Consequently,thereisnocontributionbyBankitothereductionofcrimerate. IfBankichoosestoengageinresearch = 1), Payoff= 1, 0, = h"#"#$"#h"#$ "#$%&'$&"#) Consequently,thisincreases andreducest,asasocialbenefit,muchlikethe caseinthelojackmodelabove.thisimpliesthat <.Itisimportanttonotethat isawhollyprivatecostchosensolelybythebank,andcanbeperceivedasthebank s contributiontogroupresearchassumingthebankdoesnotengageinanyresearchon
19 CasatrinaLee 3May2014 CHAPTER3:ECONOMICMODELS 16 itsownusingitsownresources).clearly,thesociallypreferredoptionwouldbefor = 1. Abankwillchoosetoinvestinresearchif: 1 < 1 1 < 1 < < < = ) 3) Weseektofindequilibriumvaluesof,andsuchthattheyfulfillthe followingconditions: 1. = 2. =, 3. "#$$%& 1 "# Utilizingtheseequations,wecanderivetheequilibriumvaluesofanindividual bank svalueofprotectingitsinformation),theequilibriumriskofcybercrime),as wellastheoptimalamountthatabankshouldinvestinresearch). Focusingonconditions2and3, "#$%$&' 1 = 1,
20 CasatrinaLee 3May2014 CHAPTER3:ECONOMICMODELS 17 = 1 = 0 = 4) Substitutingthisresultinto =,weobtain: = = 1 5) Weseeherethattheoptimalamountthatabankshouldinvestinresearchis1. Thisisaconstant,independentofthebank svalueitplacesonprotectingits information,andindependentofthecurrentriskofcrime.thiscanbeattributedtothe factthateachbankisreluctanttoinvestinmorethantheminimumtocontributeto loweringtheriskofcrime,preferringtospreadouttheresponsibilityandputtheonus equallyoneverymemberoftheorganization.theyarechoosingtosacrificethelongp termrewardsofengaginginresearchandthecompoundingbenefitsofnetworkeffects inastrengthenednetworkinfavorofshortptermcostsavings. Clearly,thisisamyopicapproach,butisunfortunatelyrampantinthecurrent market.researchhasalsoshownthat,ratherthaninvestinresearchandprevention, banksandfinancialinstitutionshavechosentointernalizethecostsofbeinghackedby compensatingcompanies.intheiropinion,thebenefitsofresearchfailtooutweighthe timeandmonetarycosts.asmorebanksadoptthismindset,thelackofacredible researchteamandfoundationisperpetuated.knowingthattheircounterpartshave adoptedthismindset,individualbanksarelesslikelytobethesolememberinthe
21 CasatrinaLee 3May2014 CHAPTER3:ECONOMICMODELS 18 networkinvestinginresearch.inthiscase,networkeffectsandthepotentialbenefitsof increasedresearchinvestmentarenottapped. Toquantifysuchbenefits,welookatthesocialvalueofincreasing : Socialbenefit=privatevalueformarginalbank +socialbenefitofdecreasedriskoftheft =0+, " "" 6) Notetheprivatevalueforthemarginalbankis0,regardlessofwhetherit choosestoinvestinresearchornot.thisisbecauseresearchhasatimelag,whetherin conductingtheresearchortheutilityofresearchresults,andthebenefitatatime wherenohackinghasoccurredis0. Thesecondterm, " representsthesumofsocial "" benefitsovereveryoneinthecommunity.thefirstderivativeoftwithrespecttois negativegiventhatthecrimeratedecreaseswithanincreasedoverallinvestmentin research.likeinthelojackmodelabove,thisbenefitisnotexclusivetothosebanks thathavechosentoinvestinresearch,butbenefitseverymemberoftheorganizationas awholebydecreasingtheprobabilityofaneffectivehackingattempt.thebenefitis thusrepresentedbytheproductoftheirindividualvaluationsoftheirinformation andthemarginaldecreaseinriskofhackingonthecommunityasawholeborneoutof agreatercumulativeinvestmentinresearch. Giventhattheresearchiscollaborative,andthereisnoprivateresearchdoneby banks,thesocialbenefitissharedamongallthebanksequally.thereinliestheproblem ofincentives sinceallbenefitissharedbutallcostisprivate,thereisanincentiveto
22 CasatrinaLee 3May2014 CHAPTER3:ECONOMICMODELS 19 becomeafreerider,resultinginunderprovisionofsecurityresearch,similartothecase oflojacksabove. Wefoundthat = 1forallbanks.Thisseemstobeaunanimousdecision,with nobankchoosingtoinvestmorethantheequilibrium.thisequilibrium,however,isnot optimal,astheriskofhackingcanbefurtherdecreasedwithincreasedinvestmentin research.yetifanybankchoosestoinvestmorethantheperceivedequilibrium,itis unlikelythatotherbankswillfollowsuit.giventhattheresearchisnonprivalrousand nonpexcludablewithinthefspisac,theproblemoffreeridersarises.
23 CasatrinaLee 3May2014 CHAPTER4:COMPARATIVEANALYSIS 20 Chapter4 ComparativeAnalysis WhilewecandrawsimilaritiesbetweenthecybersecurityandLoJackmarkets intermsofunderprovision,therearenumerousdifferencesthatneedtobehighlighted, specificallyinthestructureofitsrespectiveexternalities. 1 Differingstructuresofnetworkeffects FortheLoJackmarket,theskillsandtoolsrequiredtostealacarisdirectly transferrablefromcartocar.inotherwords,onceacriminalisequippedwiththe knowledgeandtoolsofhowtostealacar,thereisnoeconomicbarrierpreventinghim fromstealinganothercar.however,stealingonecardoesnotautomaticallygainhim accesstoanothercarie.theautotheftmarketisdiscrete). Incontrast,inthecybersecuritymarket,moreoftenthannot,criminalsrequire specificinsiderknowledgeinordertogainaccesstothesystemontopofgeneral hackingskills.thisknowledgeisuniquetoindividualcompaniesandisless transferrabletoothercompanies.thatsaid,however,onceacriminalgainsaccesstoa
24 CasatrinaLee 3May2014 CHAPTER4:COMPARATIVEANALYSIS 21 company ssystem,thebarriertogainingaccesstosystemsofothercompaniesinthe networkisloweredie.thecybercrimemarketislessdiscrete).whilethelojack criminalisnotboundbygeographicalorregionalrestrictionsinapplyinghis knowledge,thecybercriminalisboundbythenetworkofcompaniesheistryingto infiltrateie.thisknowledgemaynotbeapplicabletoanothernetworksuchasthefood andbeverageindustry). 2 Differingfreeridereffects IntheLoJackmarket,therearelittletonofreeridereffects.Acarowner installingalojackhasnodirectimpactontheprobabilityofhisimmediateneighbor s cargettingstolen.therefore,thelojackisexcludable.thefreeridereffectonlykicksin whentheinstallationoflojacksinaspecificregionexceedsaparticularthresholdsuch thatthegeneraltheftratedecreases.evenso,whilecarownerswhochoosenotto installlojacksmaybenefitfromthegeneraldecreaseintheftrate,theyreapnobenefits whentheircarswithoutlojacksarestolen.here,weseethattheincentivetobeafree riderislow. Inthecybersecuritymarkethowever,itisacknowledgedthatthereisaninfinite numberofwaysthatacompany ssystemcouldfail,bothontheindividualcompanyand collectivenetwork)levels.investmentinresearch,therefore,doesnot,inanyway, guaranteeareturn.giventhehighmonetarycostsofresearch,coupledwiththetimep intensiveeffortsandcontrastedwiththefastpaceatwhichattackvectorsevolveand develop,researchisexpensiveandmaynotpresentitselfasaneconomicallyrational decisionforcompaniesatfirstglance.infact,bankshaveshownthattheypreferto
25 CasatrinaLee 3May2014 CHAPTER4:COMPARATIVEANALYSIS 22 compensatecustomersforanysecuritybreachestheirnetworkmaysufferratherthan investinresearchbauer&vaneeten,2011).thereinliestheincentiveforcompanies tofreerideonresearchcarriedoutbyothercompaniesinthenetwork.likeinthe LoJackmodel,companieswhodonotcarryoutresearchbenefitfromthegeneral increaseinprotectionofthenetwork.intheeventofinfiltration,theyexperiencea negativepayoff,butsodotheothercompaniesintheirnetwork,whomayhaveinvested inresearch.ielaborateonthesenetworkeffectsbelow.inlightofthis,theincentiveto freerideisdrasticallyhigherinthecybercrimemarketthanthatofthemarketfor LoJacks.
26 CasatrinaLee 3May2014 CHAPTER4:COMPARATIVEANALYSIS 23 ContagionEffect Duetothehighinterconnectivityofnetworkswithinthefinancialindustry,the probabilityofabankgettinghackedisnolongeronlydependentonsimplysharing informationandengaginginresearch.whenabankinthenetworkgetshacked,other membersofthenetworkaresubsequentlymoresusceptibletogettinghackedaswell. Thiscontagioneffectthereforechangesthepayoffofeachindividualbank.Weassume thatthethreatfunctionisunchanged. Takingintoaccountthecontagioneffect, Banki spayoff= 1 "" ) 7) Here, istheprobabilitythatbankiishacked,isthenetworkeffect coefficient,and "" istheprobabilitythatanotherbankinthenetworkishacked,and affectsbankivianetworkeffects. WeseeherethatthecontagioneffecthasloweredBanki'spayoff.Therefore,the contagioneffectservesasamotivatingfactorforbankstoshareinformationwithinthe network,asmentionedabove,particularlysincethecostofsharinginformationiszero. Italsomotivatesbankstoengageinresearchtocontributetotheoverallsecurityofthe networktomaximizetheirsecurity. Thisisanimportantresultanddistinguishesthecybersecuritymarketfromthe LoJackmarket.TheinvestmentinaLoJackisverymuchindividual.AslongasPersoni investsinalojack,thegeneralrateoflojackinvestmentinpersoni sregiondoesnot affecthim.ontheotherhand,acollectivelyhighrateoflojackinvestmentinaregion withoutpersoniinvestinginonemayresultinalowerprobabilityofpersoni'scar gettingstolen,butdoesnothingtoaidrecoveryofpersoni'scarifitgetsstolen.
27 CasatrinaLee 3May2014 CHAPTER4:COMPARATIVEANALYSIS 24 Incontrast,companies researcheffortsareindividualresponsibilities.they contributetosecuringthenetworkasawholeastheyinvestinthecollectiveresearch donebythenetwork.italsobettersecurestheirindividualsystemfrombeinghacked, thereforeindirectlysecuringthenetworkatthesametime.theyshould,therefore, theoreticallybemoreinterestedincontributingtoimprovingtheoverallsecuritylevel oftheirnetwork.basedonourlastmodel,weseethatcollectiveeffortsarekeyincyber securitytoamplifynetworkeffectsandcorrespondinglyamplifythepositive externalitiesoverthenegativeexternalities.
28 CasatrinaLee 3May2014 CHAPTER5:DISCUSSION&ANALYSIS 25 Chapter5 Discussion&Analysis Asprovenbythemodelsabove,collaborationisdefinitelyadvantageousin tacklingtheproblemofcybersecurity.thefinancialservicessectoralreadyhasthefsp ISACinplace;onewouldnaturallyhopetoputinplacesimilarorganizationsinother industriestopromotecooperationinothersectors.however,asmuchasinformation sharinghasbeentoutedapossiblesolutionforcybersecurity,thereisamajorinherent problempcompanieslackadequateeconomicincentivestofacilitatesuchsharingin industriesotherthanthefinancialservicessector.instead,marketfailureand externalitiescomeintoplay. Firstandforemost,companiesareunwillingtoshareinformationwithother companies,becauseitmaymeanlosingtheircompetitiveedge,particularlyin industrieswheresystemsarepartofthecompany swinningmoves.forexample, Amazon.compridesitselfonitsefficientretailsystemandsupplychain,withsecure paymentoptionsandshortturnovertimes.theywouldbereluctanttoshareintimate informationabouttheirsystemsanditsvulnerabilitiestotheircompetitorsinthesame
29 CasatrinaLee 3May2014 CHAPTER5:DISCUSSION&ANALYSIS 26 spacewhoarelookingtooptimizetheirrespectivesystemstocompeteinthe ecommercemarket. Also,companiesarereluctanttoadmitwhenevertheirnetworkhasbeen breached,becauseofthepublicbacklashthatcouldoccurwhentheircustomerslearn thattheirinformationhasbeenleaked.thiscouldhavenegativeramificationsonthe hackedcompany sreputation.in2011,sonywasthevictimofamassivedatabreach andhadnaturallybeenreluctanttosharethecrimewiththepublic.itwasheavily criticizedwhenitfinallyadmittedtohavingbeenhacked,whichonlyservedtoamplify thepublicbacklash.onecanonlyimaginethatotherretailcompaniesliketargetwould becautiousinrevealingitsnetworksecurityflaws. Furthermore,aswehaveshownabove,informationsharingbringswithitthe problemoffreeriders.theproblemoffreeriderssimplyservestoincreasethebarriers againstencouragingcollaborationinotherindustriesagainstcybercrime.todate,the mosteffectiveeffortincombatingcybercrimehasbeeninthefinancialservices industry,insettingupthefspisac.wecanattributeseveralreasonstoitscollaborative successasopposedtootherindustries. Firstly,thepersonalinformationthatcustomersprovidetofinancialservices companiesaremuchmoresensitiveandimportantie.socialsecuritynumbers, personallyidentifiableinformation,bankaccountnumbers)thanthoseprovidedto retailerseg.shoppingpreferences).entrustedwithsuchinformation,financialservices companiesareheldresponsibleinensuringthattheinformationissecure.the importanceofhavingasecurenetworkisthereforemuchhigherinthefinancialsector thaninotherindustries.
30 CasatrinaLee 3May2014 CHAPTER5:DISCUSSION&ANALYSIS 27 Thereluctanceofotherindustriestoshareinformationwiththeircompetitorsis alsolessconspicuousinthefinancialsectorbecausesuchinformationisnottheedgeby whichfinancialservicescompaniescompeteinthemarket.financialinstitutionsare,in fact,highlymutuallydependentandthebulkoftheirrevenuecomesfromlarge investments,ratherthantheprecisemechanismsoftheirsystemsandcustomer preferences.theirhighmutualdependencealsonecessarilyimpliesahighercontagion effect,whichwouldposeagreaterthreatintheeventofanetworkbreach.these factorsthereforeuniquelyincentivizefinancialinstitutionstopartakeincollaborative effortstocombatcybercrime. Wedoknow,fromouraboveanalysis,thatsuchcollaborationandresearchisa highpcostandhighptimeinvestment.however,cooperationcancollectivelystrengthen thenetworkandhaveanetpositiveeffect.thesepositiveeffectsincludeincreased situationalawarenessofthecybercrimelandscape,aswellasmoreefficientdetection ofnetworkbreachesgiventhemyriadwaysthatanetworkcanbeinfiltrated. InformationsharingisclearlyincentivePcompatible,whileresearchactionseemstobe incentivepincompatible. GiventhatresearchistimeandcostPintensive,theuseofhoneypotscouldbea plausiblealternative,astheyarerelativelylowcost,butyetcontributetothedatabase ofknowledgeasaprecursortoresearch.honeypotsaretrapssettocounteract attemptsatunauthorizeduseofinformationsystems.theyinvolvecomputersthat seempartofthenetworkbutareactuallyisolatedandmonitored.thesecomputers seemtocontaininformationorresourcesofvaluetoattackers,baitinghackers,from whichthefspisaccanlearnvaluableinformationonthecriminals modus"operandiand
31 CasatrinaLee 3May2014 CHAPTER5:DISCUSSION&ANALYSIS 28 techniques.thisisacollective,yetactivemechanism,asitbuildsonthecollective strengthoftheorganization,isabletogleanusefulfindings,butrequireslessactive participationonthepartofindividualcompanies. Researchcouldbeoutsourcedwithstipulatedindividualinvestmentsinresearch expenditure.thisway,theresearchprocesswouldbemorecoherentandequitable. Whiletheaboveanalysisonlytakesintoaccountcollaborativeresearch,companiesmay beincentivizedtoconductprivateresearchontopofthat.this,whileclearlyservingto strengthentheindividualcompany ssystem,alsobenefitsthenetworkasawhole,by virtueofthestrongnetworkeffectsinthecybersecuritymarket.apossibleexampleof outsourcedresearchincludestheinterpolglobalcomplexforinnovationigci),which issettobecomeoperationalinsingaporein2014.thiswoulddefinitelyprovehighly effectivegiventhattheigciwouldhaveaccesstoinformationbeyondindustryand geographicalborders.researchwouldallowthreatstobeprepempted,andresponse andrecoveryfacilitated.
32 CasatrinaLee 3May2014 CHAPTER6:CONCLUSION 29 Chapter6 Conclusion ModelingtherespectivemarketsintheLoJackandcybercrimemarketshave illuminatedseveralkeysimilarities.theincentivestructuresofbothmodelsaresimilar, withemphasisoncontrastingmarginalprivatebenefitsofinvestinginalojackand cybersecurityresearchrespectivelywiththesocialbenefits.duetothefactthattherisk offallingvictimtoanattackdecreaseswithincreasedbuypinforboththelojackand cybersecuritymarkets,bothmodelsdemonstratesocialbenefitsthatfaroutweigh privatebenefits. Thereisacleardisincentiveforindividualsinbothmarketstoinvestinthe LoJackandcybersecurityresearchrespectively.Thisisbecauseoftheprivatecost incurredtotheindividual monetarycostofthelojackandtimeandmonetarycostsof cybersecurityresearch butyetzeromarginalprivategainssincenoattackhastaken placeyet.thereisthereforeabarrieragainsttheinitialinvestment. However,weknowthatwitheachindividual sinvestmentinthemarketreduces therespectiverisksofcrime,resultinginpositiveexternalities.inthelojackmarket,
33 CasatrinaLee 3May2014 CHAPTER6:CONCLUSION 30 whileanindividualwhochoosesnottoinvestinalojackmayreapthebenefitsofa loweredtheftrate,hereapsnobenefitifhiscaristargetedsinceitcannotberecovered easilywithoutalojack.thisitselfservesasmotivationforindividualstoinvestina LoJack.Ontheotherhand,companieswhodonotinvestincybersecurityresearch benefitfromtheloweredthreat,andalsoreaptherewardsofresearchconductedby othermembersofthenetworkwithoutneedingtospendasinglecent.successful researchbyothercompanieshelptostrengthenthenetworkasawhole,andmembers ofthenetworkwhochoosenottoinvestinresearchbenefitfromtheincreasedsecurity, effectivelybecomingfreeriders.therefore,duetodifferencesinthestructureof externalitiesandnetworkeffectsofthetwomodels,theincentiveeffectsaredifferent. Specifictothecybercrimemarket,assumingthatsharingofinformationwithin thenetworkincursnocost,themodelalsoshowsthatsharingofinformationamong companiesisoptimal.thepoolingofinformationhelpsimprovesituationalawareness ofthecybercrimelandscapeandthereforedecreasestheriskoffallingvictimtoan attack.furthermore,themodelshowedthattheamountthatcompaniesarewillingto investincybersecurityresearchisinfactalowconstant,independentofthevaluethey placeontheirinformationandofthecurrentriskofattack.thisagainreferstothe rampantexistenceoffreeriderswithinthemarket. Applyingthesefindingstothecybercrimemarket,wemustacknowledgefirst andforemostthat,althoughthesharingofinformationseemstobefeasibleand beneficialinthefinancialservicesindustry,thisisnoteasilytransferrabletoother industries,suchasretail.otherindustrieslackeconomicincentivestocooperateand fearpublicbacklashifinformationabouttheirsecuritybreachesareleaked.incontrast,
34 CasatrinaLee 3May2014 CHAPTER6:CONCLUSION 31 informationsecurityissuchakeyfacetoftheoperationsoffinancialinstitutionsthat theirmutualinterdependenceforcesthemtocooperate. Ontheresearchfront,apossiblealternativewouldbetheuseofhoneypots. Thesehoneypotscangleanvaluableinformationonattackvectorsbyposingastraps. ThisrequiresacollectivecontributionfromeachmemberoftheFSPISAC,butisowned bynoonemember,thereforealleviatingthefreeriderandunderprovisionphenomena. Anotherplausiblealternativewouldbetooutsourceresearchtointernationalbodies, thereforeallowingresearchcontributionsbyeachmembertobemoreequitable. Inall,inmodelingthemarketforcybercrime,itisevidentthatbothsharingand investmentinresearchiskeyforeffectiveimprovementinsecurity.tocombatthe problemoffreeriders,itisimportantfortheorganizationtosetcontractualtermssuch thatmembersareboundtocontributetoresearchinordertoreapthefullbenefitsof increasedsecurity.internationalbodiesarealsowellppositionedtoalleviatethefree riderproblembecausenotonlyaretheyimpartialandlesssusceptibletoincentive problems,theypossessgreaterresourcesthatcanincreasetheeffectivenessand holisticnatureoftheirresearch.
35 CasatrinaLee 3May2014 CHAPTER7:BIBLIOGRAPHY 32 Chapter7 Bibliography Abbas,Haider,Hemani,Ahmed,Magnusson,Christer&LouiseYngstrom. AStructured ApproachforInternalizingExternalitiesCausedbyITSecurityMechanisms. 2 nd " International"Workshop"on"Education"Technology"&"Computer"Science2010). Acquisti,Alessandro&SashaRomanosky. PrivacyCosts&PersonalDataProtection: Economic&LegalPerspectives. Berkeley"Technology"Law"Journal."Vol24.No ) Anderson,Ross."WhyinformationsecurityishardPaneconomicperspective."Computer" Security"Applications"Conference."358P ) Anderson,Ross&ShailendraFuloria. SecurityEconomics&CriticalNational Infrastructure. Economics"of"Information"Security"&"Privacy."2010) Anderson,Ross&TylerMoore. Economics&InternetSecurity:ASurveyofRecent Analytical,Empirical&BehavioralResearch. The"Oxford"Handbook"of"the"Digital" Economy,"Oxford"University"Press.2011)
36 CasatrinaLee 3May2014 CHAPTER7:BIBLIOGRAPHY 33 Anderson,Ross&TylerMoore. TheEconomicsofInformationSecurity. Science.Vol ) Anderson,Ross,Clayton,Richard&TylerMoore. TheEconomicsofOnlineCrime. Journal"of"Economic"Perspectives.Vol23.No.3.3P ). Andrijcic,Eva&BarryHorowitz. AMacroPEconomicFrameworkforEvaluationof CyberSecurityRisksRelatedtoProtectionofIntellectualProperty Risk"Analysis." Vol26.No ). Arora,Ashish,Nandkumar,Anand&RahulTelang. DoesInformationSecurityAttack FrequencyIncreaseWithVulnerabilityDisclosure?AnEmpiricalAnalysis. Information"Systems"Frontiers."Vol8,No.5.350P ) Aviram,Amitai&AvishalomTor. OvercomingImpedimentstoInformationSharing. Harvard"John"M"Olin"Discussion"Paper"Series."No ) Ayres,Ian&StevenLevitt. MeasuringPositiveExternalitiesfromUnobservableVictim Precaution:AnEmpiricalAnalysisofLojack The"Quarterly"Journal"of"Economics." Vol113.No.43P771998) Bauer,Johannes&MichelvanEeten. Cybersecurity:StakeholderIncentives, Externalities&PolicyOptions. Telecommunications"Policy."Vol33.706P719" 2009). Bauer,Johannes&MichelvanEeten. EconomicsofMalware:SecurityDecisions, Incentives&Externalities. STI"Working"Paper"2008). Bauer,Johannes&MichelvanEeten. EmergingThreatstoInternetSecurity Incentives,ExternalitiesandPolicyImplications. Journal"of"Contingencies"&" Crisis"Management,Vol17,No ).
37 CasatrinaLee 3May2014 CHAPTER7:BIBLIOGRAPHY 34 Bauer,Johannes&MichelvanEeten. IntroductiontotheEconomicsofCyberSecurity. Communication"&"Strategies.No ) Bolot,Jean&MarcLelarge. CyberInsuranceasanIncentiveforInternetSecurity. 7 th " Workshop"on"the"Economics"of"Information"Security.2008) Cook,Phillip. CoproductioninDeterringCrime. American"Society"of"Criminology.Vol 10.Issue1.2011) Cordes,Joseph. AnOverviewoftheEconomicsofCybersecurity&Cybersecurity Policy. The"George"Washington"University"Cyber"Security"Policy"&"Research" Institute."2011). Gandal,Neil. AnIntroductiontoKeyThemesinCyberSecurity. Tel"Aviv"University"&" CEPR."2006). Gordon,Lawrence,Loeb,Martin&WilliamLucyshyn. Sharinginformationon computersystemssecurity:aneconomicanalysis. Journal"of"Accounting"&" Public"Policy.2003)461P485 Gorden,Lawrence&Loeb,Martin. TheEconomicsofInformationSecurityInvestment. ACM"Transactions"on"Information"&"System"Security.Vol5,No ) Grady,Mark&FrancescoParisi. TheLawandEconomicsofCybersecurity:An Introduction. The"Law"and"Economics"of"Cybersecurity.2006) Johnsen,Bruce&SupriyaSarnikar. CyberSecurityintheNationalMarketSystem. Rutgers"Business"Law"Journal."Vol6.No1.2009) Katz,Michael&CarlShapiro. TechnologyAdoptioninthePresenceofNetwork Externalities. Journal"of"Political"Economy."Vol94,No4.1986)
38 CasatrinaLee 3May2014 CHAPTER7:BIBLIOGRAPHY 35 Kobayashi,Bruce. AnEconomicAnalysisofthePrivateandSocialCostsofthe ProvisionofCybersecurityandotherPublicSecurityGoods. Supreme"Court" Economic"Review.2005) Li,Xinghan. CybersecurityasaRelativeConcept. An"International"Journal."Vol18.11P ) Locke,Gary. Cybersecurity,Innovation&theInternetEconomy. The"Department"of" Commerce"Internet"Policy"Task"Force.2011) Moore,Tyler. IntroducingtheEconomicsofCybersecurity Proceedings"of"a"Workshop" on"deterring"cyber"attacks:"informing"strategies"&"developing"options"for"us" Policy." Mulligan,Deirdre&FredSchneider. DoctrineforCybersecurity. Cornell"University," University"of"California,"Berkeley."2011) Ozment,Andy&StuartSchechter. BootstrappingtheAdoptionofInternetSecurity Protocols. 5 th "Workshop"on"the"Economics"of"Information"Security.2006) Picker,Randal. CyberSecurity:OfHeterogeneity&Autarky. The"Law"School"of"The" University"of"Chicago."2004). Powell,Benjamin. IsCybersecurityaPublicGood?EvidencefromtheFinancial ServicesIndustry Journal"of"Law,"Economics"&"Policy."Vol1.No.22005) Swire,Peter. AModelforWhenDisclosureHelpsSecurity:WhatisDifferentAbout ComputerandNetworkSecurity? Journal"on"Telecommunications"and"High" Technology"Law."Vol2.2004)
South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected
At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At
thatthegoals,methods,andevaluationtechniquesofinformationandcomputersecurityare Moscow,ID83844
AnInformationSecurityEducationInitiativefor DepartmentofElectricaland ComputerEngineering Syracuse,NY13224 SyracuseUniversity Shiu-KaiChin EngineeringandComputerScience DepartmentofComputerScience DeborahFrincke
Access!Theft: The!Big!Problem!with!Unlimited!Long!Distance!Plans
Access!Theft: The!Big!Problem!with!Unlimited!Long!Distance!Plans Presented!by: David!Erickson President,!Free!Conferencing!Corporation [email protected] Jeff!Holoubek Director!of!Legal!and!Finance,!Free!Conferencing!Corporation
TheHouseholdBankruptcyDecision
TheHouseholdBankruptcyDecision GraduateSchoolofBusiness AnnArbor,MI48109-1220 DepartmentofEconomics UniversityofMichigan UniversityofChicago ErikHurst ScottFay AnnArbor,MI48109-1220 DepartmentofEconomics
New Car $16,000 5 yr. payments Car note 266.70/month. New Car $30,000 5 yr. payments Car note $500./month Car insurance $250/month Gasoline $75/week
Gasoline $75/week Car insurance $250/month Gasoline $75/week Car insurance $250/month Car insurance $250/month Gasoline $90/week Gasoline $60/week Car insurance $80/month Car insurance $250/month Car insurance
!!! 2014!!2015!NONPROFIT!SALARY!&!STAFFING!REPORT! NEW$YORK$CITY$AREA$ $ $ $ $ $ $
2014 2015NONPROFITSALARY&STAFFINGREPORT NEWYORKCITYAREA 2014NONPROFITSURVEYFINDINGS&2015TRENDS EXECUTIVESUMMARY Thisyear ssalarysurvey201422015confirmsgrowth andchallengesinthesectorduring2014andthestrong
Relationship,between,Dividend,Policy,and,Share,Price!
ArchivesofBusinessResearch Vol.3,No.3 PublicationDate:June25,2015 DOI:10.14738/abr.33.1118.) Ponsian,)N.,)Prosper,)K.,)Yuda,)T.,)&)Samwel,)G.)(2015).)Relationship)between)Dividend)policy)and)Share)Price.)Archives'of'
URTIIN DUU: PERFORMING MUSICAL LANDSCAPES AND THE MONGOLIAN NATION LILIANA CARRIZO THESIS
URTIINDUU: PERFORMINGMUSICALLANDSCAPESANDTHEMONGOLIANNATION BY LILIANACARRIZO THESIS Submittedinpartialfulfillmentoftherequirements forthedegreeofmasterofmusicinmusic withaconcentrationinmusicology inthegraduatecollegeofthe
TrinityHall, Cambridge, England.
usingrecurrentneuralnetworks HandwritingRecognition O-lineCursive AndrewWilliamSenior A TrinityHall, Cambridge, England. Thisthesisissubmittedforconsideration forthedegreeofdoctorofphilosophy attheuniversityofcambridge.
Recruitment Proposal for Curtiss Wright Controls
March12 09 RecruitmentProposalforCurtissWrightControls DecisionToolbox RecruitmentProcessOutsourcing(RPO)Partnership Presentedby LorenMiner,COO [email protected] 562 377 5650 JoannaSherriff,VPCreativeServices
Investing in your future is our commitment to you!
Lakeside Bank has met the financial needs of Chicago for nearly 40 years. With our competitive products and services to meet your every need, you can count on Lakeside Bank to help you achieve both your
Section 5.1 - Compound Interest
Section 5.1 - Compound Interest Simple Interest Formulas If I denotes the interest on a principal P (in dollars) at an interest rate of r (as a decimal) per year for t years, then we have: Interest: Accumulated
Masters Programs Course Syllabus
2 nd Semester, 2 nd Half (4 th Quarter) 2015-2016 2261 Energy Finance INSTRUCTOR: João Pedro Pereira CONTACT: [email protected]; phone 213 801 637; office 330.368. OFFICE HOURS: Thu, 15h-16h, or
Enterprise Project Management: A Strategic View
Enterprise Project Management: A Strategic View 2004 By Lew Ireland, Ph.D. President of the American Society for the Advancement of Project Management Introduction Enterprise project management (EPM) has
INVESTING IN CYBERSECURITY:
INVESTING IN CYBERSECURITY: Insights from the Gordon-Loeb Model Lawrence A. Gordon EY Alumni Professor of Managerial Accounting & Information Assurance Affiliate Professor in University of Maryland Institute
"The"Implementa-on"of"a" Mul-dimensional"Interna-onal"Ranking!
Presentedby: TheImplementa-onofa Mul-dimensionalInterna-onalRanking! DonF.Westerheijden CHEPS,UniversityofTwente,Netherlands Conference St.PetersburgforEduca2onandReform St.Petersburg,21March2014 @UMul2rank
Rossmoor Website SEO Tracking Sheet 2012-2014 Updated: April 1, 2014
As of 5/4/2012 As of 5/14/2012 active senior living no n/a active senior living no n/a adult golf community no n/a adult golf community no n/a 55+ community yes 8th 55+ community yes 8th retirement living
The importance of public-private partnership. Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation
The importance of public-private partnership Peter Hondebrink Ministry of Economic Affairs, Agriculture and Innovation Cybersecurity, safety and trust 1) Strategic documents: National Cybersecurity Strategy
DataIntegrationwithXMLandSemanticWeb Technologies
DataIntegrationwithXMLandSemanticWeb Technologies Athesispresented by RubénTous Submittedinpartialfullmentoftherequerimentsfor DoctorateinComputerScienceandDigitalCommunication thedegreeofdoctorofphilosophy
Max Gardner s Top Reasons to Always File a Chapter 13 Before Filing a Chapter 7
Max Gardner s Top Reasons to Always File a Chapter 13 Before Filing a Chapter 7 1. You can file a 13 for the Husband or the Wife. If the single-debtor case runs into viability problems, then you can always
Working(Capital(Management"and"Firm"Profitability"During"a" Period'of"Financial&Crisis:&Empirical&Study&in&Emerging&Country& of"vietnam)
Advances)in)Social)Sciences)Research)Journal) )Vol.3,)No.3) Publication)Date:March.25,2016 DoI:10.14738/assrj.33.1816. VU,' M.' C.' (2016).' Working' Capital' Management' and' Firm' Profitability' During'
Villages at Paseo Del SOl
186 Single Family Attached Units Planned Over 23.000 Cars Per Day Margarita Rd De Portola Rd Paloma Del Sol Park 288 Apartments Planned Over 9,900 Cars Per Day Meadows Pkwy Campanula Way Proposed Medical
Understanding Home Health Prospective Payment System (HH PPS) Health Insurance Prospective Payment System (HIPPS) Code Changes
Understanding Home Health Prospective Payment System (HH PPS) Health Insurance Prospective Payment System (HIPPS) Code Changes The following information is to be used to assist in determining how the Fiscal
Learn How to Use The Roulette Layout To Calculate Winning Payoffs For All Straight-up Winning Bets
Learn How to Use The Roulette Layout To Calculate Winning Payoffs For All Straight-up Winning Bets Understand that every square on every street on every roulette layout has a value depending on the bet
hp calculators HP 12C Loan Amortizations Amortization The HP12C amortization approach Practice amortizing loans
Amortization The HP12C amortization approach Practice amortizing loans Amortization The word 'amortization' comes from a Latin word meaning "about to die". When a loan earning interest has regular, fixed
SECURITY ANALYSIS OF CLOUD COMPUTING
Anju Chhibber* Dr. Sunil Batra** International Journal of Advanced Research in SECURITY ANALYSIS OF CLOUD COMPUTING Abstract: Cloud computing is a model that uses the concept of utility computing that
HERZING UNIVERSITY ACADEMIC CALENDAR
HERZING UNIVERSITY ACADEMIC CALENDAR Classes at Herzing University run year-round with breaks as listed below. The calendar at some Herzing University campuses may vary slightly, so please check with your
What Are My Options When My Home Is. Scheduled For A Sheriff Sale
What Are My Options When My Home Is Scheduled For A Sheriff Sale 1. What is a sheriff sale? Once the lender has a judgment in its foreclosure case against you, it can then order your home to be sold at
Guidelines for Establishment of Contract Areas Computer Science Department
Guidelines for Establishment of Contract Areas Computer Science Department Current 07/01/07 Statement: The Contract Area is designed to allow a student, in cooperation with a member of the Computer Science
https://assessment.casa.uh.edu/assessment/printtest.htm PRINTABLE VERSION Quiz 4
1 of 6 2/21/2013 8:18 AM PRINTABLE VERSION Quiz 4 Question 1 Luke invested $130 at 4% simple interest for a period of 7 years. How much will his investment be worth after 7 years? a) $169.40 b) $166.40
UniversalTemporalDataLanguages CindyXinminChenandCarloZaniolo UniversityofCaliforniaatLosAngeles ComputerScienceDepartment Abstract.Temporalreasoningandtemporalquerylanguagespresentdicultresearchchallenges,whichareslowlyyieldingtothecombinedattackofmanyinvestigationsmotivated
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to
Persuasive Speech Outline. Specific Purpose: To persuade my audience to not get distracted while driving so they will not get into a car accident
Persuasive Speech Outline Topic: Distracted Driving General Purpose: To Persuade Specific Purpose: To persuade my audience to not get distracted while driving so they will not get into a car accident Thesis
Problem Set 1 Foundations of Financial Markets Instructor: Erin Smith Summer 2011 Due date: Beginning of class, May 31
Problem Set Foundations of Financial Markets Instructor: Erin Smith Summer 20 Due date: Beginning of class, May 3. Suppose the debt holders of a cosmetics firm hold debt with a face value of $500,000.
Taking Credit & Debit Card Payments with PayPros
Taking Credit & Debit Card Payments with PayPros Table of Contents 1. Payment Types 1.1. Monthly/Semi-Monthly/Bi-Weekly/Weekly Payments 1.2. Side Note Payments 1.3. Net Payoff 1.4. Deposits 1.5. Down Payments
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users
for lease 10280 Baltimore Avenue COLLEGE PARK, MD 20705 OVERVIEW FEATURING DEMOGRAPHICS AT A GLANCE
10280 Baltimore venue COLLEGE PRK, MD 20705 OVERVIEW High profile, second generation restaurant space available for sublease in College Park, MD. Conveniently located on US Route 1 (Baltimore venue), just
RevisedJanuary26,1996. 1
EarliestEligibleVirtualDeadlineFirst:AFlexible andaccuratemechanismforproportionalshare DepartmentofComputerScience,OldDominionUniversity ResourceAllocation IonStoica,HusseinAbdel-Wahab fstoica,[email protected]
TEMPLATES FOR PROGRESSIVE PAIRING LADDER
FEDERATION DE TEMPLATES FOR PROGRESSIVE PAIRING LADDER Elimination ladder - Progressive-ladder Car Field 4 Car Field 1 1 4 2 2 5 Car Field 6 Car Field 7 Car Field 8 Car Field 1 1 1 1 6 8 4 4 4 5 5 2 2
Money Management Planner - Financial Worksheets For Debt Relief
Money Management Planner - Financial Worksheets For Debt Relief http://www.debtsteps.com These worksheets are only part of what you need to succeed with debt relief. Your commitment to manage your money,
Enrollment and Billing Test Plan Scenarios Dual and Rate-Ready Billing
Enrollment and Billing Test Plan Scenarios Dual and Rate-Ready Billing Internet Connectivity Scenario C.501: Internet: Connectivity Test Test the ability to send a file via the Internet standard protocol.
Frequently Asked Questions
Harrison High School Driver Education Program 2015 1. How do students sign up for Driver's Ed? Frequently Asked Questions Harrison High School (HHS) offers a Driver Education course in the spring, summer,
Cyber Security in Europe
Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community
Welcome! Please Sign in and Fill out the forms: AARP Participant Agreement Student Information/Pre-Assessment
Welcome! Please Sign in and Fill out the forms: AARP Participant Agreement Student Information/Pre-Assessment 1 Sponsored by and developed in collaboration with AARP FOUNDATION FINANCES 50+ TAKING CONTROL
Lemon Law Letters This package contains:
Lemon Law Letters This package contains: 1. Instructions & Checklist for writing various Lemon Law Letters 2. 1 st Lemon Law Letter 3. 2nd Lemon Law Letter 4. 3rd Lemon Law Letter Instructions & Checklist
2/22/2011. Agenda. Managing Emerging Risks --- An Oxymoron? Emerging Risk Definition. Emerging Risk Management Basics. Active Risk Management
Managing --- An Oxymoron? Beverly Barney, FSA, MAAA, CERA The Prudential Insurance Company of America March 16, 2011 Agenda Emerging Risk Definition Emerging Risk Management Basics Active Risk Management
HOW TO CALCULATE PRESENT VALUES
Chapter 2 HOW TO CALCULATE PRESENT VALUES Brealey, Myers, and Allen Principles of Corporate Finance 11 th Global Edition McGraw-Hill Education Copyright 2014 by The McGraw-Hill Companies, Inc. All rights
1.888.LOJACK.1 / www.lojack.ca. Owner s Manual CAUTION! NEVER LEAVE THIS MANUAL IN YOUR VEHICLE.
1.888.LOJACK.1 / www.lojack.ca Owner s Manual CAUTION! NEVER LEAVE THIS MANUAL IN YOUR VEHICLE. Welcome to 24/7 peace of mind with LoJack To begin, please remove the Client Card on the cover of this manual
Schedule of VET tuition fees 2016 Name of course: Diploma of Business Training Package Code: BSB50215 Delivery location(s): Virtual Campus
Schedule of VET tuition fees 2016 Name of course: Diploma of Business Training Package Code: BSB50215 Delivery location(s): Virtual Campus Delivery mode(s): External via the Virtual Campus The Diploma
21.1 Arithmetic Growth and Simple Interest
21.1 Arithmetic Growth and Simple Interest When you open a savings account, your primary concerns are the safety and growth of your savings. Suppose you deposit $1000 in an account that pays interest at
Angelika Mader Veri cation of Modal Properties Using Boolean Equation Systems EDITION VERSAL 8
UsingBooleanEquationSystems VericationofModalProperties AngelikaMader EDITIONVERSAL8 Band1:E.Kindler:ModularerEntwurf Herausgeber:WolfgangReisig Lektorat:RolfWalter EDITIONVERSAL Band2:R.Walter:PetrinetzmodelleverteilterAlgorithmen.
~ BANKRUPTCY PACKET ~
~ BANKRUPTCY PACKET ~ BANKRUPTCY INFORMATION You must list EVERYTHING you own and ALL of your debts. You cannot fail to list something because I do not want to file on that. TAX DEBTS: Tax debts and liens
Physics of Sports CTY Course Syllabus
Physics of Sports CTY Course Syllabus Texts: 1. Gold Medal Physics: The Science of Sports, by Arthur John Eric Goff 2. Active Physics: An Inquiry Approach to Physics, by Arthur Eisenkraft Course Schedule:
Green Tree Servicing LLC Attention: Central Recovery, T120 7360 S. Kyrene Road Tempe, AZ 85283-9814
Customer Name: Co-Borrower Name: Address: City,State,Zip: Green Tree Servicing LLC Attention: Central Recovery, T120 7360 S. Kyrene Road Tempe, AZ 85283-9814 RE: Account # Prop. Addr: Fax #: Short Sale
Functional Requirements Document -Use Cases-
EUROPEAN COMMISSION DIRECTORATE GENERAL JRC JOINT RESEARCH CENTRE Cyber-security & New Technologies for Combating Fraud (CSCF) Institute for the Protection and Security of the Citizen (IPSC) EYE IN THE
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Analysis of distance learning in smart schools in Iran: A case study of Tehran s smart schools
Analysis of distance learning in smart schools in Iran: A case study of Tehran s smart schools Vahid Motamedi ABSTRACT In the paradigm of information society the structure and facts have become flexible
We never talked directly about the next two questions, but THINK about them they are related to everything we ve talked about during the past week:
ECO 220 Intermediate Microeconomics Professor Mike Rizzo Third COLLECTED Problem Set SOLUTIONS This is an assignment that WILL be collected and graded. Please feel free to talk about the assignment with
DIY retail in Poland 2015. Market analysis and development forecasts for 2015-2020
2 Language: English Date of publication: March 2015 Delivery: pdf Price from: 700 Find out Which are the top selling DIY retailers in Poland? Which trends have recently emerged in the Polish DIY retail
A = P [ (1 + r/n) nt 1 ] (r/n)
April 23 8.4 Annuities, Stocks and Bonds ---- Systematic Savings Annuity = sequence of equal payments made at equal time periods i.e. depositing $1000 at the end of every year into an IRA Value of an annuity
Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven
Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven 2 3 NSA calls the iphone users public 'zombies' who pay for their own surveillance 4 Snowden revelations NSA: Collect it
The New Mexico Lottery
The New Mexico Lottery 26 February 2014 Lotteries 26 February 2014 1/27 Today we will discuss the various New Mexico Lottery games and look at odds of winning and the expected value of playing the various
Bayesian Nash Equilibrium
. Bayesian Nash Equilibrium . In the final two weeks: Goals Understand what a game of incomplete information (Bayesian game) is Understand how to model static Bayesian games Be able to apply Bayes Nash
Running head: 50 CHARACTER VERSION OF TITLE IN CAPS 1. Title of Paper (up to 12 words) Your Name, Including Middle Initial. School
Running head: 50 CHARACTER VERSION OF TITLE IN CAPS 1 Title of Paper (up to 12 words) Your Name, Including Middle Initial School 50 CHARACTER VERSION OF TITLE IN CAPS 2 Abstract A concise summary of each
New Jersey Department of Education August 2011
New Jersey Department of Education August 2011 Each school safety and security plan must be reviewed at least once a year. It is recommended that this review be conducted by the third week in October,
Debt Freedom. Primerica Canada Debt Freedom System
Debt Freedom Primerica Canada Debt Freedom System To receive a SMART Loan referral fee, the new associate must introduce the client to the certified field trainer to make the referral. New associates must
TELNET CLIENT 5.0 SSL/TLS SUPPORT
TELNET CLIENT 5.0 SSL/TLS SUPPORT This document provides information on the SSL/ TLS support available in Telnet Client 5.0 This document describes how to install and configure SSL/TLS support and verification
SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols
International Telecommunication Union ITU-T X.1154 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2013) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services
SIP-H.323 Interworking
SIP-H.323 Interworking Phone (408) 451-1430 1762 Technology Drive Suite 124 Fax (408) 451-1440 San Jose CA 95110-1307 USA URL www.ipdialog.com Joon Maeng [email protected] SIP and H.323! IETF SIP! Session
Chicago Title Insurance Company
Short Sale Processing Document Check List Letter of Authorization & Release Client Information Form Hardship Letter (must be signed and dated) Financial Statement (Profit & Loss Statement or Budget must
Judicial Review Claim Form
Judicial Review Claim Form In the High Court of Justice Administrative Court tes for guidance are available which explain how to complete the judicial review claim form. Please read them carefully before
