skip to main content
research-article
Free Access

Positive externality, increasing returns, and the rise in cybercrimes

Published:01 December 2009Publication History
Skip Abstract Section

Abstract

Introduction

The meteoric rise in cybercrime has been an issue of pressing concern to our society. According to Federal Bureau of Investigation (FBI), nine out of 10 U.S. companies experienced computer security incidents in 2005 which led to a loss of $67.2 billion. A survey conducted by IBM found that U.S. businesses worry more about cybercrimes than about physical crimes. Internet-related frauds accounted for 46% of consumer complaints made to the Federal Trade Commission (FTC) in 2005. Total losses of Internet fraud victims reporting to FTC increased from $205 million in 2003 to $336 million in 2005. In a July 2007 interview with USA Today, McAfee CEO reported that his company received 3,000--5,000 threat submissions per day from customers and 10% of them were new.

This paper offers an economic analysis to explain cybercrimes' escalation. We define cybercrimes as criminal activities in which computers or computer networks are the principal means of committing an offense. Examples include cyber-theft, cyber-trespass, cyber-obscenity, critical infrastructure attacks and cyber-extortions.6 The most notable features of the cybercrime environment include newness, technology and skill-intensiveness, and a high degree of globalization. Factors such as a wide online availability of hacking tools, information sharing in the cyber-criminal community, availability of experienced hackers' help to less skillful criminals and congestion in law enforcement systems produce externality effects within the cyber-criminal community as well as across society and businesses.

We focus on three positive or self-reinforcing feedback systems to examine increasing returns in cybercrime related activities. In this article, we first provide an overview of the positive feedback loops that reinforce cyber-criminals' behavior. Then, we describe mechanisms associated with externality in cybercrime related activities.

References

  1. Arthur, W.B. Increasing returns and the new world of business. Harvard Bus. Rev. (Jul-Aug. 1996), 101--109.Google ScholarGoogle Scholar
  2. Banisar, D. Computer hacker's sentence spotlights high-tech crime prosecutions. Criminal Justice Weekly, (Aug. 3, 1999).Google ScholarGoogle Scholar
  3. Becker, G. S. The economics of crime. Cross Sections, (Fall 1995), 8--15; http://www.rich.frb.org/pubs/cross/crime/crime.pdf.Google ScholarGoogle Scholar
  4. Drinkard, J. Nation's moral values declining, most say; Poll: Majority see USA as deeply split. USA Today, (Nov. 23, 2004), A.11.Google ScholarGoogle Scholar
  5. Gaviria, A. Increasing returns and the evolution of violent crime: The case of Colombia, Journal of Development Economics 61, 1, (2000), 1.Google ScholarGoogle ScholarCross RefCross Ref
  6. Kshetri, N. The simple economics of cybercrimes. IEEE Security and Privacy 4, 1 (2006), 33--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Noda, T. and Collis, D.J. The evolution of intraindustry firm heterogeneity: Insights from a process study, Academy of Management Journal 44, 4 (2001), 897--925.Google ScholarGoogle Scholar
  8. North, D. C. Institutions, Institutional Change and Economic Performance Cambridge University Press, Cambridge, U.K., 1990.Google ScholarGoogle Scholar
  9. Phukan, S. IT ethics in the Internet age: New dimensions, InSITE, June (2002); http://proceedings.informingscience.org/IS2002Proceedings/papers/phuka037iteth.pdf.Google ScholarGoogle Scholar
  10. Rogers, E.M. Diffusion of Innovation, 4th edn. Free Press: NY, 1995.Google ScholarGoogle Scholar
  11. Sah, R. Social osmosis and patterns of crime. Journal of Political Economy 99, 6 (1991), 169--217.Google ScholarGoogle ScholarCross RefCross Ref
  12. Scott, R. Institutions and Organizations, Sage, Thousand Oaks, CA, 2001.Google ScholarGoogle Scholar

Index Terms

  1. Positive externality, increasing returns, and the rise in cybercrimes

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 52, Issue 12
        Finding the Fun in Computer Science Education
        December 2009
        127 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/1610252
        Issue’s Table of Contents

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 December 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Popular
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format