Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-4rdpn Total loading time: 0 Render date: 2024-11-09T09:46:36.471Z Has data issue: false hasContentIssue false

6 - The Dark Side of Private Ordering: The Network/Community Harm of Crime

Published online by Cambridge University Press:  18 August 2009

Neal K. Katyal
Affiliation:
John Carroll Research Professor, Georgetown University, Law Center
Mark F. Grady
Affiliation:
University of California, Los Angeles
Francesco Parisi
Affiliation:
George Mason University, Virginia
Get access

Summary

The common conception of crime, as an act that harms an individual victim, needs rethinking. Instead of examining the impact of crime on the individual victim, this chapter argues that the harm of a criminal act must also be understood with reference to its effect on the community. Once crime is understood in those terms, the dominant conception of criminal policy changes, sometimes in drastic ways. In particular, it will cast some doubt on the desirability of solutions rooted in private ordering and demonstrate the primacy of public enforcement against cybercrime.

Cyberspace presents the easiest vantage point from which to view the community harm of crime. For example, it is commonly argued that many computer crimes, including those that target critical infrastructure, are ones of “curiosity” and result in “no real harm” and that the government should stay out of cyberspace. But even when there is no harm to an individual, acts of cybercrime can undermine the formation and development of networks. For example, the quintessential privacy-violating hacker, who does nothing more than peer into the records of a corporation's server, does not directly damage the corporation's profits. Instead, the upshot of the hacker's activity is more subtle, and likely to take the form of stifling that corporation's network connections in the future. The Internet is the paradigmatic sphere in which the positive advantage of “network effects” is central – that the greater the size of the network, the greater the benefits.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2005

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adams, Robert P. 2001. DNA Analysis of Genetic Diversity of Vetiver and Future Selections for Use in Erosion Control. http://www.vetiver.com/PRVN_IVC2_06.PDF
Allman, John. 2001. Sense of Security Can Be an Illusion. Sun-Sentinel, February 25, p. A1Google Scholar
Aristotle. 1958. The Politics. Bk. 1. Trans. E. Barker. Oxford: Oxford University Press
Axelrod, Robert M. 1984. The Evolution of Cooperation. New York: Basic BooksGoogle Scholar
Banham, Russ. 2000. Hacking It. CFO Mag, August 1. http://www.cfo.com/printarticle/1,1883,0/1/AD/874,00.htmlGoogle Scholar
Becker, Gary S. 1968. Crime and Punishment: An Economic Approach. Journal of Political Economy 76:169CrossRefGoogle Scholar
Benkler, Yochai, 2002. Coase's Penguin, or Linux and the Nature of the Firm. 2002. Yale Law Journal 112:369CrossRefGoogle Scholar
Blakely, Edward J., and Mary Gail Snyder. 1987. Divided We Fall: Gated and Walled Communities in the United States. In Architecture of Fear, ed. Ellin, Nan, 85. Princeton: Princeton Architectural PressGoogle Scholar
Blakely, Edward J. and Snyder, Mary Gail. 1997. Fortress America. Washington, D.C.: Brookings InstitutionGoogle Scholar
Broadband Finally Dominates the United States. 2004. Broadband Business Forecast, May 4
Brown, Kenneth. 2002. Opening the Open Source Debate. White paper
Carlton, Jim. 1989. Behind the Gate. L.A. Times, October 8, p. 3Google Scholar
Chron, Augusta. 2000. Teen Gets a Six-Month Jail Term for Hacking. Augusta Chronicle, September 23. http://www.augustachronicle.com/stories/092300/tec_LA0666--2.001.shtmlGoogle Scholar
Crawford, E. Margaret. 1995. Food and Famine. In The Great Irish Famine, ed. Poirteir, C., 60. Chester Springs, PA: Dufour EditionsGoogle Scholar
Critics: National Cybersecurity Plan Too Weak. 2002. Capital Times, September 19, p. 4E
CSIS. 2002. Cybersecurity: Current Challenges Larger Than National Strategy Response. CSIS press release, September 18
DSL Dominates as World Broadband Hits the 100-Million Mark. 2004. Broadband Business Forecast, April 6
Durkheim, Émile. 1956. The Division of Labor in Society. New York: The Free PressGoogle Scholar
Ellin, Nan. 1987. Shelter from the Storm or Form Follows Fear and Vice Versa. In Architecture of Fear, ed. Ellin, Nan, 13. Princeton, NJ: Princeton Architectural PressGoogle Scholar
Greinacher, Udo. 1987. Fear and Dreaming in the American City. In Architecture of Fear, ed. Ellin, Nan, 288. Princeton, NJ: Princeton Architectural PressGoogle Scholar
Hatch, Brian. 2001. Hacking Linux Exposed: Linux Security Secrets and Solutions. Emeryville, CA: Osborne/McGraw-HillGoogle Scholar
Hundley, Richard O.. 2001. The Future of the Information Revolution in Europe. Rand National Defense Researc Institute. http://www.rand.org/publicationsCF/CF172Google Scholar
Katyal, Neal. 1997. Deterrence's Difficulty. Michigan Law Review 95:2385CrossRefGoogle Scholar
Katyal, Neal. 2001. Criminal Law in Cyberspace. University of Pennsylvania Law Review 149:1003CrossRefGoogle Scholar
Katyal, Neal. 2002. Architecture as Crime Control. Yale Law Journal 101:1039CrossRefGoogle Scholar
Katz, Michael L., and Shapiro, Carl. 1985. Network Externalities, Competition, and Compatability. American Economic Review 75:424Google Scholar
Katz, Michael L. and Shapiro, Carl. 1994. Systems Competition and Network Effects. Journal of Economic Perspective Spring 1994:93CrossRefGoogle Scholar
Krebs, Brian. 2002. Cybersecurity Draft Plan Soft on Business Observers Say. Washingtonpost.com, September 19. http://washingtonpost.com/ac2/wp-dyn/A35812--2002Sep18?Google Scholar
Krim, Jonathan. 2003. Cybersecurity Strategy Depends on Power of Suggestion. Washington Post, February 15, p. E1Google Scholar
Lee, Jennifer. 2003. White House Scales Back Cyberspace Plan. New York Times, February 25, p. A14Google Scholar
Lee, Michael. 1999. A Regulatory Proposal. Berkeley Technical Law Journal 14:839Google Scholar
Liebowitz, S. J., and Margolis, Stephen E. 1994. Network Externality: An Uncommon Tragedy. Journal of Economic Perspective, Spring, p. 133CrossRefGoogle Scholar
Magnusson, Paul. 2002. Commentary: Is Business Cheaping out on Homeland Security?Business Week.com, September 30. http://www.businessweek.com/magazine/content/02_39/b3801063.htmGoogle Scholar
Many Worry Net Is Not Safe, Study Finds. 2002. CNN. com, October 16. http://www.cnn.com/2002/TECH/internet/10/16/internet.report/index.html
Nielsen, Jakob. 1990. Disrupting Communities. In Computers under Attack, ed. Denning, P.. 524. Boston: Addison-WesleyGoogle Scholar
O'Grada, Cormac. 1999. Black' 47 and Beyond. Princeton, NJ: Princeton University PressGoogle Scholar
Open Source Initiative. 2004. Open Source FAQ, February 3. http://www.opensource.org/advocacy/faq.php
Petreley, Nicholas. 2000. Microsoft's Road to Consumer Trust Is Open Source Windows. Infoword, November 13. http://www.infoworld.com/articles/op/xml/00/11/13/001113oppetreley.xmlGoogle Scholar
Poulson, Kevin. 2004. Lamo's Adventures in Worldcom. Securityfocus.com. http://www.securityfocus.com/news/296Google Scholar
Ranum, Marcus J. 2002. Federal Cybersecurity: Get a Backbone. TISC Insight, September 24. http://www.csis.org.press/pr02_43.htmGoogle Scholar
Rasch, Mark D. 2002. What about Our Cyber-Security?Washington Post, September 26, p. A32Google Scholar
Raymond, Eric S. 1999. The Cathedral and the Bazaar. Sebastopol, CA: O'ReillyGoogle Scholar
Sampson, Robert J., and Groves, Byron. 1989. Community Structure and Crime: Testing Social Disorganization Theory. American Journal of Sociology 94:774CrossRefGoogle Scholar
Sampson, Robert J.. 1997. Neighborhoods and Violent Crime: A Multilevel Study of Collective Efficacy. Science 277:918CrossRefGoogle ScholarPubMed
Schreiner, Rudolf. 2003. Open Source Software Security. Objectsecurity.com, January 9. http://www.objectsecurity.com/whitepapers/open_source/open_source_security.htmlGoogle Scholar
Shaw, Clifford, and MacKay, Henry. 1942. Juvenile Delinquency and Urban Areas. Chicago: University of Chicago PressGoogle Scholar
TruSecure. 2001. Open Source Security: A Look at the Security Benefits of Source Code Access. http://www.trusecure.com/cgi-bin/refer.pdf?wp=open_source_security5.pdf
U.S. Department of Commerce. 2002. Understanding Broadband Demand: A Review of Critical Issues. Washington, DC: U.S. Department of Commerce, Office of Technology Policy
Warfield, Michael H. 2003. Musings on Open Source Security Models. Linuxworld.com, February 27. http://www.linuxworld.com/linuxworld/lw-1998--11/1e-11-ramparts.htmlGoogle Scholar
Wheeler, David A. 2003. Why Open Source Software/Free Software (OSS/FS)? Look at the Numbers! www.dwheeler.com/oss_fs_why.html
White House. 2002. Fourth Annual Report to the President and the Congress on the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction. http://www.rand.org/nsrd/terrpanel/
White House. 2003. The National Strategy to Secure Cyberspace. http://www.whitehouse.gov/pcipbcyberspace_strategy.pdf
Wilson-Doenges, Georjeanna. 2000. An Exploration of Sense of Community and Fear of Crime in Gated Communities. Environment and Behavior 32:597CrossRefGoogle Scholar
Wilson, James Q. 1975. Thinking about Crime. New York: Basic BooksGoogle Scholar
Woodall, Martha. 1997. First Computerized Brief Filed with Supreme Court. Philadelphia Inquirer, February 21, p. A1Google Scholar
Yasin, Rutrell. 2001. So Many Patches, So Little Time. InternetWeek, October 4. http://www.internetweek.com/newslead01/lead100401.htmGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×