Looking at Information Security through a Prospect Theory Lens
نویسندگان
چکیده
Traditional accounts of decision-making under uncertainty have taken the Von Neumann and Morgenstern approach of Expected Utility Theory that considers how decisions under uncertainty should be made. This prescriptive model states that, when faced with a choice, a rational decision maker will pick the prospect that offers the highest expected utility. But as has been demonstrated by Kahnemann and Tversky in Prospect Theory, decision-making under uncertainty often deviates from what Expected Utility Theory predicts, largely depending on whether the decision is framed as a gain or a loss. According to their model, choices framed as gains often lead to risk–averse behavior, and choices framed as losses often induce riskseeking behavior. This paper reviews various theories of decision-making under uncertainty and evaluates the relevance of Prospect Theory in the information security context. An instrument is developed to evaluate relevance, preliminary results are presented, and implications for future research are discussed.
منابع مشابه
Looking at Infertility Treatment through The Lens of The Meaning of Life: The Effect of Group Logotherapy on Psychological Distress in Infertile Women
متن کامل
The Anatomy of Digital Trade Infrastructures
In global supply chains information about transactions resides in fragmented pockets within business and government systems. The lack of reliable, accurate and complete information makes it hard to detect risks (such as safety, security, compliance, commercial) and at the same time makes international trade inefficient. The introduction of digital infrastructures that transcend organizational a...
متن کاملExploring The Use Of Online Social Networking By Employees: Looking At The Potential For Information Leakage
The proliferation of online social networking (OSN) in recent years has caused organizations information security threats due to disclosure of information by their employees on their sites. The accessibility of OSN to anyone, at any time, using any devices, causes confidential and sensitive organizational information to be disclosed to unauthorised individuals, whether accidentally or intention...
متن کاملImproving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملبررسی نقش پرتفوی رفتاری در تصمیمگیری سرمایهگذاران بورس اوراق بهادار تهران
More than 50 years ago Friedman and Savage stated that investors who purchase lottery tickets (risk taking behavior), buy insurance coverage (risk averse behavior) at the same time. They proposed an “S” shape utility function that features concave as loss and convex as winning. Eisenhauer and many other researchers have confirmed risk behavior as suggested by Friedman and Savage. Shefrin and St...
متن کامل