Cybersecurity Dilemmas: Technology, Policy and Incentives Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

“Cybersecurity Dilemmas: Technology, Policy, and Incentives” by Raymond, and Beverly Sackler, contains detailed information about cybersecurity dilemma discussed during the U.S.-U.K. forum in 2015. It extensively discusses the cybersecurity dilemma in relation to technology, incentives and policy and recommends the way forward.

Experts have raised concerns over the approaches used to tame cybercrime. Rather than decreasing the threats, they tend to increase them (Andersen 359; Cavelty 703). The causes of the problem are multi-faceted and multi-dimensional. They go beyond the interaction between states to the individual citizens (Cavelty 703). Cybercrime dilemma results from three main factors: technology, incentives, and policy.

Technology is driven by consumers’ demand powerful and most modern features (Raymond and Sackler 6). The technology should offer convenience, anonymity in certain circumstances and security (Harrop, Wayne and Matteson 153). Providing all these comes at a cost. For instance, for the systems to be made more secure, they have to be simple.

Additionally, they can be protected by sanitizing and isolating all input (Raymond and Sackler 6). The system becomes less valuable and less useful when such methods are adopted. The conflicting desires between designers of the system and the users make it difficult to come up with realistic measures to stop cybercrime.

Cost-benefit analysis often leads to misalignment of incentives (Raymond and Sackler 8). For any system to become a target of attack, it must have something of value to the attacker. The value of the assets determines the amount of time and resources that can be invested to protect a particular system (Byres and Lowe 217).

For instance, exclusive secrets of the state are precious. As such, they require extremely high protection. On the other hand, information on blogs may not be as valuable. The ability to determine the benefit of what is being protected and the cost involved poses a dilemma when deciding whether or not to put up measures to ensure cyber security (Raymond and Sackler 8).

The policies to stop the attackers are not deterrent enough. Mostly, the software to assist in criminal activities can be bought from hacking specialists who are based in countries where laws to stop them are weak (Kelly and McKenzie 12). Additionally, creating new technologies only facilitates cybercrime although it also boosts the efforts of the law enforcement agents to solve crimes (Raymond and Sacker 10). The dilemma is whether it is appropriate to advance the technologies yet they increase cybercrime.

Works Cited

Anderson, Ross. “Why information security is hard-an economic perspective.”Computer security applications conference, 2001.acsac 2001.proceedings 17th annual 29.2 (2011): 358-365. Print.

Byres, Eric, and Justin Lowe.”The myths and facts behind cyber security risks for industrial control systems.”Proceedings of the VDE Congress 116.1 (2004): 213-218. Print.

Cavelty, Myriam Dunn. “Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities.” Science and engineering ethics 20.3 (2014): 701-715. Print.

Harrop, Wayne, and Ashley Matteson. “Cyber Resilience: A Review of Critical National Infrastructure and Cyber-Security Protection Measures Applied in the UK and USA.” Current and Emerging Trends in Cyber Operations. Palgrave Macmillan UK, 2015. 149-166. Print.

Kelly, Grant, and Bruce McKenzie.”Security, privacy, and confidentiality issues on the Internet.”Journal of Medical Internet Research 4.2 (2002): 12. Print.

Raymond, Sackler, and Beverly Sackler. Cybersecurity Dilemmas: Technology, Policy, and Incentives. Washington: Washington, 2015. Print.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, September 25). Cybersecurity Dilemmas: Technology, Policy and Incentives. https://ivypanda.com/essays/cybersecurity-dilemmas-technology-policy-and-incentives/

Work Cited

"Cybersecurity Dilemmas: Technology, Policy and Incentives." IvyPanda, 25 Sept. 2020, ivypanda.com/essays/cybersecurity-dilemmas-technology-policy-and-incentives/.

References

IvyPanda. (2020) 'Cybersecurity Dilemmas: Technology, Policy and Incentives'. 25 September.

References

IvyPanda. 2020. "Cybersecurity Dilemmas: Technology, Policy and Incentives." September 25, 2020. https://ivypanda.com/essays/cybersecurity-dilemmas-technology-policy-and-incentives/.

1. IvyPanda. "Cybersecurity Dilemmas: Technology, Policy and Incentives." September 25, 2020. https://ivypanda.com/essays/cybersecurity-dilemmas-technology-policy-and-incentives/.


Bibliography


IvyPanda. "Cybersecurity Dilemmas: Technology, Policy and Incentives." September 25, 2020. https://ivypanda.com/essays/cybersecurity-dilemmas-technology-policy-and-incentives/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1