Selling a Single Item with Negative Externalities

02/26/2019
by   Tithi Chattopadhyay, et al.
0

We consider the problem of regulating products with negative externalities to a third party that is neither the buyer nor the seller, but where both the buyer and seller can take steps to mitigate the externality. The motivating example to have in mind is the sale of Internet-of-Things (IoT) devices, many of which have historically been compromised for DDoS attacks that disrupted Internet-wide services such as Twitter. Neither the buyer (i.e., consumers) nor seller (i.e., IoT manufacturers) was known to suffer from the attack, but both have the power to expend effort to secure their devices. We consider a regulator who regulates payments (via fines if the device is compromised, or market prices directly), or the product directly via mandatory security requirements. Both regulations come at a cost---implementing security requirements increases production costs, and the existence of fines decreases consumers' values---thereby reducing the seller's profits. The focus of this paper is to understand the efficiency of various regulatory policies. That is, policy A is more efficient than policy B if A more successfully minimizes negatives externalities, while both A and B reduce seller's profits equally. We develop a simple model to capture the impact of regulatory policies on a buyer's behavior. In this model, we show that for homogeneous markets---where the buyer's ability to follow security practices is always high or always low---the optimal (externality-minimizing for a given profit constraint) regulatory policy need regulate only payments or production. In arbitrary markets, by contrast, we show that while the optimal policy may require regulating both aspects, there is always an approximately optimal policy which regulates just one.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/30/2017

Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems

Denial of Service (DoS) attacks constitute a major security threat to to...
research
12/11/2017

IDIoT: Securing the Internet of Things like it's 1994

Over 20 billion Internet of Things devices are set to come online by 202...
research
09/27/2022

A Fog-Based Security Framework for Large-Scale Industrial Internet of Things Environments

The Industrial Internet of Things (IIoT) is a developing research area w...
research
10/29/2018

Exploring Security Economics in IoT Standardization Efforts

The Internet of Things (IoT) propagates the paradigm of interconnecting ...
research
01/27/2022

Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT

Security in the fifth generation (5G) networks has become one of the pri...
research
04/17/2023

Designing Policies for Truth: Combating Misinformation with Transparency and Information Design

Misinformation has become a growing issue on online social platforms (OS...

Please sign up or login with your details

Forgot password? Click here to reset