ABSTRACT
The effects of psychological, cognitive, emotional, cultural and social factors on the decisions of users and service providers for online service delivery are important factors to take into consideration in designing software applications. Increasing preference of online service delivery is also raising concerns about personal data security and privacy. Hence, there is a need for optimally trading off ease of use and extra measures for ensuring data privacy and security issues. Within this context, behavioral economics is one of the major factors in determining outcomes and successes of underlying software applications. Although much research done on behavioral economics separately, however, behavioral economics is mostly unexplored in the field of software requirements engineering process. With the growing needs of personal data security and privacy concerns, the software community needs to adapt it to software requirements optimization to incorporate and prioritize requirements related to personal data security and privacy. In this study, our main objective is to explore the behavioral economics issues towards data security and privacy and adapt them into the software requirement process. We have proposed a score-based framework. The ultimate goal of this framework is to help companies maximize the benefit and minimize the cost of software products while adapting the data security and privacy requirements in the requirement engineering process.
- Linåker, J., Regnell, B. and Damian, D. 2019. A method for analyzing stakeholders’ influence on an open source software ecosystem's requirements engineering process. Requirements Engineering 25, 1, 115-130.Google ScholarDigital Library
- Waxer, C. 2021. Big data blues: The dangers of data mining. Computerworld. https://www.computerworld.com/article/2485493/enterprise-applications-big-data-blues-the-dangers-of-data-mining.html.Google Scholar
- Alkubaisy, Duaa & Cox, Karl & Mouratidis, Haris. (2019). Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements. 10.1109/RCIS.2019.8876999.Google Scholar
- O'Donoghue, Ted, and Matthew Rabin. 1999. "Doing It Now or Later." American Economic Review, 89 (1): 103-124. DOI: 10.1257/aer.89.1.103Google ScholarCross Ref
- Madrian, B. and Shea, D. 2001. The Power of Suggestion: Inertia in 401(k) Participation and Savings Behavior. The Quarterly Journal of Economics 116, 4, 1149-1187.Google ScholarCross Ref
- Egelman, S. 2021. Increasing Users' Cyber-Security Compliance by Reducing Present Bias | ICSI. Icsi.berkeley.edu. https://www.icsi.berkeley.edu/icsi/projects/privacy/reducing-present-bias.Google Scholar
- Present bias and the consequences of instant gratification. 2021. ING Think. https://think.ing.com/articles/what-is-present-bias-the-consequences-of-instant-gratification/.Google Scholar
- Risk aversion - Wikipedia. 2021. En.wikipedia.org. https://en.wikipedia.org/wiki/Risk_aversion.Google Scholar
- Risk aversion. 2021. Psychology Wiki. https://psychology.wikia.org/wiki/Risk_aversion.Google Scholar
- Frik, A. and Gaudeul, A. 2020. A measure of the implicit value of privacy under risk. Journal of Consumer Marketing 37, 4, 457-472.Google ScholarCross Ref
- Loss aversion - Wikipedia. 2021. En.wikipedia.org. https://en.wikipedia.org/wiki/Loss_aversion.Google Scholar
- Loss aversion - Biases & Heuristics | The Decision Lab. 2021. The Decision Lab. https://thedecisionlab.com/biases/loss-aversion/.Google Scholar
- Acquisti, A., Adjerid, I. and Balebako, R. 2017. Nudges for Privacy and Security. ACM Computing Surveys 50, 3, 1-41.Google ScholarDigital Library
- Mental Accounting Definition. 2021. Investopedia. https://www.investopedia.com/terms/m/mentalaccounting.asp.Google Scholar
- 8 Examples of 'Mental Accounting' and How to Avoid Them. 2021. The College Investor. https://thecollegeinvestor.com/8748/examples-of-mental-accounting/.Google Scholar
- Milkman, K. and Beshears, J. 2009. Mental accounting and small windfalls: Evidence from an online grocer. Journal of Economic Behavior & Organization 71, 2, 384-394.Google ScholarCross Ref
- Status quo bias. 2021. BehavioralEconomics.com | The BE Hub. https://www.behavioraleconomics.com/resources/mini-encyclopedia-of-be/status-quo-bias/.Google Scholar
- Status Quo Bias Explained Perfectly with Apt Examples. 2021. Psychologenie. https://psychologenie.com/status-quo-bias-explained-with-examples.Google Scholar
- The Influence of Status Quo Bias on Novice Users’ Security Decisions: An Empirical Analysis – Konnect. 2021. Konnect.serene-risc.ca. https://konnect.serene-risc.ca/2021/01/07/the-influence-of-status-quo-bias-on-novice-users-security-decisions-an-empirical-analysis/.Google Scholar
- Hyperbolic discounting - Wikipedia. 2021. En.wikipedia.org. https://en.wikipedia.org/wiki/Hyperbolic_discounting.Google Scholar
- Acquisti, Alessandro & Grossklags, Jens. (2003). Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior.Google Scholar
- Chakraborty, A., Paranjape, B., Kakarla, S. and Ganguly, N. 2016. Stop Clickbait: Detecting and preventing clickbaits in online news media. 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).Google Scholar
- Sync, O. 2021. Clickbait is a Threat to Your Online Security | OnePointSync, LLC. OnePointSync, LLC.. https://www.onepointsync.com/clickbait-threat-online-security/.Google Scholar
- Reeson, Andrew & Dunstall, Simon. (2009). Behavioural Economics and Complex Decision-Making Implications for the Australian Tax and Transfer System.Google Scholar
- Allais, M. 1953. Le Comportement de l'Homme Rationnel devant le Risque: Critique des Postulats et Axiomes de l'Ecole Americaine. Econometrica 21, 4, 503.Google ScholarCross Ref
- Ryan, D. 2021. Satisficing Versus Optimizing: Making your Choice. Blog.SHRM.org. https://blog.shrm.org/blog/satisficing-versus-optimizing-making-your-choice.Google Scholar
- Gigerenzer, G. (2001). The adaptive toolbox. In G. Gigerenzer & R. Selten (Eds.), Bounded rationality: The adaptive toolbox (p. 37–50). The MIT Press.Google Scholar
- Bernheim, B., Della Vigna, S. and Laibson, D. Handbook of behavioral economics. .Google Scholar
- Bounded rationality - Wikipedia. 2021. En.wikipedia.org. https://en.wikipedia.org/wiki/Bounded_rationality.Google Scholar
- Mauricio, D., & Wong, L. (1992-2015). New factors that affect the activities of the requirements elicitation process. Journal of Engineering Science and Technology. Journal of Engineering Science and Technology.Google Scholar
- Liao, H. (2013). Requirement elicitation based on value chain analysis.Google Scholar
- Shainesh, G. (2004). Understanding buyer behaviour in software services strategies for Indian firms. International Journal of Technology Management, 28(1), 118.Google ScholarCross Ref
Index Terms
- Behavioral Economics Issues for Software Requirements Optimization for Personal Data Security and Privacy
Recommendations
Enhanced Misuse Cases for Prioritization of Security Requirements
ICIME 2017: Proceedings of the 9th International Conference on Information Management and EngineeringNowadays, it is impossible to ignore the implementation of security features in information systems since they manage important assets that are critical for the business processes of organizations. In this aspect, there have been several researches for ...
An Effective Requirement Engineering Process Model for Software Development and Requirements Management
ARTCOM '10: Proceedings of the 2010 International Conference on Advances in Recent Technologies in Communication and ComputingRequirement engineering is the most effective phase of software development process. It aims to collect good requirements from stakeholders in the right way. It is important for every organization to develop quality software products that can satisfy ...
A Suggested Framework for Software Requirements Classification
UKSIM '15: Proceedings of the 2015 17th UKSIM-AMSS International Conference on Modelling and SimulationSoftware requirements refer to the description of the desired services that the system should provide, which reflect the needs of stakeholders. These requirements could be classified in different ways depending on the software itself and the domain in ...
Comments