Skip to main content

The Economics of Cybersecurity: From the Public Good to the Revenge of the Industry

  • Conference paper
  • First Online:
Book cover Security of Industrial Control Systems and Cyber Physical Systems (CyberICS 2015, WOS-CPS 2015)

Abstract

In the aftermath of Edward Snowden’s intelligence revelations, many governments around the world are increasingly elaborating so-called «digital sovereignty» policies. The declared aim is to develop trusted technologies to protect the more sensitive networks. The ambition of this article is to turn over the complex- and often contrasting- motivations and interests behind the industrial policy movements, explain how the dominant representation of cybersecurity as public good is impacting the public policy and analyse the dynamics between private and public players.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Some of main references in ecomics of cybersecurity are: Moore, Tyler et al. “The Economics of Online Crime,” Journal of Economic Perspectives, 2009; Anderson, Ross, “Why Information Security is Hard: an Economic Perspective,” Proceedings of the 17th Annual Computer Security Applications Conference, 2001.

  2. 2.

    According to the 2014 German IT Security Report released by Federal Office for Information Security, a cyber-attack that caused significant damage in an steel facility in Germany. For a detailed analysis see Robert M. Lee, ICS Cyber-Attack on German Steelworks Facility and Lessons Learned, 17 December 2014.

  3. 3.

    According to research conducted by US ICS-CERT, in 2012, 197 cyber incidents were reported by asset owners or trusted partners to the US Department of Homeland Security. In 2013, the incidents were 257. Moreover, at every security conference, information technology experts disclose new vulnerabilities and demonstrate how sabotage of ICS got easier.

  4. 4.

    This is the analysis made by the McAfee expert, Jarno Limnéll, NATO’s September Summit Must Confront Cyber Threats, 11 August 2014.

  5. 5.

    According to the 2013 European communication on «Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace» “there is a risk that Europe not only becomes excessively dependent on ICT produced elsewhere, but also on security solutions developed outside its frontiers”.

  6. 6.

    An in-depth analysis was made by Danielle Kehl, Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom and Cybersecurity, New America’s Open Technology Institute, 2014.

  7. 7.

    Three are the reference documents: Loi de Programmation Militaire 2014–2019, art. 22.; Programme d’Investissements d’Avenir 2013 – Développement de l’Économie Numérique, «Cœur de filière numérique-Sécurité numérique», Octobre 2013; Le guide pour la qualification de Prestataires d’audit de la sécurité des systèmes d’information (PASSI).

  8. 8.

    The Future of Global Information Security, Gartner Security Scenario Research 2014.

  9. 9.

    For the official declarations see: R. Hannigan, The web is a terrorist’s command-and-control network of choice, The Financial Times, November 3, 2014, and A. Thomson and A. Satariano Silicon Valley Privacy Push Sets Up Arms Race With World’s Spies, Bloomerg, Nov 5, 2014.

References

  1. Floridi, L.: Information: A Very Short Introduction. Oxford University Press, Oxford (2010)

    Book  MATH  Google Scholar 

  2. Dunn Cavelty, M.: From cyber-bombs to political fallout: threat representations with an impact in the cyber-security discourse. Int. Stud. Rev. 15(1), 105–122 (2013). Friedman, A.: Economic and Policy Framework for Cybersecurity Risks. Brookings, July 2011

    Google Scholar 

  3. Lacoste, Y.: La géographie ça sert d’abord à faire la guerre. La découverte, Paris (2014)

    Google Scholar 

  4. Rid, T.: Cyberwar Will Not Take Place. Oxford University Press, Oxford (2013)

    Google Scholar 

  5. Castelluccia, C., Grumbach, S., Olejnik, L.: Data Harvesting 2.0: from the Visible to the Invisible Web. Presented at the 12th Workshop on the Economics of Information Security, Washington, DC, United States, June 2013. https://who.rocq.inria.fr/…/WEIS13-CGO.pdf

  6. Anderson, R.: Privacy versus government surveillance: where network effects meet public choice. Presented at the 13th Workshop on the Economics of Information Security, Pennsylvania State University, United States, June 2014. http://weis2014.econinfosec.org/papers/Anderson-WEIS2014.pdf

  7. Hill, J.F.: The Growth of Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Industry Leaders. Lawfare Research Paper Series, vol. 2–3 (2014)

    Google Scholar 

  8. Maurer, T., Morgus, R., Skierka, I., Hohmann, M.: Technological sovereignty: missing the point? In: An Analysis of European Proposals after 5 June 2013

    Google Scholar 

  9. White Paper on Defence and National Security, La documentation Fransaise, Paris, p. 174 (2008)

    Google Scholar 

  10. D’Elia, D.: Public-private partnership: the missing factor in the resilience equation. The French experience on CIIP. In: Stefanowski, J., Panayiotou, C.G., Ellinas, G., Kyriakides, E. (eds.) CRITIS 2014. LNCS, vol. 8985, pp. 193–199. Springer, Heidelberg (2016). doi:10.1007/978-3-319-31664-2_20

    Chapter  Google Scholar 

  11. Omand, D.: Securing the State. Hurst, London (2010)

    Google Scholar 

  12. Floridi, L.: The Online Manifesto, Being Human in a Hyperconnected Era. Springer, Berlin (2015)

    Google Scholar 

  13. Schneier, B.: A Fraying of the Public/Private Surveillance Partnership. https://www.schneier.com/blog/archives/2013/11/a_fraying_of_th.html. Accessed 30 November 2013, The Battle for Power on the Internet, The Atlantic. http://www.theatlantic.com

Download references

Acknowledgements

This work is funded by Airbus Defense and Space-CyberSecurity and supported by the Chaire Castex de Cyberstratégie. Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of Airbus.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Danilo D’Elia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

D’Elia, D. (2016). The Economics of Cybersecurity: From the Public Good to the Revenge of the Industry. In: Bécue, A., Cuppens-Boulahia, N., Cuppens, F., Katsikas, S., Lambrinoudakis, C. (eds) Security of Industrial Control Systems and Cyber Physical Systems. CyberICS WOS-CPS 2015 2015. Lecture Notes in Computer Science(), vol 9588. Springer, Cham. https://doi.org/10.1007/978-3-319-40385-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-40385-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-40384-7

  • Online ISBN: 978-3-319-40385-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics