Share This Author
Privacy and rationality in individual decision making
This research suggests that consumers often lack enough information to make privacy-sensitive decisions and, even with sufficient information, are likely to trade off long-term privacy for short-term benefits.
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
An experiment in which self-reported privacy preferences of 171 participants were compared with their actual disclosing behavior during an online shopping episode, suggesting that current approaches to protect online users' privacy may face difficulties to do so effectively.
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information
The results show a clear preference for money over data across the vast majority of participants in both the protection and the release scenarios, even when the monetary advantage of releasing or not protecting in the fixed amount choice situations is very small.
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
- Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, T. Moore
- Computer ScienceFinancial Cryptography Workshops
- 3 March 2014
A series of game-theoretical models of competition between two pools of varying sizes find that pools have a greater incentive to attack large pools than small ones, and also observe that larger mining pools have more incentive to attacked than smaller ones.
Stopping spyware at the gate: a user study of privacy, notice and spyware
An ecological study of users installing five real world applications found that privacy and security become important factors when choosing between two applications with similar functionality, and that providing vague information in EULAs and short notices can create an unwarranted impression of increased security.
Secure or insure?: a game-theoretic analysis of information security games
In the weakest-target game, an interesting result is that, for almost all parameter settings, more effort is exerted at Nash equilibrium than at the social optimum, which may be attributed to the "strategic uncertainty" of players seeking to self-protect at just slightly above the lowest protection level.
An Empirical Study of Web Vulnerability Discovery Ecosystems
This paper collects publicly available data of two representative web vulnerability discovery ecosystems (Wooyun and HackerOne) and finds that both ecosystems include large and continuously growing white hat communities which have provided significant contributions to organizations from a wide range of business sectors.
Third-party apps on Facebook: privacy and the illusion of control
This research proposes two new interface designs for third-party apps' authentication dialogs to increase user control of apps' data access and restrict apps' publishing ability during the process of adding them to users' profiles, and alert users when their global privacy settings on Facebook are violated by apps.
Blue versus Red: Towards a Model of Distributed Security Attacks
We develop a two-sided multiplayer model of security in which attackers aim to deny service and defenders strategize to secure their assets. Attackers benefit from the successful compromise of target…
Uncertainty, Ambiguity and Privacy
Experimental evidence from a survey study is presented that demonstrates the impact of framing a marketing offer on participants’ willingness to accept when the consequences of the offer are uncertain and highly ambiguous.