Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

The Economics of Hacking

View through CrossRef
Hacking is becoming more common and dangerous. The challenge of dealing with hacking often comes from the fact that much of our wisdom about conventional crime cannot be directly applied to understand hacking behavior. Against this backdrop, hacking studies are reviewed in view of the new features of cybercrime and how these features affect the application of the classical economic theory of crime in the cyberspace. Most findings of hacking studies can be interpreted with a parsimonious demand-and-supply framework. Hackers decide whether and how much to “supply” hacking by calculating the return on hacking over other opportunities. Defenders optimally tolerate some level of hacking risks because defense is costly. This tolerance can be interpreted as an indirect “demand” for hacking. Variations in law enforcement, hacking benefits, hacking costs, legal alternatives, private defense, and the dual-use problem can variously affect the supply or demand for hacking, and in turn the equilibrium amount of hacking in the market. Overall, it is suggested that the classical economic theory of crime remains a powerful framework to explain hacking behaviors. However, the application of this theory calls for considerations of different assumptions and driving forces, such as psychological motives and economies of scale in offenses, that are often less prevalent in conventional (offline) criminal behaviors but that tend to underscore hacking in the cyberspace.
Title: The Economics of Hacking
Description:
Hacking is becoming more common and dangerous.
The challenge of dealing with hacking often comes from the fact that much of our wisdom about conventional crime cannot be directly applied to understand hacking behavior.
Against this backdrop, hacking studies are reviewed in view of the new features of cybercrime and how these features affect the application of the classical economic theory of crime in the cyberspace.
Most findings of hacking studies can be interpreted with a parsimonious demand-and-supply framework.
Hackers decide whether and how much to “supply” hacking by calculating the return on hacking over other opportunities.
Defenders optimally tolerate some level of hacking risks because defense is costly.
This tolerance can be interpreted as an indirect “demand” for hacking.
Variations in law enforcement, hacking benefits, hacking costs, legal alternatives, private defense, and the dual-use problem can variously affect the supply or demand for hacking, and in turn the equilibrium amount of hacking in the market.
Overall, it is suggested that the classical economic theory of crime remains a powerful framework to explain hacking behaviors.
However, the application of this theory calls for considerations of different assumptions and driving forces, such as psychological motives and economies of scale in offenses, that are often less prevalent in conventional (offline) criminal behaviors but that tend to underscore hacking in the cyberspace.

Related Results

Life hacking
Life hacking
<p>This dissertation intervenes in the larger academic and popular discussion of hacking by looking at life hacking. In essence, life hacking presumes that your life is amena...
A Network Defense System for Detecting and Preventing Hacking
A Network Defense System for Detecting and Preventing Hacking
Many computing systems have recently suffered significantly from hacking and preventing hacking is important in protecting business, sensitive information and every day network com...
LEGAL REVIEW OF THE CRIME OF HACKING CRYPTOCURRENCY BASED ON BLOCKCHAIN TECHNOLOGY
LEGAL REVIEW OF THE CRIME OF HACKING CRYPTOCURRENCY BASED ON BLOCKCHAIN TECHNOLOGY
Hacking cryptocurrencies (digital currencies that include Bitcoin, Ethereum, Litecoin, Ripple, Stellar, Dogecoin, Cardano, Eos, and Tron) is a serious challenge in the context of b...
Implementasi Norma Hukum Terhadap Tindak Pidana Peretasan (Hacking) di Indonesia
Implementasi Norma Hukum Terhadap Tindak Pidana Peretasan (Hacking) di Indonesia
AbstractCybercrime is a crime related to technology or cyberspace against public or private interests. Act Number 11 of 2009 concerning Information and Electronic Transactions as a...
Hacking, Ian (1936–2023)
Hacking, Ian (1936–2023)
Ian Hacking (born in 1936, Vancouver, British Columbia) is most well-known for his work in the philosophy of the natural and social sciences, but his contributions to philosophy ar...
(Im)possible Futures
(Im)possible Futures
In a Western post – Cold War era, the pharmaceutical industry, state, and capitalism have merged to regulate gender and sexual normativity. According to Paul Preciado in Testo Junk...
Philosophical Consulting as a Tool for “Problem Hacking” in Human Management in Organizations
Philosophical Consulting as a Tool for “Problem Hacking” in Human Management in Organizations
Consulting focused on comprehending organizational problems and breaking the patterns of their managerial solution is in demand in a chaotic, dynamic world. This counseling tool is...
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Ethical Hacking is a proactive approach to cybersecurity that involves authorizing and systematically testing information systems to find vulnerabilities before they can be exploit...

Back to Top