An algorithmic framework for performing collaborative filtering
Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval
Designing trust into online experiences
Communications of the ACM
Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Eigentaste: A Constant Time Collaborative Filtering Algorithm
Information Retrieval
Revised Papers from the 8th International Workshop on Security Protocols
Certificate-based authorization policy in a PKI environment
ACM Transactions on Information and System Security (TISSEC)
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Proceedings of the 2004 ACM workshop on Rapid malcode
The Economics of Resisting Censorship
IEEE Security and Privacy
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Communications of the ACM
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Financial Cryptography and Data Security
Seeing-Is-Believing: using camera phones for human-verifiable authentication
International Journal of Security and Networks
A profitless endeavor: phishing as tragedy of the commons
Proceedings of the 2008 workshop on New security paradigms
Mitigating Inadvertent Insider Threats with Incentives
Financial Cryptography and Data Security
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
A privacy-aware architecture for a web rating system
IBM Journal of Research and Development
Practical and Secure Software-Based Attestation
LIGHTSEC '11 Proceedings of the 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications
Online social networks: Why do students use facebook?
Computers in Human Behavior
The decreasing marginal value of evaluation network size
ACM SIGCAS Computers and Society
PeerSec: towards peer production and crowdsourcing for enhanced security
HotSec'12 Proceedings of the 7th USENIX conference on Hot Topics in Security
Aging, Privacy, and Home-Based Computing: Developing a Design Framework
IEEE Pervasive Computing
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
Security solutions fail not only because of technological or usability limitations, but also due to economic constraints and lack of coordinated adoption. Existing research conceptualizes security as a public good suffering from underinvestment, or as a private good with externalities, i.e. consequences that are not part of the price. It is also difficult to distinguish high and low quality security products, thus where there is incentive the resulting investments may be misdirected. We argue for a new paradigm of security solutions designed for communities rather than individuals. We leverage canonical economic theory of 'club goods' and 'common-pool resources' to encourage security through collective action and peer production. We operationalize these by providing examples of security solutions redesigned as club or pool goods. Investigating the paradigm of cooperation through community informs novel solutions that impinge on real world security and we advocate further research to enable this shift.