IDEAS home Printed from https://ideas.repec.org/p/pra/mprapa/47883.html
   My bibliography  Save this paper

Cybersecurity in the perspective of Internet traffic growth

Author

Listed:
  • Kox, Henk L.M.

Abstract

Private and public concern about digital security, cybercrime and data privacy is growing the last few years. If Internet-related markets are flexible enough to cope with security concerns, given time, one would expect that - per unit of Internet traffic - the number and costs of cybersecurity incidents fall over time. This paper is a first attempt to assess empirically whether overall Internet traffic growth has grown faster than the number of cybersecurity incidents. The conclusion is that, overall, the Internet has over time has become a safer place when measured by the number of security incidents per unit of transmitted data. The implication is that the current surge in reported cyberincidents is primarily driven by the growth in scale and pervasiveness of Internet communication exchange. There are a number of caveats that should be taken into account, but for this more consistent and reliable cybersecurity statistics would be required than are available at present.

Suggested Citation

  • Kox, Henk L.M., 2013. "Cybersecurity in the perspective of Internet traffic growth," MPRA Paper 47883, University Library of Munich, Germany.
  • Handle: RePEc:pra:mprapa:47883
    as

    Download full text from publisher

    File URL: https://mpra.ub.uni-muenchen.de/47883/1/MPRA_paper_47883.pdf
    File Function: original version
    Download Restriction: no

    File URL: https://mpra.ub.uni-muenchen.de/47994/16/MPRA_paper_47994.pdf
    File Function: revised version
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Justin M. Rao & David H. Reiley, 2012. "The Economics of Spam," Journal of Economic Perspectives, American Economic Association, vol. 26(3), pages 87-110, Summer.
    2. Bauer, Johannes M. & van Eeten, Michel J.G., 0. "Cybersecurity: Stakeholder incentives, externalities, and policy options," Telecommunications Policy, Elsevier, vol. 33(10-11), pages 706-719, November.
    3. Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
    4. Michel J. G. van Eeten & Johannes M. Bauer, 2008. "Economics of Malware: Security Decisions, Incentives and Externalities," OECD Science, Technology and Industry Working Papers 2008/1, OECD Publishing.
    5. Dennis Weller & Bill Woodcock, 2013. "Internet Traffic Exchange: Market Developments and Policy Challenges," OECD Digital Economy Papers 207, OECD Publishing.
    6. Oecd, 2012. "Proactive Policy Measures by Internet Service Providers against Botnets," OECD Digital Economy Papers 199, OECD Publishing.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Md. Hamid Uddin & Md. Hakim Ali & Mohammad Kabir Hassan, 2020. "Cybersecurity hazards and financial system vulnerability: a synthesis of literature," Risk Management, Palgrave Macmillan, vol. 22(4), pages 239-309, December.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Schmidt, Andreas, 2012. "At the boundaries of peer production: The organization of Internet security production in the cases of Estonia 2007 and Conficker," Telecommunications Policy, Elsevier, vol. 36(6), pages 451-461.
    2. Zhuo, Ran & Huffaker, Bradley & claffy, kc & Greenstein, Shane, 2021. "The impact of the General Data Protection Regulation on internet interconnection," Telecommunications Policy, Elsevier, vol. 45(2).
    3. Malecki, Edward J., 2017. "Real people, virtual places, and the spaces in between," Socio-Economic Planning Sciences, Elsevier, vol. 58(C), pages 3-12.
    4. Hui, Kai-Lung & Zhou, Jiali, 2020. "The Economics of Hacking," MPRA Paper 102706, University Library of Munich, Germany.
    5. Jian Pei, 2020. "A Survey on Data Pricing: from Economics to Data Science," Papers 2009.04462, arXiv.org, revised Nov 2020.
    6. Sun Me Choi & Christian Fernando Libaque-Saenz & Sang-woo Lee & Myeong-Cheol Park, 2016. "Margin squeeze in the Internet backbone interconnection market: a case study of Korea," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 61(3), pages 531-542, March.
    7. Joël Cariolle & Yasmine Elkhateeb & Mathilde Maurel, 2022. "(Mis-)information technology: Internet use and perception of democracy in Africa," Documents de travail du Centre d'Economie de la Sorbonne 22010, Université Panthéon-Sorbonne (Paris 1), Centre d'Economie de la Sorbonne.
    8. Gauguier, Jean-Jacques, 2009. "L’industrialisation de l’Open Source," Economics Thesis from University Paris Dauphine, Paris Dauphine University, number 123456789/4388 edited by Toledano, Joëlle.
    9. Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
    10. Cloos, Janis & Mohr, Svenja, 2022. "Acceptance of data sharing in smartphone apps from key industries of the digital transformation: A representative population survey for Germany," Technological Forecasting and Social Change, Elsevier, vol. 176(C).
    11. Cariolle, Joël, 2021. "International connectivity and the digital divide in Sub-Saharan Africa," Information Economics and Policy, Elsevier, vol. 55(C).
    12. Rosie Collins & Cavan O’Connor-Close & Aria Zhang, 2020. "Cyber incident cost estimates and the importance of building resilience," Reserve Bank of New Zealand Bulletin, Reserve Bank of New Zealand, vol. 83, pages 1-17, February.
    13. Seo-Young Cho, 2016. "A crime 2.0 - cybercrime, e-talent, and institutions," MAGKS Papers on Economics 201608, Philipps-Universität Marburg, Faculty of Business Administration and Economics, Department of Economics (Volkswirtschaftliche Abteilung).
    14. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defence, and Contagion in Networks," Review of Economic Studies, Oxford University Press, vol. 81(4), pages 1518-1542.
    15. Joël Cariolle & Michele Imbruno & Jaime de Melo, 2020. "Bilateral digital connectivity and firm participation in export markets," Working Papers hal-03182438, HAL.
    16. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    17. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    18. Michele Imbruno & Joel Cariolle & Jaime de Melo, 2022. "Digital connectivity and firm participation in foreign markets: An exporter-based bilateral analysis," Discussion Papers 2022-02, University of Nottingham, GEP.
    19. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    20. Tyler MOORE & Richard CLAYTON, 2011. "The Impact of Public Information on Phishing Attack and Defense," Communications & Strategies, IDATE, Com&Strat dept., vol. 1(81), pages 45-68, 1st quart.

    More about this item

    Keywords

    Internet traffic; cybersecurity; time trend safety Internet;
    All these keywords.

    JEL classification:

    • L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
    • L96 - Industrial Organization - - Industry Studies: Transportation and Utilities - - - Telecommunications
    • N7 - Economic History - - Economic History: Transport, International and Domestic Trade, Energy, and Other Services

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pra:mprapa:47883. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Joachim Winter (email available below). General contact details of provider: https://edirc.repec.org/data/vfmunde.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.