How Much Should We Spend to Protect Privacy?: Data Breaches and the Need for Information We Do Not Have

R. Sloan, Richard Warner
{"title":"How Much Should We Spend to Protect Privacy?: Data Breaches and the Need for Information We Do Not Have","authors":"R. Sloan, Richard Warner","doi":"10.2139/SSRN.3032143","DOIUrl":null,"url":null,"abstract":"A cost/benefit approach to privacy confronts two tradeoff issues. One is making appropriate tradeoffs between privacy and many goals served by the collection, distribution, and use of information. The other is making tradeoffs between investments in preventing unauthorized access to information and the variety of other goals that also make money, time, and effort demands. Much has been written about the first tradeoff. We focus on the second. The issue is critical. Data breaches occur at the rate of over three a day, and the aggregate social cost is extremely high. The puzzle is that security experts have long explained how to defend better. So why does society tolerate a significant loss that it has the means to avoid? \nSome may object that society does not tolerate breaches. Laws—current and proposed—impose requirements aimed at improving information security. However, as Thomas Smedinghoff notes, most of the laws “simply obligate companies to establish and maintain ‘reasonable’ or ‘appropriate’ security measures, controls, safeguards, or procedures, but give no further direction or guidance.” The approach has so far failed to provide an adequate incentive to improve information security. As one commentator notes, the “bad guys basically go where they want to go and do what they want to do, and they're not being stopped. Maybe for every one organization that's effectively stopping attacks, there are 100 that are being breached.” \nWe argue that the problem is not so much a lack of legal guidance as it is a lack of information. A standard cost/benefit approach is particularly suitable here. In the information security context, a business should adopt the following risk management goal: choose the most effective defense meeting the condition that the defense cost is not greater than the expected (business and relevant third-party) losses thereby avoided (over some appropriate short- or long-term time period). Businesses fall far short of a good approximation to business risk management goal. Applying this standard requires reasonably accurate information about the probability of a breach and the losses that will occur if it happens. Unfortunately, we are currently very far from having adequate information about either. The World Economic Forum report paints an accurate, if disturbing, picture of the consequences: “businesses are increasingly delaying the adoption of technological innovations due to inadequate understandings of required countermeasures. . . . A vicious circle results: uncertainty regarding proper levels of preparedness leads to forestalled investments in safeguards as interconnection expands exponentially.” \nA lack—even a severe lack—of objective information about probability and cost does not imply a complete inability to make better and worse decisions about information security. One can turn to subjective expert judgments and a variety of sophisticated analytic techniques that make use of them. Security outsourcing companies like AllClearID, BayDynamics, Healthguard Cyber Risk Management, and FireEye take this approach. Whatever its virtues, the “subjective judgment” approach can still spend far less or far more than the risk management goal requires. It is not a reliable guide to the optimal investment. \nWe think the best course is to turn the unanswerable question into an answerable one by taking steps to discover the information need to adequately approximate the risk management goal. We see no alternative to the slow road of discovering the necessary information. This solution may seem singularly unappealing. Isn’t there a quicker fix? Data breach notification laws may seem to offer just that. There are at least two reasons to have breach notification laws. One is that the notifications are a source of precisely the information we need. The second is—so it is claimed—that they improve security. We focus on the second claim, which we argue is likely false. Indeed, such laws may make security worse (by focusing resources on avoiding reportable breaches, not on meeting the risk management goal). Breach notification laws are at best an uncertain road to improving risk management. \nThe more certain, if longer, road is to get the information risk management needs. We argue for mandatory anonymous report by businesses of relevant information about data breaches.","PeriodicalId":370988,"journal":{"name":"eBusiness & eCommerce eJournal","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"eBusiness & eCommerce eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/SSRN.3032143","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

A cost/benefit approach to privacy confronts two tradeoff issues. One is making appropriate tradeoffs between privacy and many goals served by the collection, distribution, and use of information. The other is making tradeoffs between investments in preventing unauthorized access to information and the variety of other goals that also make money, time, and effort demands. Much has been written about the first tradeoff. We focus on the second. The issue is critical. Data breaches occur at the rate of over three a day, and the aggregate social cost is extremely high. The puzzle is that security experts have long explained how to defend better. So why does society tolerate a significant loss that it has the means to avoid? Some may object that society does not tolerate breaches. Laws—current and proposed—impose requirements aimed at improving information security. However, as Thomas Smedinghoff notes, most of the laws “simply obligate companies to establish and maintain ‘reasonable’ or ‘appropriate’ security measures, controls, safeguards, or procedures, but give no further direction or guidance.” The approach has so far failed to provide an adequate incentive to improve information security. As one commentator notes, the “bad guys basically go where they want to go and do what they want to do, and they're not being stopped. Maybe for every one organization that's effectively stopping attacks, there are 100 that are being breached.” We argue that the problem is not so much a lack of legal guidance as it is a lack of information. A standard cost/benefit approach is particularly suitable here. In the information security context, a business should adopt the following risk management goal: choose the most effective defense meeting the condition that the defense cost is not greater than the expected (business and relevant third-party) losses thereby avoided (over some appropriate short- or long-term time period). Businesses fall far short of a good approximation to business risk management goal. Applying this standard requires reasonably accurate information about the probability of a breach and the losses that will occur if it happens. Unfortunately, we are currently very far from having adequate information about either. The World Economic Forum report paints an accurate, if disturbing, picture of the consequences: “businesses are increasingly delaying the adoption of technological innovations due to inadequate understandings of required countermeasures. . . . A vicious circle results: uncertainty regarding proper levels of preparedness leads to forestalled investments in safeguards as interconnection expands exponentially.” A lack—even a severe lack—of objective information about probability and cost does not imply a complete inability to make better and worse decisions about information security. One can turn to subjective expert judgments and a variety of sophisticated analytic techniques that make use of them. Security outsourcing companies like AllClearID, BayDynamics, Healthguard Cyber Risk Management, and FireEye take this approach. Whatever its virtues, the “subjective judgment” approach can still spend far less or far more than the risk management goal requires. It is not a reliable guide to the optimal investment. We think the best course is to turn the unanswerable question into an answerable one by taking steps to discover the information need to adequately approximate the risk management goal. We see no alternative to the slow road of discovering the necessary information. This solution may seem singularly unappealing. Isn’t there a quicker fix? Data breach notification laws may seem to offer just that. There are at least two reasons to have breach notification laws. One is that the notifications are a source of precisely the information we need. The second is—so it is claimed—that they improve security. We focus on the second claim, which we argue is likely false. Indeed, such laws may make security worse (by focusing resources on avoiding reportable breaches, not on meeting the risk management goal). Breach notification laws are at best an uncertain road to improving risk management. The more certain, if longer, road is to get the information risk management needs. We argue for mandatory anonymous report by businesses of relevant information about data breaches.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
我们应该花多少钱来保护隐私?:数据泄露和对我们没有的信息的需求
隐私的成本/收益方法面临两个权衡问题。其一是在隐私和收集、分发和使用信息所服务的许多目标之间做出适当的权衡。另一个是在防止未经授权的信息访问的投资和其他各种需要金钱、时间和努力的目标之间进行权衡。关于第一种权衡已经写了很多。我们关注的是第二点。这个问题至关重要。数据泄露以每天超过三起的速度发生,其总社会成本非常高。令人困惑的是,安全专家长期以来一直在解释如何更好地防御。那么,为什么社会会容忍它有办法避免的重大损失呢?有些人可能会反对说,社会不能容忍违规行为。现行的和拟议的法律都提出了旨在提高信息安全的要求。然而,正如Thomas Smedinghoff所指出的那样,大多数法律“只是要求公司建立和维护‘合理的’或‘适当的’安全措施、控制、保障或程序,而没有给出进一步的方向或指导。”到目前为止,这种方法未能提供足够的激励来改善信息安全。正如一位评论员所指出的,“坏人基本上想去哪里就去哪里,想做什么就做什么,他们没有被阻止。”也许每有一个组织有效地阻止了攻击,就有100个组织遭到攻击。”我们认为,这个问题与其说是缺乏法律指导,不如说是缺乏信息。标准的成本/收益方法在这里特别适用。在信息安全上下文中,企业应采用以下风险管理目标:选择最有效的防御,满足防御成本不大于预期(企业和相关第三方)损失的条件,从而避免(在适当的短期或长期内)损失。企业远远没有很好地接近业务风险管理目标。应用这一标准需要合理准确地了解违约的可能性以及违约发生后将造成的损失。不幸的是,我们目前还远远没有关于这两者的充分信息。世界经济论坛的报告准确地描绘了一幅令人不安的后果图景:“由于对所需对策的理解不足,企业越来越推迟采用技术创新. . . .这就形成了恶性循环:随着互联互通呈指数级增长,对适当准备水平的不确定性导致对保障措施的预先投资受阻。”缺乏——甚至严重缺乏——关于概率和成本的客观信息并不意味着完全无法做出更好或更差的信息安全决策。人们可以求助于主观的专家判断和各种复杂的分析技术来利用它们。AllClearID、BayDynamics、Healthguard Cyber Risk Management和FireEye等安全外包公司都采用了这种方法。无论其优点如何,“主观判断”方法的花费仍然可能远远低于风险管理目标所需的费用。它不是最佳投资的可靠指南。我们认为最好的方法是通过采取步骤来发现足够接近风险管理目标所需的信息,将无法回答的问题变成可以回答的问题。除了缓慢地寻找必要的资料之外,我们别无选择。这个解决方案似乎特别没有吸引力。没有更快的解决办法吗?数据泄露通知法似乎提供了这样的服务。违反通知法至少有两个原因。其一,这些通知正是我们所需要的信息的来源。第二点是——正如他们声称的那样——他们提高了安全。我们关注第二种说法,我们认为这可能是错误的。事实上,这样的法律可能会使安全变得更糟(将资源集中在避免可报告的违规行为,而不是满足风险管理目标上)。违约通知法在改善风险管理方面充其量是一条不确定的道路。越确定,如果时间越长,就越能获得风险管理所需的信息。我们主张企业必须匿名报告有关数据泄露的相关信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Advertising as Information for Ranking E-Commerce Search Listings Adaptive Price Mechanism and a Sequential Reverse Auction Model in Social Commerce Asymmetric Network Effects in the Integration of Digital Platforms Is COVID-19 Reshaping Consumer Buying Behavior? Understanding the Problems and Issues of Online Purchase in Nepal The Pricing Strategies of Online Grocery Retailers
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1