Skip to main content

Economic Evaluation of Interactive Audio Media for Securing Internet Services

  • Conference paper
Global Security, Safety and Sustainability & e-Democracy (e-Democracy 2011, ICGS3 2011)

Abstract

Internet Telephony (Voice over Internet Protocol or VoIP) has recently become increasingly popular mainly due to its cost advantages and range of advance services. On the same time, SPam over Internet Telephony (SPIT) referred as unsolicited bulk calls sent via VoIP networks by botnets, is expected to become a serious threat in the near future. Audio CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) mechanism were introduced and employed as a security measure to distinguish automated software agents from human beings. The scope of this paper is to present the security economics frame and to have an in-depth review of the related economic models of SPAM and its analogies with SPIT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.: Why information security is hard: An economic perspective. In Proc. of the 17th Annual Computer Security Applications Conference (ACSAC 2001), USA, pp. 358-365 (2001)

    Google Scholar 

  2. Zhao, X., Fang, F., Whinston, A.: An economic mechanism for better Internet security. Decision Support Systems 45(4), 811–821 (2008)

    Article  Google Scholar 

  3. Motoyama, M., Levchenko, K., Kanich, C., McCoy, D., Voelker, G., Savage, S.: Re: CAPTCHAs - Understanding CAPTCHA-Solving from an Economic Context. In: Proc. of the USENIX Security Symposium, USA (2010)

    Google Scholar 

  4. Lai, F., Wang, J., Hsieh, C., Chen, J.: On network externalities, e-business adoption and information asymmetry. Industrial Management & Data Systems 107(5), 728–746 (2007)

    Article  Google Scholar 

  5. Bauer, J., van Eeten, M.: Cybersecurity: Stakeholder incentives, externalities, and policy options. Telecommunications Policy 33, 706–719 (2009)

    Article  Google Scholar 

  6. Shetty, N., Schwartz, G., Walrand, J.: Can Competitive Insurers Improve Network Security? In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 308–322. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. van Eeten, M., Bauer, J.: The economics of malware: security decisions, incentives and externalities, Directorate for Science, Technology and Industry, Committee for Information, Computer and Communications Policy, DSTI/ICCP/REG, 27, Paris, OECD (2007), http://www.oecd.org/dataoecd/53/17/40722462.pdf

  8. Vaknin, S.: The Economics of Spam, http://www.Buzzle.com

  9. Prentice, B.: Tangible and intangible benefits of transportation security measures. Journal of Transportation Security 1(1), 3–14 (2008)

    Article  Google Scholar 

  10. Ravi, B., Derrick, H., Qing, H.: A System Dynamics Model of Information Security Investments. In: Proc. of the ECIS (2007)

    Google Scholar 

  11. Böhme, R., Nowey, T.: Economic Security Metrics. In: Eusgeld, I., Freiling, F.C., Reussner, R. (eds.) Dependability Metrics. LNCS, vol. 4909, pp. 176–187. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. Lelarge, M.: Economics of Malware: Epidemic Risks Model, Network Externalities and Incentives. In: Proc. of the 5th Bi-annual Conference on the Economics of the Software and Internet Industries, France, pp. 1353–1360 (2009)

    Google Scholar 

  13. Ridzuan, F., Potdar, V., Talevski, A.: Factors Involved in Estimating Cost of Email Spam. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds.) ICCSA 2010. LNCS, vol. 6017, pp. 383–399. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  14. Allman, E.: The Economics of Spam. Queue-Distributed Development 1(9), 203–212 (2003)

    Google Scholar 

  15. Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G., Paxson, V., Savage, S.: Spamalytics: An Empirical Analysis of Spam Marketing Conversion. In: Proc. of the 15th ACM Conference on Computer and Communications Security (CCS), USA, pp. 27–31 (2008)

    Google Scholar 

  16. Kimakova, A., Rajabiun, R.: The Dangerous Economics of Spam Control. In: Proc. of the MIT Spam Conference, USA (2008)

    Google Scholar 

  17. Leyden, J.: The economics of spam, the register (2003), http://www.theregister.co.uk/2003/11/18/the_economics_of_spam/

  18. Cobb, S.: The Economics of Spam. Technical Report (2003)

    Google Scholar 

  19. Petur, J.: The economics of spam and the context and aftermath of the CAN-SPAM Act of 2003. International Journal of Liability and Scientific Enquiry 2(1), 40–52 (2008)

    Google Scholar 

  20. Minto, R.: The economics of spam, Financial Times Tech Blog: Industry analysis (2008), http://blogs.ft.com/techblog/2008/11/the-economics-of-spam

  21. Khong, D.: An economic analysis of SPAM law. Erasmus Law and Economics Review 1(1), 23–45 (2004)

    Google Scholar 

  22. Jia, D.: Cost-Effective Spam Detection in P2P File-Sharing Systems. In: Proc. of the 2008 ACM Workshop on Large-Scale Distributed Systems for Information Retrieval (LSDS-IR 2008), USA, pp. 19–26 (2008)

    Google Scholar 

  23. Plice, R., Pavlov, O., Melville, N.: Spam and Beyond: An Information-Economic Analysis of Unwanted Commercial Messages. Journal of Organizational Computing and Electronic Commerce 18(4), 278–306 (2008)

    Article  Google Scholar 

  24. Chim, H.: To Build a Blocklist Based on the Cost of Spam. In: Deng, X., Ye, Y. (eds.) WINE 2005. LNCS, vol. 3828, pp. 510–519. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  25. Quinten, V.M., van de Meent, R., Pras, A.: Analysis of Techniques for Protection Against Spam over Internet Telephony. In: Pras, A., van Sinderen, M. (eds.) EUNICE 2007. LNCS, vol. 4606, pp. 70–77. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  26. Ding, W., Yurcik, W., Yin, X.: Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers. In: Deng, X., Ye, Y. (eds.) WINE 2005. LNCS, vol. 3828, pp. 947–958. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  27. Schryen, G.: Spam and its economic significance. In: Anti-Spam Measures Analysis and Design, pp. 7–27 (2007)

    Google Scholar 

  28. Takemura, T., Ebara, H.: Spam Mail Reduces Economic Effects. In: Berntzen, L. (ed.) Proc. of the 2nd International Conference on Digital Society (ICDS), France, pp. 20–24 (2008)

    Google Scholar 

  29. Ukai, Y., Takemura, T.: Spam Mails Impede Economic Growth. Rev. Socionetwork Strat. 1, 14–22 (2007)

    Article  Google Scholar 

  30. Nakulas, A., Ekonomou, L., Kourtesi, S., Fotis, G., Zoulias, E.: A Review of Techniques to Counter Spam and Spit. In: Mastorakis, N., et al. (eds.) Proc. of the European Computing Conference. LNEE, vol. 27, pp. 501–510. Springer science+Business media, LLC (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Tsiakis, T., Katsaros, P., Gritzalis, D. (2012). Economic Evaluation of Interactive Audio Media for Securing Internet Services. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33448-1_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33447-4

  • Online ISBN: 978-3-642-33448-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics