what is understood as “secure” in IoT, and what it is
not. When education fails, the application of coer-
cive measures should serve as a valid mechanism to
preserve cybersecurity, as it does in other spheres of
common interest such as traffic laws, environmental,
health, and public safety affairs.
REFERENCES
Antonakakis, M., April, T., Bailey, M., Bernhard, M.,
Bursztein, E., Cochran, J., Durumeric, Z., Halderman,
J. A., Invernizzi, L., Kallitsis, M., et al. (2017). Under-
standing the mirai botnet. In USENIX Security Sym-
posium.
Asghari, H., van Eeten, M. J., and Bauer, J. M. (2015). Eco-
nomics of fighting botnets: Lessons from a decade of
mitigation. IEEE Security & Privacy, 13(5):16–23.
Bauer, J. M. and Van Eeten, M. J. (2009). Cybersecurity:
Stakeholder incentives, externalities, and policy opti-
ons. Telecommunications Policy, 33(10-11):706–719.
Boddy, S. and Shattuck, J. (2018). Threat analysis re-
port. the hunto for iot. the growth and evolution of
thingbots ensures chaos. https://www.f5.com/labs/
articles/threat-intelligence/the-hunt-for-iot-the-
growth-and-evolution-of-thingbots-ensures-chaos.
Retrieved on: 2018-06-25.
Cerf, V. G. (2013). Revisiting the tragedy of the commons.
Communications of the acm, 56(10):7–7.
Cole, R., Dodis, Y., and Roughgarden, T. (2006). Bottle-
neck links, variable demand, and the tragedy of the
commons. In Proceedings of the seventeenth annual
ACM-SIAM symposium on Discrete algorithm, pages
668–677. Society for Industrial and Applied Mathe-
matics.
Davidow, B. (2012). The tragedy of the internet commons.
The Atlantic, 18.
den Hartog, F., Raschella, A., Bouhafs, F., Kempker, P.,
Boltjes, B., and Seyedebrahimi, M. (2017). A pathway
to solving the wi-fi tragedy of the commons in apart-
ment blocks. In Telecommunication Networks and Ap-
plications Conference (ITNAC), 2017 27th Internatio-
nal, pages 1–6. IEEE.
Fong, K., Hepler, K., Raghavan, R., and Rowland, P.
(2018). Quantifying Consumer Costs of Insecure
Internet of Things Devices. https://groups.ischool.
berkeley.edu/riot/. Accessed on: 2018-05-30.
Gartner (2017). Gartner newsroom. http://
www.gartner.com/newsroom/id/3598917/. Accessed
on: 2017-07-30.
Greenwood, G. W. (2016). Altruistic punishment can help
resolve tragedy of the commons social dilemmas. In
Computational Intelligence and Games (CIG), 2016
IEEE Conference on, pages 1–7. IEEE.
Hardin, G. (1968). The tragedy of the commons. Science,
162(3859):1243–1248.
Herley, C. and Flor
ˆ
encio, D. (2009). A profitless endeavor:
phishing as tragedy of the commons. In Proceedings
of the 2008 New Security Paradigms Workshop, pages
59–70. ACM.
Iannela, R. (2017). Tragedy of the digital commons: Ampli-
fied zombies [opinion]. IEEE Technology and Society
Magazine, 36(3):15–16.
IoT Security Foundation. Best practice user mark faq and
terms of use. https://www.iotsecurityfoundation.org/
best-practice-user-mark/. Accessed on: 2018-06-26.
Krebs, B. (2016a). Hacked Cameras, DVRs Powe-
red Todays Massive Internet Outage. https://
krebsonsecurity.com/2016/10/hacked-cameras-dvrs-
powered-todays-massive-internet-outage. Accessed
on: 2017-02-22.
Krebs, B. (2016b). Senator Prods Federal Agencies
on IoT Mess. https://krebsonsecurity.com/2016/10/
senator-prods-federal-agencies-on-iot-mess/. Acces-
sed on: 2018-05-30.
Lloyd, W. F. (1833). Two Lectures on the Checks to Popu-
lation: Delivered Before the University of Oxford, in
Michaelmas Term 1832. JH Parker.
Lutu, A. and Bagnulo, M. (2011). The tragedy of the in-
ternet routing commons. In Communications (ICC),
2011 IEEE International Conference on, pages 1–5.
IEEE.
Mansfield-Devine, S. (2016). Ddos goes mainstream: how
headline-grabbing attacks could make this threat an
organisation’s biggest nightmare. Network Security,
2016(11):7–13.
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V.,
and Wu, Q. (2010). A survey of game theory as app-
lied to network security. In System Sciences (HICSS),
2010 43rd Hawaii International Conference on, pages
1–10. IEEE.
Smith, M. (2017). The tragedy of the commons in the
IoT ecosystem. https://computerworld.com.au/article/
626059/tragedy-commons-iot-ecosystem/. Accessed
on: 2018-05-30.
The European Parliament and the Council of the European
Union (2016). General data protection regulation-
gdpr. https://gdpr-info.eu/. Retrieved on: 2018-06-25.
Usman, S. H. (2013). A review of responsibilities of inter-
net service providers toward their customer’s network
security. Journal of Theoretical & Applied Informa-
tion Technology, 49(1).
World Economic Forum (2018). The global
risks report 2018. http://weforum.org/docs/
WEF
GRR18 Report.pdf/.
BASS 2018 - International Workshop on Behavioral Analysis for System Security
480