The Tension Between Privacy and Security: An Analysis Based on Coase and Pigou
نویسنده
چکیده
INTRODUCTION................................................................................... 397 I. WHY IS THERE A TENSION BETWEEN PRIVACY AND SECURITY? ................................................................................... 398 II. WHAT IS PRIVATE? ..................................................................... 399 III. WHAT IS SECURE?....................................................................... 401 IV. PIGOU AND COASE ..................................................................... 402 V. APPLYING PIGOU AND COASE TO THE TENSION BETWEEN PRIVACY AND SECURITY ............................................................ 404 VI. THE DYSTOPIAN FUTURE .......................................................... 406 CONCLUSION .................................................................................. 407
منابع مشابه
The core disagreement between Pigou, the profession, and Coase in the analyses of the externality question
The source of disagreement between Pigou, the profession, and Coase in regard to the externalities is thought to be transaction cost. Coase shows that the traditional prescription for remedying externality problems can be wrong if transaction cost is positive. But Pigou did recognize that positive transaction cost played a role in creating externality problems even though the profession later f...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JTHTL
دوره 3 شماره
صفحات -
تاریخ انتشار 2005