The challenges of personal data markets and privacy

Personal data is increasingly conceived as a tradable asset. Markets for personal information are emerging and new ways of valuating individuals’ data are being proposed. At the same time, legal obligations over protection of personal data and individuals’ concerns over its privacy persist. This article outlines some of the economic, technical, social, and ethical issues associated with personal data markets, focusing on the privacy challenges they raise.

[1]  D. Zwick,et al.  Whose Identity Is It Anyway? Consumer Representation in the Age of Database Marketing , 2004 .

[2]  Benjamin E. Hermalin,et al.  Privacy, property rights and efficiency: The economics of privacy as secrecy , 2006 .

[3]  Tyler Moore,et al.  Economics of Information Security and Privacy , 2014 .

[4]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[5]  Alessandro Acquisti,et al.  When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information , 2007, WEIS.

[6]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[7]  Kenneth C. Laudon,et al.  Markets and privacy , 1993, CACM.

[8]  Sumit Sarkar,et al.  A Data Perturbation Approach to Privacy Protection in Data Mining , 2004, ICIS.

[9]  J. Borges,et al.  A TAXONOMY OF PRIVACY , 2006 .

[10]  E. J. Dommering Property rights in personal data: A European perspective: proefschrift van mr. N. Purtova , 2012 .

[11]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[12]  A. Acquisti Privacy, Big Data, and the Public Good: The Economics and Behavioral Economics of Privacy , 2014 .

[13]  Kai Lung Hui,et al.  Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..

[14]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[15]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[16]  Rainer Böhme,et al.  Valuating Privacy with Option Pricing Theory , 2009, WEIS.

[17]  Avi Goldfarb,et al.  Online advertising, behavioral targeting, and privacy , 2011, Commun. ACM.

[18]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[19]  Sarah Spiekermann,et al.  A vision for global privacy bridges: Technical and legal measures for international data markets , 2015, Comput. Law Secur. Rev..

[20]  Jeffrey Friedberg,et al.  A metadata-based architecture for user-centered data accountability , 2015, Electron. Mark..

[21]  George Danezis,et al.  How Much Is Location Privacy Worth? , 2005, WEIS.

[22]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[23]  Nadezhda Purtova Property Rights in Personal Data. A European Perspective , 2011 .

[24]  Alessandro Acquisti,et al.  Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .

[25]  B Rainer,et al.  Privacy in Online Social Lending , 2010, AAAI 2010.

[26]  Siani Pearson,et al.  Sticky Policies: An Approach for Managing Privacy across Multiple Parties , 2011, Computer.

[27]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[28]  Sumit Sarkar,et al.  Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data , 2006, Inf. Syst. Res..

[29]  Benjamin Thomsen,et al.  Personal data: how context shapes consumers’ data sharing with organizations from various sectors , 2015, Electron. Mark..

[30]  Curtis R. Taylor Consumer Privacy and the Market for Customer Information , 2004 .

[31]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[32]  Rainer Böhme,et al.  Pricing strategies in electronic marketplaces with privacy-enhancing technologies , 2007, Wirtsch..

[33]  Pamela Samuelson,et al.  Privacy as intellectual property , 2000 .

[34]  Zeynep Tufekci Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .

[35]  P. Schwartz Property, Privacy, and Personal Data , 2004 .

[36]  G. Loewenstein,et al.  What Is Privacy Worth? , 2013, The Journal of Legal Studies.

[37]  Lorrie Faith Cranor,et al.  Web Privacy with P3p , 2002 .

[38]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[39]  Michael E. Lesk The Price of Privacy , 2012, IEEE Security & Privacy.

[40]  Rafael Accorsi,et al.  Personalization in privacy-aware highly dynamic systems , 2006, CACM.

[41]  Thomas Hess,et al.  Ökonomie der Privatsphäre , 2012, Datenschutz und Datensicherheit - DuD.

[42]  H. Varian,et al.  Conditioning Prices on Purchase History , 2005 .

[43]  Curtis R. Taylor,et al.  The Economics of Privacy , 2016 .

[44]  James Y. L. Thong,et al.  Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..

[45]  Ninghui Li,et al.  End-User Privacy in Human–Computer Interaction , 2009 .

[46]  Alessandro Acquisti,et al.  Empirical Analysis of Data Breach Litigation , 2013, WEIS.

[47]  Dale A. Stirling,et al.  Information rules , 2003, SGMD.

[48]  Alessandro Acquisti,et al.  Nudging Privacy: The Behavioral Economics of Personal Information , 2009, IEEE Security & Privacy.

[49]  Joachim Henkel,et al.  Welfare Implications of User Innovation , 2003 .

[50]  Eytan Adar,et al.  Valuating Privacy , 2005, WEIS.

[51]  Christine Bauer,et al.  Psychology of Ownership and Asset Defense: Why People Value Their Personal Information Beyond Privacy , 2012, ICIS.

[52]  A. Acquisti The Economics of Personal Data and the Economics of Privacy , 2010 .

[53]  Rainer Böhme,et al.  Privacy in Online Social Lending , 2010, AAAI Spring Symposium: Intelligent Information Privacy Management.

[54]  Alessandro Acquisti,et al.  Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.

[55]  Larry Korba,et al.  Applying digital rights management systems to privacy rights management , 2002, Comput. Secur..

[56]  V. Stodden,et al.  Privacy, Big Data, and the Public Good: Frameworks For Engagement , 2014 .

[57]  R. Coase,et al.  The Problem of Social Cost , 1960, The Journal of Law and Economics.

[58]  Sumit Sarkar,et al.  Maximizing Accuracy of Shared Databases when Concealing Sensitive Patterns , 2005, Inf. Syst. Res..

[59]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[60]  S. Stringer Economic Analysis , 2002, The Laryngoscope.

[61]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.

[62]  G. Dangelmayer Economic Analysis , 2020, Economic Analysis.

[63]  Jessica Litman,et al.  Information Privacy/Information Property , 2000 .