Abstract
Botnets pose a growing threat to the nation’s critical digital infrastructure and general level of cybersecurity. Several strategies for reducing the threat of botnets have been outlined in the cyber security literature. These strategies typically call for both Internet Service Providers (ISPs) and home Internet users to adopt a greater share of the responsibility for overall security. However, to date no study has attempted to determine how accepting the public would be of these strategies. This study takes the first step in filling that gap. The results of this pilot survey suggest that, in general, individuals would be willing to spend additional time each month meeting security requirements set by their ISPs. The results also suggest that although only 50% of respondents would be willing to pay their ISP more per month to protect themselves from cyber threats, more people would be willing to do so if they perceived ISPs as being effective or very effective at reducing such threats. The findings provide important guidance for policy makers and ISPs seeking to gain support for such strategies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Homeland Security News Wire (HSNW): U.S. Cybercrime Losses Double (2010), http://homelandsecuritynewswire.com/us-cybercrime-losses-double (as obtained on April 7, 2010)
U.S. Government Accountability Office. Report to Congressional Requestors. Cybercrime. Public and Private Entities Face Challenges in Addressing Cyber Threats. GAO-07-705 (2007), http://www.gao.gov/new.items/d07705.pdf (as obtained on April 12, 2010)
The White House. Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure (2009), http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf (as obtained on April 12, 2010)
Arbor Networks: 2009 Worldwide Infrastructure Security Report (2010), http://www.arbornetworks.com/report (as obtained on February 21, 2010)
Swartz, J.: Cybersecurity CEO Keeps Watch Over Threat. USA Today, July 23, p. 6B (2007)
Anderson, R., Bohme, R., Clayton, R., Moore, T.: Analyzing Barriers and Incentives for Network and Information Security in the Internal Market for e-Communication (2008), http://www.enisa.europa.eu/act/sr/reports/econ-sec (as obtained on February 21, 2010)
Lichtman, D., Posner, E.: Holding Internet Service Providers Accountable. University of Chicago John M. Olin Law and Economist Working Paper No. 217 (2006), http://www.law.uchicago.edu/files/files/217-dgl-eap-isp.pdf (as obtained on April 12, 2010)
Baker, S., Shaun, W., Ivanov, G.: In the Crossfire: Critical Infrastructure in the Age of CyberWar (2010), http://csis.org/event/crossfire-critical-infrastructure-age-cyber-war (as obtained on February 21, 2010)
Buskirk, E.: Denial-of-Service Attack Knocks Twitter Offline (2009), http://www.wired.com/epicenter/2009/08/twitter-apparently-down/ (as obtained on February 21, 2010)
Swabey, P.: The New Cybercriminals (2010), http://www.growthbusiness.co.uk/channels/growth-strategies/technology-in-business/1147068/the-new-cybercriminals.thtml (as obtained on February 21, 2010)
Symantec: Symantec Global Internet Security Threat Report: Trends for 2008 (2009), http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_Internet_security_threat_report_xiv_04-2009.en-us.pdf (as obtained on February 21, 2009)
British Broadcasting Company (BBC): BBC Team Exposes Cyber Crime Risk, http://news.bbc.co.uk/2/hi/programmes/click_online/7932816.stm (as obtained on February 22, 2009) (last updated March 12, 2009)
iDefense: Distributed Denial of Service and Botnet Attacks (2006), http://complianceandprivacy.com/WhitePapers/iDefense_DDoS_20060428.pdf (as obtained on February 21, 2010)
Cranton, T.: Cracking Down on Botnets (2009), http://microsoftontheissues.com/cs/blogs/mscorp/archive/2010/02/24/cracking-down-on-botnets.aspx (as obtained on April 07, 2010)
Wash, R.: Mental Models of Home Computer Security. Presented at the Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, July 23-25 (2008)
Beautement, A., Sasse, A.: The Economics of User Effort in Information Security. Computer Fraud & Security 2009(10), 8–12 (2009), http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6VNT-4XMCXV1-8&_user=775537&_coverDate=10%2F31%2F2009&_rdoc=1&_fmt=high&_orig=search&_sort=d&_docanchor=&view=c&_searchStrId=1292011789&_rerunOrigin=google&_acct=C000042938&_version=1&_urlVersion=0&_userid=775537&md5=d0b7627564e032d681962cdb844a7afb (as obtained April 12, 2010)
Evers, J.: ISPs Versus the Zombies. Cnet News.com (July 19, 2005), http://news.cnet.com/ISPs-versus-the-zombies/2100-7349_3-5793719.html (as obtained on February 21, 2010)
Huang, Y., Xianjun, G., Whinston, A.: Defeating DDoS Attacks by Fixing the Incentive Chain. ACM Transactions on Internet Technology article 5, 7(1), 1–5 (2007), http://portal.acm.org/citation.cfm?doid=1189740.1189745 (as obtained on April 30, 2009)
Richards, J.: Make Firms Bear the Cost to Improve Information Security, says Schneier. Computer Weekly (May 22, 2007), http://www.computerweekly.com/Articles/2007/05/22/223959/make-firms-bear-the-cost-toimprove-information-security-says-schneier.htm (as obtained on February 21, 2010)
Robinson, N., Potoglou, D., Woo Kim, C., Burge, P., Warnes, P.: Security, at What Cost? Quantifying People’s Trade-offs across Liberty, Privacy and Security (2010), http://www.rand.org/pubs/technical_reports/2010/RAND_TR664.pdf (as obtained on April 9, 2010)
Marasculio, M., McSweeny, M.: Nonparametric and Distribution-Free Methods for the Social Sciences. Waldsworth Publishing Company, Belmont (1977)
National Cyber Security Alliance (NCSA) and Symantec. 2009 NCSA/Symantec Home User Study (2009), http://www.staysafeonline.org/files/pdfs/2009HomeUserStudy/Home%20User%20Study%20FINAL.pdf (as obtained on April 12, 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rowe, B., Wood, D., Reeves, D. (2010). How the Public Views Strategies Designed to Reduce the Threat of Botnets. In: Acquisti, A., Smith, S.W., Sadeghi, AR. (eds) Trust and Trustworthy Computing. Trust 2010. Lecture Notes in Computer Science, vol 6101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-13869-0_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13868-3
Online ISBN: 978-3-642-13869-0
eBook Packages: Computer ScienceComputer Science (R0)