skip to main content
research-article

ICT pollution and liability

Published:01 October 2011Publication History
Skip Abstract Section

Abstract

To a large extent liability for ICT perils is still a grey area, even though an increasing number of information security researchers adopt economic approaches to highlight market mechanisms and externalities. That is why this article focuses on the need for increased awareness of externalities and liability among ICT professionals and their customers. This is critical to achieve in order to promote appropriate ICT technologies and services with comprehensible privacy and security protection.

What is needed is a better understanding of the consequences of externalities from ICT perils. This would benefit customers and increase trust in ICT products and services which in turn may even increase suppliers' profit margin; customers would be prepared to buy more services and products if contracts and service level agreements would accept more liability. Moreover, suppliers could sell guaranties and insurances on top of their products and services. The result would be a win-win situation and would benefit society at large.

References

  1. Anderson, Ross J. 2001a, "Why Information Security is Hard: An Economic Perspective," in Proceedings of 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, 10--14 December, 2001, pp. 358 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Anderson, Ross J. 1994, "Liability and Computer Security -- Nine Principles", in Proceedings of ESORICS 1994, Springer-Verlag, London, pp. 231--245. <http://www.cl.cam.ac.uk/~rja14/Papers/liability.pdf> Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Anderson, Ross J. 2001b, Security Engineering -- A Guide to Building Dependable Distributed Systems, Wiley, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bohm, N., Brown, I. and Gladman, B. 2000, "Electronic Commerce: Who Caries the Risk of Fraud?", The Journal of Information, Law and Technology (JILT), 2000 (3). <http://elj.warwick.ac.uk/jilt/00-3/bohm.html>Google ScholarGoogle Scholar
  5. Geer, D. 1998, "Risk Management is Where the Money Is", Risk Digest, vol 20, no. 6, Nov. 12, 1998. <http://catless.ncl.ac.uk/Risks/20.06.html>Google ScholarGoogle Scholar
  6. Magnusson, Christer 1999, "Hedging Shareholder Value in an IT dependent Business Society -- the Framework BRITS", PhD Dissertation, Department of Computer and Systems Sciences, Stockholm University, report series 99--015, Stockholm 1999.Google ScholarGoogle Scholar
  7. Marglin, Stephen A. 2008, The Dismal Science, How Thinking Like an Economicst Undermines Community, 2008, Harvard, ISBN-13: 978-0-674-02654-4.Google ScholarGoogle Scholar
  8. Odlyzko, A. M. 2000, "Cryptographic Abundance and Pervasive Computing", Information Impact Magazine, June 2000. <http://www.cisp.org/imp/june_2000/06_00odlyzko-insight.html>Google ScholarGoogle Scholar
  9. Van Eeten, Michel. J. G. and Bauer, Johannes M. 2008, "Economics of Malware: Security Decisions, Incentives and Externalities", STI Working Paper, 2008/1, Information and Communication Technologies, Directorate for Science, Technology and Industry, Organisation for Economic Co-operation and Development, 29-May-2008.Google ScholarGoogle Scholar
  10. Varian, H. R. 2000, "Managing Online Security Risks", Economic Science Column, The New York Times, June 1, 2000. <http://www.nytimes.com/library/financial/columns/060100econ-scene.html>Google ScholarGoogle Scholar

Index Terms

  1. ICT pollution and liability

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCAS Computers and Society
        ACM SIGCAS Computers and Society  Volume 41, Issue 1
        October 2011
        48 pages
        ISSN:0095-2737
        DOI:10.1145/2095266
        Issue’s Table of Contents

        Copyright © 2011 Author

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 October 2011

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader