Crowdsourcing cyber security: A property rights view of exclusion and theft on the information commons

14Citations
Citations of this article
61Readers
Mendeley users who have this article in their library.

Abstract

Individuals increasingly rely upon the internet for basic economic interaction. Current cyber security mechanisms are unable to stop adversaries and hackers from gaining access to sensitive information stored on government, business, and public computers. Experts propose implementing attribution and audit frameworks in cyberspace to deter, prevent, and prosecute cyber criminals and attackers. However, this method faces significant policy and resource constraints. Social science research, specifically in law and economics, concerning common-pool resources suggests an organic approach to cyber security may yield an appropriate solution. This cyber commons method involves treating the internet as a commons and encouraging individuals and institutions to voluntarily implement innovative and adaptive monitoring mechanisms. Such mechanisms are already in use and in many cases have proven more effective than attribution mechanisms in resisting and tracing the source of cyber attacks. © content is licensed under a Creative Commons Attribution 3.0 License.

Author supplied keywords

Cite

CITATION STYLE

APA

Shiffman, G. M., & Gupta, R. (2013). Crowdsourcing cyber security: A property rights view of exclusion and theft on the information commons. International Journal of the Commons, 7(1), 92–112. https://doi.org/10.18352/ijc.343

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free