EconPapers    
Economics at your fingertips  
 

Characterizing Conflicting User Values for Cyber Authentication Using a Virtual Public Values Forum

Sarah Kusumastuti (), Heather Rosoff () and Richard S. John ()
Additional contact information
Sarah Kusumastuti: Department of Psychology, University of Southern California, Los Angeles, California 90089; National Center for Risk and Economic Analysis of Terrorism Events (CREATE), University of Southern California, Los Angeles, California 90089
Heather Rosoff: National Center for Risk and Economic Analysis of Terrorism Events (CREATE), University of Southern California, Los Angeles, California 90089
Richard S. John: Department of Psychology, University of Southern California, Los Angeles, California 90089; National Center for Risk and Economic Analysis of Terrorism Events (CREATE), University of Southern California, Los Angeles, California 90089

Decision Analysis, 2019, vol. 16, issue 3, 157-171

Abstract: Authentication is a major component in protecting the security of online user services. An effective implementation of security policies requires compliance from users, who are one class of key stakeholders in the cybersecurity policy decision problem. We examine this multiple stakeholder decision problem by conducting a virtual public values forum, a policy decision structuring methodology to characterize stakeholder values by eliciting essential trade‐offs among conflicting objectives. We assess trade‐offs for a sample of users to explore heterogeneity in user values and the relationship of trade‐offs to both individual user characteristics and online context. We obtained responses from 265 online service users and elicited their trade‐offs among three conflicting objectives related to authentication security: (1) maximizing security, (2) maximizing convenience, and (3) minimizing cost. Using an additive multiattribute value model with four attributes, we obtained scaling coefficients that denote the relative valuation of each attribute to the decision maker and discovered that for the attribute ranges considered, security followed by cost receive the highest priority; however, there is a group of respondents who consider convenience to have higher valuation than either cost or security. We also explore the relationships between user characteristics (self-efficacy, response efficacy, response cost, and perceived severity) and the calculated scaling coefficients.

Keywords: applications: security; applications: public policy; public values; multi-attribute value theory; value trade-offs (search for similar items in EconPapers)
Date: 2019
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
https://doi.org/10.1287/deca.2018.0383 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:inm:ordeca:v:16:y:2019:i:3:p:157-171

Access Statistics for this article

More articles in Decision Analysis from INFORMS Contact information at EDIRC.
Bibliographic data for series maintained by Chris Asher ().

 
Page updated 2025-03-19
Handle: RePEc:inm:ordeca:v:16:y:2019:i:3:p:157-171