TY - GEN
T1 - On the adoption of privacy-enhancing technologies
AU - Caulfield, Tristan
AU - Ioannidis, Christos
AU - Pym, David
N1 - Copyright © Springer International Publishing AG 2016. The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-47413-7_1
PY - 2016/10/5
Y1 - 2016/10/5
N2 - We propose a model, based on the work of Brock and Durlauf, which looks at how agents make choices between competing technologies, as a framework for exploring aspects of the economics of the adoption of privacy-enhancing technologies. In order to formulate a model of decision-making among choices of technologies by these agents, we consider the following: context, the setting in which and the purpose for which a given technology is used; requirement, the level of privacy that the technology must provide for an agent to be willing to use the technology in a given context; belief, an agent’s perception of the level of privacy provided by a given technology in a given context; and the relative value of privacy, how much an agent cares about privacy in this context and how willing an agent is to trade off privacy for other attributes. We introduce these concepts into the model, admitting heterogeneity among agents in order to capture variations in requirement, belief, and relative value in the population. We illustrate the model with two examples: the possible effects on the adoption of iOS devices being caused by the recent Apple–FBI case; and the recent revelations about the non-deletion of images on the adoption of Snapchat.
AB - We propose a model, based on the work of Brock and Durlauf, which looks at how agents make choices between competing technologies, as a framework for exploring aspects of the economics of the adoption of privacy-enhancing technologies. In order to formulate a model of decision-making among choices of technologies by these agents, we consider the following: context, the setting in which and the purpose for which a given technology is used; requirement, the level of privacy that the technology must provide for an agent to be willing to use the technology in a given context; belief, an agent’s perception of the level of privacy provided by a given technology in a given context; and the relative value of privacy, how much an agent cares about privacy in this context and how willing an agent is to trade off privacy for other attributes. We introduce these concepts into the model, admitting heterogeneity among agents in order to capture variations in requirement, belief, and relative value in the population. We illustrate the model with two examples: the possible effects on the adoption of iOS devices being caused by the recent Apple–FBI case; and the recent revelations about the non-deletion of images on the adoption of Snapchat.
UR - http://link.springer.com/book/10.1007/978-3-319-47413-7
UR - http://www.scopus.com/inward/record.url?scp=84994853553&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-47413-7_11
DO - 10.1007/978-3-319-47413-7_11
M3 - Conference publication
AN - SCOPUS:84994853553
SN - 978-3-319-47412-0
T3 - Lecture Notes in Computer Science
SP - 175
EP - 194
BT - Decision and game theory for security
A2 - Zhu, Quanyan
A2 - Alpcan, Tansu
A2 - Panaousis, Emmanouil
A2 - et al,
PB - Springer
CY - Chem (CH)
T2 - 7th International Conference on Decision and Game Theory for Security
Y2 - 2 November 2016 through 4 November 2016
ER -