Interdependent privacy

Topics: Privacy, Economics

Privacy concerns arise naturally along with sharing or releasing personal data. Due to logical connections among individuals (e.g., online social networks) and/or correlation between individuals' data stemming from similar personal (e.g., DNA) or behavioral traits (e.g., individual mobility), privacy breaches and data holder malpractice could potentially jeopardize the privacy of many who may not even be aware of the act of sharing and its impact; not to mention consenting to the sharing. We refer to this phenomenon as interdependent privacy [1].

The prospective student will first briefly get to know the technical, economic and legal background of the topic. Building on that knowledge the student will design and evaluate a simple game-theoretic model capturing the essence of interdependent privacy.
Required skills: analytic thinking, good command of English
Preferred skills: basic knowledge of game theory
[1] Biczók, Gergely, and Pern Hui Chia. "Interdependent privacy: Let me share your data." International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2013.

Maximum number of students: 1 student

Contact: Gergely Biczók (CrySyS Lab)

Incentives in cybersecurity

Topics: Economics, Risk management

As evidenced in the last 10-15 years, cybersecurity is not a purely technical discipline. Decision-makers, whether sitting at security providers (IT companies), security demanders (everyone using IT) or the security industry, are mostly driven by economic incentives. Understanding these incentives are vital for designing systems that are secure in real-life scenarios [1].

The prospective student will identify a cybersecurity economics problem in the domain of risk management, cyber-warfare or sharing security-related information. The student will use elements of game theory and other domain-specific techniques and software tools to transform the problem into a model and to propose a solution.
Required skills: analytic thinking, good command of English
Preferred skills: basic knowledge of game theory, basic programming skills (e.g., python, matlab, NetLogo)
[1] Anderson, Ross, and Moore, Tyler. "The Economics of Information Security." Science 314.5799 (2006): 610-613.

Maximum number of students: 2 students

Contact: Gergely Biczók (CrySyS Lab)