Of response would suffice the extent to which

Info icon This preview shows pages 13–15. Sign up to view the full content.

of response would suffice: the extent to which conditions of diversity, decentralization, resiliency and redundancy are sufficiently satisfied to reduce risk to a socially-acceptable level. We must compare the risk-adjusted magnitude of damage (D) with the cost of taking care (C). This is simple cost-benefit analysis where the magnitude of damage avoided constitutes the benefit. So, the subsidiarity question in this context is whether D p – C p > D g – C g, where D p is the risk adjusted magnitude of damage under private ordering, C p is the cost of private ordering measures to take care, D g is the risk-adjusted magnitude of damage under government regulation, and C g is the cost of government regulation to take care. Of course, the more nuanced, and likely, comparison will examine different public-private partnerships: multiple combinations of private ordering and regulation. 22 It is possible that private ordering could under some circumstances provide sufficient protection, but it is also possible that it would be efficient under some 20 But see Benkler, supra note 10. See also David R. Johnson, Susan P. Crawford, & John G. Palfrey, The Accountable Net: Peer Production of Internet Governance , draft of March 25, 2004, at . 21 On the potential dangers of exclusion generally, see Neal Kumar Katyal, Digital Architecture as Crime Control , 112 Y ALE L.J. 2261, 2283 (2003). 22 There is a higher level of subsidiarity analysis that we will address below: whether it is better to take action at an international level. Here the question is whether D g – C g > D i – C i, where D i is the risk adjusted magnitude of damage under international cooperation, while C i is the cost of international measures to take care. Again, we are likely to have hybrid measures utilizing action at all levels.
Image of page 13

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Global Cyberterrorism, Jurisdiction, and International Organization 14 circumstances for its protection to be enhanced by public order, for example, in the form of law enforcement-type action. It appears that other kinds of cyberterrorism security issues, relating to essential infrastructures where risk is unacceptable, including military command and control networks, will benefit from isolation and redundancy designs. In quantitative terms, the risk of loss is pre-emptive, and swamps the costs of taking care under any conceivable calculation. These networks must be made secure against terrorism—both cyberterrorism and realspace attack—and need not be integrated with other networks. Alternatively, firewall technology may be sufficient to isolate these networks from attack while permitting partial integration with other networks. Therefore, it is a middle group of cyberterrorism security issues—where private ordering does not provide sufficient security, or could be assisted by supplementation, and where isolation is not acceptable or is not technologically feasible—that will require public order. These include protection of infrastructures that must remain attached to the network and where firewalls cannot provide sufficient protection. Examples include
Image of page 14
Image of page 15
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • global cyberterrorism

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern