s rsrt Market failures Tyler Moore - - PowerPoint PPT Presentation

s rs r t
SMART_READER_LITE
LIVE PREVIEW

s rsrt Market failures Tyler Moore - - PowerPoint PPT Presentation

s rsrt Market failures Tyler Moore When markets fail Market failures occur when the free-market outcome is inefficient Monopolies/oligopolies Public goods Information


slide-1
SLIDE 1

❊❝♦♥♦♠✐❝s ♦❢ ❈②❜❡rs❡❝✉r✐t②

Market failures

Tyler Moore

slide-2
SLIDE 2

When markets fail

◮ Market failures occur when the free-market outcome is

inefficient

◮ Monopolies/oligopolies ◮ Public goods ◮ Information asymmetries ◮ Externalities

◮ Market failures justify regulatory intervention, and inform

how public policy should be designed

◮ They help explain why private cybersecurity investment is

  • ften suboptimal
slide-3
SLIDE 3

Public goods

◮ Most goods can be privately consumed (e.g., cars, food) ◮ But somethings can’t be privately consumed (e.g., national

defense, grazing commons)

◮ Public goods have two characteristics that make them hard

to allocate efficiently

◮ Non-rivalrous: individual consumption does not reduce

what’s available to others

◮ Non-excludable: no practical way to exclude people from

consuming

◮ Public goods tend to be delivered at less than what is

socially optimal

slide-4
SLIDE 4

Markets with asymmetric information

slide-5
SLIDE 5

Information asymmetries in cybersecurity markets

  • 1. Secure software is a market for lemons

◮ Vendors may believe their software is secure, but buyers

have no reason to believe them

◮ So buyers refuse to pay a premium for secure software,

and vendors refuse to devote resources to do so

slide-6
SLIDE 6

Information asymmetries in cybersecurity markets

  • 1. Secure software is a market for lemons

◮ Vendors may believe their software is secure, but buyers

have no reason to believe them

◮ So buyers refuse to pay a premium for secure software,

and vendors refuse to devote resources to do so

  • 2. Lack of robust cybersecurity incident data

◮ Unless required by law, most firms choose not to disclose

when they have suffered cybersecurity incidents

◮ Thus firms cannot create an accurate a priori estimate of

the likelihood of incidents or their cost

◮ Without accurate loss measurements, defensive resources

cannot be allocated properly

slide-7
SLIDE 7

Consequences of asymmetric information

  • 1. Adverse selection

◮ In health insurance, adverse selection occurs when sick

people are more likely to buy coverage than the healthy

◮ Difficulty of discriminating between firms with good or

bad operational security practices has hampered the development of the cyber-insurance market

slide-8
SLIDE 8

Consequences of asymmetric information

  • 1. Adverse selection

◮ In health insurance, adverse selection occurs when sick

people are more likely to buy coverage than the healthy

◮ Difficulty of discriminating between firms with good or

bad operational security practices has hampered the development of the cyber-insurance market

  • 2. Moral hazard

◮ People may drive recklessly if fully insured with $0

deductible

◮ Often claimed that consumers engage in moral hazard

due to $0 card fraud liability

◮ Cuts both ways: when regulations favor banks, they can

behave recklessly in combating fraud

slide-9
SLIDE 9

Positive externalities

◮ Positive externality: benefit to third parties as a consequence

  • f another’s actions

◮ Many technical security solutions become effective only when

many people aopt them

◮ Introduced in 1996, S-BGP authenticates the paths

routers advertise and could have prevented many network

  • utages

◮ However, S-BGP is only valuable if all ISPs switch

◮ Security protocols which have succeeded offer immediate

value to adopting firms (e.g., SSH)

slide-10
SLIDE 10

Negative externalities

slide-11
SLIDE 11

Negative externalities

◮ Negative externality: harm imposed on third parties as a

consequence of another’s actions

◮ Environmental pollution is a negative externality

◮ Factory produces a good and gets paid by buyer ◮ Pollution caused by production is not accounted for in

the transaction

◮ Information insecurity is often a negative externality

slide-12
SLIDE 12

Botnet-infected computers impose negative externalities

Source: http://en.wikipedia.org/wiki/File:Botnet.svg

slide-13
SLIDE 13

Implications of externalities

◮ When positive externalities are present, less of the good

tends to be provisioned than is good for society

◮ When negative externalities are present, more of the bad

tends to be provisioned than is good for society

◮ So we often end up with less security investment from the

good guys and more harm emanating from the bad guys than we should

slide-14
SLIDE 14

Summary

◮ Markets sometimes fail to ensure the best outcomes for

society

◮ Cybersecurity failures can often be traced to market failures,

notably information asymmetries and externalities

◮ Next time we will learn about available policy options for

correcting market failures

slide-15
SLIDE 15

Thank you for your attention!

Please post any questions you may have on our discussion forum.