Skip to main content

Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)

  • Conference paper
  • First Online:
  • 2855 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9603))

Abstract

We introduce a model for examining the factors that lead to the adoption of new encryption technologies. Building on the work of Brock and Durlauf, the model describes how agents make choices, in the presence of social interaction, between competing technologies given their relative cost, functionality, and usability. We apply the model to examples about the adoption of encryption in communication (email and messaging) and storage technologies (self-encrypting drives) and also consider our model’s predictions for the evolution of technology adoption over time.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Brock, W.A., Durlauf, S.N.: Discrete choice with social interactions. Rev. Econ. Stud. 68(2), 235–260 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  2. Google Online Security Blog: Making End-to-End Encryption Easier to Use (2014). http://googleonlinesecurity.blogspot.co.uk/2014/06/making-end-to-end-encryption-easier-to.html. Visited 20 Sep 2015

  3. Ioannidis, C., Pym, D., Williams, J.: Investments and trade-offs in the economics of information security. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 148–166. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03549-4_9

    Chapter  Google Scholar 

  4. Keeney, R.L., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Trade-offs. Wiley, Hoboken (1976)

    MATH  Google Scholar 

  5. Keybase (2015). https://keybase.io/. Visited 20 Sep 2015

  6. OpenPGP.org (2015). http://www.openpgp.org. Visited 30 Sep 2015

  7. Shambare, R.: The adoption of WhatsApp: breaking the vicious cycle of technological poverty in South Africa. J. Econ. Behav. Stud. 6(7), 542–550 (2014)

    Google Scholar 

  8. SKS Keyservers: History of Number of OpenPGP Keys (2015). https://sks-keyservers.net/status/key_development.php. Visited 30 Sep 2015

  9. The Guardian: Snowden Implores Hackers to Focus on Protecting Users’ Rights (2014). http://www.theguardian.com/technology/2014/jul/21/edward-snowden-hackers-encryption-patriot. Visited 7 Oct 2015

  10. The julia language (2015). http://julialang.org/. Visited 30 Sep 2015

  11. User-Focused Security: End-to-End Encryption Extension for Yahoo Mail (2015). http://yahoo.tumblr.com/post/113708033335/user-focused-security-end-to-end-encryption. Visited 30 Sep 2015

  12. Whitten, A., Tygar, J.D.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Proceedings 8th Conference on USENIX Security Symposium, vol. 8, SSYM 1999, pp. 14–14. USENIX Association, Berkeley (1999)

    Google Scholar 

  13. Ozment, A., Schechter, S.E.: Bootstrapping the adoption of internet security protocols. In: WEIS (2006). http://www.econinfosec.org/archive/weis2006/docs/46.pdf. Visited 02 Jan 2016

  14. Rosasco, N., Larochelle, D.: How and why more secure technologies succeed in legacy markets: lessons from the success of SSH. In: Jean Camp, L., Lewis, S. (eds.) Economics of Information Security, pp. 247–254. Kluwer, Boston (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tristan Caulfield .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 International Financial Cryptography Association

About this paper

Cite this paper

Caulfield, T., Ioannidis, C., Pym, D. (2017). Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper). In: Grossklags, J., Preneel, B. (eds) Financial Cryptography and Data Security. FC 2016. Lecture Notes in Computer Science(), vol 9603. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-54970-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-54970-4_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-54969-8

  • Online ISBN: 978-3-662-54970-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics