We introduce a model for examining the factors that lead to the adoption of new encryption technologies. Building on the work of Brock and Durlauf, the model describes how agents make choices, in the presence of social interaction, between competing technologies given their relative cost, functionality, and usability. We apply the model to examples about the adoption of encryption in communication (email and messaging) and storage technologies (self-encrypting drives) and also consider our model’s predictions for the evolution of technology adoption over time.
CITATION STYLE
Caulfield, T., Ioannidis, C., & Pym, D. (2017). Discrete choice, social interaction, and policy in encryption technology adoption (short paper). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9603 LNCS, pp. 271–279). Springer Verlag. https://doi.org/10.1007/978-3-662-54970-4_16
Mendeley helps you to discover research relevant for your work.