Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2021
DOI: 10.2139/ssrn.3867652
|View full text |Cite
|
Sign up to set email alerts
|

IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Scientific literature on phishing defense can be divided in two categories: technical papers (e.g., [10,49,50,52,53]), which propose (or attack) a given solution; and user studies (e.g., [8,35,82]), which seek to investigate the response of humans to phishing (useful for phishing training and education). However, to the best of our knowledge, none of these categories have questioned how humans respond to phishing webpages crafted to bypass ML-PWDs.…”
Section: Research Gapmentioning
confidence: 99%
See 2 more Smart Citations
“…Scientific literature on phishing defense can be divided in two categories: technical papers (e.g., [10,49,50,52,53]), which propose (or attack) a given solution; and user studies (e.g., [8,35,82]), which seek to investigate the response of humans to phishing (useful for phishing training and education). However, to the best of our knowledge, none of these categories have questioned how humans respond to phishing webpages crafted to bypass ML-PWDs.…”
Section: Research Gapmentioning
confidence: 99%
“…However, to the best of our knowledge, none of these categories have questioned how humans respond to phishing webpages crafted to bypass ML-PWDs. Indeed, from an "adversarial ML" perspective, technical papers typically stop after showing that a given ML-PWD has been evaded (e.g., [11,57]); whereas user studies either entailed "phishing" webpages that have been crafted ad-hoc (e.g., [35,58]) or, even when real phishing webpages were considered (e.g., [8,12]), the role of ML was irrelevant. Hence, the question: "Are adversarial webpages a problem in reality?"…”
Section: Research Gapmentioning
confidence: 99%
See 1 more Smart Citation
“…WTP is a well-established concept in economics that has been widely applied to research on privacy. It captures the maximum amount an individual would pay to opt out from their personal data being disclosed (Acquisti et al, 2013 ; Gopavaram et al, 2021 ). In this paper, we assess basic quality aspects of the measurement instrument for WTP that was included in the Bundesbank’s Online Panel on Households’ Expectations (BOP-HH).…”
Section: Introductionmentioning
confidence: 99%