Abstract
We introduce a model for examining the factors that lead to the adoption of new encryption technologies. Building on the work of Brock and Durlauf, the model describes how agents make choices, in the presence of social interaction, between competing technologies given their relative cost, functionality, and usability. We apply the model to examples about the adoption of encryption in communication (email and messaging) and storage technologies (self-encrypting drives) and also consider our model’s predictions for the evolution of technology adoption over time.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Brock, W.A., Durlauf, S.N.: Discrete choice with social interactions. Rev. Econ. Stud. 68(2), 235–260 (2001)
Google Online Security Blog: Making End-to-End Encryption Easier to Use (2014). http://googleonlinesecurity.blogspot.co.uk/2014/06/making-end-to-end-encryption-easier-to.html. Visited 20 Sep 2015
Ioannidis, C., Pym, D., Williams, J.: Investments and trade-offs in the economics of information security. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 148–166. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03549-4_9
Keeney, R.L., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Trade-offs. Wiley, Hoboken (1976)
Keybase (2015). https://keybase.io/. Visited 20 Sep 2015
OpenPGP.org (2015). http://www.openpgp.org. Visited 30 Sep 2015
Shambare, R.: The adoption of WhatsApp: breaking the vicious cycle of technological poverty in South Africa. J. Econ. Behav. Stud. 6(7), 542–550 (2014)
SKS Keyservers: History of Number of OpenPGP Keys (2015). https://sks-keyservers.net/status/key_development.php. Visited 30 Sep 2015
The Guardian: Snowden Implores Hackers to Focus on Protecting Users’ Rights (2014). http://www.theguardian.com/technology/2014/jul/21/edward-snowden-hackers-encryption-patriot. Visited 7 Oct 2015
The julia language (2015). http://julialang.org/. Visited 30 Sep 2015
User-Focused Security: End-to-End Encryption Extension for Yahoo Mail (2015). http://yahoo.tumblr.com/post/113708033335/user-focused-security-end-to-end-encryption. Visited 30 Sep 2015
Whitten, A., Tygar, J.D.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Proceedings 8th Conference on USENIX Security Symposium, vol. 8, SSYM 1999, pp. 14–14. USENIX Association, Berkeley (1999)
Ozment, A., Schechter, S.E.: Bootstrapping the adoption of internet security protocols. In: WEIS (2006). http://www.econinfosec.org/archive/weis2006/docs/46.pdf. Visited 02 Jan 2016
Rosasco, N., Larochelle, D.: How and why more secure technologies succeed in legacy markets: lessons from the success of SSH. In: Jean Camp, L., Lewis, S. (eds.) Economics of Information Security, pp. 247–254. Kluwer, Boston (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 International Financial Cryptography Association
About this paper
Cite this paper
Caulfield, T., Ioannidis, C., Pym, D. (2017). Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper). In: Grossklags, J., Preneel, B. (eds) Financial Cryptography and Data Security. FC 2016. Lecture Notes in Computer Science(), vol 9603. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-54970-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-54970-4_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-54969-8
Online ISBN: 978-3-662-54970-4
eBook Packages: Computer ScienceComputer Science (R0)