Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 12))

Conclusion

The cases of set-top boxes in the U. S. cable industry, video games and their cartridges, and printers and their cartridges all illustrate ways in which security technology can play an enhanced role in lock-in of customers by their suppliers through creation of substantial switching costs. Openness of technology, normally an inhibitor of lock-in, can be argued against in the case of security on the basis of a presumed increase in security by keeping details of the security system secret and proprietary. Whether open or not, security technology can be used to make permissible reverse engineering equivalent to an infeasible problem of breaking a cryptographically strong algorithm. And what might appear to be permissible reverse engineering may be conflated with an effort to enable illegitimate piracy and rendered illegal. The extra potential for security technology as a locus of lock-in raises its importance in the strategic considerations of both customers and vendors and for legislators and regulators. Customers will want to consider how to reduce the effect of lock-in, particularly on access to innovation; vendors will want to consider how to increase lock-in where possible, and policy makers will want to consider where the public interest motivates efforts to intervene to mitigate lock-in.

Here we first develop a framework for security based lock-in before describing three important recent cases: set-top boxes in the US cable industry and cartridges in the video game and printer industries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Anderson, R. Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc., New York, 2001.

    Google Scholar 

  • Anderson, R., Security in Open versus Closed Systems-The Dance of Boltzmann, Coase, and Moore. in Open Source Software:Economics, Law and Policy, (Toulouse, France, 2002).

    Google Scholar 

  • Arthur, W.B. Increasing Returns and Path Dependence in the Economy. The University of Michigan Press, Ann Arbor, MI, 1994.

    Google Scholar 

  • Baldwin, C. and Clark, K. Design Rules, vol. 1: The Power of Modularity. Boston, MA: The MIT Press, 2000.

    Google Scholar 

  • Burr, William E.., “Selecting the Advanced Encryption Standard,” IEEE Security & Privacy Magazine, vol. 1, issue 2, Mar–Apr 2003, pp. 43–52

    Article  Google Scholar 

  • Cable Labs, http://www.opencable.com/

  • Clayton Christensen and Michael Raynor, The Innovator’s Solution, Boston, MA: Harvard Business School Press, 2003.

    Google Scholar 

  • Julie E. Cohen Reverse Engineering and the Rise of Electronic Vigilantism: Intellectual Property Implications of “Lock-Out” Programs in 68 S. Cal. L. Rev. 1091 (1995).

    Google Scholar 

  • DMCA. See http://www.eff.org/IP/DMCA

  • EFF. Unintended Consequences: Five Years Under the DMCA v. 3, September 24, 2003, available at http://www.eff.org/IP/DRM/DMCA/unintended_consequences.php

  • FCC. Commercial Availability of Navigation Devices, Order On Reconsideration, Section 304 of the Telecommunications Act of 1996, CS Docket No. 97–80, May 13, 1999.

    Google Scholar 

  • Dan Goodin, “Microsoft, Intel wage war of words,” cnet. news. com, Nov. 12, 1998, at: http://news.com.com/2100-1023\_3-217848.html

  • Andrew Huang, Hacking the Xbox:An Introduction to Reverse Engineering, No Starch Press, July 2003.

    Google Scholar 

  • Kamien, M. and Schwartz, N. Market Structure and Innovation. Cambridge University Press, Cambridge, UK, 1982.

    Google Scholar 

  • Kerchoffs, A. La crytpographie militaire. Journal des sciences militaires, IX. 5–38.

    Google Scholar 

  • T. Lookabaugh, D.C. Sicker, D.M. Keaton, Y.G. Wang, and I. Vedula, “Security Analysis of Selectively Encrypted MPEG-2 Streams,” in Multimedia Systems and Applications VI, Proceedings of the SPIE, vol. 5241, Orlando, FL, 8–9 September 2003.

    Google Scholar 

  • Henry Chresbrough, Open Innovation, Boston, MA: Harvard Business School Press, 2003.

    Google Scholar 

  • Liebowitz, S.J. and Margolis, S.E. Winners, Losers & Microsoft. The Independent Institute, Oakland, CA, 1999.

    Google Scholar 

  • Lipner, S.B:, Security and source code access:issues and realities, in IEEE Symposium on Security and Privacy, (Oakland, CA, 2000).

    Google Scholar 

  • MPEG-4.http://www.chiariglione.org/mpeg/standards/mpeg-21/mpeg-21.htm

  • MPEG LA.http://www.mpegla.com/news/n_03-10-02_drm.html

  • Neumann, P.G., Robust Nonproprietary Software, in IEEE Symposium on Security and Privacy, (Oakland,CA, 2000).

    Google Scholar 

  • NIST. Federal Information Processing Standard 46-3, Data Encryption Standard, US Nat’l Inst. Standards and Technology, 1999, http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf

  • Nowell, P. Small firm irks printer giant; cartridges at center of legal tussle The Seattle Times, Seattle, WA, 2003.

    Google Scholar 

  • Redding, S. Path Dependence, Endogenous Innovation, and Growth. International Economic Review, 43(4). 1215–1248.

    Google Scholar 

  • Mark Robichaux, Cable Cowboy: John Malone and the Rise of the Modern Cable Business, Hoboken, NJ: John Wiley & Sons, 2002.

    Google Scholar 

  • Scherer, F. Changing perspectives on the firm size problem. in Acs, Z. and Audretsch, D. eds. Innovation and Technological Change: An International Comparison, The University of Michigan Press, Ann Arbor, MI, 1991, 24–38.

    Google Scholar 

  • Schneider, F.B., Open source in security: visiting the bizarre. in IEEE Symposium on Security and Privacy, (Oakland, CA, 2000).

    Google Scholar 

  • Schneier, B. Open Source and Security Crypto-Gram Newsletter, 1999.

    Google Scholar 

  • Shapiro, C. and Varian, H. Information Rules: A Strategic Guide to the Network Economy. Harvard Business School Press, Boston, MA, 1998.

    Google Scholar 

  • TCPA. See http://www.trustedcomputing.org/, and for a different perspective see http://www.schneier.com/crypto-gram-0208.html

  • Joanie Wexler, Is Cisco LEAP-frogging the Standards Process? Available at http://www.nwfusion.com/newsletters/wireless/2003/0303wireless2.html

  • Xbox. For a description of the certification process see http://www.wimedia.org/events/docs/02012rOWM_PUB-GEN-0_Certification Program_USB_Xbox_WiMedia_Oct_2002.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer Science + Business Media, Inc.

About this chapter

Cite this chapter

Lookabaugh, T., Sicker, D.C. (2004). Security and Lock-In. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_17

Download citation

  • DOI: https://doi.org/10.1007/1-4020-8090-5_17

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-8089-0

  • Online ISBN: 978-1-4020-8090-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics