IDEAS home Printed from https://ideas.repec.org/a/kap/regeco/v31y2007i1p37-55.html
   My bibliography  Save this article

The potential for underinvestment in internet security: implications for regulatory policy

Author

Listed:
  • Alfredo Garcia
  • Barry Horowitz

Abstract

With the continuing growth of the use of the Internet for business purposes, the consequences of a possible cyber attack that could create a large scale outage of long time duration becomes a more and more serious economic issue. In this paper, we construct a game-theoretic model that addresses the economic motivations for investment in added Internet security and makes a case for a possible market failure in the form of underinvestment in the provision of Internet security. This result relies on the fact that the social value derived from consumption (which is at least equal to a fraction of the surplus derived from e-commerce) greatly exceeds the revenue at stake associated with the telecommunications companies’ and ISP’s security levels. If the ratio of social value to revenue at stake to Internet providers continues to grow, the likelihood of underinvestment in security becomes higher and some form of regulation may become necessary. We discuss the difficulties associated with designing and enforcing a regulatory scheme based upon mandatory security standards. Copyright Springer Science+Business Media, LLC 2007

Suggested Citation

  • Alfredo Garcia & Barry Horowitz, 2007. "The potential for underinvestment in internet security: implications for regulatory policy," Journal of Regulatory Economics, Springer, vol. 31(1), pages 37-55, February.
  • Handle: RePEc:kap:regeco:v:31:y:2007:i:1:p:37-55
    DOI: 10.1007/s11149-006-9011-y
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s11149-006-9011-y
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s11149-006-9011-y?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Martin Cave & Robin Mason, 2001. "The Economics of the Internet: Infrastructure and Regulation," Oxford Review of Economic Policy, Oxford University Press and Oxford Review of Economic Policy Limited, vol. 17(2), pages 188-201, Summer.
    2. Giovannetti, Emanuele, 2001. "Perpetual Leapfrogging in Bertrand Duopoly," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 42(3), pages 671-696, August.
    3. Esther Gal-Or & Anindya Ghose, 2005. "The Economic Incentives for Sharing Security Information," Information Systems Research, INFORMS, vol. 16(2), pages 186-208, June.
    4. Carl Shapiro, 1983. "Premiums for High Quality Products as Returns to Reputations," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 98(4), pages 659-679.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
    2. Alexander A. Ganin & Phuoc Quach & Mahesh Panwar & Zachary A. Collier & Jeffrey M. Keisler & Dayton Marchese & Igor Linkov, 2020. "Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management," Risk Analysis, John Wiley & Sons, vol. 40(1), pages 183-199, January.
    3. Berg, Nathan & Kim, Jeong-Yoo, 2022. "Optimal online-payment security system and the role of liability sharing," Economic Modelling, Elsevier, vol. 110(C).
    4. Kathryn Merrick & Medria Hardhienata & Kamran Shafi & Jiankun Hu, 2016. "A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios," Future Internet, MDPI, vol. 8(3), pages 1-29, July.
    5. Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yoseph, Nir Shlomo, 2018. "The Impact of Environmental Fraud on the Used Car Market: Evidence from Dieselgate," CEPR Discussion Papers 12899, C.E.P.R. Discussion Papers.
    2. Villas-Boas, Sofia B, 2020. "Reduced Form Evidence on Belief Updating Under Asymmetric Information," Department of Agricultural & Resource Economics, UC Berkeley, Working Paper Series qt08c456vk, Department of Agricultural & Resource Economics, UC Berkeley.
    3. Claire Chambolle & Eric Giraud‐Héraud, 2005. "Certification of Origin as a Non‐Tariff Barrier," Review of International Economics, Wiley Blackwell, vol. 13(3), pages 461-471, August.
    4. Tahir Andrabi & Jishnu Das & Asim Ijaz Khwaja, 2017. "Report Cards: The Impact of Providing School and Child Test Scores on Educational Markets," American Economic Review, American Economic Association, vol. 107(6), pages 1535-1563, June.
    5. Benito Arruñada, 2020. "Prospects of Blockchain in Contract and Property," Springer Books, in: Amnon Lehavi & Ronit Levine-Schnur (ed.), Disruptive Technology, Legal Innovation, and the Future of Real Estate, edition 1, pages 35-55, Springer.
    6. Anna Nagurney & Dong Li, 2014. "Equilibria and dynamics of supply chain network competition with information asymmetry in quality and minimum quality standards," Computational Management Science, Springer, vol. 11(3), pages 285-315, July.
    7. John R. Bowblis & Andrew Ghattas, 2017. "The Impact of Minimum Quality Standard Regulations on Nursing Home Staffing, Quality, and Exit Decisions," Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 50(1), pages 43-68, February.
    8. Minzyuk, Larysa, 2010. "The development of non-monetary means of payment," MPRA Paper 28167, University Library of Munich, Germany, revised 2010.
    9. Luisa Menapace & GianCarlo Moschini, 2012. "Quality certification by geographical indications, trademarks and firm reputation," European Review of Agricultural Economics, Oxford University Press and the European Agricultural and Applied Economics Publications Foundation, vol. 39(4), pages 539-566, September.
    10. Michelle Haynes & Steve Thompson, 2012. "The Economic Significance of User-Generated Feedback," International Journal of the Economics of Business, Taylor & Francis Journals, vol. 19(1), pages 153-166, February.
    11. Steenkamp, J-B.E.M. & Nijs, V.R. & Hanssens, D.M. & Dekimpe, M.G., 2002. "Competitive Reactions and the Cross-Sales Effects of Advertising and Promotion," ERIM Report Series Research in Management ERS-2002-20-MKT, Erasmus Research Institute of Management (ERIM), ERIM is the joint research institute of the Rotterdam School of Management, Erasmus University and the Erasmus School of Economics (ESE) at Erasmus University Rotterdam.
    12. Yu Ding & Wayne S. DeSarbo & Dominique M. Hanssens & Kamel Jedidi & John G. Lynch & Donald R. Lehmann, 2020. "The past, present, and future of measurement and methods in marketing analysis," Marketing Letters, Springer, vol. 31(2), pages 175-186, September.
    13. David Martimort & Aggey Semenov & Lars Stole, 2017. "A Theory of Contracts with Limited Enforcement," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 84(2), pages 816-852.
    14. Amol Navathe & Guy David, 2009. "The Formation of Peer Reputation among Physicians and Its Effect on Technology Adoption," Journal of Human Capital, University of Chicago Press, vol. 3(4), pages 289-322.
    15. Cremer, Jacques & Khalil, Fahad, 1992. "Gathering Information before Signing a Contract," American Economic Review, American Economic Association, vol. 82(3), pages 566-578, June.
    16. Kai-Lung Hui & Ping Fan Ke & Yuxi Yao & Wei T. Yue, 2019. "Bilateral Liability-Based Contracts in Information Security Outsourcing," Information Systems Research, INFORMS, vol. 30(2), pages 411-429, June.
    17. Venkatachalam, Mohan & Rajgopal, Shivaram & Kotha, Suresh, 2000. "Does the Quality of Online Customer Experience Create a Sustainable Competitive Advantage for E-Commerce Firms?," Research Papers 1666, Stanford University, Graduate School of Business.
    18. Khurshed, Arif & Kostas, Dimitris & Mohamed, Abdulkadir & Saadouni, Brahim, 2018. "Initial public offerings on the UK when-issued market," Journal of Corporate Finance, Elsevier, vol. 49(C), pages 1-14.
    19. Mahenc, Philippe & Meunier, Valérie, 2006. "Early Sales of Bordeaux grands crus," Journal of Wine Economics, Cambridge University Press, vol. 1(1), pages 57-74, April.
    20. Eric Rasmusen, 2008. "Quality-Ensuring Profits," Working Papers 2008-10, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy.

    More about this item

    Keywords

    Internet Security; Market Failure; Game Theory; Nash Equilibrium; Markov perfect equilibrium; L51; L86; C72; C73; K23;
    All these keywords.

    JEL classification:

    • L51 - Industrial Organization - - Regulation and Industrial Policy - - - Economics of Regulation
    • L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
    • C72 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Noncooperative Games
    • C73 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Stochastic and Dynamic Games; Evolutionary Games
    • K23 - Law and Economics - - Regulation and Business Law - - - Regulated Industries and Administrative Law

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:regeco:v:31:y:2007:i:1:p:37-55. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.