The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2008 vol.6)
pp: 46-50
Alessandro Acquisti , Carnegie Mellon University
ABSTRACT
In the economics literature, privacy is usually discussed in the context of consumers' preferences and price discrimination: merchants are interested in finding out a consumer's preferences, because from the latter they can infer the consumer's maximum willingness to pay for a good. However, economists also acknowledge that consumer privacy is not just about hiding the price you may pay for a good: during any economic transaction a consumer may rationally want to share with a merchant certain types of personal data while keeping others private. Identity management systems can support such selective information revelation strategies, allowing for economic transactions in which some level of information sharing is accompanied by some level of information hiding. In this paper we discuss what forms of privacy of personal data are compatible with merchants' interests in knowing more about their consumers and their preferences, and examine several ways in which identity management systems can protect certain types of information privacy while simultaneously enabling personalization and price discrimination.
INDEX TERMS
Privacy, identity management systems, economics, price discrimination
CITATION
Alessandro Acquisti, "Identity Management, Privacy, and Price Discrimination", IEEE Security & Privacy, vol.6, no. 2, pp. 46-50, March/April 2008, doi:10.1109/MSP.2008.35
REFERENCES
1. A. Acquisti and H.R. Varian, "Conditioning Prices on Purchase History," Marketing Science, vol. 24, no 3, 2005, pp. 1–15.
2. C.R. Taylor, "Consumer Privacy and the Market for Customer Information," RAND J. Economics, vol. 35, no. 4, 2004, pp. 631–651.
3. G. Calzolari and A. Pavan, "On the Optimality of Privacy in Sequential Contracting," J. Economic Theory, vol. 130, no. 1, 2006.
4. A. Acquisti, "Privacy and Security of Personal Information: Economic Incentives and Technological Solutions," The Economics of Information Security, J. Camp and S. Lewis, eds., Kluwer, 2004.
5. B. Hermalin and M. Katz, "Privacy, Property Rights and Efficiency: The Economics of Privacy as Secrecy," Quantitative Marketing and Economics, vol. 4, no. 3, 2006, pp. 209–239.
6. H. Varian, Economic Aspects of Personal Privacy, in Privacy and Self-Regulation in the Information Age, NTIA report, 1996; www.sims.berkeley.edu/hal/people/halpapers.html .
7. D. Chaum, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Comm. ACM, vol. 28, no. 10, 1985, pp. 1030–1044.
8. S. Brands, Rethinking Public Key Infrastructure and Digital Certificates: Building in Privacy, MIT Press, 2000.
9. M. Hansen et al., "Privacy-Enhancing Identity Management," Information Security Tech. Report, vol. 11, no. 3, 2006, pp. 119–128.
10. D. Chaum, "Blind Signatures for Untraceable Payments," Advances in Cryptology (CRYPTO 82), Plenum Press, 1983, pp. 199–203.
11. S. Low, N.F. Maxemchuk, and S. Paul, "Anonymous Credit Cards," Proc. 2nd ACM Conf. Computer and Communications Security, ACM Press, 1994, pp. 108–117.
12. "Amazon, The Software Company," Economist,18 Dec. 2001; www.economist.comdisplayStory.cfm?Story_ID=393096 .
13. H.R. Varian, "Price Discrimination and Social Welfare," Am. Economic Rev., vol. 75, no. 4, 1985, pp. 870–875.
14. A. Odlyzko, "Privacy, Economics, and Price Discrimination on the Internet," Proc. 5th Int'l Conf. Electronic Commerce, ACM Press, 2003, pp. 355–366.
15. A. Odlyzko, "The Evolution of Price Discrimination in Transportation and Its Implications for the Internet," Rev. Network Economics, vol. 3, no. 3, 2004, pp. 323–346.
16. A. Odlyzko, "Privacy and the Clandestine Evolution of E-Commerce," Proc. 9th Intl Conf. Electronic Commerce (ICEC 07), ACM Press, 2007, pp. 3–6.
17. P. Das Chowdhury, B. Christianson, and J. Malcolm, "Privacy Systems with Incentives, Proc. First Int'l Workshop Information Systems, 2006.
18. P. Das Chowdhury, Anonymity and Trust in the Electronic World, PhD thesis, computer science dept., Univ. of Hertfordshire, 2005.
19. A. Acquisti, "Personalized Pricing, Privacy Technologies, and Consumer Acceptance," CHI Workshop on Personalization and Privacy, 2006; www.isr.uci.edu/pep06/papersProceedings_PEP06.pdf .
20. S. Koble and R. Böhme, "Economics of Identity Management: A Supply-Side Perspective," Privacy Enhancing Technologies Workshop (PET 05), G. Danezis and D. Martin, eds., 2006, pp. 259–272; www.petworkshop.org/2005/workshopcall.html .
21. R. Böhme and S. Koble, "On the Viability of Privacy-Enhancing Technologies in a Self-regulated Business-to-Consumer Market: Will Privacy Remain a Luxury Good?," Proc. Workshop on Economics of Information Security (WEIS 07), 2007.
22. S. Spiekermann, "Individual Price Discrimination: An Impossibility?," CHI Workshop on Personalization and Privacy, 2006; www.isr.uci.edu/pep06/papersProceedings_PEP06.pdf .
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool