Computers at risk: safe computing in the information age
Computers at risk: safe computing in the information age
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
Why Information Security is Hard-An Economic Perspective
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Market for Software Vulnerabilities? Think Again
Management Science
Password security: an empirical study
Journal of Management Information Systems
Network Software Security and User Incentives
Management Science
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge
IEEE Transactions on Software Engineering
International Journal of Electronic Commerce
An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price
IEEE Transactions on Software Engineering
An economic mechanism for better Internet security
Decision Support Systems
Studying users' computer security behavior: A health belief perspective
Decision Support Systems
Optimal Policy for Software Vulnerability Disclosure
Management Science
Information Systems Research
A "nutrition label" for privacy
Proceedings of the 5th Symposium on Usable Privacy and Security
Teaching Johnny not to fall for phish
ACM Transactions on Internet Technology (TOIT)
Design of portable biometric authenticators - energy, performance, and security tradeoffs
IEEE Transactions on Consumer Electronics
Research on purified internet environment for college students
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Cloud Computing Services: Theoretical Foundations of Ethical and Entrepreneurial Adoption Behaviour
International Journal of Cloud Applications and Computing
Hi-index | 0.00 |
This paper demonstrates that consumers make incorrect inferences about security/convenience tradeoff. We find the evidence that consumers tend to infer unobservable security quality from observable convenience and that their inferences are not always correct. In four studies, we examine user perceptions of wireless Internet service quality, with an aim to understand consumers' irrational choice of a dominated product over a dominant option. Our results indicate that consumers make inference in security from convenience using a zero-sum heuristic and that they believe in improving security in return for losing convenience. In a choice setting, we empirically show that security perception, as well as convenience, influences consumers' product choices, contradicting the common view of existing literature that convenience is the sole driver of consumer choice. Our findings show that spontaneous and extensive education of consumers about security makes a modest impact on their inference making.