On the Adoption of Privacy-enhancing Technologies

被引:0
|
作者
Caulfield, Tristan [1 ]
Ioannidis, Christos [2 ]
Pym, David [1 ]
机构
[1] UCL, London, England
[2] Aston Univ, Aston Business Sch, Birmingham, W Midlands, England
基金
英国工程与自然科学研究理事会;
关键词
ECONOMICS; CHOICE; MODEL;
D O I
10.1007/978-3-319-47413-7_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a model, based on the work of Brock and Durlauf, which looks at how agents make choices between competing technologies, as a framework for exploring aspects of the economics of the adoption of privacy-enhancing technologies. In order to formulate a model of decision-making among choices of technologies by these agents, we consider the following: context, the setting in which and the purpose for which a given technology is used; requirement, the level of privacy that the technology must provide for an agent to be willing to use the technology in a given context; belief, an agent's perception of the level of privacy provided by a given technology in a given context; and the relative value of privacy, how much an agent cares about privacy in this context and how willing an agent is to trade off privacy for other attributes. We introduce these concepts into the model, admitting heterogeneity among agents in order to capture variations in requirement, belief, and relative value in the population. We illustrate the model with two examples: the possible effects on the adoption of iOS devices being caused by the recent Apple-FBI case; and the recent revelations about the non-deletion of images on the adoption of Snapchat.
引用
收藏
页码:175 / 194
页数:20
相关论文
共 50 条
  • [1] Privacy-enhancing technologies
    Senicar, V
    Klobucar, T
    Jerman-Blazic, B
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 213 - 227
  • [2] Privacy-enhancing technologies for the Internet
    Goldberg, I
    Wagner, D
    Brewer, E
    [J]. IEEE COMPCON 97, PROCEEDINGS, 1997, : 103 - 109
  • [3] Practical Privacy-Enhancing Technologies
    Hajny, Jan
    Malina, Lukas
    Dzurenda, Petr
    [J]. 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 60 - 64
  • [4] Critical RFID Privacy-Enhancing Technologies
    Spiekermann, Sarah
    Evdokimov, Sergei
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (02) : 56 - 62
  • [5] Usage Patterns of Privacy-Enhancing Technologies
    Coopamootoo, Kovila P. L.
    [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1371 - 1390
  • [6] Privacy-enhancing technologies - approaches and development
    Senicar, V
    Jerman-Blazic, B
    Klobucar, T
    [J]. COMPUTER STANDARDS & INTERFACES, 2003, 25 (02) : 147 - 158
  • [7] Isolation in cloud computing and privacy-enhancing technologies: Suitability of privacy-enhancing technologies for separating data usage in business processes
    Sonehara N.
    Echizen I.
    Wohlgemuth S.
    [J]. Business & Information Systems Engineering, 2011, 3 (3) : 155 - 162
  • [8] A Review of the Privacy-Enhancing Technologies Software Market
    Polonetsky, Jules
    Sparapani, Tim
    [J]. IEEE SECURITY & PRIVACY, 2021, 19 (06) : 119 - 122
  • [9] Privacy-enhancing technologies for the world wide web
    Oppliger, R
    [J]. COMPUTER COMMUNICATIONS, 2005, 28 (16) : 1791 - 1797
  • [10] Isolation in Cloud Computing and Privacy-Enhancing Technologies
    Sonehara, Noboru
    Echizen, Isao
    Wohlgemuth, Sven
    [J]. BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2011, 3 (03) : 155 - 162