Skip to main content
Top
Published in: Public Choice 3-4/2019

13-02-2019

Is the market for digital privacy a failure?

Author: Caleb S. Fuller

Published in: Public Choice | Issue 3-4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Conventional wisdom holds that the market for digital privacy fails owing to widespread informational asymmetry between digital firms and their customers, behavioral biases exhibited by those customers, and negative externalities from data resale. This paper supplies both theoretical and empirical reasons to question the standard market failure conclusion. On the theoretical side, I argue that digital markets are not qualitatively different from markets for other consumer goods. To wit, just as in traditional markets, it is costly to measure product attributes (such as “privacy”) and, just as in more traditional settings, some firms offer credible commitments to reduce the threat of potential opportunism. On the empirical side, I conduct a survey of Google’s users. The most important results of this survey suggest that, at least with respect to Google, (a) the extent of informational asymmetry is minimal and (b) the demands for “unconstrained” and “constrained” privacy diverge substantially. Significantly, 86% of respondents express no willingness to pay for additional privacy when interacting with Google. Among the remaining 14%, the average expressed willingness to pay is low.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
See here for more information on Google’s decision to drop the phrase: https://​gizmodo.​com/​google-removes-nearly-all-mentions-of-dont-be-evil-from-1826153393.
 
2
Less consensus exists regarding what specific policy interventions should be implemented. Some scholars favor outright bans on information collection, others call for a legally mandated opt-in, and still others argue that greater transparency be required of firms. The EU, Japan, Canada, Singapore and South Africa all have passed comprehensive digital privacy legislation. For an analysis of intervention, see Fuller (2018).
 
3
Haven Insights used Lucid’s platform for academic research. See more details here: https://​luc.​id/​lucid-for-academics/​.
 
4
It has been characteristic to describe privacy itself as an “economic good” (Farrell 2012; Acquisti et al. 2016, p. 446). This paper conceives of privacy, not as an economic good itself, but as an attribute of some other economic good.
 
5
Of course, to get a library card, one usually provides name, physical address, email address, etc.…The information collected by digital firms tends to be a browser’s location, browsing history, and (often) purchase history. If one wishes to avoid surrendering information to a library, it is possible to use the library without checking out any items.
 
6
Expecting “perfect information” to describe the real world commits the “Nirvana Fallacy” (Demsetz 1969). Unsurprisingly, an orange grower will tend to be more informed about an orange’s attributes than prospective fruit buyers (Barzel 1982).
 
7
The company earns revenue by displaying ads based merely on what search terms a browser enters but does not track the user.
 
8
Although DuckDuckGo has grown steadily, it averaged only a little more than 20 million queries daily as of early 2018, far less than 1% of Google’s daily traffic. See https://​duckduckgo.​com/​traffic.​html for statistics on DuckDuckGo’s traffic over time. See http://​www.​internetlivestat​s.​com/​google-search-statistics/​ for a daily count of Google searches.
 
9
Respondents who indicated unawareness of Google’s information-collection practices were not asked questions four, five, or six.
 
10
Google may collect any of the data listed in question four of the survey’s text (Appendix A) except: “Your driver’s license”, “Your social security number”, “Your medical information” and “Your credit card information.”
 
11
The results show that individuals are least aware of the fact that Google gathers information about their devices. Still, 51% of “aware respondents” know that device information is collected. Arguably, for most users, device information is the least “sensitive” or “important” piece of information that Google collects. It also is possible that some consumers are unfamiliar with the term “device information.”
 
12
Google may use collected information to “target ads based on your search history and location”, to “aggregate large quantities of anonymized data”, and to “store your data indefinitely”, but its privacy policy does not permit any of the other uses listed in question five of the survey (see the survey’s text in Appendix A).
 
13
As noted by Acquisti et al. (2016), information asymmetry provides another explanation, but I am ruling that out for a moment so as to isolate the purported effect of behaviorial biases.
 
14
“[S]tudies in which consumers are… asked to consider paying… to protect their privacy are… scarcer” (Acquisti et al. 2013, p. 254).
 
15
Goldfarb and Tucker 2011 examine the economic impact of the EU’s switch to an opt-in rather than an opt-out default option. They find that the switch reduced the effectiveness of the average digital ad dramatically because of the inability to target advertisements.
 
16
Unconstrained surveys also are common in other contexts. For example, see Clark and Powell’s (2013) analysis of “non-economic” or “unconstrained” survey approaches in the literature on sweatshops.
 
17
Acquisti et al. (2016, pp. 44–445) affirm that both costs and benefits are associated with disclosure of personal information.
 
18
Non-money differentials may include preferences for beauty, love, discrimination and so on (Boettke and Candela 2017), but those differentials come in the form of personal information in the case of digital privacy.
 
19
Note that 149 respondents indicated a willingness to pay for privacy on Google, but when they subsequently were prompted to state the amount they would be willing to pay, they entered $0. Those 149 respondents were re-categorized as being unwilling to pay for privacy and thus included amongst the 86% of all respondents not willing to pay for privacy.
 
20
The survey began with a sample of 6864 respondents, but 781 were eliminated because they did not use Google. It is unclear how those non-users would respond to the remainder of the survey. At one extreme, it is possible that 100% of them refrain from using Google because of privacy concerns and all of them would also be willing to pay for privacy on Google. If that were the case, 23% of the Internet-using population would be willing to pay for privacy on Google. At the other extreme, 100% of them could also be unwilling to pay for privacy on Google because they never use Google (for reasons other than privacy concerns). If that were the case, only 12% of the Internet-using population would be willing to pay for privacy. The truth probably lies somewhere between the extremes.
 
21
It is impossible to determine whether respondents are perfectly consistent between their annual and “per-search” valuations. For example, someone selecting “$1 to $5” may have had $1 in mind, whereas another had $5 in mind. Nonetheless, the answers are “generally consistent” in that both the annual and “per-search” prompts elicit relatively low WTPs.
 
22
Respondents who believe that Google does not collect information were excluded from the question about whether Google can change its privacy policy unilaterally. Thus, the relevant sample comprises users who are aware of Google’s information-collection practices and who express a desire for Google not to collect their data.
 
23
The respondents are comprised of those users who were aware that Google engages in information collection (question three) and expressed a willingness to pay for privacy (question nine).
 
24
Of course, other ways of categorizing respondents as “relatively informed” or “relatively uninformed” with respect to question five are possible. My strategy for categorization was selected in the interest of generating a sufficiently large sample size for both “informed” and “uninformed” groups, given that most respondents are unwilling to pay. Respondents who selected only two correct answers, but no incorrect answers are categorized as “uninformed” because they seemingly exhibit less awareness of overall data collection practices than those who selected all three correct answers and exhibited some degree of misinformation by also selecting an incorrect response.
 
25
The respondents are comprised of those who prefer not to have their information collected (including those both willing and unwilling to pay for privacy).
 
26
Acquisti et al. (2016) also list “quantity discrimination in insurance and credit markets”, but I did not present respondents with that option because it was the most technical of the possibilities suggested by those authors.
 
27
In addition to the four possibilities listed by Acquisti et al. (2016), my survey added: “Advertisers being able to target you directly”, “A government agency forcing an internet entity that has collected your information to hand over the information”, and “Other (please specify)”.
 
28
Section 3.2.2’s results provide evidence for doubting this argument.
 
29
Questions four, five and ten randomized the response options to respondents. The other questions presented the response options in the order displayed in Appendix A
 
30
Question 13 contains a wording error. The question should not have included the phrase: “Enter a whole number in US dollars” because respondents were not offered an open-ended response option.
 
31
Appendix B contains the results from all survey questions except for question one (a screener question to determine whether respondents are Google users) and question 12 which asks about how much consumers would be willing to pay for privacy. The paper’s text reports the results of question 12.
 
32
As described in the paper’s text, some respondents indicated a positive WTP, but then subsequently entered a value of “zero” for question 12. Those respondents (totaling 149) were re-categorized in both the text and in Appendix B’s table as being unwilling to pay.
 
33
The paper’s text describes how respondents were assigned to either the “informed” or “uninformed” categories. Respondents who prefer their information to be collected are excluded from this analysis.
 
Literature
go back to reference Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on electronic commerce (pp. 21–29). ACM. Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on electronic commerce (pp. 21–29). ACM.
go back to reference Acquisti, A. (2012). Privacy and market failures: Three reasons for concern, and three reasons for hope. Journal on Telecommunications and High Technology Law, 10, 227–233. Acquisti, A. (2012). Privacy and market failures: Three reasons for concern, and three reasons for hope. Journal on Telecommunications and High Technology Law, 10, 227–233.
go back to reference Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International workshop on privacy enhancing technologies (pp. 36–58). Springer. Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International workshop on privacy enhancing technologies (pp. 36–58). Springer.
go back to reference Acquisti, A., John, L. K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies, 42(2), 249–274.CrossRef Acquisti, A., John, L. K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies, 42(2), 249–274.CrossRef
go back to reference Acquisti, A., Taylor, C., & Wagman, L. (2016). The economics of privacy. Journal of Economic Literature, 54(2), 442–492.CrossRef Acquisti, A., Taylor, C., & Wagman, L. (2016). The economics of privacy. Journal of Economic Literature, 54(2), 442–492.CrossRef
go back to reference Akerlof, G. A. (1970). The market for ‘lemons’: Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84(3), 488–500.CrossRef Akerlof, G. A. (1970). The market for ‘lemons’: Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84(3), 488–500.CrossRef
go back to reference Alchian, A. A. (1967). Pricing and society. London: Institute of Economic Affairs. Alchian, A. A. (1967). Pricing and society. London: Institute of Economic Affairs.
go back to reference Barzel, Y. (1982). Measurement cost and the organization of markets. The Journal of Law and Economics, 25(1), 27–48.CrossRef Barzel, Y. (1982). Measurement cost and the organization of markets. The Journal of Law and Economics, 25(1), 27–48.CrossRef
go back to reference Benson, B. (1998). How to secede in business without really leaving: Evidence of the substitution of arbitration for litigation. In D. Gordon (Ed.), Secession, state, and liberty. New Brunswick, NJ: Transaction Benson, B. (1998). How to secede in business without really leaving: Evidence of the substitution of arbitration for litigation. In D. Gordon (Ed.), Secession, state, and liberty. New Brunswick, NJ: Transaction
go back to reference Berendt, B., Günther, O., & Spiekermann, S. (2005). Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101–106.CrossRef Berendt, B., Günther, O., & Spiekermann, S. (2005). Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101–106.CrossRef
go back to reference Berman, J., & Mulligan, D. (1998). Privacy in the digital age: Work in progress. Nova Law Review, 23, 551–582. Berman, J., & Mulligan, D. (1998). Privacy in the digital age: Work in progress. Nova Law Review, 23, 551–582.
go back to reference Boettke, P. J., & Candela, R. A. (2017). Price theory as prophylactic against popular fallacies. Journal of Institutional Economics, 13(3), 725–752.CrossRef Boettke, P. J., & Candela, R. A. (2017). Price theory as prophylactic against popular fallacies. Journal of Institutional Economics, 13(3), 725–752.CrossRef
go back to reference Brown, I. (2016). The economics of privacy, data protection and surveillance. In Handbook on the economics of the internet. Available at SSRN 2358392 (2013). Brown, I. (2016). The economics of privacy, data protection and surveillance. In Handbook on the economics of the internet. Available at SSRN 2358392 (2013).
go back to reference Calo, R. (2013). Digital market manipulation. George Washington Law Review, 82, 995–1051. Calo, R. (2013). Digital market manipulation. George Washington Law Review, 82, 995–1051.
go back to reference Clark, J. R., & Powell, B. (2013). Sweatshop working conditions and employee welfare: Say it ain’t sew. Comparative Economic Studies, 55(2), 343–357.CrossRef Clark, J. R., & Powell, B. (2013). Sweatshop working conditions and employee welfare: Say it ain’t sew. Comparative Economic Studies, 55(2), 343–357.CrossRef
go back to reference Cooper, J. C. (2012). Privacy and antitrust: Underpants gnomes, the first amendment, and subjectivity. George Mason Law Review, 20, 1129–1146. Cooper, J. C. (2012). Privacy and antitrust: Underpants gnomes, the first amendment, and subjectivity. George Mason Law Review, 20, 1129–1146.
go back to reference De Corniere, A., & De Nijs, R. (2016). Online advertising and privacy. The Rand Journal of Economics, 47(1), 48–72.CrossRef De Corniere, A., & De Nijs, R. (2016). Online advertising and privacy. The Rand Journal of Economics, 47(1), 48–72.CrossRef
go back to reference Demsetz, H. (1969). Information and efficiency: Another viewpoint. The Journal of Law and Economics, 12(1), 1–22.CrossRef Demsetz, H. (1969). Information and efficiency: Another viewpoint. The Journal of Law and Economics, 12(1), 1–22.CrossRef
go back to reference Farrell, J. (2012). Can privacy be just another good? Journal on Telecommunications and High Technology Law, 10, 251–264. Farrell, J. (2012). Can privacy be just another good? Journal on Telecommunications and High Technology Law, 10, 251–264.
go back to reference Fuller, C. S. (2018). Privacy law as price control. European Journal of Law and Economics, 45(2), 225–250.CrossRef Fuller, C. S. (2018). Privacy law as price control. European Journal of Law and Economics, 45(2), 225–250.CrossRef
go back to reference Gertz, J. D. (2002). The purloined personality: Consumer profiling in financial services. San Diego Law Review, 39, 943. Gertz, J. D. (2002). The purloined personality: Consumer profiling in financial services. San Diego Law Review, 39, 943.
go back to reference Hermalin, B. E., & Katz, M. L. (2004). Sender or receiver: Who should pay to receive an electronic message? RAND Journal of Economics, 35(3), 423–448.CrossRef Hermalin, B. E., & Katz, M. L. (2004). Sender or receiver: Who should pay to receive an electronic message? RAND Journal of Economics, 35(3), 423–448.CrossRef
go back to reference Hermalin, B. E., & Katz, M. L. (2006). Privacy, property rights and efficiency: The economics of privacy as secrecy. Quantitative Marketing and Economics, 4(3), 209–239.CrossRef Hermalin, B. E., & Katz, M. L. (2006). Privacy, property rights and efficiency: The economics of privacy as secrecy. Quantitative Marketing and Economics, 4(3), 209–239.CrossRef
go back to reference Hirsch, D. D. (2010). The law and policy of online privacy: Regulation, self-regulation, or co-regulation. Seattle University Law Review, 34, 439–480. Hirsch, D. D. (2010). The law and policy of online privacy: Regulation, self-regulation, or co-regulation. Seattle University Law Review, 34, 439–480.
go back to reference Hoofnagle, C. J. (2003). Reflections on the NC JOLT symposium: The privacy self-regulation race to the bottom. NCJL & Tech., 5, 213–217. Hoofnagle, C. J. (2003). Reflections on the NC JOLT symposium: The privacy self-regulation race to the bottom. NCJL & Tech., 5, 213–217.
go back to reference Hoofnagle, C.J. (2006). Privacy self regulation: A decade of disappointment. In: J. K. Winn (Ed.), Consumer Protection in the Age of the 'Information Economy. Hoofnagle, C.J. (2006). Privacy self regulation: A decade of disappointment. In: J. K. Winn (Ed.), Consumer Protection in the Age of the 'Information Economy.
go back to reference Hoofnagle, C. J. (2009). Beyond Google and evil: How policy makers, journalists and consumers should talk differently about Google and privacy. First Monday, 14, 4–6.CrossRef Hoofnagle, C. J. (2009). Beyond Google and evil: How policy makers, journalists and consumers should talk differently about Google and privacy. First Monday, 14, 4–6.CrossRef
go back to reference Hoofnagle, C. J., & Whittington, J. (2013). Free: Accounting for the costs of the internet’s most popular price. UCLA Law Review, 61, 606–670. Hoofnagle, C. J., & Whittington, J. (2013). Free: Accounting for the costs of the internet’s most popular price. UCLA Law Review, 61, 606–670.
go back to reference Hoofnagle, C.J., Soltani, A., Good, N., & Wambach, D.J. (2012). Behavioral advertising: The offer you can't refuse. Harvard Law & Policy Review, 6, 273–296 Hoofnagle, C.J., Soltani, A., Good, N., & Wambach, D.J. (2012). Behavioral advertising: The offer you can't refuse. Harvard Law & Policy Review, 6, 273–296
go back to reference Hui, K. L., & Png, I. (2005). Economics of privacy. In Handbook of information systems and economics. Available at SSRN 786846. Hui, K. L., & Png, I. (2005). Economics of privacy. In Handbook of information systems and economics. Available at SSRN 786846.
go back to reference Goldfarb, A., & Tucker, C.E. (2011). Privacy regulation and online advertising. Management Science, 57(1), 57–71CrossRef Goldfarb, A., & Tucker, C.E. (2011). Privacy regulation and online advertising. Management Science, 57(1), 57–71CrossRef
go back to reference John, L. K., Acquisti, A., & Loewenstein, G. (2011). Strangers on a plane: context-dependent willingness to divulge sensitive information. Journal of Consumer Research, 37(5), 858–873.CrossRef John, L. K., Acquisti, A., & Loewenstein, G. (2011). Strangers on a plane: context-dependent willingness to divulge sensitive information. Journal of Consumer Research, 37(5), 858–873.CrossRef
go back to reference Leeson, P. T. (2007). Better off stateless: Somalia before and after government collapse. Journal of Comparative Economics, 35(4), 689–710.CrossRef Leeson, P. T. (2007). Better off stateless: Somalia before and after government collapse. Journal of Comparative Economics, 35(4), 689–710.CrossRef
go back to reference Leeson, P. T. (2008). Social distance and self-enforcing exchange. The Journal of Legal Studies, 37(1), 161–188.CrossRef Leeson, P. T. (2008). Social distance and self-enforcing exchange. The Journal of Legal Studies, 37(1), 161–188.CrossRef
go back to reference Leeson, P. T. (2014). Pirates, prisoners, and preliterates: anarchic context and the private enforcement of law. European Journal of Law and Economics, 37(3), 365–379.CrossRef Leeson, P. T. (2014). Pirates, prisoners, and preliterates: anarchic context and the private enforcement of law. European Journal of Law and Economics, 37(3), 365–379.CrossRef
go back to reference Leeson, P. T., & Coyne, C. J. (2012). Conflict-inhibiting norms. Oxford handbook of the economics of peace and conflict. Oxford: Oxford University Press. Leeson, P. T., & Coyne, C. J. (2012). Conflict-inhibiting norms. Oxford handbook of the economics of peace and conflict. Oxford: Oxford University Press.
go back to reference Marthews, A., & Tucker, C. (2017). Government surveillance and internet search behavior. Available at SSRN 2412564. Marthews, A., & Tucker, C. (2017). Government surveillance and internet search behavior. Available at SSRN 2412564.
go back to reference Milberg, S., Smith, J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.CrossRef Milberg, S., Smith, J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.CrossRef
go back to reference Newman, N. (2013). The costs of lost privacy: Consumer harm and rising economic inequality in the age of Google. William Mitchell Law Review, 40, 849. Newman, N. (2013). The costs of lost privacy: Consumer harm and rising economic inequality in the age of Google. William Mitchell Law Review, 40, 849.
go back to reference Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126.CrossRef Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126.CrossRef
go back to reference Odlyzko, A. (2003). Privacy, economics, and price discrimination on the Internet. In Proceedings of the 5th international conference on electronic commerce (pp. 355–366). ACM. Odlyzko, A. (2003). Privacy, economics, and price discrimination on the Internet. In Proceedings of the 5th international conference on electronic commerce (pp. 355–366). ACM.
go back to reference Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701–1777. Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701–1777.
go back to reference Penney, J. (2016). Chilling effects: Online surveillance and Wikipedia use. Berkeley Technology Law Journal, 31, 117–182. Penney, J. (2016). Chilling effects: Online surveillance and Wikipedia use. Berkeley Technology Law Journal, 31, 117–182.
go back to reference Rose, E.A. (2005). Data users versus data subjects: are consumers willing to pay for property rights to personal information? In Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Washington, D.C.: IEEE Computer Society Press. Rose, E.A. (2005). Data users versus data subjects: are consumers willing to pay for property rights to personal information? In Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Washington, D.C.: IEEE Computer Society Press.
go back to reference Sachs, B. R. (2009). Consumerism and information privacy: How Upton Sinclair can again save us from ourselves. Virginia Law Review, 95(1), 205–252. Sachs, B. R. (2009). Consumerism and information privacy: How Upton Sinclair can again save us from ourselves. Virginia Law Review, 95(1), 205–252.
go back to reference Savage, S. J., & Waldman, D. M. (2015). Privacy tradeoffs in smartphone applications. Economics Letters, 137, 171–175.CrossRef Savage, S. J., & Waldman, D. M. (2015). Privacy tradeoffs in smartphone applications. Economics Letters, 137, 171–175.CrossRef
go back to reference Solove, D. J. (2004). The digital person: Technology and privacy in the information age. New York: NYU Press. Solove, D. J. (2004). The digital person: Technology and privacy in the information age. New York: NYU Press.
go back to reference Stigler, G. J. (1961). The economics of information. Journal of Political Economy, 69(3), 213–225.CrossRef Stigler, G. J. (1961). The economics of information. Journal of Political Economy, 69(3), 213–225.CrossRef
go back to reference Strandburg, K. J. (2013). Free fall: The online market’s consumer preference disconnect. University of Chicago Legal Forum, 5, 95–172. Strandburg, K. J. (2013). Free fall: The online market’s consumer preference disconnect. University of Chicago Legal Forum, 5, 95–172.
go back to reference Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268.CrossRef Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268.CrossRef
go back to reference Tucker, C. E. (2012). The economics of advertising and privacy. International Journal of Industrial Organization, 30(3), 326–329.CrossRef Tucker, C. E. (2012). The economics of advertising and privacy. International Journal of Industrial Organization, 30(3), 326–329.CrossRef
go back to reference Turow, J., King, J., Hoofnagle, C. J., Bleakley, A., & Hennessy, M. (2009). Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214. Turow, J., King, J., Hoofnagle, C. J., Bleakley, A., & Hennessy, M. (2009). Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214.
go back to reference Varian, H. R. (2002). Economic aspects of personal privacy. In W.H. Lehr & L. Pupillo (Eds.), Cyber Policy and Economics in an Internet Age (pp. 127–137). Boston, MA: Springer. Varian, H. R. (2002). Economic aspects of personal privacy. In W.H. Lehr & L. Pupillo (Eds.), Cyber Policy and Economics in an Internet Age (pp. 127–137). Boston, MA: Springer.
go back to reference Vila, T., Greenstadt, R., & Molnar, D. (2004). Why we can’t be bothered to read privacy policies. In L. J. Camp & S. Lewis (Eds.), Economics of information security (pp. 143–153). Berlin: Springer.CrossRef Vila, T., Greenstadt, R., & Molnar, D. (2004). Why we can’t be bothered to read privacy policies. In L. J. Camp & S. Lewis (Eds.), Economics of information security (pp. 143–153). Berlin: Springer.CrossRef
go back to reference Williamson, O. E. (1983). Credible commitments: using hostages to support exchange. The American Economic Review, 73(4), 519–540. Williamson, O. E. (1983). Credible commitments: using hostages to support exchange. The American Economic Review, 73(4), 519–540.
Metadata
Title
Is the market for digital privacy a failure?
Author
Caleb S. Fuller
Publication date
13-02-2019
Publisher
Springer US
Published in
Public Choice / Issue 3-4/2019
Print ISSN: 0048-5829
Electronic ISSN: 1573-7101
DOI
https://doi.org/10.1007/s11127-019-00642-2

Other articles of this Issue 3-4/2019

Public Choice 3-4/2019 Go to the issue