All Article Summaries
These article summaries are written by TAP staff members. TAP’s purpose for this section of the site is to present information, points of view, research, and debates.
The Effects of Data Localization on Cybersecurity
Data localization policies prohibit the transfer of data to foreign countries. Data localization affects the ability of organizations to prevent and respond to cyberattacks, increasing cybersecurity risks.
Data Security, Data Breaches, and Compliance
Data breaches affect the breached firm’s stock price. Fines for data breaches are low, and firms may underinvest in security. Litigation following a breach is less likely when firms offer free credit monitoring.
Cybersecurity Hiring in Response to Data Breaches
Data on firm-level hiring shows that firms increase hiring of cybersecurity workers following data breaches, particularly when the press covers the breach.
The Portability and Other Required Transfers Impact Assessment (PORT-IA): Assessing Competition, Privacy, Cybersecurity, and Other Considerations
One key legal question is whether data should move from A to B, or be prevented from moving from A to B. Requiring the transfer of data can be harmful in some ways and beneficial in others.
FTC Regulation of Cybersecurity and Surveillance
The Federal Trade Commission (FTC) regulates monitoring and tracking activities by private-sector entities in the United States. Such activities include intrusive web monitoring or insecure product design. Under principles established in FTC cases, firms may be liable for direct surveillance of consumers, or for surveillance by third parties.
Cyber-Attacks–Prevention-Reactions: The Role of States and Private Actors
Cyber-attacks are a growing threat to peace and security. Private actors play a leading role in ensuring that digital technologies are secure from cyber-attacks.
"You Might Also Like:" Privacy Risks of Collaborative Filtering
When one shops online, recommender systems often display related purchases by other users. Researchers designed a cyberattack using these systems to discover what users had bought. The success of the attack shows that these systems leak information.
An Introduction to Key Themes in the Economics of Cyber-security
This paper looks at how computer security problems like viruses are solved.
Security Analysis of the Diebold AccuVote-TS Voting Machine
This paper reveals security problems with a commonly used voting machine.
Holding Internet Service Providers Accountable
This article looks at who should pay for illegal use of computers.