The Community for Technology Leaders
RSS Icon
Issue No.02 - March-April (2013 vol.11)
pp: 93-95
Alessandro Acquisti , Carnegie Mellon University
Economics and behavioral economics offer different but complementary approaches to understanding privacy and security. This article explains briefly their differences and similarities, and why they matter in our thinking about security and privacy.
Privacy, Computer security, Network security, Economics, Behavioral science, behavioral economics, privacy, economics
Alessandro Acquisti, "Complementary Perspectives on Privacy and Security: Economics", IEEE Security & Privacy, vol.11, no. 2, pp. 93-95, March-April 2013, doi:10.1109/MSP.2013.30
1. R. Anderson, "Why Information Security Is Hard: An Economic Perspective," Proc. 17th Ann. Computer Security Applications Conf. (ACSAC 01), IEEE, 2001.
2. L.A. Gordon and M.P. Loeb, "The Economics of Information Security Investment," ACM Trans. Information and System Security, vol. 5, no. 4, 2002, pp. 438–457.
3. R. Posner, "An Economic Theory of Privacy," Regulation, 1978, pp. 19–26.
4. A. Adams and M.A. Sasse, "Users Are Not the Enemy," Comm. ACM, vol. 42, no. 12, 1999, pp. 40–46.
5. L.J. Camp, Trust and Risk in Internet Commerce, MIT Press, 2001.
6. A. Whitten and J.D. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," Proc. 8th Usenix Security Symp., McGraw-Hill, 1999.
7. L. Cranor and S. Garfinkel, Security and Usability: Designing Secure Systems that People Can Use, O'Reilly Media, 2005.
8. I. Altman, The Environment and Social Behavior, Brooks/Cole, 1975.
9. V.J. Derlega and A.L. Chaikin, "Privacy and Self-Disclosure in Social Relationships," J. Social Issues, vol. 33, no. 3, 1977, pp. 102–115.
10. A. Acquisti, "Privacy in Electronic Commerce and the Economics of Immediate Gratification," Proc. 5th ACM Conf. Electronic Commerce, ACM, 2004.
11. B. Schneier, "The Psychology of Security," Comm. ACM, vol. 50, no. 5, 2007, p. 128.
12. C. Herley, "So Long, and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users," Proc. New Security Paradigms Workshop, 2009.
13. A. Shostack and P. Syverson, "What Price Privacy?" Economics of Information Security, 2004, pp. 129–142.
14. S. Romanosky, R. Telang, and A. Acquisti, "Do Data Breach Disclosure Laws Reduce Identity Theft?" J. Policy Analysis and Management, vol. 30, no. 2, 2011, pp. 256–286.
39 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool