skip to main content
10.1145/988772.988777acmconferencesArticle/Chapter ViewAbstractPublication PagesecConference Proceedingsconference-collections
Article

Privacy in electronic commerce and the economics of immediate gratification

Published:17 May 2004Publication History

ABSTRACT

Dichotomies between privacy attitudes and behavior have been noted in the literature but not yet fully explained. We apply lessons from the research on behavioral economics to understand the individual decision making process with respect to privacy in electronic commerce. We show that it is unrealistic to expectindividual rationality in this context. Models of self-control problems and immediate gratification offer more realistic descriptions of the decision process and are more consistent with currently available data. In particular, we show why individuals who may genuinely want to protect their privacy might not do so because of psychological distortions well documented in the behavioral literature; we show that these distortions may affect not only 'naive' individuals but also 'sophisticated' ones; and we prove that this may occur also when individuals perceive the risks from not protecting their privacy as significant.

References

  1. A. Acquisti, R. Dingledine, and P. Syverson. On the economics of anonymity. In Financial Cryptography -FC '03, pages 84--102. Springer Verlag, LNCS 2742, 2003.Google ScholarGoogle Scholar
  2. A. Acquisti and J. Grossklags. Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. In 2nd Annual Workshop on Economics and Information Security - WEIS '03, 2003.Google ScholarGoogle Scholar
  3. A. Acquisti and H. R. Varian. Conditioning prices on purchase history. Technical report, University of California, Berkeley, 2001. Presented at the European Economic Association Conference, Venice, IT, August 2002. http://www.heinz.cmu.edu/acquisti/papers/privacy.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. A. Akerlof. The market for 'lemons:' quality uncertainty and the market mechanism. Quarterly Journal of Economics, 84:488--500, 1970.Google ScholarGoogle ScholarCross RefCross Ref
  5. G. S. Becker and K. M. Murphy. A theory of rational addiction. Journal of Political Economy, 96:675--700, 1988.Google ScholarGoogle ScholarCross RefCross Ref
  6. B. D. Brunk. Understanding the privacy space. First Monday, 7, 2002. http://firstmonday.org/issues/issue7_10/brunk/index.html.Google ScholarGoogle Scholar
  7. G. Calzolari and A. Pavan. Optimal design of privacy policies. Technical report, Gremaq, University of Toulouse, 2001.Google ScholarGoogle Scholar
  8. D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84--88, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology - Crypto '82, pages 199---203. Plenum Press, 1983.Google ScholarGoogle ScholarCross RefCross Ref
  10. R. K. Chellappa and R. Sin. Personalization versus privacy: An empirical examination of the online consumer's dilemma. In 2002 Informs Meeting, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. T. Commission. Privacy online: Fair information practices in the electronic marketplace, 2000. http://www.ftc.gov/reports/privacy2000/ privacy2000.pdf.Google ScholarGoogle Scholar
  12. Community Banker Association of Indiana. Identity fraud expected to triple by 2005, 2001. http://www.cbai.org/Newsletter/December2001/identity_fraud_de2001.htm.Google ScholarGoogle Scholar
  13. S. Corey. Professional attitudes and actual behavior. Journal of Educational Psychology, 28(1):271--280, 1937.Google ScholarGoogle ScholarCross RefCross Ref
  14. C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In P. Syverson and R. Dingledine, editors, Privacy Enhancing Technologies - PET '02. Springer Verlag, 2482, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. ebusinessforum.com. eMarketer: The great online privacy debate, 2000. http://www.ebusinessforum.com/index.asp?doc_id=1785&layout=rich_story.Google ScholarGoogle Scholar
  16. Federal Trade Commission. Identity theft heads the ftc's top 10 consumer fraud complaints of 2001, 2002. http://www.ftc.gov/opa/2002/01/idtheft.htm.Google ScholarGoogle Scholar
  17. R. Gellman. Privacy, consumers, and costs - How the lack of privacy costs consumers and why business studies of privacy costs are biased and incomplete, 2002. http://www.epic.org/reports/dmfprivacy.html.Google ScholarGoogle Scholar
  18. I.-H. Harn, K.-L. Hui, T. S. Lee, and I. P. L. Png. Online information privacy: Measuring the cost-benefit trade-off. In 23rd International Conference on Information Systems, 2002.Google ScholarGoogle Scholar
  19. Harris Interactive. First major post-9.11 privacy survey finds consumers demanding companies do more to protect privacy; public wants company privacy policies to be independently verified, 2002. http://www.harrisinteractive.com/news/allnewsbydate.asp?NewsID=429.Google ScholarGoogle Scholar
  20. P. Jehiel and A. Lilico. Smoking today and stopping tomorrow: A limited foresight perspective. Technical report, Department of Economics, UCLA, 2002.Google ScholarGoogle Scholar
  21. Jupiter Research. Seventy percent of US consumers worry about online privacy, but few take protective action, 2002. http://www.jmm.com/xp/jmm/press/2002/pr_060302.xml.Google ScholarGoogle Scholar
  22. H. Kunreuther. Causes of underinsurance against natural disasters. Geneva Papers on Risk and Insurance, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  23. D. Laibson. Essays on hyperbolic discounting. MIT, Department of Economics, Ph.D. Dissertation, 1994.Google ScholarGoogle Scholar
  24. R. LaPiere. Attitudes versus actions. Social Forces, 13:230--237, 1934.Google ScholarGoogle ScholarCross RefCross Ref
  25. G. Lowenstein, T. O'Donoghue, and M. Rabin. Projection bias in predicting future utility. Technical report, Carnegie Mellon University, Cornell University, and University of California, Berkeley, 2003.Google ScholarGoogle Scholar
  26. A. Odlyzko. Privacy, economics, and price discrimination on the Internet. In Fifth International Conference on Electronic Commerce, pages 355--366. ACM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. T. O'Donoghue and M. Rabin. Choice and procrastination. Quartely Journal of Economics, 116:121---160, 2001. The page referenced in the text refers to the 2000 working paper version.Google ScholarGoogle ScholarCross RefCross Ref
  28. R. A. Posner. An economic theory of privacy. Regulation, pages 19--26, 1978.Google ScholarGoogle Scholar
  29. R. A. Posner. The economics of privacy. American Economic Review, 71(2):405--409, 1981.Google ScholarGoogle Scholar
  30. Privacy Rights Clearinghouse. Nowhere to turn: Victims speak out on identity theft, 2000. http://www.privacyrights.org/ar/idtheft2000.htm.Google ScholarGoogle Scholar
  31. M. Rabin and T. O'Donoghue. The economics of immediate gratification. Journal of Behavioral Decision Making, 13:233--250, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  32. A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In P. Syverson and R. Dingledine, editors, Privacy Enhancing Technologies - PET '02. Springer Verlag, LNCS 2482, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. A. Shostack. Paying for privacy: Consumers and infrastructures. In 2nd Annual Workshop on Economics and Information Security - WEIS '03, 2003.Google ScholarGoogle Scholar
  34. H. A. Simon. Models of bounded rationality. The MIT Press, Cambridge, MA, 1982.Google ScholarGoogle Scholar
  35. P. Slovic. What does it mean to know a cumulative risk? Adolescents' perceptions of short-term and long-term consequences of smoking. Journal of Behavioral Decision Making, 13:259--266, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  36. S. Spiekermann, J. Grossklags, and B. Berendt. E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. In 3rd ACM Conference on Electronic Commerce - EC '01, pages 38--47, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. G. J. Stigler. An introduction to privacy in economics and politics. Journal of Legal Studies, 9:623--644, 1980.Google ScholarGoogle ScholarCross RefCross Ref
  38. P. Syverson. The paradoxical value of privacy. In 2nd Annual Workshop on Economics and Information Security - WEIS '03, 2003.Google ScholarGoogle Scholar
  39. C. R. Taylor. Private demands and demands for privacy: Dynamic pricing and the market for customer information. Department of Economics, Duke University, Duke Economics Working Paper 02-02, 2002.Google ScholarGoogle Scholar
  40. T. Vila, R. Greenstadt, and D. Molnar. Why we can't be bothered to read privacy policies: Models of privacy economics as a lemons market. In 2nd Annual Workshop on Economics and Information Security -WEIS '03, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. S. Warren and L. Brandeis. The right to privacy. Harvard Law Review, 4:193--220, 1890.Google ScholarGoogle ScholarCross RefCross Ref
  42. N. D. Weinstein. Optimistic biases about personal risks. Science, 24:1232--1233, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  43. A. Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy in electronic commerce and the economics of immediate gratification

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          EC '04: Proceedings of the 5th ACM conference on Electronic commerce
          May 2004
          278 pages
          ISBN:1581137710
          DOI:10.1145/988772

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 May 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          EC '04 Paper Acceptance Rate24of146submissions,16%Overall Acceptance Rate664of2,389submissions,28%

          Upcoming Conference

          EC '24
          The 25th ACM Conference on Economics and Computation
          July 8 - 11, 2024
          New Haven , CT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader