08.08.2015 Views

Economic Report of the President

Economic Report of the President - 2005 - The American Presidency ...

Economic Report of the President - 2005 - The American Presidency ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Illegal Acts on <strong>the</strong> InternetThe Internet provides tremendous opportunities to improve <strong>the</strong> way wecommunicate, learn, entertain ourselves, and buy and sell goods and services.Unfortunately, <strong>the</strong>ft, vandalism, and fraud are also moving online. From aneconomic perspective, <strong>the</strong>se activities are costly because <strong>the</strong>y violate <strong>the</strong> propertyrights <strong>of</strong> people, reducing <strong>the</strong>ir incentives to create new goods anddiverting resources from productive uses as people spend time trying to undo<strong>the</strong> damage caused by computer viruses and Internet worms. More fundamentally,<strong>the</strong> growth in such activity could threaten public confidence inusing <strong>the</strong> Internet for productive purposes. As in <strong>the</strong> <strong>of</strong>fline world, wherelocks and inventory control tags deter property right violations, private sectorresponses can make cybercrime more difficult. Government must also actto protect property rights and ensure that <strong>the</strong> Internet and o<strong>the</strong>r newtechnologies are safe venues for commerce.CybersecurityThe growing reliance on <strong>the</strong> Internet means that computer users areexposed to new threats. Viruses and Internet worms impair computers andprevent authorized users from gaining timely, reliable access to data or asystem. Attacks in cyberspace can maliciously modify, alter, or destroy data ora computer system. Attackers access computers without authorization to viewor copy proprietary or private information, such as a credit card numbers ortrade secrets. At a deeper level, concerns have grown about how unauthorizedcontrol over large numbers <strong>of</strong> systems by those with malicious intent can posethreats to <strong>the</strong> security <strong>of</strong> sensitive information or to <strong>the</strong> functioning <strong>of</strong> criticalinfrastructures. In terms <strong>of</strong> prevention, <strong>the</strong> private sector is best equippedto take steps against evolving cyber threats. The private sector owns most <strong>of</strong><strong>the</strong> computer systems and networks and can, in many cases, capture <strong>the</strong> benefitsfrom investments in improved security. Private sector surveys suggestthat organizations are spending increasing amounts on IT security. The<strong>President</strong>’s National Strategy to Secure Cyberspace also makes clear <strong>the</strong> Federalgovernment’s important role in promoting cybersecurity.Fraudulent Spam and SpywareScams to defraud people are ano<strong>the</strong>r type <strong>of</strong> property rights violation. TheFederal Trade Commission (FTC) has found that spam (unwanted, typicallycommercial e-mail), in addition to being a nuisance, is mostly deceptive andfraudulent. Of 1,000 pieces <strong>of</strong> spam examined by <strong>the</strong> Commission,84.5 percent were deceptive on <strong>the</strong>ir face or advertised an illegitimate productor service. As in <strong>the</strong> <strong>of</strong>fline world, consumer awareness online is <strong>the</strong> first line <strong>of</strong>defense in combating fraud. The anonymity and scope <strong>of</strong> <strong>the</strong> Internet can makeChapter 6 | 141

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!