Notes:
[1] Market Failure: A situation where the market fails to allocate resources efficiently. In other words, the market fails to produce the socially optimal level of goods and services, resulting in a misallocation of resources. This can occur due to a variety of reasons, such as the presence of externalities (where the actions of one party affect others who are not involved in the transaction), public goods (goods that are non-excludable and non-rivalrous in consumption). These market failures can lead to welfare losses and can be corrected through government intervention, such as taxes, subsidies, regulations, and public provision of goods and services.
[2] Marsh McLennan,. “The Global Risks Report 2021 16th Edition.” Cologny, Switzerland: World Economic Forum, 2021.
[3] Kookyoung Han and Jin Hyuk Choi. “Implications of false alarms in dynamic games on cyber-security.” Chaos, Solitons & Fractals 169, 2023: 113322.
[4] Paul A.Samuelson, “The pure theory of public expenditure.” The review of economics and Statistics (1954): 387-389.
[5] Elke Krahmann. “Security: Collective good or commodity?.” European journal of international relations 14, no. 3, 2008: 379-404.
[6] Douglas Kelly, “The Economics of Cybersecurity,” Academic Conferences International Limited, 2017, https://www.proquest.com/conference-papers-proceedings/economics-cybersecurity/docview/1897683119/se-2.
[7] Ibid.
[8] Ibid.
[9] University of Texas, Strauss Center for International Security and Law. “The Economics of Cybersecurity.” Strausscenter.org, 8 April 2021, https://www.strausscenter.org/events/the-economics-of-cybersecurity/.
[10] Gordon E. Moore “Cramming More Components onto Integrated Circuits.” Reprinted from Electronics, Volume 38, Number 8, April 19, 1965. http://static.cs.brown.edu/courses/csci1800/sources/lec27/Moore.pdf.
[11] Benjamin Powell. Is Cybersecurity a Public Good? Evidence From the Financial Services Industry, 2005. George Mason University Journal of Law, Economics, & Policy, pp. 497-511. Retrieved from http://www.benjaminwpowell.com/scholarlypublications/ journal-articles/is-cybersecurity-a-public-good.pdf.
[12] Isabella Corradini. “Redefining the Approach to Cybersecurity.” Building a Cybersecurity Culture in Organizations: How to Bridge the Gap Between People and Digital Technology vol. 284 49–62. 30 Apr. 2020, doi:10.1007/978-3-030-43999-6_3.
[13] Nic Chantler, and Roderic Broadhurst. “Social engineering and crime prevention in cyberspace.” Proceedings of the Korean Institute of Criminology, 2008: 65-92.
[14] James H. Stewart Jr., “Social engineering deception susceptibility: Modification of personality traits susceptible to social engineering manipulation to acquire information through attack and exploitation.” PhD diss., Colorado Technical University, 2015.
[15] Jayanth Kancherla, Motivational and Psychological Triggers in Social Engineering, April 24, 2020. https://ssrn.com/abstract=3750474 or http://dx.doi.org/10.2139/ssrn.3750474.
[16] James H. Stewart Jr., “Social engineering deception susceptibility: Modification of personality traits susceptible to social engineering manipulation to acquire information through attack and exploitation.” PhD diss., Colorado Technical University, 2015
[17] Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, and Basel Katt. “Weaponized AI for cyber attacks.” Journal of Information Security and Applications 57 (2021): 102722.
[18] New Global Cybersecurity Report Reveals Misaligned Incentives, Executive Overconfidence Create Advantages for Attacker.” Business Wire. February 28, 2017. https://www.businesswire.com/news/home/20170228006741/en/New-Global-Cybersecurity-Report-Reveals-Misaligned-Incentives-Executive-Overconfidence-Create-Advantages-for-Attacker.
[19] Tyler Moore. “The economics of cybersecurity: Principles and policy options.” International Journal of Critical Infrastructure Protection 3, no. 3-4 (2010): 103-117.
[20] Robert McMillan, “FDIC: Hackers Took More than $120m in Three Months,” Computerworld, DG News Service, March 8, 2010, https://www.computerworld.com/article/2762543/fdic–hackers-took-more-than–120m-in-three-months.html.
[21] Nicole Perlroth, “All 3 Billion Yahoo Accounts Were Affected by 2013 Attack,” The New York Times (The New York Times, October 3, 2017), https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html.
[22] Ibid.
[23] Electronic Privacy Information Center, “Epic – Equifax Data Breach,” Electronic Privacy Information Center, https://archive.epic.org/privacy/data-breach/equifax/.
[24] Douglas Kelly. The Economics of Cybersecurity. Reading: Academic Conferences International Limited, 2017. https://www.proquest.com/conference-papers-proceedings/economics-cybersecurity/docview/1897683119/se-2.
[25] Ross Anderson and Tyler Moore. 2006, Oct 27, The Economics of Information Security, Science Magazine, Vol. 314, Issue 5799, pp. 610-613. http://science.sciencemag.org/content/314/5799/610.
[26] Security executive, Google Cloud Services, April 2023, Palo Alto, CA
[27] “The Cybersecurity of Critical Infrastructure,” Cyber.nj.gov, NJCCIC, February 18, 2021, https://www.cyber.nj.gov/alerts-advisories/the-cybersecurity-of-critical-infrastructure.
[28] Tyler Moore. “The economics of cybersecurity: Principles and policy options.” International Journal of Critical Infrastructure Protection 3, no. 3-4 (2010): 103-117.
[29] “New Global Cybersecurity Report Reveals Misaligned Incentives, Executive Overconfidence Create Advantages for Attacker,” Business Wire, March 1, 2017, https://www.businesswire.com/news/home/20170228006741/en/New-Global-Cybersecurity-Report-Reveals-Misaligned-Incentives-Executive-Overconfidence-Create-Advantages-for-Attacker.
[30] Office of Inspector General, “Additional Progress Needed to Improve Information Sharing under the Cybersecurity Act of 2015,” (Homeland Security, 2021 August, 16), 1.
[31] Ibid.
[32] Ibid.
[33] “Mitre Att&ck,” MITRE, March 1, 2023, https://www.mitre.org/focus-areas/cybersecurity/mitre-attack.
[34] Ibid.
[35] Shameek Konar and Mark A. Cohen. 1997. Information as Regulation: The Effect of Community Right to Know Laws on Toxic Emissions. Journal of Environmental Economics and Management 32(1):109-124
[36] Ibid.
[37] California Civil Code §1798.82. https://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?sectionNum=1798.82&lawCode=CIV.
[38] Deirdre K. Mulligan and Kenneth A. Bamberger. 2007. Security Breach Notification Laws: Views from Chief Security Officers. Samuelson Law, Technology & Public Policy Clinic, University of California-Berkeley School of Law. http://www.law.berkeley.edu/ files/cso_study.pdf.
[39] “National Council of ISACs,” natlcouncilofisacs, https://www.nationalisacs.org/.
[40] “A Declaration for the Future of the Internet.” U.S. Department of State. April 13, 2022. https://www.state.gov/wp-content/uploads/2022/04/Declaration-for-the-Future-for-the-Internet.pdf.
[41] “Global Industrial Control Systems Cybersecurity Professional.” Defense Counterintelligence and Security Agency. https://www.dcsa.mil/mc/pv/mbi/gicp/.
[42] “Critical Cybersecurity Hygiene: Patching the Enterprise.” National Cybersecurity Center of Excellence. Accessed April 28, 2023. https://www.nccoe.nist.gov/projects/critical-cybersecurity-hygiene-patching-enterprise.
[43] Helsinki, Finland. Eisenhower Industry Study Visit, April 2023, European Centre of Excellence for Countering Hybrid Threats
[44] “Information Sharing: A Vital Resource.” Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/topics/cyber-threats-and-advisories/information-sharing/information-sharing-vital-resource









