Security When People Matter: Structuring Incentives For User Behavior
dc.contributor.author | Wash, Rick | |
dc.contributor.author | MacKie-Mason, Jeffrey K. | |
dc.date.accessioned | 2007-09-18T18:09:36Z | |
dc.date.available | 2007-09-18T18:09:36Z | |
dc.date.issued | 2007 | |
dc.identifier.citation | International Conference on Electronic Commerce (ICEC'07), Minneapolis, MN, 19-22 August 2007. <http://hdl.handle.net/2027.42/55773> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/55773 | |
dc.description.abstract | Humans are “smart components” in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives provided to induce desired behavior. Sometimes these incentives are properly aligned, and the humans don’t represent a vulnerability. But often, a misalignment of incentives causes a weakness in the system that can be exploited by clever attackers. Incentive-centered design tools help us understand these problems, and provide design principles to alleviate them. We describe incentive-centered design and some tools it provides. We provide a number of examples of security problems for which Incentive Centered Design might be helpful. We elaborate with a general screening model that offers strong design principles for a class of security problems. | en_US |
dc.format.extent | 274868 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en_US | en_US |
dc.title | Security When People Matter: Structuring Incentives For User Behavior | en_US |
dc.type | Article | en_US |
dc.subject.hlbsecondlevel | Information and Library Science | |
dc.subject.hlbtoplevel | Social Sciences | |
dc.contributor.affiliationum | Information, School of | en_US |
dc.contributor.affiliationumcampus | Ann Arbor | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/55773/1/icec702w-wash.pdf | en_US |
dc.owningcollname | Information, School of (SI) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.