A partial equilibrium view on security and privacy

Vasilios Katos, Ahmed Patel

    Research output: Contribution to journalArticle

    10 Citations (Scopus)

    Abstract

    Purpose - This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level. Design/methodology/approach - The methodology is ported from the discipline of Macroeconomics, and applied to the information security and privacy domain. The methodology adopted is the so-called "cross methodology" which claims ownership of the well-known supply/demand market equilibrium exercise. Findings - Early evaluation reveals that this is a potentially very effective tool in understanding societal behaviour and position towards information security and privacy and therefore makes this a suitable tool for investigating and exploring scenarios that can assist in policy making. Originality/value - Up to date, research on the economics of security and privacy has been primarily focusing on a micro level. The main contribution of this paper is a methodology for investigating privacy and security on a macro level. We believe that our approach in undertaking this research is new and looking at the issues and relationships between security and privacy at a macro level, gives a better understanding of the problems at hand and how to resolve them. Practical implications - The proposed tool may increase the efficiency of policy making and planning as it enables the policy makers on a governmental and strategic level to run scenarios in order to investigate the effect of their decisions (for example, an introduction of a stricter law relating to computer misuse) to the delicate balance of security and privacy.

    Original languageEnglish
    Pages (from-to)74-83
    Number of pages10
    JournalInformation Management and Computer Security
    Volume16
    Issue number1
    DOIs
    Publication statusPublished - 2008

    Fingerprint

    Macros
    Security of data
    Planning
    Economics
    Privacy
    Partial equilibrium
    Methodology
    Information privacy
    Politicians
    Information security
    Policy making
    Scenarios

    Keywords

    • Business policy
    • Data security
    • Privacy

    ASJC Scopus subject areas

    • Software
    • Engineering (miscellaneous)
    • Industrial and Manufacturing Engineering

    Cite this

    A partial equilibrium view on security and privacy. / Katos, Vasilios; Patel, Ahmed.

    In: Information Management and Computer Security, Vol. 16, No. 1, 2008, p. 74-83.

    Research output: Contribution to journalArticle

    Katos, Vasilios ; Patel, Ahmed. / A partial equilibrium view on security and privacy. In: Information Management and Computer Security. 2008 ; Vol. 16, No. 1. pp. 74-83.
    @article{843971e4aa5d47e29e84dc226f27b2eb,
    title = "A partial equilibrium view on security and privacy",
    abstract = "Purpose - This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level. Design/methodology/approach - The methodology is ported from the discipline of Macroeconomics, and applied to the information security and privacy domain. The methodology adopted is the so-called {"}cross methodology{"} which claims ownership of the well-known supply/demand market equilibrium exercise. Findings - Early evaluation reveals that this is a potentially very effective tool in understanding societal behaviour and position towards information security and privacy and therefore makes this a suitable tool for investigating and exploring scenarios that can assist in policy making. Originality/value - Up to date, research on the economics of security and privacy has been primarily focusing on a micro level. The main contribution of this paper is a methodology for investigating privacy and security on a macro level. We believe that our approach in undertaking this research is new and looking at the issues and relationships between security and privacy at a macro level, gives a better understanding of the problems at hand and how to resolve them. Practical implications - The proposed tool may increase the efficiency of policy making and planning as it enables the policy makers on a governmental and strategic level to run scenarios in order to investigate the effect of their decisions (for example, an introduction of a stricter law relating to computer misuse) to the delicate balance of security and privacy.",
    keywords = "Business policy, Data security, Privacy",
    author = "Vasilios Katos and Ahmed Patel",
    year = "2008",
    doi = "10.1108/09685220810862760",
    language = "English",
    volume = "16",
    pages = "74--83",
    journal = "Information and Computer Security",
    issn = "2056-4961",
    publisher = "Emerald Group Publishing Ltd.",
    number = "1",

    }

    TY - JOUR

    T1 - A partial equilibrium view on security and privacy

    AU - Katos, Vasilios

    AU - Patel, Ahmed

    PY - 2008

    Y1 - 2008

    N2 - Purpose - This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level. Design/methodology/approach - The methodology is ported from the discipline of Macroeconomics, and applied to the information security and privacy domain. The methodology adopted is the so-called "cross methodology" which claims ownership of the well-known supply/demand market equilibrium exercise. Findings - Early evaluation reveals that this is a potentially very effective tool in understanding societal behaviour and position towards information security and privacy and therefore makes this a suitable tool for investigating and exploring scenarios that can assist in policy making. Originality/value - Up to date, research on the economics of security and privacy has been primarily focusing on a micro level. The main contribution of this paper is a methodology for investigating privacy and security on a macro level. We believe that our approach in undertaking this research is new and looking at the issues and relationships between security and privacy at a macro level, gives a better understanding of the problems at hand and how to resolve them. Practical implications - The proposed tool may increase the efficiency of policy making and planning as it enables the policy makers on a governmental and strategic level to run scenarios in order to investigate the effect of their decisions (for example, an introduction of a stricter law relating to computer misuse) to the delicate balance of security and privacy.

    AB - Purpose - This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level. Design/methodology/approach - The methodology is ported from the discipline of Macroeconomics, and applied to the information security and privacy domain. The methodology adopted is the so-called "cross methodology" which claims ownership of the well-known supply/demand market equilibrium exercise. Findings - Early evaluation reveals that this is a potentially very effective tool in understanding societal behaviour and position towards information security and privacy and therefore makes this a suitable tool for investigating and exploring scenarios that can assist in policy making. Originality/value - Up to date, research on the economics of security and privacy has been primarily focusing on a micro level. The main contribution of this paper is a methodology for investigating privacy and security on a macro level. We believe that our approach in undertaking this research is new and looking at the issues and relationships between security and privacy at a macro level, gives a better understanding of the problems at hand and how to resolve them. Practical implications - The proposed tool may increase the efficiency of policy making and planning as it enables the policy makers on a governmental and strategic level to run scenarios in order to investigate the effect of their decisions (for example, an introduction of a stricter law relating to computer misuse) to the delicate balance of security and privacy.

    KW - Business policy

    KW - Data security

    KW - Privacy

    UR - http://www.scopus.com/inward/record.url?scp=40949151220&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=40949151220&partnerID=8YFLogxK

    U2 - 10.1108/09685220810862760

    DO - 10.1108/09685220810862760

    M3 - Article

    AN - SCOPUS:40949151220

    VL - 16

    SP - 74

    EP - 83

    JO - Information and Computer Security

    JF - Information and Computer Security

    SN - 2056-4961

    IS - 1

    ER -