NotesFAQContact Us
Search Tips
ERIC Number: ED548337
Record Type: Non-Journal
Publication Date: 2012
Pages: 132
Abstractor: As Provided
ISBN: 978-1-2675-1456-1
Measuring and Modeling Security and Privacy Laws
Romanosky, Sasha
ProQuest LLC, Ph.D. Dissertation, Carnegie Mellon University
This manuscript presents empirical and analytical analysis and discussion of security and privacy laws. The introduction, together with the three substantive chapters each represent separate research papers written as partial fulfillment of my PhD dissertation in the Heinz College, Carnegie Mellon University. Chapter 2 is an abbreviated version of a paper coauthored with Alessandro Acquisti and published in the Berkeley Technology Law Journal (Romanosky and Acquisti 2009). The full paper examines three alternative policy interventions that can be applied to reduce the externalities caused by data breaches. Moreover, it examines the privacy costs through the lens of legal and economic theory. I would like to thank John Bagby, Fred Cate, Ben Edelman, Mark Melodia, and Alana Maurushat for their insightful comments and feedback, and Charlotte Chang, Varty Defterderian, Kristin Kemnitzer, and Peter Nagle for their editing. Chapter 3 empirically estimates the effect of data breach disclosure laws on identity theft. The paper from which it was drawn was coauthored with my advisors Rahul Telang and Alessandro Acquisti and was published in the "Journal of Policy Analysis and Management" (JPAM). I would like to thank Katrina Baum, Al Blumstein, Laura Dugan, Vasundhara Garg, John Hutchins, Jed Kolko, Thad Kousser, Anand Nandkumar, JJ Prescott, Peter Swire, and Ellerie Webber for their valuable suggestions. Rahul Telang acknowledges generous support of NSF (National Science Foundation) through the CAREER award grant CNS-0546009. Chapter 4 analytically examines disclosure laws and addresses the conditions under which mandatory disclosure could reduce social costs. It was coauthored with my advisor, Alessandro Acquisti, and Richard Sharp, a mathematician who authored the mathematical proofs. I would like to thank Nicolas Christin and participants of the Ninth Workshop on the Economics of Information Security for their comments and suggestions. Chapter 5 empirically examines US civil lawsuits relating to the loss or theft of personal information, and was coauthored with Alessandro Acquisti and David Hoffman of the Beasley School of Law at Temple University. This research was supported by Temple Law School's Conwell Corps Program. We would like to thank Antima Chakraborty, Carol Anne Donohoe, Ian Everhart, Caitlin Jones, Kevin Leary and Jake Oresick for their research assistance. We would also like to thank Paul Bond, Aaron Burnstein, Fainna Kagan, Amelia Haviland, Mark Melodia, Kristen Matthews, Peter Oh, Barrie Nault, David Navetta, Mohammad Rahman, Theresa Romanosky, Boris Segalis, Brendon Tavelli and 7 anonymous attorneys for their valuable insights and suggestions. Finally, I would like to acknowledge CyLab at Carnegie Mellon for their generous support for this research under grants DAAD19-02-1-0389 and W911NF-09-1-0273 from the Army Research Office. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page:]
ProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site:
Publication Type: Dissertations/Theses - Doctoral Dissertations
Education Level: N/A
Audience: N/A
Language: English
Sponsor: National Science Foundation; Department of the Army, Washington, DC.
Authoring Institution: N/A
Grant or Contract Numbers: CNS-0546009|DAAD19-02-1-0389|W911NF-09-1-0273