Showing 1 - 10 of 10
Persistent link: https://www.econbiz.de/10011460552
Persistent link: https://www.econbiz.de/10012493788
In recent years, many lawsuits have been filed by individuals seeking legal redress for harms caused by the loss or theft of their personal information. However, very little is known about the drivers, mechanics, and outcomes of those lawsuits, making it difficult to assess the effectiveness of...
Persistent link: https://www.econbiz.de/10014174056
In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting “data breach disclosure laws” that require firms to notify...
Persistent link: https://www.econbiz.de/10014214642
Despite experts agreeing on many security best practices, there remains a gap between their advice and users’ behavior. One example is the low adoption of secure mobile payments in the United States, despite widespread prevalence of credit and debit card fraud. Prior work has proposed nudging...
Persistent link: https://www.econbiz.de/10014079247
Privacy and security tools can help users protect themselves online. Unfortunately, people are often unaware of such tools, and have potentially harmful misconceptions about the protections provided by the tools they know about. Effectively encouraging the adoption of privacy tools requires...
Persistent link: https://www.econbiz.de/10014079376
Economics offer different but complementary approaches to understanding privacy and security. For this inaugural contribution to the new In Our Orbit department, I was asked to explain briefly their methodological differences and similarities, and why they matter in our thinking about security...
Persistent link: https://www.econbiz.de/10012896390
Persistent link: https://www.econbiz.de/10009525586
When card data is exposed in a data breach but has not yet been used to attempt fraud, the overall social costs of that breach depend on whether the financial institutions that issued those cards immediately cancel them and issue new cards or instead wait until fraud is attempted. This article...
Persistent link: https://www.econbiz.de/10013310831
By allowing individuals to be permanently connected to the Internet, mobile devices ease the way information can be accessed and shared online, but also raise novel privacy challenges for end users. Recent behavioral research on “soft” or “asymmetric” paternalism has begun exploring ways...
Persistent link: https://www.econbiz.de/10014242886