Javascript must be enabled to continue!
The Economics of Hacking
View through CrossRef
Hacking is becoming more common and dangerous. The challenge of dealing with hacking often comes from the fact that much of our wisdom about conventional crime cannot be directly applied to understand hacking behavior.
Against this backdrop, hacking studies are reviewed in view of the new features of cybercrime and how these features affect the application of the classical economic theory of crime in the cyberspace. Most findings of hacking studies can be interpreted with a parsimonious demand-and-supply framework. Hackers decide whether and how much to “supply” hacking by calculating the return on hacking over other opportunities. Defenders optimally tolerate some level of hacking risks because defense is costly. This tolerance can be interpreted as an indirect “demand” for hacking. Variations in law enforcement, hacking benefits, hacking costs, legal alternatives, private defense, and the dual-use problem can variously affect the supply or demand for hacking, and in turn the equilibrium amount of hacking in the market. Overall, it is suggested that the classical economic theory of crime remains a powerful framework to explain hacking behaviors. However, the application of this theory calls for considerations of different assumptions and driving forces, such as psychological motives and economies of scale in offenses, that are often less prevalent in conventional (offline) criminal behaviors but that tend to underscore hacking in the cyberspace.
Oxford University Press
Title: The Economics of Hacking
Description:
Hacking is becoming more common and dangerous.
The challenge of dealing with hacking often comes from the fact that much of our wisdom about conventional crime cannot be directly applied to understand hacking behavior.
Against this backdrop, hacking studies are reviewed in view of the new features of cybercrime and how these features affect the application of the classical economic theory of crime in the cyberspace.
Most findings of hacking studies can be interpreted with a parsimonious demand-and-supply framework.
Hackers decide whether and how much to “supply” hacking by calculating the return on hacking over other opportunities.
Defenders optimally tolerate some level of hacking risks because defense is costly.
This tolerance can be interpreted as an indirect “demand” for hacking.
Variations in law enforcement, hacking benefits, hacking costs, legal alternatives, private defense, and the dual-use problem can variously affect the supply or demand for hacking, and in turn the equilibrium amount of hacking in the market.
Overall, it is suggested that the classical economic theory of crime remains a powerful framework to explain hacking behaviors.
However, the application of this theory calls for considerations of different assumptions and driving forces, such as psychological motives and economies of scale in offenses, that are often less prevalent in conventional (offline) criminal behaviors but that tend to underscore hacking in the cyberspace.
Related Results
Life hacking
Life hacking
<p>This dissertation intervenes in the larger academic and popular discussion of hacking by looking at life hacking. In essence, life hacking presumes that your life is amena...
A Network Defense System for Detecting and Preventing Hacking
A Network Defense System for Detecting and Preventing Hacking
Many computing systems have recently suffered significantly from hacking and preventing hacking is important in protecting business, sensitive information and every day network com...
(Im)possible Futures
(Im)possible Futures
In a Western post – Cold War era, the pharmaceutical industry, state, and capitalism have merged to regulate gender and sexual normativity. According to Paul Preciado in Testo Junk...
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Ethical Hacking is a proactive approach to cybersecurity that involves authorizing and systematically testing information systems to find vulnerabilities before they can be exploit...
Membangun Fondasi Keilmuan Ekonomi Islam: Telaah Metodologi Muhammad Akram Khan
Membangun Fondasi Keilmuan Ekonomi Islam: Telaah Metodologi Muhammad Akram Khan
Throughout my experience in tracking down and reading books on faith-based economics, in this case Islam, there are no books that specifically list the title of "Islamic economics"...
Membangun Fondasi Keilmuan Ekonomi Islam: Telaah Metodologi Muhammad Akram Khan
Membangun Fondasi Keilmuan Ekonomi Islam: Telaah Metodologi Muhammad Akram Khan
Throughout my experience in tracking down and reading books on faith-based economics, in this case Islam, there are no books that specifically list the title of "Islamic economics"...
Critical Values Robust to P-hacking
Critical Values Robust to P-hacking
Abstract
P-hacking is prevalent in reality but absent from classical hypothesis-testing theory. We therefore build a model of hypothesis testing that accounts for p-...
A Review Paper on Ethical Hacking
A Review Paper on Ethical Hacking
An ethical hacker is the network specialist & computer who pounce some security systems on the behalf of its possessor seeking amenability that could be exploited by a maliciou...

