메뉴 건너뛰기




Volumn 83, Issue 1, 2016, Pages 117-137

Big data and bad data: On the sensitivity of security policy to imperfect information

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84964501372     PISSN: 00419494     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (14)

References (98)
  • 4
    • 84886433601 scopus 로고    scopus 로고
    • Blueprint for a science of cybersecurity
    • 47
    • See Fred B. Schneider, Blueprint for a Science of Cybersecurity, 19 Next Wave 47, 47(2012), archived at http://perma.cc/CMH7-QNJL.
    • (2012) Next Wave , vol.19 , pp. 47
    • Schneider, F.B.1
  • 5
    • 84964531840 scopus 로고    scopus 로고
    • Guest editor's column
    • i
    • Frederick R. Chang, Guest Editor's Column, 19 Next Wave i, i (2012), archived at http://perma.cc/Q4KV-LYXF ("There are some promising indications that a science of cybersecurity initiative is gaining momentum, including several workshops, conferences, and reports that point to the need for an interdisciplinary approach to addressing the problem.");
    • (2012) Next Wave , vol.19 , pp. i
    • Chang, F.R.1
  • 6
    • 84986616439 scopus 로고    scopus 로고
    • NSA initiatives in cybersecurity science
    • 10-11
    • Robert Meushaw, NSA Initiatives in Cybersecurity Science, 19 Next Wave 8, 10-11(2012), archived at http://perma.cc/Q4KV-LYXF (discussing funding for cybersecurity research).
    • (2012) Next Wave , vol.19 , pp. 8
    • Meushaw, R.1
  • 8
    • 84964540245 scopus 로고    scopus 로고
    • cited in note 5
    • Schneider, Blueprint at 53 (cited in note 5).
    • Blueprint , pp. 53
    • Schneider1
  • 9
    • 84964540226 scopus 로고    scopus 로고
    • AFCEA International Cyber Committee, June
    • See Charles H. Brown, et al, The Science of Security: A Survey and Analysis ∗2 (AFCEA International Cyber Committee, June 2014), archived at http://perma.cc/39CH-XUJF (highlighting the various areas that are reliant on cybertechnologies and the broad motivations for developing a science of cybersecurity).
    • (2014) The Science of Security: A Survey and Analysis , pp. 2
    • Brown, C.H.1
  • 10
    • 84892448683 scopus 로고    scopus 로고
    • House Permanent Select Committee on Intelligence, Sept 10
    • James R. Clapper, Worldwide Cyber Threats ∗2 (House Permanent Select Committee on Intelligence, Sept 10, 2015), archived at http://perma.cc/7XN6-9N5W.
    • (2015) Worldwide Cyber Threats , pp. 2
    • Clapper, J.R.1
  • 12
    • 84964422958 scopus 로고    scopus 로고
    • Twenty Seventh International Conference on Information Systems
    • See Alessandro Acquisti, Allan Friedman, and Rahul Telang, Is There a Cost to Privacy Breaches? An Event Study ∗2 (Twenty Seventh International Conference on Information Systems, 2006), archived at http://perma.cc/4QM6-VHT2 (noting that some companies that have experienced "privacy debacles" were subjected to "public outrage and hard to quantify reputation losses").
    • (2006) Is There a Cost to Privacy Breaches? An Event Study , pp. 2
    • Acquisti, A.1    Friedman, A.2    Telang, R.3
  • 14
    • 84964487857 scopus 로고    scopus 로고
    • Visa, Apr. 15
    • See, for example, Visa International Operating Regulations ∗648-53 (Visa, Apr. 15, 2014), archived at http://perma.cc/79X7-EDGL.
    • (2014) Visa International Operating Regulations , pp. 648-653
  • 15
    • 84865316760 scopus 로고    scopus 로고
    • Private disordering? Payment card fraud liability rules
    • 14-15
    • See also Adam J. Levitin, Private Disordering? Payment Card Fraud Liability Rules, 5 Brooklyn J Corp, Fin & Comm L 1, 14-15 (2010) (outlining the general rules of liability for unauthorized credit card transactions);
    • (2010) Brooklyn J Corp, Fin & Comm L , vol.5 , pp. 1
    • Levitin, A.J.1
  • 16
    • 41449116360 scopus 로고    scopus 로고
    • Cybersecurity in the payment card industry
    • 214-16
    • Richard A. Epstein and Thomas P. Brown, Cybersecurity in the Payment Card Industry, 75 U Chi L Rev 203, 214-16 (2008) (describing the "elaborate systems to detect fraud" and the punishments prescribed for noncompliance).
    • (2008) U Chi L Rev , vol.75 , pp. 203
    • Epstein, R.A.1    Brown, T.P.2
  • 17
    • 84964457351 scopus 로고    scopus 로고
    • Pennsylvania State Employees Credit Union v Fifth Third Bank
    • 322 MD Pa
    • See, for example, Pennsylvania State Employees Credit Union v Fifth Third Bank, 398 F Supp 2d 317, 322 (MD Pa 2005) (stating that the Pennsylvania State Employees Credit Union canceled and reissued 20, 029 cards at a total cost of $98, 128, or about $5 per card);
    • (2005) F Supp 2d , vol.398 , pp. 317
  • 18
    • 84964457306 scopus 로고    scopus 로고
    • Maine Department of Professional & Financial Regulation, Nov. 24
    • Maine Bureau of Financial Institutions, Maine Data Breach Study ∗18-20 (Maine Department of Professional & Financial Regulation, Nov. 24, 2008), archived at http://perma.cc/D8U9-CMA7 (finding reissuance costs totaling $1, 164, 200 across 246, 479 reissued cards, or an average cost to issuers of $4.72 per card);
    • (2008) Maine Data Breach Study , pp. 18-20
    • Maine Bureau of Financial Institutions1
  • 19
    • 84964530717 scopus 로고    scopus 로고
    • Reuters, Apr. 28
    • Maria Aspan and Clare Baldwin, Sony Breach Could Cost Card Lenders $300 Mln (Reuters, Apr. 28, 2011), archived at http://perma.cc/W6YE-KCMK (reporting that "[e]ach customer request to replace a credit card would cost lenders about $3 to $5 per card", which includes "the new piece of plastic itself, postage, and various customer service costs");
    • (2011) Sony Breach Could Cost Card Lenders $300 Mln
    • Aspan, M.1    Baldwin, C.2
  • 20
    • 84964530714 scopus 로고    scopus 로고
    • TJX Reacts to Bank Lawsuit; T. J. Maxx Parent in Filing Says TrustCo Failed to Mitigate Injury from Data Breach
    • Aug. 30
    • Chris Churchill, TJX Reacts to Bank Lawsuit; T. J. Maxx Parent in Filing Says TrustCo Failed to Mitigate Injury from Data Breach, Times Union B9 (Aug. 30, 2008) (citing TrustCo as saying that its costs from the TJX breach, including reissuing four thousand debit cards, were up to $20 per affected account);
    • (2008) Times Union , pp. B9
    • Churchill, C.1
  • 21
    • 84964457365 scopus 로고    scopus 로고
    • IDs are a steal; thieves looking for credit numbers set their sights on big targets
    • Aug. 23
    • Mark Jewell, IDs Are a Steal; Thieves Looking for Credit Numbers Set Their Sights on Big Targets, Vancouver Columbian E1 (Aug. 23, 2004) (reporting that Sovereign Bank reissued eighty-one thousand cards twice at a total cost of about $1 million);
    • (2004) Vancouver Columbian , pp. E1
    • Jewell, M.1
  • 22
    • 84964540193 scopus 로고    scopus 로고
    • Compromised credit cards top 100, 000
    • Jan 31
    • Denis Paiste, Compromised Credit Cards Top 100, 000, NH Union Leader B3 (Jan 31, 2007) (reporting that "[v]arious banks and credit unions have said it costs from $5 to $25 per card reissued");
    • (2007) NH Union Leader , pp. B3
    • Paiste, D.1
  • 23
    • 84964540186 scopus 로고    scopus 로고
    • Banks start credit card reissue; breach of databases prompts replacements
    • Feb. 8
    • Anne Ravana, Banks Start Credit Card Reissue; Breach of Databases Prompts Replacements, Bangor Daily News A4 (Feb. 8, 2007) (quoting a Merrill Bank executive as saying that the cost of replacing seventyone cards was about $14 per card);
    • (2007) Bangor Daily News , pp. A4
    • Ravana, A.1
  • 24
    • 84964487824 scopus 로고    scopus 로고
    • Computer hackers are stealing bank card information, but there is protection and some banks have been aggressive
    • July 11
    • Eric G. Stark, Computer Hackers Are Stealing Bank Card Information, but There Is Protection and Some Banks Have Been Aggressive, Lancaster Sunday News D1 (July 11, 2004) (reporting that Fulton Bank spent $100, 000 to replace twenty thousand cards).
    • (2004) Lancaster Sunday News , pp. D1
    • Stark, E.G.1
  • 25
    • 84964487841 scopus 로고    scopus 로고
    • Sept 9
    • See, for example, Harriet Pearson, Letter to the Office of the Attorney General (Sept 9, 2014), archived at http://perma.cc/YM3P-QUZ6 (stating that Home Depot "received reports from its banking partners and law enforcement that criminals may have hacked its payment data systems");
    • (2014) Letter to the Office of the Attorney General
    • Pearson, H.1
  • 26
    • 85027525282 scopus 로고    scopus 로고
    • Krebs on Security, Dec. 19
    • Brian Krebs, Staples: 6-Month Breach, 1.16 Million Cards (Krebs on Security, Dec. 19, 2014), archived at http://perma.cc/86YF-PUPG (implying that the office-supply store Staples may have been informed of a data breach by banks that noticed suspicious activity);
    • (2014) Staples: 6-month Breach, 1.16 Million Cards
    • Krebs, B.1
  • 33
    • 84964487865 scopus 로고    scopus 로고
    • National Conference of State Legislatures, June 11
    • Security Breach Notification Laws (National Conference of State Legislatures, June 11, 2015), archived at http://perma.cc/86QR-KUXN.
    • (2015) Security Breach Notification Laws
  • 36
    • 84964418075 scopus 로고    scopus 로고
    • Database Breach Notification Requirements, archived at http://perma.cc/FEH3-XTDU (requesting information to be sent to the Virginia attorney general office).
    • Database Breach Notification Requirements
  • 38
    • 84964520631 scopus 로고    scopus 로고
    • Data Breach Notices, archived at http://perma.cc/4L2L-VUGE (listing breach notifications sent to the attorney general of Maine);
    • Data Breach Notices
  • 40
    • 84964520615 scopus 로고    scopus 로고
    • New Hampshire Department of Justice
    • Security Breach Notifications (New Hampshire Department of Justice), archived at http://perma.cc/PW7M-24JN.
    • Security Breach Notifications
  • 41
    • 84964520611 scopus 로고    scopus 로고
    • cited in note 20
    • See Langton, Identity Theft at ∗5 (cited in note 20).
    • Identity Theft , pp. 5
    • Langton1
  • 47
    • 84964418379 scopus 로고    scopus 로고
    • cited in note 33
    • Foley, et al, Identity Theft at ∗15 (cited in note 33).
    • Identity Theft at , pp. 15
    • Foley1
  • 49
    • 84964511796 scopus 로고    scopus 로고
    • cited in note 32
    • See, for example, Gordon, et al, Identity Fraud Trends at ∗53 (cited in note 32).
    • Identity Fraud Trends , pp. 53
    • Gordon1
  • 50
    • 77956890234 scopus 로고
    • Monte Carlo sampling methods using Markov chains and their applications
    • 97-98
    • For an introduction to Monte Carlo simulations, see W. K. Hastings, Monte Carlo Sampling Methods Using Markov Chains and Their Applications, 57 Biometrika 97, 97-98 (1970) ("For numerical problems in a large number of dimensions, Monte Carlo methods are often more efficient than conventional numerical methods.").
    • (1970) Biometrika , vol.57 , pp. 97
    • Hastings, W.K.1
  • 52
    • 84964453755 scopus 로고    scopus 로고
    • Aite Group, Oct
    • See, for example, Shirley W. Inscoe, Global Consumers React to Rising Fraud: Beware Back of Wallet ∗17 (Aite Group, Oct. 2012), archived at http://perma.cc/TZ4B-QB2F ("33% of consumers who received replacement cards [after a breach] state that they used the new card less frequently than the original card."). It is unclear whether this is because a card was reissued or because of the card exposure regardless of reissue.
    • (2012) Global Consumers React to Rising Fraud: Beware Back of Wallet , pp. 17
    • Inscoe, S.W.1
  • 54
    • 75749102614 scopus 로고    scopus 로고
    • The economics of online crime
    • 3-4 Summer
    • See Tyler Moore, Richard Clayton, and Ross Anderson, The Economics of Online Crime, 23 J Econ Persp 3, 3-4 (Summer 2009) (describing the transition from "amateur hackers who defaced websites and wrote malicious software" in a "cottage industry" to "criminal networks" and "online black markets").
    • (2009) J Econ Persp , vol.23 , pp. 3
    • Moore, T.1    Clayton, R.2    Anderson, R.3
  • 55
    • 84898033338 scopus 로고    scopus 로고
    • Measuring the cost of cybercrime
    • Rainer Böhme, ed, 296-97 Springer
    • See id; Ross Anderson, et al, Measuring the Cost of Cybercrime, in Rainer Böhme, ed, The Economics of Information Security and Privacy 265, 296-97 (Springer 2013).
    • (2013) The Economics of Information Security and Privacy , pp. 265
    • Anderson, R.1
  • 56
    • 0032402858 scopus 로고    scopus 로고
    • The effect of variation in high-level domestic drug enforcement on variation in drug prices
    • 266
    • See, for example, Yuehong Yuan and Jonathan P. Caulkins, The Effect of Variation in High-Level Domestic Drug Enforcement on Variation in Drug Prices, 32 Socio-Econ Planning Sci 265, 266 (1998).
    • (1998) Socio-Econ Planning Sci , vol.32 , pp. 265
    • Yuan, Y.1    Caulkins, J.P.2
  • 57
    • 84964504437 scopus 로고    scopus 로고
    • cited in note 40
    • See, for example, Moore, Clayton, and Anderson, 23 J Econ Persp at 8 (cited in note 40) (describing the ability of researchers to "stud[y] the new criminal markets directly" by "monitor[ing] the public chat channels used by online criminals to contact each other", "infiltrat[ing]⋯ botnet[s]", and using related means).
    • J Econ Persp , vol.23 , pp. 8
    • Moore1    Clayton2    Anderson3
  • 58
    • 84964541648 scopus 로고    scopus 로고
    • Anderson, et al, cited in note 41
    • Anderson, et al, Measuring the Cost at 267-73 (cited in note 41).
    • Measuring the Cost , pp. 267-273
  • 59
    • 84888321575 scopus 로고    scopus 로고
    • Pro Publica, Aug. 1
    • See Peter Maass and Megha Rajagopalan, Does Cybercrime Really Cost $1 Trillion? (Pro Publica, Aug. 1, 2012), archived at http://perma.cc/6UD3-GA3S (questioning McAfee's $1 trillion estimate, a figure cited by General Keith Alexander, then-director of the NSA, but published only in a McAfee news release and not in its cybercrime study);
    • (2012) Does Cybercrime Really Cost $1 Trillion?
    • Maass, P.1    Rajagopalan, M.2
  • 62
    • 84964453849 scopus 로고    scopus 로고
    • Compare Ross Anderson
    • Compare Ross Anderson, Unsettling Parallels between Security and the Environment, archived at http://perma.cc/A8Z6-L67K ("My intuition is that many firms get it about right, or if anything spend slightly too much [on network security].")
    • Unsettling Parallels between Security and the Environment
  • 63
    • 84964487785 scopus 로고    scopus 로고
    • with, Workshop on Economics and Information Security, May 16
    • with Bruce Schneier, Computer Security: It's the Economics, Stupid (Workshop on Economics and Information Security, May 16, 2002), archived at http://perma.cc/RWR3-J4XQ (arguing that organizations spend too little on computer security but will spend more only if software companies improve their security abilities).
    • (2002) Computer Security: It's the Economics, Stupid
    • Schneier, B.1
  • 66
    • 84964541616 scopus 로고    scopus 로고
    • Daily Dot, May 13
    • See, for example, Patrick Howell O'Neill, Dark Net Markets Offer More Drugs Than Ever Before (Daily Dot, May 13, 2015), archived at http://perma.cc/432X-46JT ("Dark Net markets have grown over 37 percent in product listings in the last year despite sweeping police actions and the constant threat of multimillion-dollar thefts looming large.");
    • (2015) Dark Net Markets Offer More Drugs Than Ever Before
    • Howell O'Neill, P.1
  • 67
    • 84964504418 scopus 로고    scopus 로고
    • US News, Mar. 18
    • Steven Nelson, Largest Online Drug Market Shuts in Massive Suspected Scam (US News, Mar. 18, 2015), archived at http://perma.cc/2MS4-JQLX ("The 15 largest deep web markets had about 42, 000 drug listings, indicating the overall deep web drug market had nearly recovered from last year's FBI-led raids.");
    • (2015) Largest Online Drug Market Shuts in Massive Suspected Scam
    • Nelson, S.1
  • 72
    • 84964504404 scopus 로고    scopus 로고
    • MailChimp, July 24
    • See How Blacklists Work (MailChimp, July 24, 2015), archived at http://perma.cc/534J-MHHL.
    • (2015) How Blacklists Work
  • 75
    • 84929077014 scopus 로고    scopus 로고
    • Bitcoin: Economics, technology, and governance
    • 222-23 Spring
    • Rainer Böhme, et al, Bitcoin: Economics, Technology, and Governance, 29 J Econ Persp 213, 222-23 (Spring 2015).
    • (2015) J Econ Persp , vol.29 , pp. 213
    • Böhme, R.1
  • 76
    • 84930982034 scopus 로고    scopus 로고
    • Criminal Action No 13-2328, SDNY filed Sept 27
    • Sealed Complaint, United States v Ulbricht, Criminal Action No 13-2328, ∗15 (SDNY filed Sept 27, 2013) ("Ulbricht Complaint") ("The total revenue generated from these sales was 9, 519, 664 Bitcoins, and the total commissions collected by Silk Road from the sales amounted to 614, 305 Bitcoins. These figures are equivalent to roughly $1.2 billion in revenue and $79.8 million in commissions.").
    • (2013) United States V Ulbricht , pp. 15
    • Complaint, S.1
  • 78
    • 84964496731 scopus 로고    scopus 로고
    • Wired, May 23
    • See, for example, Joshuah Bearman, Silk Road: The Untold Story (Wired, May 23, 2015), archived at http://perma.cc/JL8R-3F43;
    • (2015) Silk Road: The Untold Story
    • Bearman, J.1
  • 82
    • 84964472842 scopus 로고    scopus 로고
    • See, for example, Soska and Christin, Measuring the Longitudinal Evolution at ∗40 (cited in note 50) (estimating Silk Road's gross sales at over $100 million per year, which "appears consistent with the (revised) US Government calculations of $214M of total grossed income by Silk Road over its lifetime").
    • Measuring the Longitudinal Evolution , pp. 40
    • Soska1    Christin2
  • 83
    • 84964542301 scopus 로고    scopus 로고
    • cited in note 60
    • See Ulbricht Complaint at ∗15 (cited in note 60).
    • Ulbricht Complaint , pp. 15
  • 84
    • 84964496740 scopus 로고    scopus 로고
    • United States v Ulbricht
    • 550 SDNY
    • See United States v Ulbricht, 31 F Supp 3d 540, 550 (SDNY 2014) ("According to the Indictment, the defendant pursued violent means, including soliciting the murderfor-hire of several individuals he believed posed a threat to that enterprise.') (quotation marks omitted).
    • (2014) F Supp 3d , vol.31 , pp. 540
  • 85
    • 73049098066 scopus 로고    scopus 로고
    • Criminal Action No 13-0222, D Md filed Oct. 1
    • See also Superseding Indictment, United States v Ulbricht, Criminal Action No 13-0222, ∗6-11 (D Md filed Oct. 1, 2013).
    • (2013) United States V Ulbricht , pp. 6-11
    • Superseding Indictment1
  • 89
    • 84922535939 scopus 로고    scopus 로고
    • UN Office on Drugs and Crime, June
    • World Drug Report 2014 ∗18 (UN Office on Drugs and Crime, June 2014), archived at http://perma.cc/4GKG-4TW8.
    • (2014) World Drug Report 2014 , pp. 18
  • 90
    • 78349239937 scopus 로고    scopus 로고
    • Sept 16
    • See, for example, Fred Chong, et al, National Cyber Leap Year Summit 2009: Co-Chairs' Report ∗9-12 (Sept 16, 2009), archived at http://perma.cc/4CAK-5TZ6 ("[I]t is imperative that appropriate models of cooperation are developed immediately to incentivize the participants to engage in research, development, and testing of technologies and approaches to achieve [security] goals.").
    • (2009) National Cyber Leap Year Summit 2009: Co-Chairs' Report , pp. 9-12
    • Chong, F.1
  • 91
    • 84964527953 scopus 로고    scopus 로고
    • Wall St J, Oct. 5
    • See, for example, Shirley S. Wang, How Much Should Scientists Check Other Scientists' Work? (Wall St J, Oct. 5, 2015), archived at http://perma.cc/WN46-JWGT (discussing one psychology journal's initiative to promote data sharing, as well as the advantages and disadvantages of "open science and data sharing").
    • (2015) How Much Should Scientists Check Other Scientists' Work?
    • Wang, S.S.1
  • 96
    • 84964527929 scopus 로고    scopus 로고
    • TIAS No 13174
    • TIAS No 13174, 2296 UNTS 167 (2001).
    • (2001) UNTS , vol.2296 , pp. 167


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.