Estimating the Market for Internet Service Provider-Based Cyber Security Solutions Brent Rowe – RTI International Doug Reeves – NC State University Dallas.

Slides:



Advertisements
Similar presentations
Energy Analysis Department Electricity Markets and Policy Group DOE Smart Grid Investment Grant Program: Dynamic Pricing & Consumer Behavior Studies Chuck.
Advertisements

Better Security and Privacy for Home Broadband Peter P. Swire Moritz College of Law The Ohio State University Morrison & Foerster LLP Privacy 2002 Conference.
Are you Resilient? Diane Howorth Business Development Manager European Telecommunications Resilience & Recovery Association.
IMPACT ESTIMATION PROJECT h o r i z o n s c a n n i n g Anti-trust issues in on-line retailing Ed Smith Director Office of Fair Trading The views expressed.
Sustaining digital projects. Sustainability Planning What is sustainability? Big Picture: Meeting the needs of the present without compromising the ability.
Do Now Take out Apprentice HW and be ready to share Pick up a textbook from the open cabinet to the right of the room Read Business Building Blocks on.
Market Analysis Learning Unit 3.
Market Assessment for Small Businesses. Lecture Contents Marketing Mix/ Demand/ Demand Estimation Sampling Plan/ Data Collection and Analysis Market Survey.
Results from a Mobile Finance Survey. 2 2 Second survey sponsored by CheckFree with fieldwork in April 2008; First survey completed in March ,007.
Develop an Information Strategy Plan
Chapter 10 Product Issues in Channel Management.
Time-of-Use and Critical Peak Pricing
Solar lending Workshop 30 th August 2006 ELIMENTS OF PRODUCT DESIGN FOR SOLAR LENDING Saliya J. Ranasinghe.
CHAPTER 4 E-ENVIRONMENT
Spyware and Adware Rick Carback 9/18/2005
Conversion Architecture Improve Your Online Performance While Reducing Your Online Spend By Doug Schust.
Compensation Compensation is the reward that individuals receive in exchange for performing tasks A major cost of doing business The chief reason people.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Understanding Factors Affecting Consumer Purchase Decisions for Functional Foods By Ratapol Teratanavat Dr. Neal H. Hooker Presented at the IFT Meeting,
: An Integrated Curriculum With Impact Across Four States C. Bastian, L. Anderson, T. Daniels, G. Gordon D. Griffith, S. Hadrick, V. Hayman, J. Hewlett,
MARKETING 1 Pricing Products and Services. What is Price? The value in money (or it’s equivalent) placed on a good or service Usually expressed in monetary.
Micro and Macro- the difference?
Marketing Research Unit 7.
© The McGraw-Hill Companies, Software Project Management 4th Edition Managing contracts Chapter 10.
IT ASSET MANAGEMENT (From Booz-Allen & Hamilton).
Choosing an Internet Service Providers (ISP) A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
CYBERSURF TELECOMMUNICATIONS. The company Founded in 1994 Headquarters is in Ottawa, Canada Industry: Internet Company Size: employees - 80% of.
Designing Ranking Systems for Hotels on Travel Search Engines by Mining User-Generated and Crowd sourced Content Author - Anindya Ghose, Panagiotis G.
What Role Should Consumerism Play in the Economy? Unit 8 – Economics and Consumerism.
Software project management
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
ENTREPRENEURS IN A MARKET ECONOMY
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Marketing and Distribution
Assessing Home Internet Users’ Demand for Security Brent Rowe, RTI International Dallas Wood, RTI International.
Select and Develop Top Performing Sales Professionals Introducing SalesMax Revised 10/2005.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
The Usage and Value of Local Search Sources comScore study findings / marketer application Stuart McKelvey, CEO - TMP Directional Marketing Search with.
Marketing – Chapter 28 What is Market Research?
1 Chapter 4 Instructor Shan A. Garib, Winter 2013.
Farmer Risk Perceptions and Demand for Risk Management Education Keith H. Coble, Mississippi State University Thomas O. Knight, Texas A&M University George.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Direct Teacher: Professor Ng Reporter: Cindy Pineapple 1 Summarized from :
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
MIS An Economic Analysis of Software Market with Risk-Sharing Contract Byung Cho Kim Pei-Yu Chen Tridas Mukhopadhyay Tepper School of Business Carnegie.
Introducing Regulatory Impact Analysis into the Turkish Legal Framework “Training the Trainers” November 2008 Session 8 Standard Cost Model and RIAs.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Organizational Risk and the Costs and Benefits of Biometrics Presentation to the European Union Biometrics Group May 14, 2004 Virginia Franke Kleist, Ph.D.
1 Introduction to Business and Economics Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Section 1.1 Introduction.
Institutional affiliation Date.  Security is very important as it keeps your secret from other know.  An insecure network exposes a business to various.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Unit 5 Operations Management Location. Learning Objectives To be able to explain the causes and consequences of location and relocation – domestically.
Bitdefender is an antivirus software suite developed by Romania-based software company Softwin. It was launched in November 2001,and is currently in its.
Integrated Marketing Solutions Leland Smithson Quintrex Data Systems Corp. “How Integrated Marketing Solutions such as Target Marketing,
Utilities’ Update on Energy Savings Assistance Program Studies Ordered in D LIOB Meeting August 21, 2013 Sacramento, California.
Chapter © 2010 South-Western, Cengage Learning Responsibilities and Costs of Credit Using Credit Wisely Costs of Credit 18.
Section 302, Team 5: Emily Millette, Manuel Ortiz, Melody Qiao, Chad Tyler.
Marketing April 20, 2015 Price Planning. Discuss with your neighbor  Discuss the relationship between price and the other P’s of the marketing mix. 
BLUE APRON Recommendations Shu Shu, Rishav, Trista, Caitlin, & Kelsey.
Online Shopping: Research Paper Eimear Greene. My Objectives Why People shop online How Online retail has changed What category of product do people shop.
Contract management 1. Acquiring software from external supplier This could be: a bespoke system - created specially for the customer off-the-shelf -
Understanding the Integrated Resource Plan (IRP 2010 Rev 2)
Chapter 10 Product Issues in Channel Management.
Chapter 10 Product Issues in Channel Management.
Farmer Risk Perceptions and Demand for Risk Management Education
EPF 10 – The student will develop consumer skills by examining basic economic concepts & their relationship to product prices & consumer spending.
Chapter 10 Product Issues in Channel Management.
E-Commerce and Economic Forces
Economics & Economic Decision Making
Demand Prices within our economy are set by supply and demand.
Presentation transcript:

Estimating the Market for Internet Service Provider-Based Cyber Security Solutions Brent Rowe – RTI International Doug Reeves – NC State University Dallas Wood – RTI International Fern Braun – RTI International November 4, 2010

Study Motivation Home Internet users are particularly ill-prepared to secure their computers –Economic theory: Incomplete information

Study Motivation Home Internet users are particularly ill-prepared to secure their computers –Economic theory: Incomplete information Home Internet users’ insecurity affects all other Internet users –Economic theory: Cost externalities

Study Motivation Home Internet users are particularly ill-prepared to secure their computers –Economic theory: Incomplete information Home Internet users’ insecurity affects all other Internet users –Economic theory: Cost externalities

Study Motivation KEY QUESTION: How can home internet users become more secure? –Incentive home internet users to spend more time / money on security –Government regulations / subsidies to increase the security of products and services We decided to investigate a case study that would help inform both potential actions

Case Study: ISP-based Cyber Security ISPs are in optimal location to identify malicious incoming & outgoing Internet traffic ISPs have knowledge and capabilities to react As such, ISPs can help reduce the social cost of cyber security activities significantly –Economic theory: Economies of scale

Study Goals I.Estimate supply of ISP-based cyber security solutions –What are ISPs doing for their customers’ security? –What aren’t they doing that could help customers’ security? –How much are they charging for security services? II.Estimate demand for ISP-based cyber security solutions –What are ISP customers willing to pay for security? –What ISP security service components most impact demand? –What educational / marketing messages can impact demand?

I. ISP Supply Assessment Identified 84 plans sold by the Top 22 ISPs –77% of plans examined were DSL or cable broadband 97% offer some type security service 49% of those offering security services charge a fee, the rest include in monthly price

I. ISP Supply Assessment Average Price of Plan w/ Security = $52.65 Average Price of Plan w/o Security = $47.47 –NET: Amount ISPs Charging Customers for “Included” Security Features = $4.18 Average Price of Security Add-on = $4.34 9

I. ISP Supply Assessment Security features offered vary by plan as follows: 100% of security plans include antivirus and anti- spyware software 86% of plans include firewalls 79% of plans include anti-spam 73% of plans include anti-phishing 10

I. ISP Supply Assessment Security features offered vary by plan as follows: 100% of security plans include antivirus and anti- spyware software 86% of plans include firewalls 79% of plans include anti-spam 73% of plans include anti-phishing ? % of plans include traffic analysis, filtering & remediation (higher cost) 11

I. ISP Supply Assessment Security features offered vary by plan as follows: 100% of security plans include antivirus and anti- spyware software 86% of plans include firewalls 79% of plans include anti-spam 73% of plans include anti-phishing ? % of plans include traffic analysis, filtering & remediation (higher cost) 12 Comcast does

I. ISP Supply Assessment Why aren’t ISPs doing more? Legal implications Desire not to impede internet activities Perception that consumers are not willing to pay enough for security products / services

I. ISP Supply Assessment Why aren’t ISPs doing more? Legal implications Desire not to impede internet activities Perception that consumers are not willing to pay enough for security products / services

II. Consumer Demand Assessment Establish Baseline: Quantify home internet users’ willingness to pay for ISP-based cyber security solutions Quantify home internet users’ willingness to spend time on ISP-based cyber security solutions

II. Consumer Demand Assessment Assess Impact of Marketing / Educational Messages: Evaluate the differences in impact of fear and trust messaging on demand measures Identify any impact on behavior based on survey language

II. Consumer Demand Assessment Developed survey of home Internet users to determine willingness to pay for security and accept certain tradeoffs –Utilized stated preference questions to assess demand Fielding through ComScore to 2,400 broadband home internet users –Pilot survey conducted with 365 participants

Conjoint Question: Example AttributesTreatment ATreatment B Security fee$2 per month$7 per month Required time spent on training 1 hours per month0 hours per month Option to limit access to subscribers showing signs of malicious or illegal activity ISP can limit your access to the internet ISP can never limit your access to the internet Reduces risk of your computer slowing down or crashing Not ReducedGreatly Reduced Reduces risk of your identity being stolen Not Reduced Reduces risk to other individuals and business from youru insecurity Not Reduced Please indicate your preferred option: Prefer Option A Prefer Option B Opt Out

Pilot Survey Results On average, respondents indicated they would be willing to pay (per month)... –$3.87 to AVOID ever having their internet access restricted –$3.55 to REDUCE THE RISK of identify theft to them –$2.83 to REDUCE THE RISK of their computer crashing –$1.96 to REDUCE THE RISK of others being impacted –$0.71 to AVOID one hour of training

Implications Average cost of $4.25 for current ISP security packages (focus on low cost options like AV) Pilot data suggests that consumers are willing to pay over $8 per month to reduce risks to them and others, however… –They do not want their internet access limited –They do not want to spend time on security

Future Survey Analysis 8 Versions of the Survey Fielded –No text added –“Trust”, “Fear” and combined messages added prior to conjoint questions –Are survey participants willing to pay more when they know more about threats and actions they can take? Analysis of Post-survey Actions –Do survey participants search for security? –Do survey participants install security programs?

Next Steps Field survey to full sample of 2,400 individuals through Comscore Assess impact of educational / marketing messages Determine if any actions are taken post survey Compile results into final report to be delivered in late 2010 / early 2011

Additional Information If you would like additional information about this study, please contact: Brent Rowe browe at rti.org