skip to main content
10.1145/948005.948057acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
Article

Why we can't be bothered to read privacy policies models of privacy economics as a lemons market

Published:30 September 2003Publication History

ABSTRACT

Consumers want to interact with web sites, but they also want to keep control of their private information. Asymmetric information about whether web sites will sell private information or not leads to a lemons market for privacy. We discuss privacy policies as signals in a lemons market and ways in which current realizations of privacy policies may fail to be effective signals. As a result of these shortcomings, we consider a "lemons market with testing," where consumers have a cost of determining whether a site meets their privacy requirement. Our model explains empirical data concerning privacy policies and privacy seals. We end by discussing cyclic instability in the number of web sites that sell consumer information.

References

  1. Alessandro Acquisti. Protecting privacy with economics: Economic incentives for preventive technologies in ubiquitous computing environments. In Workshop on Socially-informed Design of Privacy-enhancing Solutions, 4th International Conference on Ubiquitous Computing (UBICOMP 02), September 2002. http://guir.berkeley.edu/privacyworkshop2002/papers/acquisti-ubicomp-09%-19-02.pdf.Google ScholarGoogle Scholar
  2. George A. Akerlof. The market for lemons: Quality uncertainty and the market mechanism. Quarterly Journal of Economics, pages 488--500, August 1970.Google ScholarGoogle ScholarCross RefCross Ref
  3. AT&T. P3p privacy bird. http://www.privacybird.com.Google ScholarGoogle Scholar
  4. A. N. Burnetas and M. N. Katehakis. Asymptotic bayes analysis for the finite horizon one armed bandit problem. Probability in the Engineering and Informational Sciences, 2002. to appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Giacomo Calzolari and Alessandro Pavan. Optimal design of privacy policies. http://faculty.nwu.edu/faculty/pava/ODPP.pdf.Google ScholarGoogle Scholar
  6. Federal Trade Commission. Privacy online: Fair information practices in the electronic marketplace. http://www.ftc.gov/reports/privacy2000/privacy2000.pdf, 2000.Google ScholarGoogle Scholar
  7. EPIC. Pretty poor privacy. http://www.epic.org, 1999.Google ScholarGoogle Scholar
  8. Center for Democracy and Technology. Surveys main page. http://www.cdt.org/privacy/guide/introduction/surveyinfo.html, 2002.Google ScholarGoogle Scholar
  9. Heather Green, Mike France, Marcia Stepanek, and Amy Borrus. Our four-point plan. Business Week Online, March 2000.Google ScholarGoogle Scholar
  10. William F. Adkinson Jr, Jeffrey A. Eisenach, and Thomas M. Lenard. Privacy online: A report on the information practices and policies of commercial web sites. http://www.pff.org/publications/privacyonlinefinalael.pdf, 2002.Google ScholarGoogle Scholar
  11. Brian McWilliams. Real networks hit with privacy lawsuit. http://www.internetnews.com/bus-news/article.php/8161\_235141.Google ScholarGoogle Scholar
  12. Dierdre Mulligan, Ann Cavoukian, Ari Schwartz, and Michael Gurski. P3p and privacy: An update for the privacy community. http://www.cdt.org/privacy/pet/p3pprivacy/shtml, 2000.Google ScholarGoogle Scholar
  13. Paul Resnick, Richard Zeckhauser, John Swanson, and Kate Lockwood. The value of reputation on ebay: A controlled experiment. http://www.si.umich.edu/~presnick/papers/postcards/, 2002.Google ScholarGoogle Scholar
  14. Michael Spence. Job market signalling. The Quarterly Journal of Economics, pages 355--74, 1973.Google ScholarGoogle ScholarCross RefCross Ref
  15. TrustE. Truste statistics. http://www.truste.org/bus/pub\_bottom.html, 2003.Google ScholarGoogle Scholar
  16. Hal Varian. Economic aspects of personal privacy. http://www.sims.berkeley.edu/~hal/Papers/privacy/, 1996.Google ScholarGoogle Scholar
  17. Toshio Yamagichi and Masafumi Matsuda. Improving the lemons market with a reputation system. Technical report, University of Hokkaido, 2002.Google ScholarGoogle Scholar
  1. Why we can't be bothered to read privacy policies models of privacy economics as a lemons market

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        ICEC '03: Proceedings of the 5th international conference on Electronic commerce
        September 2003
        528 pages
        ISBN:1581137885
        DOI:10.1145/948005

        Copyright © 2003 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 September 2003

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate150of244submissions,61%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader