Home > Free Essays > Tech & Engineering > Cyber Security > Cybersecurity Dilemmas: Technology, Policy and Incentives
Cite this

Cybersecurity Dilemmas: Technology, Policy and Incentives Essay


Experts have raised concerns over the approaches used to tame cybercrime. Rather than decreasing the threats, they tend to increase them (Andersen 359; Cavelty703). The causes of the problem are multi-faceted and multi-dimensional. They go beyond the interaction between states to the individual citizens (Cavelty 703). Cybercrime dilemma results from three main factors: technology, incentives, and policy.

Technology is driven by consumers’ demand powerful and most modern features (Reymond and Sackler 6). The technology should offer convenience, anonymity in certain circumstances and security (Harrop, Wayne and Matteson 153). Providing all these comes at a cost. For instance, for the systems to be made more secure, they have to be simple. Additionally, they can be protected by sanitizing and isolating all input (Reymond and Sackler 6). The system becomes less valuable and less useful when such methods are adopted. The conflicting desires between designers of the system and the users make it difficult to come up with realistic measures to stop cybercrime.

Cost-benefit analysis often leads to misalignment of incentives (Reymond and Sackler 8). For any system to become a target of attack, it must have something of value to the attacker. The value of the assets determines the amount of time and resources that can be invested to protect a particular system (Byres and Lowe 217). For instance, exclusive secrets of the state are precious. As such, they require extremely high protection. On the other hand, information on blogs may not be as valuable.

The ability to determine the benefit of what is being protected and the cost involved poses a dilemma when deciding whether or not to put up measures to ensure cyber security (Reymond and Sackler 8).

The policies to stop the attackers are not deterrent enough. Mostly, the software to assist in criminal activities can be bought from hacking specialists who are based in countries where laws to stop them are weak (Kelly and McKenzie 12). Additionally, creating new technologies only facilitates cybercrime although it also boosts the efforts of the law enforcement agents to solve crimes (Reymond and Sacker 10). The dilemma is whether it is appropriate to advance the technologies yet they increase cybercrime.

Works Cited

Anderson, Ross. “Why information security is hard-an economic perspective.”Computer security applications conference, 2001.acsac 2001.proceedings 17th annual 29.2 (2011): 358-365. Print.

Byres, Eric, and Justin Lowe.”The myths and facts behind cyber security risks for industrial control systems.”Proceedings of the VDE Kongress 116.1 (2004): 213-218. Print.

Cavelty, Myriam Dunn. “Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities.” Science and engineering ethics 20.3 (2014): 701-715. Print.

Harrop, Wayne, and Ashley Matteson. “Cyber Resilience: A Review of Critical National Infrastructure and Cyber-Security Protection Measures Applied in the UK and USA.” Current and Emerging Trends in Cyber Operations. Palgrave Macmillan UK, 2015. 149-166. Print.

Kelly, Grant, and Bruce McKenzie.”Security, privacy, and confidentiality issues on the Internet.”Journal of Medical Internet Research 4.2 (2002): 12. Print.

Raymond, Sackler, and Beverly Sackler. Cybersecurity Dilemmas: Technology, Policy, and Incentives. Washington: Washington, 2015. Print.

Appendix

Raymond, and Beverly Sackler. Cybersecurity Dilemmas: Technology, Policy, and Incentives.Contains detailed information about cybersecurity dilemma discussed during the U.S.-U.K. forum in 2015. It extensively discusses the cybersecuritydilemma in relation to technology, incentives and policy and recommends the way forward.

This essay on Cybersecurity Dilemmas: Technology, Policy and Incentives was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.

Need a custom Essay sample written from scratch by
professional specifically for you?

Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar

301 certified writers online

GET WRITING HELP
Cite This paper

Select a referencing style:

Reference

IvyPanda. (2020, September 25). Cybersecurity Dilemmas: Technology, Policy and Incentives. Retrieved from https://ivypanda.com/essays/cybersecurity-dilemmas-technology-policy-and-incentives/

Work Cited

"Cybersecurity Dilemmas: Technology, Policy and Incentives." IvyPanda, 25 Sept. 2020, ivypanda.com/essays/cybersecurity-dilemmas-technology-policy-and-incentives/.

1. IvyPanda. "Cybersecurity Dilemmas: Technology, Policy and Incentives." September 25, 2020. https://ivypanda.com/essays/cybersecurity-dilemmas-technology-policy-and-incentives/.


Bibliography


IvyPanda. "Cybersecurity Dilemmas: Technology, Policy and Incentives." September 25, 2020. https://ivypanda.com/essays/cybersecurity-dilemmas-technology-policy-and-incentives/.

References

IvyPanda. 2020. "Cybersecurity Dilemmas: Technology, Policy and Incentives." September 25, 2020. https://ivypanda.com/essays/cybersecurity-dilemmas-technology-policy-and-incentives/.

References

IvyPanda. (2020) 'Cybersecurity Dilemmas: Technology, Policy and Incentives'. 25 September.

More related papers