Restrained by design: the political economy of cybersecurity
Digital Policy, Regulation and Governance
ISSN: 2398-5038
Article publication date: 11 September 2017
Abstract
Purpose
The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of this article is to explain the absence of serious adverse consequences to date and the durability of this trend.
Design/methodology/approach
This paper combines concepts from international relations theory and new institutional economics to understand cyberspace as a complex global institution with contracts embodied in both software code and human practice. Constitutive inefficiencies (market and regulatory failure) and incomplete contracts (generative features and unintended flaws) create the vulnerabilities that hackers exploit. Cyber conflict is a form of cheating within the rules, rather than an anarchic struggle, more like an intelligence-counterintelligence contest than traditional war.
Findings
Cyber conflict is restrained by the collective sociotechnical constitution of cyberspace, where actors must cooperate to compete. Maintenance of common protocols and open access is a condition for the possibility of attack, and successful deceptive exploitation of these connections becomes more difficult in politically sensitive situations as defense and deterrence become more feasible. The distribution of cyber conflict is, thus, bounded vertically in severity but unbounded horizontally in the potential for creative exploitation.
Originality/value
Cyber conflict can be understood with familiar political economic concepts applied in fresh ways. This application provides counterintuitive insights at odds with prevalent threat narratives about the likelihood and magnitude of cyber conflict. It also highlights the important advantages of strong states over the weaker non-state actors widely thought to be empowered by cyberspace.
Keywords
Citation
Lindsay, J.R. (2017), "Restrained by design: the political economy of cybersecurity", Digital Policy, Regulation and Governance, Vol. 19 No. 6, pp. 493-514. https://doi.org/10.1108/DPRG-05-2017-0023
Publisher
:Emerald Publishing Limited
Copyright © 2017, Emerald Publishing Limited