This is a preview of how your content will look on export. To export the complete content in DOC format, click the blue export button in the upper right corner of this page.
2.2.2 Cyber-Asymmetries
  • 1 Jack Goldsmith, The New Vulnerability, The New Republic, Jun 7, 2010

    A review of Richard Clarke’s book, provides some counter-balance to the threat Clarke outlines and the underlying assumption of his book, that US activities are abroad are legitimate, while adversaries are acting illegally.

  • 2 2.2.2.a Failure of Market Incentives (cost-burden asymmetry)

    • 2.1 Seymour E. Goodman and Herbert S. Lin, Toward a Safer and More Secure Cyberspace, Ch. 6.4: The Economics of Cybersecurity, National Research Council, 2007, pp. 142-165

      This section provides an economic perspective on why cybersecurity is hard and on why (if at all) there is underinvestment in cybersecurity.

    • 2.2 Tyler Moore, Introducing the Economics of Cybersecurity: Principles and Policy Options, Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy, 2010

      This paper outlines the various economic challenges plaguing cybersecurity: misaligned incentives, information asymmetries, and externalities.

You've reached the bottom of your content preview.
To view the rest in your browser, click here.
To export the complete content in DOC format, click the blue export button in the upper right corner of this page.

(Note: If you view the entire playlist, any changes you've made to export settings will be lost. Large playlists may temporarily freeze your browser while loading, as well.)