front cover of Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Lillian Ablon
RAND Corporation, 2016
Although spending on cybersecurity continues to grow, companies, government agencies, and nonprofit organizations are still being breached, and sensitive personal, financial, and health information is still being compromised. This report sets out the results of a study of consumer attitudes toward data breaches, notifications that a breach has occurred, and company responses to such events.
[more]

front cover of Crime Dot Com
Crime Dot Com
From Viruses to Vote Rigging, How Hacking Went Global
Geoff White
Reaktion Books, 2021
From Anonymous to the Dark Web, a dizzying account of hacking—past, present, and future.

“Brilliantly researched and written.”—Jon Snow, Channel 4 News

 
“A comprehensive and intelligible account of the elusive world of hacking and cybercrime over the last two decades. . . . Lively, insightful, and, often, alarming.”—Ewen MacAskill, Guardian

On May 4, 2000, an email that read “kindly check the attached LOVELETTER” was sent from a computer in the Philippines. Attached was a virus, the Love Bug, and within days it had been circulated across the globe, paralyzing banks, broadcasters, and businesses in its wake, and extending as far as the UK Parliament and, reportedly, the Pentagon. The outbreak presaged a new era of online mayhem: the age of Crime Dot Com. In this book, investigative journalist Geoff White charts the astonishing development of hacking, from its conception in the United States’ hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as one of the most dangerous and pervasive threats to our connected world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks to make millions are being harnessed by nation states to target voters, cripple power networks, and even prepare for cyber-war. From Anonymous to the Dark Web, Ashley Madison to election rigging, Crime Dot Com is a thrilling, dizzying, and terrifying account of hacking, past and present, what the future has in store, and how we might protect ourselves from it.
[more]

front cover of The Defender’s Dilemma
The Defender’s Dilemma
Charting a Course Toward Cybersecurity
Martin C. Libicki
RAND Corporation, 2015
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures—and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.
[more]

front cover of The Economics of Privacy
The Economics of Privacy
Edited by Avi Goldfarb and Catherine E. Tucker
University of Chicago Press, 2024

A foundational new collection examining the mechanics of privacy in the digital age.

The falling costs of collecting, storing, and processing data have allowed firms and governments to improve their products and services, but have also created databases with detailed individual-level data that raise privacy concerns. This volume summarizes the research on the economics of privacy and identifies open questions on the value of privacy, the roles of property rights and markets for privacy and data, the relationship between privacy and inequality, and the political economy of privacy regulation.

Several themes emerge across the chapters. One is that it may not be possible to solve privacy concerns by creating a market for the right to privacy, even if property rights are well-defined and transaction costs are low. Another is that it is difficult to measure and value the benefits of privacy, particularly when individuals have an intrinsic preference for privacy. Most previous attempts at valuation have focused only on quantifiable economic outcomes, such as innovation. Finally, defining privacy through an economic lens is challenging. The broader academic and legal literature includes many distinct definitions of privacy, and different definitions may be appropriate in different contexts. The chapters explore a variety of frameworks for examining these questions and provide a range of new perspectives on the role of economics research in understanding the benefits and costs of privacy and of data flows. As the digital economy continues to expand the scope of economic theory and research, The Economics of Privacy provides the most comprehensive survey to date of this field and its next steps.

[more]

front cover of Hackers Wanted
Hackers Wanted
An Examination of the Cybersecurity Labor Market
Martin C. Libicki
RAND Corporation, 2014
The perceived shortage of cybersecurity professionals working on national security may endanger the nation’s networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.
[more]

front cover of How Do We Know What Information Sharing Is Really Worth? Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts
How Do We Know What Information Sharing Is Really Worth? Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts
Brian A. Jackson
RAND Corporation, 2014
The sharing of intelligence and law enforcement information is a central part of U.S. domestic security efforts, yet there are concerns about the effectiveness of information-sharing and fusion activities and their value relative to the public funds invested in them. This report lays out the challenges of evaluating information-sharing efforts that seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts.
[more]

front cover of Markets for Cybercrime Tools and Stolen Data
Markets for Cybercrime Tools and Stolen Data
Hackers' Bazaar
Lillian Ablon
RAND Corporation, 2014
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.
[more]

front cover of Radical Secrecy
Radical Secrecy
The Ends of Transparency in Datafied America
Clare Birchall
University of Minnesota Press, 2021

Reimagining transparency and secrecy in the era of digital data

When total data surveillance delimits agency and revelations of political wrongdoing fail to have consequences, is transparency the social panacea liberal democracies purport it to be? This book sets forth the provocative argument that progressive social goals would be better served by a radical form of secrecy, at least while state and corporate forces hold an asymmetrical advantage over the less powerful in data control. Clare Birchall asks: How might transparency actually serve agendas that are far from transparent? Can we imagine a secrecy that could act in the service of, rather than against, a progressive politics? 

To move beyond atomizing calls for privacy and to interrupt the perennial tension between state security and the public’s right to know, Birchall adapts Édouard Glissant’s thinking to propose a digital “right to opacity.” As a crucial element of radical secrecy, she argues, this would eventually give rise to a “postsecret” society, offering an understanding and experience of the political that is free from the false choice between secrecy and transparency. She grounds her arresting story in case studies including the varied presidential styles of George W. Bush, Barack Obama, and Donald Trump; the Snowden revelations; conspiracy theories espoused or endorsed by Trump; WikiLeaks and guerrilla transparency; and the opening of the state through data portals.

Postsecrecy is the necessary condition for imagining, finally, an alternative vision of “the good,” of equality, as neither shaped by neoliberal incarnations of transparency nor undermined by secret state surveillance. Not least, postsecrecy reimagines collective resistance in the era of digital data.

[more]

front cover of Shareveillance
Shareveillance
The Dangers of Openly Sharing and Covertly Collecting Data
Clare Birchall
University of Minnesota Press, 2017

Cracking open the politics of transparency and secrecy

In an era of open data and ubiquitous dataveillance, what does it mean to “share”? This book argues that we are all “shareveillant” subjects, called upon to be transparent and render data open at the same time as the security state invests in practices to keep data closed. Drawing on Jacques Rancière’s “distribution of the sensible,” Clare Birchall reimagines sharing in terms of a collective political relationality beyond the veillant expectations of the state.

[more]

front cover of Zero Days, Thousands of Nights
Zero Days, Thousands of Nights
The Life and Times of Zero-Day Vulnerabilities and Their Exploits
Lillian Ablon
RAND Corporation, 2017
Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
[more]


Send via email Share on Facebook Share on Twitter