摘要 :
Apart from the technological perspective of security in mobile devices and applications, the economic perspective has been increasingly attracting the academic and business interest. This paper aims to investigate the perceptions ...
展开
Apart from the technological perspective of security in mobile devices and applications, the economic perspective has been increasingly attracting the academic and business interest. This paper aims to investigate the perceptions of mobile users about the economic importance of security breaches. Instead of considering mobile users as a whole, they were examined as distinct user types based on Brandtz'g's mobile user typology. These types are: (1) sporadic users, (2) socializers, (3) entertainment type users, (4) instrumental users, and (5) advanced users. In the context of the research part of this study, a survey was conducted in a sample of smartphone and tablet owners. The five user types were identified in our sample by setting specific classification rules, based on the frequency and the variety of mobile services used. Mobile users' perceptions were assessed in terms of ten different kinds of security breaches. The findings indicated that the user types perceive differently the economic importance of security breaches, implying that the design of security policies and/or the development of tools totally for the community of users are not the appropriate practices. Our research could contribute to the knowledge considering mobile users and their perceptions about security breaches. Mobile content providers and developers could use the findings of this study to evaluate and redesign, if needed, their current strategies so as to meet users' needs regarding security.
收起
摘要 :
How well does social security jointly insure lifetime earnings risk and longevity risk? We show that the answer to this fundamental question depends critically on the nature of economic mobility across generations. To show this re...
展开
How well does social security jointly insure lifetime earnings risk and longevity risk? We show that the answer to this fundamental question depends critically on the nature of economic mobility across generations. To show this result, we compare two economies. In our first economy, inheritances are uncorrelated with wage earnings, implying that an individual's earnings are unrelated to the wages and asset holdings of their predecessors. In our second economy, there is no such economic mobility; instead, low-wage earners are stuck receiving small inheritances from their low-wage ancestral line, while high-wage earners enjoy large inheritances from their high-wage ancestral line. We make these comparisons in a variety of settings including both fixed and endogenous factor prices. Social security causes large welfare losses in the first economy but can generate large welfare gains in the second economy. Given the apparent limits to economic mobility in the USA, the welfare gains from collective risk sharing through social security are potentially large.
收起
摘要 :
Botnet, a network of compromised computers controlled by botmasters, can perform various forms ofmalicious attacks and has emerged as one of the top security problems yet to be solved. Traditionally, botmasters have been focusing ...
展开
Botnet, a network of compromised computers controlled by botmasters, can perform various forms ofmalicious attacks and has emerged as one of the top security problems yet to be solved. Traditionally, botmasters have been focusing on herding computers. As mobile computing devices such as smart phones and tablets are becoming increasingly popular, there are more targets exposed to hacking risks. While technical approaches have so far received limited results, we study the botnet problem from an alternative angle, i.e., economic perspectives of botnet industry. In this paper, we play devil's advocate and think from the perspective of botmasters, i.e., how botmasters can evolve to maximize their profits in response to changing technologies. We adopt the concept of portfolio management, in which botmasters run their business through maintaining an optimal portfolio of PC and mobile devices to diversify risk and maximize profits of entire botnet industry. On the other hand, users may also maximize their utility function by keeping an optimal portfolio of network activities and data on their computers and mobile devices. The strategic playing by botmasters and users is modeled in a game theoretical framework. Various equilibrium solutions are discussed in terms of their welfare implications to botmasters and users. Understanding the optimal portfolio choice by botmasters provides insight for defenders, especially with evolving and diversified computing environments.
收起
摘要 :
Stealing-reality attacks attempt to steal social network and behavioral information through data collection and inference techniques, making them more dangerous than other types of identity theft.
摘要 :
After more than two decades of hype, computing and communication technologies are finally converging. Java-enabled cell phones run a host of powerful applications including mobile Internet access, while many notebook computers off...
展开
After more than two decades of hype, computing and communication technologies are finally converging. Java-enabled cell phones run a host of powerful applications including mobile Internet access, while many notebook computers offer high-speed wireless connectivity as a standard feature. The big decision when purchasing a PDA is whether to get integrated cellular service or Wi-Fi capability. Location-based services are emerging as the next killer app in personal wireless devices, but there are few safeguards on location privacy. In fact, the demand for improved public safety is pushing regulation in the opposite direction. Today, when a person reports an emergency from a landline phone by dialing 911 in the United States or 112 in Europe, the system displays the caller's phone number and address to the dispatcher. The US Federal Communications Commission has mandated that, by December 2005, all cellular carriers be able to identify the location of emergency callers using mobile phones to within 50 to 100 meters. However, how cellular carriers and other businesses will use this capability remains open to question. The article looks at some of the areas this capability affects, including: privacy risks; economic damages; location-based spam; intermittent connectivity; user interfaces; network privacy; and privacy protection.
收起
摘要 :
This paper examines the portability of star security analysts' performance. Star analysts who switched employers experienced an immediate decline in performance that persisted for at least five years. This decline was most pronoun...
展开
This paper examines the portability of star security analysts' performance. Star analysts who switched employers experienced an immediate decline in performance that persisted for at least five years. This decline was most pronounced among star analysts who moved to firms with lesser capabilities and those who moved solo, without other team members. Star analysts who moved between two firms with equivalent capabilities also exhibited a drop in performance, but only for two years. Those who switched to firms with better capabilities and those who moved with other team members exhibited no significant decline in short-term or long-term performance. These findings suggest that firm-specific skills and firms' capabilities both play important roles in star analysts' performance. In addition, we find that firms that hire star analysts from competitors with better capabilities suffered more extreme negative stock-market reactions than those that hire from comparable or lesser firms. These findings suggest that hiring stars may be perceived as value destroying and may not improve a firm's competitive advantage.
收起