Table of Contents

Research Handbook on Governance of the Internet

Research Handbook on Governance of the Internet

Elgar original reference

Edited by Ian Brown

The internet is now a key part of everyday life across the developed world, and growing rapidly across developing countries. This Handbook provides a comprehensive overview of the latest research on internet governance, written by the leading scholars in the field.

Chapter 18: Enhancing incentives for internet security

Michel van Eeten and Johannes M. Bauer

Subjects: innovation and technology, technology and ict, law - academic, intellectual property law, internet and technology law, regulation and governance, politics and public policy, regulation and governance


The devices and software constituting the internet are maintained by numerous players with very different incentives to provide for security. Hardware and software vendors, Internet Service Providers (ISPs), application and service providers, various types of users, security service providers, as well as government and non-government actors involved in governing the internet, interact in a trans-national, multi-level system. This system is continuously attacked by players with increasingly malicious and criminal motives (OECD 2009; Hogben et al. 2011). The proliferation of new network architectures and services such as cloud computing, mobile internet, and social networks raises additional security concerns (e.g., Blumenthal 2011). Highly distributed with hierarchical elements, the internet is best described as a nested system with subsystems that are more closely connected than others. Security at the system level is an emergent property, influenced but not fully determined by security decisions of individual participants. Even at the level of individuals or organizations security is partially affected by decisions of other players. Enhancing the incentives for internet security requires a clear understanding of the factors that shape security decisions of the many players involved in the internet and of the forces that relentlessly seek to breach information security, often in pursuit of fraudulent and criminal purposes.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information