Cambridge Catalogue  
  • Your account
  • View basket
  • Help
Home > Catalogue > The Law and Economics of Cybersecurity
The Law and Economics of Cybersecurity
Google Book Search

Search this book


  • Page extent: 320 pages
  • Size: 228 x 152 mm
  • Weight: 0.64 kg
Add to basket


 (ISBN-13: 9780521855273 | ISBN-10: 0521855276)

DOI: 10.2277/0521855276

Manufactured on demand: supplied direct from the printer

 (Stock level updated: 02:09 GMT, 28 November 2015)


Cybersecurity is a leading national problem for which the market may fail to produce a solution. The ultimate source of the problem is that computer owners lack adequate incentives to invest in security because they bear fully the costs of their security precautions but share the benefits with their network partners. In a world of positive transaction costs, individuals often select less than optimal security levels. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition of nations. Originally published in 2006, this book brings together the views of leading law and economics scholars on the nature of the cybersecurity problem and possible solutions to it. Many of these solutions are market based, but they need some help, either from government or industry groups, or both. Indeed, the cybersecurity problem prefigures a host of twenty-first-century problems created by information technology and the globalization of markets.

• Cybersecurity is a leading concern in the twenty-first century, much as the environmental problems were in the twentieth century • The cybersecurity issue is a global problem for which traditional forms of national regulation and international cooperation are inadequate • The problems addressed in the book will show us the dark side of globalization and will teach us ways of thinking about how to control malicious intent


Part I. Problems: 1. Private versus social incentives in cybersecurity, law and economics Bruce K. Kobayashi; 2. A model for when disclosure helps security: what is different about computer and network security? Peter Swire; 3. Peer production of survivable critical infrastructures Yochai Benkler; 4. Cyber security: of heterogeneity and autarchy Randal C. Picker; 5. Network responses to network threats: the evolution into private cybersecurity associations Amitai Aviram; 6. The dark side of private ordering for cybersecurity Neal K. Katyal; 7. Holding Internet Service Providers accountable Doug Lichtman and Eric P. Posner; 8. Global cyberterrorism, jurisdiction, and international organization Joel T. Trachtman.


Bruce K. Kobayashi, Peter Swire,Yochai Benkler, Randal C. Picker, Amitai Aviram, Neal K. Katyal, Doug Lichtman, Eric P. Posner, Joel T. Trachtman

printer iconPrinter friendly version AddThis