security & trust iii part 1: introductionpseidel/teaching/655/1000.pdf · introduction p-m...
TRANSCRIPT
![Page 1: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/1.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Security & Trust III — Part 1:
Introduction
Peter-Michael Seidel
Fall 2018
![Page 2: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/2.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Outline
Announcements
Motivation
Examples
Ideas
![Page 3: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/3.jpg)
Introduction
P-M Seidel
Announcements
Introductions
Motivation
Examples
Ideas
Outline
Announcements
Motivation
Examples
Ideas
![Page 4: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/4.jpg)
Introduction
P-M Seidel
Announcements
Introductions
Motivation
Examples
Ideas
Contact
◮ Peter-Michael Seidel
◮ email: [email protected]
◮ office: POST 312B
◮ office hours: W 1030-1130 or email appointment
![Page 5: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/5.jpg)
Introduction
P-M Seidel
Announcements
Introductions
Motivation
Examples
Ideas
Course on the web
◮ slides and notes: asecolab.org and laulima
◮ homeworks and solutions: laulima
![Page 6: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/6.jpg)
Introduction
P-M Seidel
Announcements
Introductions
Motivation
Examples
Ideas
Books
◮ D. Easley and J. Kleinberg, Networks, Crowds and
Markets, Cambridge University Press 2012.
◮ M. Chiang, Networked Life - 20 Questions and
Answers, Cambridge University Press 2012.
◮ L. A. Gordon and M.P. Loeb, Managing
Cyber-Security Resources, Mc-Graw Hill 2006.
◮ T. Moore et al (eds.), Economics of Information
Security and Privacy, Springer 2010.
◮ L.J. Camp and S. Lewis (eds.), Economics of
Information Security, Kluwer 2004.
![Page 7: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/7.jpg)
Introduction
P-M Seidel
Announcements
Introductions
Motivation
Examples
Ideas
What do you expect from the course?
![Page 8: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/8.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Outline
Announcements
Motivation
Examples
Ideas
![Page 9: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/9.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Question
Why study Security and Economics together?
![Page 10: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/10.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Question
Is this a security problem
or an economic problem?
![Page 11: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/11.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Question
Whose problem is harder?
![Page 12: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/12.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
The troubles
◮ It is a trouble to not have.
◮ It is a trouble to have.
![Page 13: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/13.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Security is the problem of having
J.K. Gallbraith:
◮ The poor man has always a precise view of his
problem: he hasn’t enough and he needs more.
◮ The rich man [has] a much greater variety of ills and
he [is] correspondingly less certain of their remedy.
![Page 14: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/14.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Outline
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
Digital Rights Management
Tragedy of the Commons
Securing free market
Monetizing information
![Page 15: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/15.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 1: Early security protocol
About 6000 years ago, Kain’s son Bob built a secure vault
ℓ1
ℓ2
ℓ3 ℓ4
AliceBob
ℓ5
![Page 16: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/16.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 1: Early security protocol
and stored his goods in it.
ℓ1
ℓ2
ℓ3 ℓ4
AliceBob
ℓ5
![Page 17: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/17.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 1: Early security protocol
and stored his goods in it. When Alice wanted to go for a
vacation
ℓ1
ℓ2
ℓ3 ℓ4
Alice
Bob
ℓ5
![Page 18: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/18.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 1: Early security protocol
and stored his goods in it. When Alice wanted to go for a
vacation, she stored her goods there too.
ℓ1
ℓ2
ℓ3 ℓ4
AliceBob
ℓ5
![Page 19: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/19.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 1: Early security protocol
As a receipt for her deposit in Bob’s vault, Alice got a secure
token in a clay envelope.
Figure: Louvre, Paris
![Page 20: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/20.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 1: Early security protocol
As a receipt for her deposit in Bob’s vault, Alice got a secure
token in a clay envelope.
Figure: Louvre, Paris
◮ To take the sheep, Alice must give the token.
![Page 21: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/21.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 1: Early security protocol
As a receipt for her deposit in Bob’s vault, Alice got a secure
token in a clay envelope.
Figure: Louvre, Paris
◮ To take the sheep, Alice must give the token.
◮ To give the sheep, Bob must take the token.
![Page 22: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/22.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 1: Early security protocol
As a receipt for her deposit in Bob’s vault, Alice got a secure
token in a clay envelope.
Figure: Louvre, Paris
◮ To take the sheep, Alice must give the token.
◮ To give the sheep, Bob must take the token.
◮ Anyone who gives the token can take the sheep.
![Page 23: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/23.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 1: Early security protocol
◮ This protocol goes back to Uruk (Irak), 4000 B.C.
![Page 24: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/24.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 1: Early security protocol
◮ This protocol goes back to Uruk (Irak), 4000 B.C.
◮ Money developed from security tokens.
![Page 25: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/25.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 1: Early security protocol
◮ This protocol goes back to Uruk (Irak), 4000 B.C.
◮ Money developed from security tokens.
◮ Numbers developed from security annotations.
◮ Writing developed later.
![Page 26: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/26.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 2: Security in E-commerce
Security seals convey trust
![Page 27: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/27.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 2: Security in E-commerce
Adverse selection
TRUSTE-certified uncertified
honest 94.6% 97.5%
malicious 5.4% 2.5 %
Table: Trustworthyness of TRUSTE [Edelman 2007]
![Page 28: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/28.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 2: Security in E-commerce
Adverse selection
sponsored organic
top 4.44% 2.73%
top 3 5.33% 2.93 %
top 10 5.89% 2.74 %
top 50 5.93% 3.04 %
Table: Malicious search engine placements [Edelman 2007]
![Page 29: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/29.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 2: Security in E-commerce
Adverse selection
Yahoo!
sponsored organic
top 6.35% 0.00%
top 3 5.72% 0.35 %
top 10 5.14% 1.47 %
top 50 5.40% 1.55 %
Table: Malicious search engine placements [Edelman 2007]
![Page 30: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/30.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 2: Security in E-commerce
Adverse selection
Ask
sponsored organic
top 7.99% 3.23%
top 3 7.99% 3.24 %
top 10 8.31% 2.94 %
top 50 8.20% 3.12 %
Table: Malicious search engine placements [Edelman 2007]
![Page 31: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/31.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 2: Security in E-commerce
Questions
◮ Why does adverse selection happen?
◮ How can it be avoided?
![Page 32: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/32.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 2: Security in E-commerce
Questions
◮ Why does adverse selection happen?
◮ How can it be avoided?
Answers
◮ Reputation
◮ Trust
![Page 33: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/33.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 3: Digital rights management (DRM)
Economic art history
◮ art used to be bound to the artist
◮ music was available only from a musician
◮ a story from a storyteller
◮ a painting could only be seen in the cave, church. . .
![Page 34: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/34.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 3: Digital rights management (DRM)
Economic art history
◮ mass reproduction bound art to copiable media
◮ copying technologies led to copyright-based markets
◮ artists could sell lots of books and records
◮ Copyright Management: branding, celebrities
![Page 35: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/35.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 3: Digital rights management (DRM)
Economic art history
◮ digital networks freed art (science, religion. . . )
from physical tokens (books, CDs. . . )
◮ copying of digital content is essentially costless
◮ Copyright Management becomes unviable
◮ Digital Rights Management: seeks to
◮ prevent (sandboxing. . . )
◮ detect (watermarking . . . )
◮ deter (lawyers . . . )
unauthorized copying of digital content
![Page 36: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/36.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 3: Digital rights management (DRM)
Art economy as a security problem
In DRM, economics and security cannot be separated
![Page 37: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/37.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 3: Digital rights management (DRM)
Art economy as a security problem
In DRM, economics and security cannot be separated:
◮ unauthorized copying of digital content cannot be
prevented
![Page 38: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/38.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 3: Digital rights management (DRM)
Art economy as a security problem
In DRM, economics and security cannot be separated:
◮ unauthorized copying of digital content cannot be
prevented
◮ the cost and the risk of copying needs to be made
greater than the price of the downloads
![Page 39: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/39.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 3: Digital rights management (DRM)
OR should art be a common resource, like air, or the
Internet?
![Page 40: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/40.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
Commons: publicly shared resources
For centuries, Alice, Bob and Charlie have been sharing
an open field system.
![Page 41: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/41.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
Commons: publicly shared resources
For centuries, Alice, Bob and Charlie have been sharing
an open field system.
![Page 42: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/42.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
Commons: publicly shared resources
In England, such open fields were called Commons.
Alice, Bob and Charlie alternated different crops with
grazing, and maintained the land together.
![Page 43: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/43.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
Commons: publicly shared resources
In England, such open fields were called Commons.
Alice, Bob and Charlie alternated different crops with
grazing, and maintained the land together.
Two remarkable social processes ensued:
◮ Tragedy of the Commons, and
◮ Enclosure Movement
![Page 44: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/44.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
◮ Charlie realized that it was rational for him to invest
◮ all effort into exploiting the public resource, and
◮ no effort into maintaining it.
Charlie became a free rider.
![Page 45: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/45.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
◮ Charlie realized that it was rational for him to invest
◮ all effort into exploiting the public resource, and
◮ no effort into maintaining it.
Charlie became a free rider.
◮ Alice and Bob realized that it was rational for them
◮ to stop maintaining the resource for Charlie, and
◮ to hurry to exploit the resource too.
![Page 46: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/46.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
◮ Charlie realized that it was rational for him to invest
◮ all effort into exploiting the public resource, and
◮ no effort into maintaining it.
Charlie became a free rider.
◮ Alice and Bob realized that it was rational for them
◮ to stop maintaining the resource for Charlie, and
◮ to hurry to exploit the resource too.
◮ A race to the bottom ensued.
![Page 47: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/47.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
◮ Charlie realized that it was rational for him to invest
◮ all effort into exploiting the public resource, and
◮ no effort into maintaining it.
Charlie became a free rider.
◮ Alice and Bob realized that it was rational for them
◮ to stop maintaining the resource for Charlie, and
◮ to hurry to exploit the resource too.
◮ A race to the bottom ensued.
◮ The resource got depleted.
![Page 48: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/48.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
Common resources cause the race to the bottom.
![Page 49: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/49.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
Fair sharing of public resources is a security problem.
![Page 50: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/50.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
◮ the Internet is a common resource
◮ spam is an instance of the Tragedy of the Commons
◮ it is an economic & security problem
![Page 51: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/51.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
Solution: The Enclosure Movement
◮ Charlie enclosed the Commons from Alice and Bob.
◮ In England, this happened in XV–XVII centuries.
![Page 52: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/52.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
Market economy: private vice→ public benefit
"It is not from the benevolence of the butcher, the brewer,
or the baker that we expect our dinner, but from their
regard to their own self-interest. We address ourselves
not to their humanity but to their self-love, and never talk
to them of our own necessities, but of their advantages"
Adam Smith
![Page 53: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/53.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 4: Tragedy of the Commons
Second Enclosure
![Page 54: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/54.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 5: Free market protocol
![Page 55: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/55.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 5: Free market protocol
Based on trust
![Page 56: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/56.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 5: Free market protocol
supply demand
![Page 57: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/57.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 5: Free market protocol
supply demand
advertising
![Page 58: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/58.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 5: Free market protocol
supply demand
advertising
credit
![Page 59: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/59.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 5: Free market protocol
supply demand
advertising
credit
bundling
![Page 60: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/60.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 5: Free market protocol
Based on influence
![Page 61: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/61.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 5: Free market protocol
Information asymmetry: "Market of lemons"
![Page 62: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/62.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 5: Free market protocol
Information asymmetry: "Financial derivative"
![Page 63: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/63.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 5: Free market protocolUpshot
◮ security goal: equilibrium of supply and demand
◮ security protocol: free exchange
◮ "attacks above": advertising, information asymmetry
◮ security protocol correctly executed
◮ security goal shifted
![Page 64: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/64.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing information
Problem of the Web: Semistructured data
◮ no global declarations
◮ semantics vary from node to node
![Page 65: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/65.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing information
Problem of the Web: Semistructured data
◮ no global declarations
◮ semantics vary from node to node
Proposed solutions
◮ Semantic Web:
◮ standardize formats for global declarations
(ontologies)
◮ search:
◮ do not standardize
◮ extract the meaning from the documents
![Page 66: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/66.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationDemise of Web 1.0
◮ keyword search
◮ crawling and indexing
◮ stealing the meaning is easy and blatant
◮ keyword stuffing, keyword spam, spamdexing
◮ race to the bottom
◮ costless advertising overruns all information
![Page 67: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/67.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationWeb 2.0 solution: Reputation ranking
Reputation as a fixed point (PageRank, HITS)
![Page 68: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/68.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationMonetizing search: Ad Words
![Page 69: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/69.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationMonetizing semantics: Ad Sense
![Page 70: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/70.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationGoogle protocol
![Page 71: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/71.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationSearch engine protocol
index
SE
![Page 72: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/72.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationSearch engine protocol
index
query?
User SE
![Page 73: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/73.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationSearch engine protocol
index
query?
query!
User SE
![Page 74: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/74.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationSearch engine protocol
index
query?
query!
index
User SE
![Page 75: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/75.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationSearch engine protocol
index
query?
query!
index
advertise?
User SE Advertiser
![Page 76: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/76.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationSearch engine protocol
index
query?
query!
index
advertise!
advertise?
monetize!
User SE Advertiser
![Page 77: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/77.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationUpshot
Search protocol participants have different security
goals:
◮ surfer: acquire information
◮ search engine: monetize information
◮ sponsors: influence information
![Page 78: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/78.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationUpshot
Search protocol has different executions:
◮ surfer: information retrieval
◮ search engine: man-in-the-middle
◮ sponsors: user tracking and profiling
![Page 79: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/79.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Example 6: Monetizing informationUpshot
. . . And these security problems arise before fraud. . .
![Page 80: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/80.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Claim 1
Networks open up social problems like
1. trust and reputation
2. digital property rights
3. commons and the environment
4. free market
5. information economy
. . .
![Page 81: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/81.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Early security protocol
Security in E-commerce
DRM
Tragedy of the Commons
Securing free market
Monetizing information
Claims
Ideas
Claim 2
Such social problems open up to technical solutions
that combine
◮ security methodologies and
◮ economic modeling
![Page 82: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/82.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
Outline
Announcements
Motivation
Examples
Ideas
Why Economics & Security?
Conceptual roots of network economy
Structure of the course
![Page 83: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/83.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
What are Economics & Security?
◮ What is economics?
◮ What is security?
![Page 84: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/84.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
What are Economics & Security?
◮ Economics is concerned with production of wealth.
◮ Security is concerned with protection of assets.
![Page 85: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/85.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
What links Economics & Security?
◮ Economics ⊆ Security
◮ economics studies the market
◮ the market is a security protocol
◮ market economy is a security process
![Page 86: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/86.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
What links Economics & Security?
◮ Security ⊆ Economics
◮ security protects assets
◮ security costs ≤ asset value
◮ security is an economic process
![Page 87: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/87.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
Dark side of the economic force
"The efforts of men are utilized in two different ways:
◮ they are directed to the
production or transformation of economic goods,
◮ or else to the
appropriation of goods produced by others.
Vilfrido Pareto
![Page 88: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/88.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
A race is won by moving fast
![Page 89: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/89.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
. . . or by tripping up the opponent
![Page 90: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/90.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
Economy of production and predation
![Page 91: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/91.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
Economy of production and predation
Bacteria have a security problem to protect their assets.
![Page 92: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/92.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
Economy of production and predation
◮ Production increases wealth.
◮ Predation redistributes it.
◮ Redistribution leads to new forms of production.
◮ network servers: banks, real estate agents. . .
![Page 93: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/93.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
Dynamics of production and predation
The rich get richer.
Vilfrido Pareto
![Page 94: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/94.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
Structure of the course
Part I: Methods of economics in security
Lecture 2: Security Investment Analysis
Lecture 3: Interdependency and Gaming
Part II: Methods of security in economics
Lecture 4: Information economy
Lecture 5: Trust and reputation
![Page 95: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/95.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
Teaching outcomes of the course
Part I: Market aspects of security
Lecture 2: Tools for CIO
Lecture 3: Security and competition
Part II: Security aspects of market
Lecture 4: Pricing and market mechanisms
Lecture 5: Monetizing information
![Page 96: Security & Trust III Part 1: Introductionpseidel/Teaching/655/1000.pdf · Introduction P-M Seidel Announcements Introductions Motivation Examples Ideas Books D. Easley and J. Kleinberg,](https://reader036.vdocuments.us/reader036/viewer/2022081614/5fd0e18603ec1806cb3f8fa0/html5/thumbnails/96.jpg)
Introduction
P-M Seidel
Announcements
Motivation
Examples
Ideas
Why
Roots
Outline
Employment outcomes the course
Part I: Chief Information Ofiicer
Lecture 2: "How much is this firewall worth to me?"
Lecture 3: "Can I secure this transaction?"
Part II: Monetizing guru
Lecture 4: "Where is the revenue on this network?"
Lecture 5: "How can I monetize this free
transaction?"