03.07.2016 Views

Authorized Authorized

eERqs

eERqs

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

224 WORLD DEVELOPMENT REPORT 2016<br />

Table 4.2 A basic framework for assessing the costs of cybersecurity incidents<br />

Direct costs<br />

Indirect costs<br />

Market players<br />

Repair costs<br />

Data loss<br />

Security measures<br />

Fraud<br />

Patch development and deployment<br />

Customer support<br />

Abuse management<br />

Law enforcement<br />

Cost of infrastructure<br />

Investigation at the organizational level<br />

Lost productivity<br />

Revenue loss<br />

Confidentiality breach<br />

Reputation-related revenue loss<br />

Security countermeasures collateral impact<br />

Slower ICT adoption<br />

Slower ICT innovation<br />

End users<br />

Home<br />

Business<br />

e-commerce companies<br />

Infrastructure<br />

Software vendors<br />

Internet service providers<br />

Hosting providers<br />

Registrars<br />

Computer emergency<br />

response teams<br />

Law enforcement<br />

Society at large<br />

Source: Bauer and Dutton 2015, for the WDR 2016, citing Bauer and others 2008.<br />

Note: ICT = information and communication technology.<br />

perhaps more than others—governments can play a<br />

role in developing effective policies. The “perimeter<br />

security” paradigm that pervades today, born in an<br />

era of a few centralized mainframe computers, needs<br />

revisiting, putting users—not devices—at the center<br />

of the discussion, and thus implying a great role for<br />

capacity building. 98 Public policy could be used to<br />

change misaligned incentives to achieve security.<br />

Given the pace of technological change, these policies<br />

should be guidelines or principles, not prescriptive,<br />

and be technology neutral. They should encourage<br />

interoperability among regimes and legal systems<br />

to investigate and prosecute cybercriminals across<br />

jurisdictions and to avoid the creation of safe havens<br />

for cybercriminals. Finally, work could be done to<br />

develop a common set of indicators to measure the<br />

economic impact of cybercrime and other cyberrisks.<br />

Protecting personal privacy and data<br />

online is essential in building trust in the<br />

internet<br />

The other side of the “balance” is protecting privacy<br />

and data online. 99 One of the key drivers in the digital<br />

economy is the flow of personal data, of which an<br />

estimated 90 percent has been added in the last two<br />

years. Collecting and analyzing data about individuals<br />

is integral to how some of the largest companies<br />

in the world do business. For example, Facebook is a<br />

company with a US$230 billion capitalization largely<br />

through its sales of ads that reach Facebook users. 100<br />

But data also allow small and medium companies to<br />

monetize their services.<br />

The World Economic Forum (WEF) has identified<br />

data-driven enterprises as part of a strategy for<br />

economic development in developing countries. 101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!