In Inadvertent Disclosure — Information Leaks in the Extended EnterpriseEric Johnson and Scott Dynes study inadvertent data leaks of sensitive information personal and corporate through P2P file sharing, and also find that some users are explicitly searching for sensitive documents leaked through such mechanisms.
Vulnerability markets by Rainer Boehme provides a short survey of the whole field. An Experimental Study by Janice Tsai, Serge Egelman, Lorrie Cranor and Alessandro Acquisti shows that by making information about website privacy policies more accessible and salient it is possible to get shoppers to pay more attention to it and even to pay a premium for privacy.
In a second experiment, he ran an auction to see how much Android users would need to give an app access to GPS, contacts or photos; the only significant effect was on contacts. Is finding security holes a good idea? Markets can have a pooling equilibrium where everyone agrees on privacy but when this breaks you may move to a separating equilibrium where people prefer disclosure to prove they have not too much to hide.
Preliminary Evidence from Pilot Databy Alessandro Acquisti and Jens Grossklags, studies the specific problem of why people express a high preference for privacy when interviewed but reveal a much lower preference through their behaviour both online and offline.
First, who gets to collect and control transaction data? Modeling and their use in Managing Risk in ICT firmsAthanassios Yannacopoulos and colleagues explore insurance market failures due to asymmetric information, and provide a random tulity model for assessing insurance against privacy failures.
A Cost Analysis of Windows Vista Content Protection asks some hard questions about whether the new security mechanisms in Vista are worth it, and to whom. They produce a model in which neither instant disclosure not non-disclosure is optimal; without disclosure, software firms will have little incentive to fix bugs in later versions of their products.
That argued that downloads do not do significant harm to the music industry: Deworming the Internet looks at the incentives facing virus writers, software vendors and computer users. There was a short survey in Science in late ; a version for economists at Softint in January ; a version for security engineers at Crypto in August see slides ; a book chapter ; video of me giving a survey talk at De Montfort, and finally an archival journal version in Phil Trans Roy Soc A Aug In Cruel, Mean or Lavish?: We also have to consider a wider range of principals — dishonest, lazy, strategic, sensitive, and myopic — than in most of the markets that economists try to model.
There can also be cases where the security depends on the efforts of an individual champion. It did indeed, with a significant drop in burglaries for about 15 weeks. I showed how economic analysis explains many phenomena that security researchers had previously found to be pervasive but perplexing.
This page provides links to a number of key papersconferencesthe home pages of active researchers, relevant booksand other resources. Eric von Hippel shows how most of the innovations that spur economic growth are not anticipated by the manufacturers of the platforms on which they are based; the PC, for example, was conceived as an engine for running spreadsheets.
Having constructed a multi-stage game between a website and all ISPs, they used real data on web traffic to estimate incentives. Under certain assumptions, opt out is the socially preferred privacy regime:You're in a prime position for a job in sales--because an Economics Major, you really get the relationship between supply, demand, C Growth C Job security.
The economics of security is a hot and rapidly growing field of research.Jean Camp's bibliography, and job ads for security economists.
Job Security and Productivity: Evidence From Academics William Leung ∗ Department of Economics, University of California, Berkeley May 3, Abstract: How does job security inﬂuence.
Learn more about careers at Arizona Department of Economic Security and view our open positions. The extensive empirical macro- and micro-level evidence on the impact of job security provisions is largely inconclusive.
We argue that the weak evidence is a consequence of the weak power of. Economics and Job Security. Marris’ Model of Managerial Enterprise The goal of the firm in Marris’s model is the maximisation of the balanced rate ‘of growth (g) of the firm.Download