Skip to main content
Top
Published in: Business & Information Systems Engineering 4/2019

21-02-2018 | Research Paper

The Price of Privacy

An Evaluation of the Economic Value of Collecting Clickstream Data

Authors: Annika Baumann, Johannes Haupt, Fabian Gebert, Stefan Lessmann

Published in: Business & Information Systems Engineering | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The analysis of clickstream data facilitates the understanding and prediction of customer behavior in e-commerce. Companies can leverage such data to increase revenue. For customers and website users, on the other hand, the collection of behavioral data entails privacy invasion. The objective of the paper is to shed light on the trade-off between privacy and the business value of customer information. To that end, the authors review approaches to convert clickstream data into behavioral traits, which we call clickstream features, and propose a categorization of these features according to the potential threat they pose to user privacy. The authors then examine the extent to which different categories of clickstream features facilitate predictions of online user shopping patterns and approximate the marginal utility of using more privacy adverse information in behavioral prediction models. Thus, the paper links the literature on user privacy to that on e-commerce analytics and takes a step toward an economic analysis of privacy costs and benefits. In particular, the results of empirical experimentation with large real-world e-commerce data suggest that the inclusion of short-term customer behavior based on session-related information leads to large gains in predictive accuracy and business performance, while storing and aggregating usage behavior over longer horizons has comparably less value.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Show more products
Appendix
Available only for authorised users
Footnotes
1
For example, see the Health Insurance Portability and Accountability Act of 1996 or the California Online Privacy Protection Act of 2003 for the US or the General Data Protection Regulation for EU regulation.
 
2
The calculations are based on the actual number of correctly and incorrectly classified customers across the 50 (2 shops × 5 feature sets × 5 conversion rate) settings. Interested readers find results at this level of detail in the Appendix.
 
Literature
go back to reference Akrivopoulou C, Stylianou A (2009) Navigating in Internet: privacy and the socioeconomic and legal implications of electronic intrusion. IGI Global, HersheyCrossRef Akrivopoulou C, Stylianou A (2009) Navigating in Internet: privacy and the socioeconomic and legal implications of electronic intrusion. IGI Global, HersheyCrossRef
go back to reference Banerjee A, Ghosh J (2001) Clickstream clustering using weighted longest common subsequences. In: Proceedings of the web mining workshop at the 1st SIAM conference on data mining Banerjee A, Ghosh J (2001) Clickstream clustering using weighted longest common subsequences. In: Proceedings of the web mining workshop at the 1st SIAM conference on data mining
go back to reference Bennett PN, White RW, Chu W, Dumais ST, Bailey P, Borisyuk F, Cui X (2012) Modeling the impact of short-and long-term behavior on search personalization. In: Proceedings of the 35th international ACM SIGIR conference on research and development in information retrieval. ACM, pp 185–194 Bennett PN, White RW, Chu W, Dumais ST, Bailey P, Borisyuk F, Cui X (2012) Modeling the impact of short-and long-term behavior on search personalization. In: Proceedings of the 35th international ACM SIGIR conference on research and development in information retrieval. ACM, pp 185–194
go back to reference Boda K, Földes Á, Gulyás G, Imre S (2012). User tracking on the web via cross-browser fingerprinting. In: Information security technology for applications, pp 31–46 Boda K, Földes Á, Gulyás G, Imre S (2012). User tracking on the web via cross-browser fingerprinting. In: Information security technology for applications, pp 31–46
go back to reference Chaffey D (2015) Digital business and e-commerce management, 6th edn. Pearson, London Chaffey D (2015) Digital business and e-commerce management, 6th edn. Pearson, London
go back to reference Chan T, Joseph I, Macasaet C, Kang D, Hardy RM, Ruiz C, Porras R, Baron B, Qazi K, Hannon P, Honda T (2014) Predictive models for determining if and when to display online lead forms. In: Proceedings of the twenty-eighth AAAI conference on artificial intelligence (AAAI), pp 2882–2889 Chan T, Joseph I, Macasaet C, Kang D, Hardy RM, Ruiz C, Porras R, Baron B, Qazi K, Hannon P, Honda T (2014) Predictive models for determining if and when to display online lead forms. In: Proceedings of the twenty-eighth AAAI conference on artificial intelligence (AAAI), pp 2882–2889
go back to reference Cooley R, Mobasher B, Srivastava J (1997) Web mining: information and pattern discovery on the world wide web. In: Proceedings of the ninth IEEE international conference on tools with artificial intelligence. IEEE, pp 558–567 Cooley R, Mobasher B, Srivastava J (1997) Web mining: information and pattern discovery on the world wide web. In: Proceedings of the ninth IEEE international conference on tools with artificial intelligence. IEEE, pp 558–567
go back to reference Dinev T, Xu H, Smith JH, Hart P (2013) Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. Eur J Inf Syst 22:295–316CrossRef Dinev T, Xu H, Smith JH, Hart P (2013) Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. Eur J Inf Syst 22:295–316CrossRef
go back to reference Eckersley P (2010) How unique is your web browser? In: International symposium on privacy enhancing technologies symposium. Springer, Heidelberg, pp 1–18 Eckersley P (2010) How unique is your web browser? In: International symposium on privacy enhancing technologies symposium. Springer, Heidelberg, pp 1–18
go back to reference Elkan C (2001) The foundations of cost-sensitive learning. Int Jt Conf Artif Intell 17:973–978 Elkan C (2001) The foundations of cost-sensitive learning. Int Jt Conf Artif Intell 17:973–978
go back to reference Guo Q, Agichtein E (2010a) Towards predicting web searcher gaze position from mouse movements. In: Proceedings on extended abstracts on human factors in computing systems (CHI), pp 3601–3606 Guo Q, Agichtein E (2010a) Towards predicting web searcher gaze position from mouse movements. In: Proceedings on extended abstracts on human factors in computing systems (CHI), pp 3601–3606
go back to reference Guo Q, Agichtein E (2010b) Ready to buy or just browsing? Detecting web searcher goals from interaction data. In: Proceedings of the 33rd international ACM SIGIR conference on research and development in information retrieval. ACM, pp 130–137 Guo Q, Agichtein E (2010b) Ready to buy or just browsing? Detecting web searcher goals from interaction data. In: Proceedings of the 33rd international ACM SIGIR conference on research and development in information retrieval. ACM, pp 130–137
go back to reference Hoofnagle C, Urban J, Li S (2012) Privacy and modern advertising: most US internet users want ‘do not track’ to stop collection of data about their online activities. In: Amsterdam privacy conference Hoofnagle C, Urban J, Li S (2012) Privacy and modern advertising: most US internet users want ‘do not track’ to stop collection of data about their online activities. In: Amsterdam privacy conference
go back to reference Jiang Q, Tan CH, Wei KK (2012) Cross-website navigation behavior and purchase commitment: a pluralistic field research. In: Proceedings of the Pacific Asia conference on information systems (PACIS) Jiang Q, Tan CH, Wei KK (2012) Cross-website navigation behavior and purchase commitment: a pluralistic field research. In: Proceedings of the Pacific Asia conference on information systems (PACIS)
go back to reference Lee M, Ferguson ME, Garrow LA, Post D (2010) The impact of leisure travelers’ online search and purchase behaviors on promotion effectiveness. Working paper, Georgia Institute of Technology Lee M, Ferguson ME, Garrow LA, Post D (2010) The impact of leisure travelers’ online search and purchase behaviors on promotion effectiveness. Working paper, Georgia Institute of Technology
go back to reference Libert T (2015) Privacy implications of health information seeking on the web. Commun ACM 58:68–77CrossRef Libert T (2015) Privacy implications of health information seeking on the web. Commun ACM 58:68–77CrossRef
go back to reference Lin E (2002) Prioritizing privacy: a constitutional response to the Internet. Berkeley Technol Law J 17:1085–1154 Lin E (2002) Prioritizing privacy: a constitutional response to the Internet. Berkeley Technol Law J 17:1085–1154
go back to reference Lu L, Dunham M, Meng Y (2005) Mining significant usage patterns from clickstream data. In: Advances in web mining and web usage analysis. Springer, Heidelberg, pp 1–17 Lu L, Dunham M, Meng Y (2005) Mining significant usage patterns from clickstream data. In: Advances in web mining and web usage analysis. Springer, Heidelberg, pp 1–17
go back to reference Margineantu DD (2001) Methods for cost-sensitive learning. Doctoral dissertation, Department of Computer Science, Oregon State University Margineantu DD (2001) Methods for cost-sensitive learning. Doctoral dissertation, Department of Computer Science, Oregon State University
go back to reference Masand B., Piatetsky-Shapiro G (1996) A comparison of approaches for maximizing business payoff of prediction models. In: Proceedings of the 2nd international conference on knowledge discovery and data mining, Portland, OR, USA. AAAI Press Menlo Park, pp 195–201 Masand B., Piatetsky-Shapiro G (1996) A comparison of approaches for maximizing business payoff of prediction models. In: Proceedings of the 2nd international conference on knowledge discovery and data mining, Portland, OR, USA. AAAI Press Menlo Park, pp 195–201
go back to reference Moe WW, Chipman H, George EI, McCulloch RE (2002) A Bayesian treed model of online purchasing behavior using in-store navigational clickstream. Revising for 2nd review at Journal of Marketing Research Moe WW, Chipman H, George EI, McCulloch RE (2002) A Bayesian treed model of online purchasing behavior using in-store navigational clickstream. Revising for 2nd review at Journal of Marketing Research
go back to reference Moertini VS, Ibrahim N (2015) Efficient techniques for predicting suppliers churn tendency in e-commerce based on website access data. J Theoret Appl Inf Technol 74(3):300–309 Moertini VS, Ibrahim N (2015) Efficient techniques for predicting suppliers churn tendency in e-commerce based on website access data. J Theoret Appl Inf Technol 74(3):300–309
go back to reference Nikiforakis N, Kapravelos A, Joosen W, Kruegel C, Piessens F, Vigna G (2014) On the workings and current practices of web-based device fingerprinting. IEEE Secur Priv 12:28–36CrossRef Nikiforakis N, Kapravelos A, Joosen W, Kruegel C, Piessens F, Vigna G (2014) On the workings and current practices of web-based device fingerprinting. IEEE Secur Priv 12:28–36CrossRef
go back to reference Padmanabhan B, Zheng Z, Kimbrough SO (2001) Personalization from incomplete data: what you don’t know can hurt. In: Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining, San Francisco, California Padmanabhan B, Zheng Z, Kimbrough SO (2001) Personalization from incomplete data: what you don’t know can hurt. In: Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining, San Francisco, California
go back to reference Padmanabhan B, Zheng Z, Kimbrough SO (2006) An empirical analysis of the value of complete information for eCRM models. MIS Q 30(2):247–267CrossRef Padmanabhan B, Zheng Z, Kimbrough SO (2006) An empirical analysis of the value of complete information for eCRM models. MIS Q 30(2):247–267CrossRef
go back to reference Pai D, Sharang A, Yadagiri MM, Agrawal S (2014) Modelling visit similarity using click-stream data: a supervised approach. In: Web information systems engineering (WISE). Springer, Heidelberg, pp 135–145 Pai D, Sharang A, Yadagiri MM, Agrawal S (2014) Modelling visit similarity using click-stream data: a supervised approach. In: Web information systems engineering (WISE). Springer, Heidelberg, pp 135–145
go back to reference Pitman A, Zanker M (2010). Insights from applying sequential pattern mining to e-commerce click stream data. In: IEEE international conference on data mining workshops (ICDMW). IEEE, pp 967–975 Pitman A, Zanker M (2010). Insights from applying sequential pattern mining to e-commerce click stream data. In: IEEE international conference on data mining workshops (ICDMW). IEEE, pp 967–975
go back to reference Pollach I (2011) Online privacy as a corporate social responsibility: an empirical study. Bus Ethics Europ Rev 20:88–102CrossRef Pollach I (2011) Online privacy as a corporate social responsibility: an empirical study. Bus Ethics Europ Rev 20:88–102CrossRef
go back to reference Rodden K, Fu X, Aula A, Spiro I (2008) Eye-mouse coordination patterns on web search results pages. In: Proceedings of extended abstracts on human factors in computing systems (CHI’08) Rodden K, Fu X, Aula A, Spiro I (2008) Eye-mouse coordination patterns on web search results pages. In: Proceedings of extended abstracts on human factors in computing systems (CHI’08)
go back to reference Sheng VS, Ling CX (2006) Thresholding for making classifiers cost-sensitive. In: Proceedings of the 21st national conference on artificial intelligence. AAAI Press, Boston, MA, USA Sheng VS, Ling CX (2006) Thresholding for making classifiers cost-sensitive. In: Proceedings of the 21st national conference on artificial intelligence. AAAI Press, Boston, MA, USA
go back to reference Sipior JC, Ward BT, Mendoza RA (2011) Online privacy concerns associated with cookies, flash cookies, and web beacons. J Internet Commer 10:1–16CrossRef Sipior JC, Ward BT, Mendoza RA (2011) Online privacy concerns associated with cookies, flash cookies, and web beacons. J Internet Commer 10:1–16CrossRef
go back to reference Skok G (2000) Establishing a legitimate expectation of privacy in clickstream data. Michigan Telecommun Technol Law Rev 6:61–88 Skok G (2000) Establishing a legitimate expectation of privacy in clickstream data. Michigan Telecommun Technol Law Rev 6:61–88
go back to reference Solove DJ (2001) Privacy and power: computer databases and metaphors for information privacy. Stanf Law Rev 53:1393–1462CrossRef Solove DJ (2001) Privacy and power: computer databases and metaphors for information privacy. Stanf Law Rev 53:1393–1462CrossRef
go back to reference Stange M, Funk B (2015) How much tracking is necessary? The learning curve in Bayesian user journey analysis. In: Proceedings of the 23rd European conference on information systems Stange M, Funk B (2015) How much tracking is necessary? The learning curve in Bayesian user journey analysis. In: Proceedings of the 23rd European conference on information systems
go back to reference Van der Meer D, Dutta K, Datta A, Ramamritham K, Navanthe SB (2000) Enabling scalable online personalization on the web. In: Proceedings of the 2nd ACM conference on electronic commerce. ACM, pp 185–196 Van der Meer D, Dutta K, Datta A, Ramamritham K, Navanthe SB (2000) Enabling scalable online personalization on the web. In: Proceedings of the 2nd ACM conference on electronic commerce. ACM, pp 185–196
go back to reference Wu F, Chiu IH, Lin JR (2005) Prediction of the intention of purchase of the user surfing on the web using hidden Markov model. In: Proceedings of international conference on services systems and services management (ICSSSM’05). IEEE, pp 387–390 Wu F, Chiu IH, Lin JR (2005) Prediction of the intention of purchase of the user surfing on the web using hidden Markov model. In: Proceedings of international conference on services systems and services management (ICSSSM’05). IEEE, pp 387–390
Metadata
Title
The Price of Privacy
An Evaluation of the Economic Value of Collecting Clickstream Data
Authors
Annika Baumann
Johannes Haupt
Fabian Gebert
Stefan Lessmann
Publication date
21-02-2018
Publisher
Springer Fachmedien Wiesbaden
Published in
Business & Information Systems Engineering / Issue 4/2019
Print ISSN: 2363-7005
Electronic ISSN: 1867-0202
DOI
https://doi.org/10.1007/s12599-018-0528-2

Other articles of this Issue 4/2019

Business & Information Systems Engineering 4/2019 Go to the issue

Premium Partner