Have a personal or library account? Click to login
Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons Cover

Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons

By: Gary Shiffman and  Ravi Gupta  
Open Access
|Feb 2013

Abstract

Individuals increasingly rely upon the internet for basic economic interaction. Current cyber security mechanisms are unable to stop adversaries and hackers from gaining access to sensitive information stored on government, business, and public computers. Experts propose implementing attribution and audit frameworks in cyberspace to deter, prevent, and prosecute cyber criminals and attackers. However, this method faces significant policy and resource constraints. Social science research, specifically in law and economics, concerning common-pool resources suggests an organic approach to cyber security may yield an appropriate solution. This cyber commons method involves treating the internet as a commons and encouraging individuals and institutions to voluntarily implement innovative and adaptive monitoring mechanisms. Such mechanisms are already in use and in many cases have proven more effective than attribution mechanisms in resisting and tracing the source of cyber attacks.
DOI: https://doi.org/10.18352/ijc.343 | Journal eISSN: 1875-0281
Language: English
Published on: Feb 28, 2013
Published by: Igitur Publishing
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2013 Gary Shiffman, Ravi Gupta, published by Igitur Publishing
This work is licensed under the Creative Commons Attribution 4.0 License.