Abstract

http://ssrn.com/abstract=1807076
 


 



Conundrum


Derek E. Bambauer


University of Arizona - James E. Rogers College of Law

April 11, 2011

Minnesota Law Review, Vol. 96, p. 584, 2011
Brooklyn Law School, Legal Studies Paper No. 227

Abstract:     
Cybersecurity is a conundrum. Despite a decade of sustained attention from scholars, legislators, military officials, popular media, and successive presidential administrations, little if any progress has been made in augmenting Internet security. Current scholarship on cybersecurity is bound to ill-fitting doctrinal models. It addresses cybersecurity based upon identification of actors and intent, arguing that inherent defects in the Internet’s architecture must be remedied to enable attribution. These proposals, if adopted, would badly damage the Internet’s generative capacity for innovation. Drawing upon scholarship in economics, animal behavior, and mathematics, this Article takes a radical new path, offering a theoretical model oriented around information, in distinction to the near-obsession with technical infrastructure demonstrated by other models. It posits a regulatory focus on access and alteration of data, and on guaranteeing its integrity. Counterintuitively, it suggests that creating inefficient storage and connectivity best protects user capabilities to access and alter information, but this necessitates difficult tradeoffs with preventing unauthorized interaction with data. The Article outlines how to implement inefficient information storage and connectivity through legislation. Lastly, it describes the stakes in cybersecurity debates: adopting current scholarly approaches jeopardizes not only the Internet’s generative architecture, but also key normative commitments to free expression on-line.

Number of Pages in PDF File: 92

Keywords: cybersecurity, security, Internet, information, regulation, architecture, cyberlaw, inefficiency, Egypt, Stuxnet, connectivity, data retention, ISP, kill switch, cyberwar, espionage, authentication, attribution, cyberspace, critical infrastructure, computers, terrorism, cybercrime, hacking, disaster

JEL Classification: O30, O33, O38

Accepted Paper Series


Download This Paper

Date posted: April 12, 2011 ; Last revised: January 25, 2012

Suggested Citation

Bambauer, Derek E., Conundrum (April 11, 2011). Minnesota Law Review, Vol. 96, p. 584, 2011; Brooklyn Law School, Legal Studies Paper No. 227. Available at SSRN: http://ssrn.com/abstract=1807076

Contact Information

Derek E. Bambauer (Contact Author)
University of Arizona - James E. Rogers College of Law ( email )
P.O. Box 210176
Tucson, AZ 85721-0176
United States
Feedback to SSRN


Paper statistics
Abstract Views: 3,594
Downloads: 385
Download Rank: 40,555

© 2014 Social Science Electronic Publishing, Inc. All Rights Reserved.  FAQ   Terms of Use   Privacy Policy   Copyright   Contact Us
This page was processed by apollo4 in 0.406 seconds