Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services

Spam over internet telephony (SPIT) refers to all unsolicited and massive scale attempts to establish voice communication with oblivious users of voice over internet protocol (VoIP) services. SPIT exhibits a significant increase over the last years, thus developing into a serious threat with adverse impact and costs for the business economy. An audio completely automated public Turing test to tell computers and human apart (CAPTCHA) has been introduced as a means to distinguish automated software agents (bots) from human. CAPTCHA has been proposed as a security measure against SPIT. In this paper, we lay the principles for an adequate understanding of the SPAM-related economic models, as well as their analogies to the SPIT phenomenon, so as to weigh the benefits of audio CAPTCHA protection against the incurred costs. Our approach is based on the economic assessment of externalities, i.e., the economic impact associated with the SPIT side effects on the everyday life.

[1]  Eric Allman The Economics of Spam , 2003 .

[2]  Joseph M Woodside Economic externalities of health information technology. A game theoretic model for electronic health record adoption. , 2007, Journal of healthcare information management : JHIM.

[3]  Louise Yngström,et al.  A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[4]  Clemens Mensink,et al.  INTEGRATED ASSESSMENT MODELLING: APPLICATIONS OF THE IMPACT PATHWAY METHODOLOGY , 2007 .

[5]  Aiko Pras,et al.  Analysis of Techniques for Protection Against Spam over Internet Telephony , 2007, EUNICE.

[6]  Jian Wang,et al.  On network externalities, e-business adoption and information asymmetry , 2007, Ind. Manag. Data Syst..

[7]  Lambros Ekonomou,et al.  A Review of Techniques to Counter Spam and Spit , 2009 .

[8]  Tilman Brück,et al.  AN ECONOMIC ANALYSIS OF SECURITY POLICIES , 2005 .

[9]  B. Prentice Tangible and intangible benefits of transportation security measures , 2008 .

[10]  Yasuharu Ukai,et al.  Spam mails impede economic growth , 2007, Rev. Socionetwork Strateg..

[11]  Andrew B. Whinston,et al.  An economic mechanism for better Internet security , 2008, Decis. Support Syst..

[12]  Ruperto P. Majuca Public Goods and Externalities Aspects of Internet Security: Modeling the Spill-Over Effects of Interrelated Risks and Solutions , 2006 .

[13]  Farida Ridzuan,et al.  Factors Involved in Estimating Cost of Email Spam , 2010, ICCSA.

[14]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[15]  Hiroyuki Ebara,et al.  Spam Mail Reduces Economic Effects , 2008, Second International Conference on the Digital Society.

[16]  R. Friedrich,et al.  Environmental external costs of transport , 2001 .

[17]  Marc Lelarge,et al.  Economics of malware: Epidemic risks model, network externalities and incentives , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[18]  Jean C. Walrand,et al.  Can Competitive Insurers Improve Network Security? , 2010, TRUST.

[19]  Vicente Segura,et al.  Modeling the Economic Incentives of DDoS Attacks: femtocell case study , 2009, WEIS.

[20]  Reza Rajabiun,et al.  1 The Dangerous Economics of Spam Control , 2008 .

[21]  Qing Hu,et al.  A System Dynamics Model of Information Security Investments , 2007, ECIS.

[22]  Hung Chim To Build a Blocklist Based on the Cost of Spam , 2005, WINE.

[23]  Chris Kanich,et al.  Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context , 2010, USENIX Security Symposium.

[24]  Nigel Melville,et al.  Spam and Beyond: An Information-Economic Analysis of Unwanted Commercial Messages , 2008, J. Organ. Comput. Electron. Commer..

[25]  Guido Schryen,et al.  Anti-spam measures - analysis and design , 2007 .

[26]  Johannes M. Bauer,et al.  Cybersecurity: Stakeholder incentives, externalities, and policy options , 2009 .

[27]  Chris Kanich,et al.  Spamalytics: an empirical analysis of spam marketing conversion , 2008, CCS.

[28]  Dennis W. K. Khong An Economic Analysis of Spam Law , 2004 .

[29]  William Yurcik,et al.  Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers , 2005, WINE.

[30]  Rainer Böhme,et al.  Economic Security Metrics , 2005, Dependability Metrics.

[31]  Johannes M. Bauer,et al.  OF MALWARE : SECURITY DECISIONS , INCENTIVES AND EXTERNALITIES , 2008 .

[32]  Petur O. Jonsson The economics of spam and the context and aftermath of the CAN-SPAM Act of 2003 , 2009 .

[33]  J. Bauer,et al.  Economics of Malware: Security Decisions, Incentives and Externalities , 2008 .

[34]  Dongmei Jia Cost-effective spam detection in p2p file-sharing systems , 2008, LSDS-IR '08.

[35]  J. Bauer,et al.  Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications , 2009 .