Matches in SemOpenAlex for { <https://semopenalex.org/work/W1498521777> ?p ?o ?g. }
Showing items 1 to 75 of
75
with 100 items per page.
- W1498521777 endingPage "192" @default.
- W1498521777 startingPage "143" @default.
- W1498521777 abstract "The enforcement of certain norms on network participants - such as norms supporting information exchange and governing access to the network - is critical in ensuring the security of the network. While a public norm enforcer may be feasible in many situations, private norm enforcement may, and frequently does, complement or substitute public enforcement. Private enforcement of cyber-security is often subsidized, primarily in non-pecuniary manners (e.g., by exemption from antitrust laws). These subsidies may be necessary to capture the positive externalities of providing security to the network, but they also bias private parties' incentives and may result in the formation of inefficient security associations that are beneficial to their members only due to the subsidy. To mitigate this concern, subsidies should be awarded only to associations that are likely to be effective in enforcing norms on the network participants. This Article offers a framework that assesses the likelihood that an association would become an effective norm enforcer. Norms that are expensive to enforce are rarely enforced by newly-formed private legal systems (PLSs), because the effectiveness of mechanisms used to secure compliance (e.g., the threat of exclusion) depends on the PLSs' ability to confer benefits on their members, and newly-formed PLSs do not yet confer such benefits. Pre-existing functionality inexpensively enhances a PLS' ability to enforce norms, and therefore most PLSs rely on preexisting institutions that already benefit members, typically by regulating norms that are not very costly to enforce. The threat of losing these benefits disciplines members to abide by the PLS' rules, thus permitting the PLS to regulate behavior. Network security norms are usually expensive to enforce, and thus a private association enforcing them would be more successful and thus more deserving of public subsidies if it relied on a suitable pre-existing functionality. The Article suggests criteria for assessing the effectiveness of pre-existing functionalities." @default.
- W1498521777 created "2016-06-24" @default.
- W1498521777 creator A5081300816 @default.
- W1498521777 date "2005-11-28" @default.
- W1498521777 modified "2023-09-23" @default.
- W1498521777 title "Network Responses to Network Threats: The Evolution into Private Cybersecurity Associations" @default.
- W1498521777 cites W105304462 @default.
- W1498521777 cites W1492794030 @default.
- W1498521777 cites W1533297684 @default.
- W1498521777 cites W1577085552 @default.
- W1498521777 cites W1581351619 @default.
- W1498521777 cites W199610840 @default.
- W1498521777 cites W2035234632 @default.
- W1498521777 cites W2037631701 @default.
- W1498521777 cites W2046412917 @default.
- W1498521777 cites W2047115881 @default.
- W1498521777 cites W2061565725 @default.
- W1498521777 cites W2065313901 @default.
- W1498521777 cites W2067050450 @default.
- W1498521777 cites W2093706280 @default.
- W1498521777 cites W2158253057 @default.
- W1498521777 cites W2320781182 @default.
- W1498521777 cites W2405271985 @default.
- W1498521777 cites W2797387630 @default.
- W1498521777 cites W283599130 @default.
- W1498521777 cites W3121704919 @default.
- W1498521777 cites W3122143195 @default.
- W1498521777 cites W3122958024 @default.
- W1498521777 cites W3125373920 @default.
- W1498521777 cites W4211123236 @default.
- W1498521777 cites W4212854181 @default.
- W1498521777 cites W4213443024 @default.
- W1498521777 cites W4233654598 @default.
- W1498521777 cites W4234761190 @default.
- W1498521777 cites W4235023594 @default.
- W1498521777 cites W4236402467 @default.
- W1498521777 cites W4238625182 @default.
- W1498521777 cites W4246223421 @default.
- W1498521777 cites W4250731756 @default.
- W1498521777 cites W4254764143 @default.
- W1498521777 doi "https://doi.org/10.1017/cbo9780511511523.006" @default.
- W1498521777 hasPublicationYear "2005" @default.
- W1498521777 type Work @default.
- W1498521777 sameAs 1498521777 @default.
- W1498521777 citedByCount "2" @default.
- W1498521777 countsByYear W14985217772013 @default.
- W1498521777 crossrefType "book-chapter" @default.
- W1498521777 hasAuthorship W1498521777A5081300816 @default.
- W1498521777 hasConcept C108827166 @default.
- W1498521777 hasConcept C144133560 @default.
- W1498521777 hasConcept C38652104 @default.
- W1498521777 hasConcept C41008148 @default.
- W1498521777 hasConceptScore W1498521777C108827166 @default.
- W1498521777 hasConceptScore W1498521777C144133560 @default.
- W1498521777 hasConceptScore W1498521777C38652104 @default.
- W1498521777 hasConceptScore W1498521777C41008148 @default.
- W1498521777 hasLocation W14985217771 @default.
- W1498521777 hasOpenAccess W1498521777 @default.
- W1498521777 hasPrimaryLocation W14985217771 @default.
- W1498521777 hasRelatedWork W2110695853 @default.
- W1498521777 hasRelatedWork W2143560501 @default.
- W1498521777 hasRelatedWork W2236103065 @default.
- W1498521777 hasRelatedWork W2288179168 @default.
- W1498521777 hasRelatedWork W2534190072 @default.
- W1498521777 hasRelatedWork W2547405342 @default.
- W1498521777 hasRelatedWork W2608118026 @default.
- W1498521777 hasRelatedWork W2783961853 @default.
- W1498521777 hasRelatedWork W2787177649 @default.
- W1498521777 hasRelatedWork W3166491940 @default.
- W1498521777 isParatext "false" @default.
- W1498521777 isRetracted "false" @default.
- W1498521777 magId "1498521777" @default.
- W1498521777 workType "book-chapter" @default.