Browse Definitions :
Definition

tragedy of the commons

The tragedy of the commons is a problem that occurs when individuals exploit a shared resource to the extent that demand overwhelms supply and the resource becomes unavailable to some or all.

Garret Hardin, an evolutionary biologist, wrote "The Tragedy of the Commons," which was published in the journal Science in 1968. Hardin's main concern was overpopulation. He used the example of commonly-used grazing land. According to Hardin, the land could provide adequately as long as the number of herders grazing cattle on it was kept in check, through natural population control mechanisms such as war and disease. 

If the numbers were to increase as a result of those checks being overcome, the land would be no longer sufficient to support the population. Each person sharing the land, acting in self-interest, would continue to tax the resources of the commons, despite the fact that if enough people do so, the land will be damaged and unable to support them. 

The tragedy of the commons has implications for the use of resources and sustainability. Depletion of non-renewable resources is an example of the tragedy of the commons in action.  Non-renewable resources, such as water, are often used as if the supply were limitless. Similarly, the reliance on fossil fuels is not only unsustainable but is demonstrably damaging the environment. 

The Internet is sometimes referred to as a commons, a shared resource subject to the same pressures of self-interest and exploitation that lead to damage in the physical environment. In either context, the solution to the problem involves management and regulation of resources with the goal of maintaining sustainability. 

 

See also: digital commons, social entrepreneur

This was last updated in August 2013

Continue Reading About tragedy of the commons

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close