Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


The Law and Economics of Cybersecurity

Edited by: Mark F. Grady, Francesco Parisi

ISBN13: 9780521855273
ISBN: 0521855276
Published: January 2006
Publisher: Cambridge University Press
Country of Publication: UK
Format: Hardback
Price: £69.00
Paperback edition , ISBN13 9781107403109



Despatched in 7 to 9 days.

Cybersecurity is an increasing problem for which the market may fail to produce a solution. The ultimate source is that computer owners lack adequate incentives to invest in security because they bear fully the costs of their security precautions but share the benefits with their network partners.

In a world of positive transaction costs, individuals often select less than optimal security levels. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition of nations.

This book brings together the views of leading law and economics scholars on the nature of the cybersecurity problem and possible solutions to it. Many of these solutions are market based, but they need some help, either from government or industry groups or both. Indeed, the cybersecurity problem prefigures a host of 21st century problems created by information technology and the globalization of markets

Subjects:
IT, Internet and Artificial Intelligence Law
Contents:
Part I. Problems:
1. Private versus social incentives in cybersecurity, law and economics Bruce K. Kobayashi
2. A model for when disclosure helps security: what is different about computer and network security? Peter Swire
3. Peer production of survivable critical infrastructures Yochai Benkler
4. Cyber security: of heterogeneity and autarchy Randal C. Picker
5. Network responses to network threats: the evolution into private cybersecurity associations Amitai Aviram
6. The dark side of private ordering for cybersecurity Neal K. Katyal
7. Holding Internet Service Providers accountable Doug Lichtman and Eric P. Posner
8. Global cyberterrorism, jurisdiction, and international organization Joel T. Trachtman.