• Corpus ID: 110301124

Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity

@inproceedings{Kehl2014SurveillanceCT,
  title={Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom \& Cybersecurity},
  author={D{\'a}niel Kehl and Kevin Bankston and Robert Morgus},
  year={2014}
}
New America is a nonprofit, nonpartisan public policy institute that invests in new thinkers and new ideas to address the next generation of challenges facing the United States. New America's Open Technology Institute formulates policy and regulatory reforms to support open architectures and open source innovations and facilitates the development and implementation of open technologies and communications networks. OTI promotes affordable, universal, and ubiquitous communications networks. OTI… 
Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness
Almost two years ago, ITIF described how revelations about pervasive digital surveillance by the U.S. intelligence community could severely harm the competitiveness of the United States if foreign
Data Localization Laws in a Digital World: Data Protection or Data Protectionism?
Data localization laws are emerging as a pernicious form of non-tariff barrier which significantly harms the growth of trade in a digitally powered world. An International Political Economy approach
Chilling effects and the stock market response to the Snowden revelations
TLDR
It is shown that chilling effects indeed exist, however, further analysis including the stock prices of the largest cybersecurity companies demonstrate a muted market response to the revelations, while cybersecurity spending data suggest resulting economic harm in the form of increased opportunity costs of buyers of cybersecurity services.
A Risk-Based Framework to Inform Prioritisation of Security Investment for Insider Threats
Received: 22 January 2019 Accepted: 7 November 2019 Threats to information security from inside an organisation are difficult to manage as insiders, by definition, have legitimate access to the
Tip of the Costberg: On the Invalidity of All Cost of Regulation Estimates and the Need to Compile Them Anyway, 2017 Edition
We know the federal government spends over $3.5 trillion annually, but it remains surprising how little is known regarding the costs of individual categories of federal regulation and intervention,
THERE IS NO SINGLE SOLUTION TO THE ‘INSIDER’ PROBLEM BUT THERE IS A VALUABLE WAY FORWARD
The threat posed by insiders deliberately or inadvertently misusing their knowledge and access to sensitive information is a major security challenge. Finding effective, acceptable and affordable
User tolerance of privacy abuse on mobile Internet and the country level of development
This paper presents the results of an exploratory study on the awareness of users about privacy abuse when communicating and using the mobile Internet. The study researches the relationships and
BigData - Can Virtue Ethics Play a Role?.pdf
Big Data is a term for masses of information that is usually heterogeneous, usually from multiple sources, in multiple formats and at a scale of at least terabytes, and often substantially larger. It
Understanding Computer Security
TLDR
The root of the challenge that the authors face is understanding security and how information technology can enable and support such an understanding, and just like security is a broad, multidisciplinary topic covering technical as well as non-technical issues, the challenge of understandingSecurity is a multifaceted one, spanning across a myriad of noteworthy topics.
The WebSocket protocol and security : best practices and worst weaknesses
TLDR
The research showed that the WebSocket protocol in itself has dealt with the security aspect and that the protocol specification states clearly on how the protocol should work when applied according to the documentation.
...
1
2
...

References

SHOWING 1-10 OF 330 REFERENCES
Risking it All: Unlocking the Backdoor to the Nation's Cybersecurity
This paper addresses government policies that can influence commercial practices to weaken security in products and services sold on the commercial market. The debate on information surveillance for
Internet freedom
TLDR
A renewed push from self-styled consumer advocates urging federal regulators to impose network neutrality regulation on Internet service providers would upset that dynamic, which has largely prevented states and localities from imposing onerous, discriminatory taxes on Internet access and online commerce.
The Dangerous Policy of Weakening Security to Facilitate Surveillance
Some nations may consider policies that are intended to facilitate legal surveillance for law enforcement or intelligence purposes by weakening the cybersecurity of commercially available products
A Declaration of the Independence of Cyberspace
Yesterday, that great invertebrate in the White House signed into the law the Telecom “Reform” Act of 1996, while Tipper Gore took digital photographs of the proceedings to be included in a book
Jonesing For A Privacy Mandate, Getting A Technology Fix--Doctrine to Follow
While the Jones Court held unanimously that the government’s use of a GPS device to track Antoine Jones’ vehicle for 28 days was a Fourth Amendment search, the Justices disagreed on the facts and
Internet Corporation For Assigned Names And Numbers
The Internet Corporation for Assigned Names and Numbers (ICANN) was created through a Memorandum of Understanding (MoU) between the US Department of Commerce and ICANN in 1998. According to Article
Breaking the Web: Data Localization vs. the Global Internet
A BRICS Internet, the Euro Cloud, the Iranian Internet. Governments across the world eager to increase control over the World Wide Web are tearing it apart. Iran seeks to develop an Internet free of
Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet
For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder or the like to a single pair of wires. By the 1990s, though, the changing structure of
How Much Will PRISM Cost the U.S. Cloud Computing Industry
The recent revelations about the extent to which the National Security Agency (NSA) and other U.S. law enforcement and national security agencies have used provisions in the Foreign Intelligence
Information technology and U.S. productivity growth: evidence from a prototype industry production account
The rapid productivity growth in the US during the Information Age, prior to the dot-com bust in 2000, and the large contribution of the IT producing sector, is well known. Less known are the sources
...
1
2
3
4
5
...