skip to main content
10.1145/3477911.3477918acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicctaConference Proceedingsconference-collections
research-article

Behavioral Economics Issues for Software Requirements Optimization for Personal Data Security and Privacy

Published:15 October 2021Publication History

ABSTRACT

The effects of psychological, cognitive, emotional, cultural and social factors on the decisions of users and service providers for online service delivery are important factors to take into consideration in designing software applications. Increasing preference of online service delivery is also raising concerns about personal data security and privacy. Hence, there is a need for optimally trading off ease of use and extra measures for ensuring data privacy and security issues. Within this context, behavioral economics is one of the major factors in determining outcomes and successes of underlying software applications. Although much research done on behavioral economics separately, however, behavioral economics is mostly unexplored in the field of software requirements engineering process. With the growing needs of personal data security and privacy concerns, the software community needs to adapt it to software requirements optimization to incorporate and prioritize requirements related to personal data security and privacy. In this study, our main objective is to explore the behavioral economics issues towards data security and privacy and adapt them into the software requirement process. We have proposed a score-based framework. The ultimate goal of this framework is to help companies maximize the benefit and minimize the cost of software products while adapting the data security and privacy requirements in the requirement engineering process.

References

  1. Linåker, J., Regnell, B. and Damian, D. 2019. A method for analyzing stakeholders’ influence on an open source software ecosystem's requirements engineering process. Requirements Engineering 25, 1, 115-130.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Waxer, C. 2021. Big data blues: The dangers of data mining. Computerworld. https://www.computerworld.com/article/2485493/enterprise-applications-big-data-blues-the-dangers-of-data-mining.html.Google ScholarGoogle Scholar
  3. Alkubaisy, Duaa & Cox, Karl & Mouratidis, Haris. (2019). Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements. 10.1109/RCIS.2019.8876999.Google ScholarGoogle Scholar
  4. O'Donoghue, Ted, and Matthew Rabin. 1999. "Doing It Now or Later." American Economic Review, 89 (1): 103-124. DOI: 10.1257/aer.89.1.103Google ScholarGoogle ScholarCross RefCross Ref
  5. Madrian, B. and Shea, D. 2001. The Power of Suggestion: Inertia in 401(k) Participation and Savings Behavior. The Quarterly Journal of Economics 116, 4, 1149-1187.Google ScholarGoogle ScholarCross RefCross Ref
  6. Egelman, S. 2021. Increasing Users' Cyber-Security Compliance by Reducing Present Bias | ICSI. Icsi.berkeley.edu. https://www.icsi.berkeley.edu/icsi/projects/privacy/reducing-present-bias.Google ScholarGoogle Scholar
  7. Present bias and the consequences of instant gratification. 2021. ING Think. https://think.ing.com/articles/what-is-present-bias-the-consequences-of-instant-gratification/.Google ScholarGoogle Scholar
  8. Risk aversion - Wikipedia. 2021. En.wikipedia.org. https://en.wikipedia.org/wiki/Risk_aversion.Google ScholarGoogle Scholar
  9. Risk aversion. 2021. Psychology Wiki. https://psychology.wikia.org/wiki/Risk_aversion.Google ScholarGoogle Scholar
  10. Frik, A. and Gaudeul, A. 2020. A measure of the implicit value of privacy under risk. Journal of Consumer Marketing 37, 4, 457-472.Google ScholarGoogle ScholarCross RefCross Ref
  11. Loss aversion - Wikipedia. 2021. En.wikipedia.org. https://en.wikipedia.org/wiki/Loss_aversion.Google ScholarGoogle Scholar
  12. Loss aversion - Biases & Heuristics | The Decision Lab. 2021. The Decision Lab. https://thedecisionlab.com/biases/loss-aversion/.Google ScholarGoogle Scholar
  13. Acquisti, A., Adjerid, I. and Balebako, R. 2017. Nudges for Privacy and Security. ACM Computing Surveys 50, 3, 1-41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Mental Accounting Definition. 2021. Investopedia. https://www.investopedia.com/terms/m/mentalaccounting.asp.Google ScholarGoogle Scholar
  15. 8 Examples of 'Mental Accounting' and How to Avoid Them. 2021. The College Investor. https://thecollegeinvestor.com/8748/examples-of-mental-accounting/.Google ScholarGoogle Scholar
  16. Milkman, K. and Beshears, J. 2009. Mental accounting and small windfalls: Evidence from an online grocer. Journal of Economic Behavior & Organization 71, 2, 384-394.Google ScholarGoogle ScholarCross RefCross Ref
  17. Status quo bias. 2021. BehavioralEconomics.com | The BE Hub. https://www.behavioraleconomics.com/resources/mini-encyclopedia-of-be/status-quo-bias/.Google ScholarGoogle Scholar
  18. Status Quo Bias Explained Perfectly with Apt Examples. 2021. Psychologenie. https://psychologenie.com/status-quo-bias-explained-with-examples.Google ScholarGoogle Scholar
  19. The Influence of Status Quo Bias on Novice Users’ Security Decisions: An Empirical Analysis – Konnect. 2021. Konnect.serene-risc.ca. https://konnect.serene-risc.ca/2021/01/07/the-influence-of-status-quo-bias-on-novice-users-security-decisions-an-empirical-analysis/.Google ScholarGoogle Scholar
  20. Hyperbolic discounting - Wikipedia. 2021. En.wikipedia.org. https://en.wikipedia.org/wiki/Hyperbolic_discounting.Google ScholarGoogle Scholar
  21. Acquisti, Alessandro & Grossklags, Jens. (2003). Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior.Google ScholarGoogle Scholar
  22. Chakraborty, A., Paranjape, B., Kakarla, S. and Ganguly, N. 2016. Stop Clickbait: Detecting and preventing clickbaits in online news media. 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).Google ScholarGoogle Scholar
  23. Sync, O. 2021. Clickbait is a Threat to Your Online Security | OnePointSync, LLC. OnePointSync, LLC.. https://www.onepointsync.com/clickbait-threat-online-security/.Google ScholarGoogle Scholar
  24. Reeson, Andrew & Dunstall, Simon. (2009). Behavioural Economics and Complex Decision-Making Implications for the Australian Tax and Transfer System.Google ScholarGoogle Scholar
  25. Allais, M. 1953. Le Comportement de l'Homme Rationnel devant le Risque: Critique des Postulats et Axiomes de l'Ecole Americaine. Econometrica 21, 4, 503.Google ScholarGoogle ScholarCross RefCross Ref
  26. Ryan, D. 2021. Satisficing Versus Optimizing: Making your Choice. Blog.SHRM.org. https://blog.shrm.org/blog/satisficing-versus-optimizing-making-your-choice.Google ScholarGoogle Scholar
  27. Gigerenzer, G. (2001). The adaptive toolbox. In G. Gigerenzer & R. Selten (Eds.), Bounded rationality: The adaptive toolbox (p. 37–50). The MIT Press.Google ScholarGoogle Scholar
  28. Bernheim, B., Della Vigna, S. and Laibson, D. Handbook of behavioral economics. .Google ScholarGoogle Scholar
  29. Bounded rationality - Wikipedia. 2021. En.wikipedia.org. https://en.wikipedia.org/wiki/Bounded_rationality.Google ScholarGoogle Scholar
  30.  Mauricio, D., & Wong, L. (1992-2015). New factors that affect the activities of the requirements elicitation process. Journal of Engineering Science and Technology. Journal of Engineering Science and Technology.Google ScholarGoogle Scholar
  31. Liao, H. (2013). Requirement elicitation based on value chain analysis.Google ScholarGoogle Scholar
  32. Shainesh, G. (2004). Understanding buyer behaviour in software services strategies for Indian firms. International Journal of Technology Management, 28(1), 118.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Behavioral Economics Issues for Software Requirements Optimization for Personal Data Security and Privacy
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICCTA '21: Proceedings of the 2021 7th International Conference on Computer Technology Applications
            July 2021
            103 pages
            ISBN:9781450390521
            DOI:10.1145/3477911

            Copyright © 2021 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 15 October 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited
          • Article Metrics

            • Downloads (Last 12 months)38
            • Downloads (Last 6 weeks)6

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format