A partial equilibrium view on security and privacy
Purpose - This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level.Design methodology approach - The methodology is ported from the discipline of Macroeconomics, and applied to the information security and...
Saved in:
Published in: | Information management & computer security Vol. 16; no. 1; pp. 74 - 83 |
---|---|
Main Authors: | , |
Format: | Journal Article |
Language: | English |
Published: |
Bradford
Emerald Group Publishing Limited
21-03-2008
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Purpose - This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level.Design methodology approach - The methodology is ported from the discipline of Macroeconomics, and applied to the information security and privacy domain. The methodology adopted is the so-called "cross methodology" which claims ownership of the well-known supply demand market equilibrium exercise.Findings - Early evaluation reveals that this is a potentially very effective tool in understanding societal behaviour and position towards information security and privacy and therefore makes this a suitable tool for investigating and exploring scenarios that can assist in policy making.Originality value - Up to date, research on the economics of security and privacy has been primarily focusing on a micro level. The main contribution of this paper is a methodology for investigating privacy and security on a macro level. We believe that our approach in undertaking this research is new and looking at the issues and relationships between security and privacy at a macro level, gives a better understanding of the problems at hand and how to resolve them.Practical implications - The proposed tool may increase the efficiency of policy making and planning as it enables the policy makers on a governmental and strategic level to run scenarios in order to investigate the effect of their decisions (for example, an introduction of a stricter law relating to computer misuse) to the delicate balance of security and privacy. |
---|---|
Bibliography: | filenameID:0460160106 href:09685220810862760.pdf original-pdf:0460160106.pdf istex:61405D19FED31EBEA257077DA1AC311E95085E15 ark:/67375/4W2-C4FF2SXB-C ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ISSN: | 0968-5227 2056-4961 1758-5805 2056-497X |
DOI: | 10.1108/09685220810862760 |