Skip to main content

The Impact of Incentives on Notice and Take-down

  • Chapter
  • First Online:

Abstract

We consider a number of notice and take-down regimes for Internet content. These differ in the incentives for removal, the legal framework for compelling action, and the speed at which material is removed. By measuring how quickly various types of content are removed, we determine that the requester’s incentives outweigh all other factors, from the penalties available, to the methods used to obstruct take-down.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    In this chapter we cite UK cases; similar developments occurred in the US, Australia and other jurisdictions.

  2. 2.

    It would be possible to give numerous instances of sites that have migrated to the US, however we have not provided any examples of this alternative type of ‘forum shopping’ because the authors are currently residing in the UK. In this jurisdiction there is some case law about providing pointers to defamatory material: in Hird v. Wood 1894, the court held that the defendant had defamed the plaintiff by merely standing on a road and mutely pointing out a path which, if followed, allowed one to view a notice on which a defamatory statement had been written, even though the authorship of that statement was never proved.

  3. 3.

    The International Association of Internet Hotlines: http://www.inhope.org

  4. 4.

    The data provided by the IWF presents numerous difficulties whenever images reappear on the same website. Using the sanitised data they made available, it is impossible to distinguish between similar and distinct removals on the same website.

  5. 5.

    For a detailed account of our ‘feeds’ of URLs of phishing websites and our monitoring system, we refer the interested reader to (Moore 2008; Moore and Clayton 2007; Moore and Clayton 2008). In the current context, the key point is that because we receive data from a number of disparate sources, we believe that our database of URLs is one of the most comprehensive available, and the overwhelming majority of phishing websites will come to our attention.

  6. 6.

    While our method for identifying compromised websites from the structure of phishing URLs has confirmed 193 websites, there are additional websites that we have not yet verified. Hence, the 193 websites should be viewed as a sample of a significantly larger population of compromised websites.

  7. 7.

    http://www.aa419.org

  8. 8.

    Occasionally the legitimate escrow service escrow.com goes after fake sites that infringe upon their brand. Of course, additional volunteer groups may be operating, but we are unaware of any.

  9. 9.

    http://www.phishtank.com

  10. 10.

    We use the standard formula for capture-recapture:

    $$ \frac{{|sample1| \times |sample2|}}{{|overlap|}} $$

    Our data does not satisfy all of assumptions necessary for this formula to hold – notably the population is dynamic, with sites appearing and disappearing. (Weaver and Collins 2007) computed the overlap between two phishing feeds and applied capture-recapture analysis to estimate the number of overall phishing attacks. They discuss how the capture-recapture assumptions can be accommodated for phishing. We leave deriving a more accurate estimate to future work.

  11. 11.

    http://www.spamhaus.org

  12. 12.

    http://www.team-cymru.org

  13. 13.

    http://www.stopbadware.org

  14. 14.

    AOL Feedback Loop Information: http://postmaster.aol.com/fbl/

  15. 15.

    Microsoft Smart Network Data Services: https://postmaster.live.com/snds/

  16. 16.

    Financial Services Technology Consortium: http://www.fstc.org; Financial Services Information Sharing and Analysis Center: http://www.fsisac.com; Association for Payment Clearing Services: http://www.apacs.org.uk; Anti-PhishingWorking Group: http://www.antiphishing.org.

  17. 17.

    http://www.ncmec.org/en_US/documents/CyberTiplineFactSheet.pdf

  18. 18.

    In this chapter we have not considered whether ‘take-down’ of child sexual abuse images is the optimal strategy. It could be argued that the correct approach is to locate the people behind the websites and that removing websites merely leads to a ‘whack-a-mole’ game that rapidly removes individual websites without decreasing the availability of the material. The attention that has recently been paid to site lifetimes in the IWF annual reports indicates that removal is now seen by them to be important. However (Callanan 2007) found that only 11% of all websites are reported to ISPs by member hotlines. They wish “not to interfere with any ongoing lawenforcement investigation” and say that “depending on national legislation, the ISPsometimes prefers not to be informed about potentially illegal content.” We do not understand this comment, unless it refers to the necessity, in some jurisdictions, for the ISP to make a report to the authorities.

References

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Moore, T., Clayton, R. (2009). The Impact of Incentives on Notice and Take-down. In: Johnson, M.E. (eds) Managing Information Risk and the Economics of Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09762-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-09762-6_10

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-09761-9

  • Online ISBN: 978-0-387-09762-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics