The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (2009 vol.7)
pp: 82-85
Alessandro Acquisti , Carnegie Mellon University
Privacy decisions often involve balancing competing interests. As such, they're a natural field of study for economics. But traditional economic models have made overly restrictive assumptions about the stability and nature of individual privacy preferences. Approaches drawing on existing research in behavioral economics and psychology can offer complementary tools for understanding privacy decision making.
privacy, behavioral economics, asymmetric paternalism
Alessandro Acquisti, "Nudging Privacy: The Behavioral Economics of Personal Information", IEEE Security & Privacy, vol.7, no. 6, pp. 82-85, November/December 2009, doi:10.1109/MSP.2009.163
1. T. Clark-Flory, "30 Reasons Girls Should Call It a Night,", 5 Nov. 2007; facebookindex.html.
2. R.A. Posner, "The Economics of Privacy," Am. Economic Rev., vol. 71, no. 2, 1981, pp. 405–409.
3. G.J. Stigler, "An Introduction to Privacy in Economics and Politics," J. Legal Studies, vol. 9, 1980, pp. 623–644.
4. H.R. Varian, "Economic Aspects of Personal Privacy," Privacy and Self-Regulation in the Information Age, Nat'l Telecommunications and Information Administration, 1996.
5. E.M. Noam, "Privacy and Self-Regulation: Markets for Electronic Privacy," Privacy and Self-Regulation in the Information Age, Nat'l Telecommunications and Information Administration, 1996.
6. R.S. Laufer and M. Wolfe, "Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory," J. Social Issues, vol. 33, no. 3, 1977, pp. 22–42.
7. M.J. Culnan and P.K. Armstrong, "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science, vol. 10, no. 1, 1999, pp. 104–115.
8. I. Simonson and A. Tversky, "Choice in Context: Tradeoff Contrast and Extremeness Aversion," J. Marketing Research, vol. 29, no. 3, 1992, pp. 281–295.
9. P. Slovic, "The Construction of Preference," American Psychologist, vol. 50, no. 5, 1995, pp. 364–371.
10. A. Acquisti, "Privacy in Electronic Commerce and the Economics of Immediate Gratification," Proc. ACM Electronic Commerce Conf. (ACM EC 04), ACM Press, 2004, pp. 21–29.
11. A. Acquisti, L. John, and G. Loewenstein, What is Privacy Worth?, tech. report, Heinz College, Carnegie Mellon Univ., 2009.
12. L. Brandimarte, A. Acquisti, and G. Loewenstein, "Privacy Concerns and Information Disclosure: An Illusion of Control Hypothesis," poster, iConference, 2009; Privacy_concerns_and_information_disclosure.pdf .
13. S.T. Margulis, "Psychology and Privacy," Contours of Privacy, D. Matheson ed., Cambridge Scholars Publishing, 2009; .
14. L. Cranor, "A Framework for Reasoning about the Human in the Loop," , Proc 1st Conf. Usability, Psychology, and Security, Usenix Assoc., 2008, pp. 1–15.
15. B. Schneier, "The Psychology of Security," Progress in Cryptology—Proc. 1st Int'l Conf. Cryptology in Africa (AFRICACRYPT 08), LNCS 5023, Springer-Verlag, 2008, pp. 50–79.
16. G. Loewenstein and E. Haisley, "The Economist as Therapist: Methodological Ramifications of 'Light' Paternalism," Perspectives on the Future of Economics: Positive and Normative Foundations, Oxford Univ. Press, 2007.
17. R.H. Thaler and C.R. Sunstein, Nudge: Improving Decisions About Health, Wealth, and Happiness, Yale Univ. Press, 2008.
18. A. Acquisti and R. Gross, "Predicting Social Security Numbers from Public Data," Proc. Nat'l Academy of Science, vol. 106, no. 27, 2009, pp. 10,975–10,980.
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool