Reputation as Public Policy for Internet Security

作者: Leigh L. Linden , John S. Quarterman , Qian Tang , Andrew B. Whinston

DOI: 10.2139/SSRN.2030288

关键词:

摘要: Insufficient resource allocation causes an Internet information security (infosec) problem that public policy could improve. Lack of transparency lets organizations avoid ad- dressing internal risks, leaving vulnerabilities are exploited by botnets, threatening other participants. Their protection provides no economic benefit to the firm, so this negative externality underinvestment in infosec. Public provide a partial solution adding incentives for have well-configured in- fosec. Specifically, mandatory reporting issues plus presenting public, can impose shame and fame on through publicity peer influence comparison with major competitors. Outbound spam is prominent symptom poor infosec project uses as proxy overall security, mapping anti-spam blocklist IP addresses (1). Selected top outbound rankings publicized SpamRankings.net already produced positive pilot test results. Next we use field experiments effects disclosure relative effectiveness different presentations. As first two objectives, determine whether ranking be effective mechanism encouraging firms reduce spam. Second, explore most ways improve Our study serves assessment disclosure. We aggregate company within between industries analyze results such pub- lic. Field been used extensively analysis programs (2) (3). The include design system presentation get attention, observe reactions, underlying mechanisms. This extended problems decision makers problems, pollution, energy saving, etc. A enables inferring based observed outcome, thus makes transparent induces reputation makers: producing externalities or fixing preventing them. Reputation internalizes externalities, take socially optimal behavior. Because results, propose conducting full-scale randomized controlled trial Spam- Rankings.net initiative. purpose experimentally create individual research groups generally similar except receive experimental treatments. So any differences arise subsequent treatments due respective treatment. Randomized selection bias, high validity. For experiments, will identify sample companies geographic units which outgoing data, randomly assign unit groups. In experiment, one groups: treatment group whose statistics widely control without publicizing information. initial evaluation examine proposed induce Assuming success second intervention, assigning presentations including absolute volume, per country, industry, see what granularity has effect. publication details behavioral economics context these experiments. Supported NSF grant no. 0831338; usual disclaimers apply.

参考文章(36)
Nick Feamster, Alexander G. Gray, Nadeem Ahmed Syed, Shuang Hao, Sven Krasser, Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine usenix security symposium. pp. 101- 118 ,(2009)
Hadi Asghari, Shirin Tabatabaie, David Rand, Johannes M. Bauer, Michel van Eeten, The Role of Internet Service Providers in Botnet Mitigation an Empirical Analysis Based on Spam Data Social Science Research Network. ,(2010)
Andrew B. Whinston, Serpil Sayin, John S. Quarterman, Rustock Botnet and ASNs Social Science Research Network. ,(2011)
Manfred Milinski, Dirk Semmann, Hans-Jürgen Krambeck, Reputation helps solve the ‘tragedy of the commons’ Nature. ,vol. 415, pp. 424- 426 ,(2002) , 10.1038/415424A
Jeffrey M Wooldridge, Cluster-Sample Methods in Applied Econometrics The American Economic Review. ,vol. 93, pp. 133- 138 ,(2003) , 10.1257/000282803321946930
John S. Quarterman, PhishScope: Tracking Phish Server Clusters Journal of Digital Forensic Practice. ,vol. 1, pp. 103- 114 ,(2006) , 10.1080/15567280600995808
Daniel E. Geer, Bob Blakley, Are You Smarter than the TSA? (Hint: No) ieee symposium on security and privacy. ,vol. 10, pp. 94- 95 ,(2012) , 10.1109/MSP.2012.91
John Quarterman, Ken Harker, Peter Salus, Combat Power and Enterprise Competitiveness First Monday. ,vol. 8, ,(2003) , 10.5210/FM.V8I1.1022