Open vs. closed systems for accountability

Joan Feigenbaum, Aaron D. Jaggard, Rebecca N. Wright

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The relationship between accountability and identity in online life presents many interesting questions. Here, we first systematically survey the various (directed) relationships among principals, system identities (nyms) used by principals, and actions carried out by principals using those nyms. We also map these relationships to corresponding accountability-related properties from the literature. Because punishment is fundamental to accountability, we then focus on the relationship between punishment and the strength of the connection between principals and nyms. To study this particular relationship, we formulate a utilitytheoretic framework that distinguishes between principals and the identities they may use to commit violations. In doing so, we argue that the analogue applicable to our setting of the well known concept of quasilinear utility is insufficiently rich to capture important properties such as reputation. We propose more general utilities with linear transfer that do seem suitable for this model. In our use of this framework, we define notions of "open" and "closed" systems. This distinction captures the degree to which system participants are required to be bound to their system identities as a condition of participating in the system. This allows us to study the relationship between the strength of identity binding and the accountability properties of a system.

Original languageEnglish (US)
Title of host publicationProceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014
PublisherAssociation for Computing Machinery
ISBN (Print)9781450329071
DOIs
StatePublished - 2014
Event2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014 - Raleigh, NC, United States
Duration: Apr 8 2014Apr 9 2014

Publication series

NameACM International Conference Proceeding Series

Other

Other2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014
CountryUnited States
CityRaleigh, NC
Period4/8/144/9/14

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Keywords

  • Accountability
  • Identity
  • Utility

Cite this