On the adoption of privacy-enhancing technologies

Tristan Caulfield*, Christos Ioannidis, David Pym

*Corresponding author for this work

Research output: Chapter in Book/Published conference outputConference publication

Abstract

We propose a model, based on the work of Brock and Durlauf, which looks at how agents make choices between competing technologies, as a framework for exploring aspects of the economics of the adoption of privacy-enhancing technologies. In order to formulate a model of decision-making among choices of technologies by these agents, we consider the following: context, the setting in which and the purpose for which a given technology is used; requirement, the level of privacy that the technology must provide for an agent to be willing to use the technology in a given context; belief, an agent’s perception of the level of privacy provided by a given technology in a given context; and the relative value of privacy, how much an agent cares about privacy in this context and how willing an agent is to trade off privacy for other attributes. We introduce these concepts into the model, admitting heterogeneity among agents in order to capture variations in requirement, belief, and relative value in the population. We illustrate the model with two examples: the possible effects on the adoption of iOS devices being caused by the recent Apple–FBI case; and the recent revelations about the non-deletion of images on the adoption of Snapchat.

Original languageEnglish
Title of host publicationDecision and game theory for security
Subtitle of host publication7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings
EditorsQuanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, et al
Place of PublicationChem (CH)
PublisherSpringer
Pages175-194
Number of pages20
ISBN (Electronic)978-3-319-47413-7
ISBN (Print)978-3-319-47412-0
DOIs
Publication statusE-pub ahead of print - 5 Oct 2016
Event7th International Conference on Decision and Game Theory for Security - New York, United States
Duration: 2 Nov 20164 Nov 2016

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume9996
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference7th International Conference on Decision and Game Theory for Security
Abbreviated titleGameSec 2016
CountryUnited States
CityNew York
Period2/11/164/11/16

Bibliographical note

Copyright © Springer International Publishing AG 2016. The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-47413-7_1

Fingerprint

Dive into the research topics of 'On the adoption of privacy-enhancing technologies'. Together they form a unique fingerprint.

Cite this