Skip to main content
Log in

The challenges of personal data markets and privacy

Electronic Markets Aims and scope Submit manuscript

Abstract

Personal data is increasingly conceived as a tradable asset. Markets for personal information are emerging and new ways of valuating individuals’ data are being proposed. At the same time, legal obligations over protection of personal data and individuals’ concerns over its privacy persist. This article outlines some of the economic, technical, social, and ethical issues associated with personal data markets, focusing on the privacy challenges they raise.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. BCG Report published in the Liberty Global Policy Series; available at: http://www.libertyglobal.com/PDF/public-policy/The-Value-of-Our-Digital-Identity.pdf (last visited March, 20th, 2015)

References

  • Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce (pp. 21–29). ACM.

  • Acquisti, A. (2009). Nudging privacy: the behavioral economics of personal information. IEEE Security and Privacy Magazine, 7(6), 82–85.

    Article  Google Scholar 

  • Acquisti, A. (2010). The economics of personal data and the economics of privacy. Background Paper for OECD Joint WPISP-WPIE Roundtable, 1.

  • Acquisti, A. (2014). The economics and behavioral economics of privacy. In: J. Lane, V. Stodden, S. Bender, H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement. Cambridge University Press.

  • Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security and Privacy Magazine, 3(1), 26–33.

    Article  Google Scholar 

  • Acquisti, A., & Varian, H. (2005). Conditioning prices on purchase history. Marketing Science, 24(3), 367–381.

    Article  Google Scholar 

  • Acquisti, A., Friedman, A., Telang, R. (2006). Is there a cost to privacy breaches? An event study analysis. Proc International Conference on Information Systems (ICIS), Milwaukee.

  • Acquisti, A., John, L. K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies, 42(2), 249–274.

    Article  Google Scholar 

  • Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13–28.

    Google Scholar 

  • Berendt, B., Guenther, O., & Spiekermann, S. (2005). Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101–106.

    Article  Google Scholar 

  • Berthold, S., & Böhme, R. (2009). Valuating privacy with option pricing theory. In T. Moore, D. Pym, & C. Ioannidis (Eds.), Economics of information security and privacy (pp. 187–209). New York: Springer.

    Google Scholar 

  • Böhme, R., & Koble, S. (2007). Pricing strategies in electronic marketplaces with privacy-enhancing technologies. Wirtschaftsinformatik, 49(1), 16–25.

    Article  Google Scholar 

  • Böhme, R., & Pötzsch, S. (2010). Privacy in online social lending. Proc AAAI Spring Symposium: Intelligent Information Privacy Management, Palo Alto, pp 23–28.

  • Cao, Z., Hui, K. L., Xu, H. (2014). An economic analysis of peer-disclosure in online social communities. Unpublished manuscript, Hong Kong University of Science and Technology.

  • Chaum, D. (1985). Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10), 1030–1044.

    Article  Google Scholar 

  • Coase, R. (1960). The problem of social cost. Journal of Law and Economics, 3(1), 1–44.

    Article  Google Scholar 

  • Cranor, L. F. (2002). Web privacy with P3P. O’Reilly.

  • Danezis, G., Lewis, S., Anderson, R. J. (2005). How much is location privacy worth? Proc 4th annual Workshop on the Economics of Information Security (WEIS), Harvard Univ.

  • Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80.

    Article  Google Scholar 

  • Dwork, C. (2011). A firm foundation for private data analysis. Communications of the ACM, 54(1), 86–95.

    Article  Google Scholar 

  • Gentry, C. (2010). Computing arbitrary functions of encrypted data. Communications of the ACM, 53(3), 97–105.

    Article  Google Scholar 

  • Goldfarb, A., & Tucker, C. (2011). Online advertising, behavioral targeting, and privacy. Communications of the ACM, 54(5), 25–27.

    Article  Google Scholar 

  • Grossklags, J., & Acquisti, A. (2007). When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. In: WEIS.

  • Hamlin, K. (2013). Market models in the personal data ecosystem. Vienna: European Workshop for Trust and Identity.

    Google Scholar 

  • Hann, I. H., Hui, K. L., Lee, T. S. Y., & Png, I. P. L. (2007). Overcoming online information privacy concerns: an information processing theory approach. Journal of Management Information Systems, 42(2), 13–42.

    Article  Google Scholar 

  • Hansen, M., Berlich, P., Camenisch, J., Clauß, S., Pfitzmann, A., & Waidner, M. (2004). Privacy-enhancing identity management. Information Security Technical Report, 9(1), 35–44.

    Article  Google Scholar 

  • Henkel, J., & von Hippel, E. (2005). Welfare implications of user innovation. Journal of Technology Transfer, 30(1/2), 73–87.

    Google Scholar 

  • Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: an integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298.

    Google Scholar 

  • Huberman, B. A., Adar, E., & Fine, L. R. (2005). Valuating privacy. IEEE Security and Privacy Magazine, 3(1), 22–25.

    Article  Google Scholar 

  • Hui, K. L., & Png, I. P. L. (2006). The economics of privacy. In: T. J. Hendershott (ed), Handbooks in information systems. Vol 1 (pp. 471–493). Elsevier.

  • Hui, K. L., Teo, H. H., & Lee, T. S. Y. (2007). The value of privacy assurance: an exploratory field experiment. MIS Quarterly, 31(1), 19–33.

    Google Scholar 

  • Iachello, G., & Hong, J. (2007). End-user privacy in human-computer interaction. Foundations and Trends in Human-Computer Interaction, 1(1), 1–137.

    Article  Google Scholar 

  • Internet Life Stats (2014). In: Twitter usage [Online]. Available at: http://www.internetlivestats.com/twitter-statistics/#trend.

  • Jentzsch, N., Preibusch, S., & Harasser, A. (2012). Study on monetising privacy. Heraklion: European Network and Information Security Agency (ENISA).

    Google Scholar 

  • John, L., Acquisti, A., & Loewenstein, G. (2011). Strangers on a plane: context-dependent willingness to divulge personal information. Journal of Consumer Research, 37(5), 858–873.

    Article  Google Scholar 

  • Kenny, S., & Korba, L. (2002). Applying digital rights management systems to privacy rights management. Computers & Security, 21(7), 648–664.

    Article  Google Scholar 

  • Laudon, K. C. (1996). Markets and privacy. Communications of the ACM, 39(9), 92–104.

    Article  Google Scholar 

  • Lesk, M. (2012). The price of privacy. IEEE Security and Privacy Magazine, 10(5), 79–81.

    Article  Google Scholar 

  • Li, X., & Sarkar, S. (2006). A data perturbation approach to privacy protection in data mining. Information Systems Research, 17(3), 254–270.

    Article  Google Scholar 

  • Maguire, S., Friedberg, J., Nguyen, M.-H. C., Haynes, P. (2015). A metadata-based architecture for user-centered data accountability. Electronic Markets, 25(2). doi:10.1007/s12525-015-0184-z.

  • Menon, S., Sarkar, S., & Mukherjee, S. (2005). Maximizing accuracy of shares databases when concealing sensitive patterns. Information Systems Research, 16(3), 256–270.

    Article  Google Scholar 

  • NA (2013). Unpublished manuscript submitted to ECIS 2013.

  • Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: personal information disclosure intentions versus behavior. Journal of Consumer Affairs, 41(1), 100–126.

    Article  Google Scholar 

  • Noyes, D. (2014). In: The top 20 valuable Facebook statistics—Updated October 2014. zephoria internet marketing solutions. Available at: https://zephoria.com/social-media/top-15-valuable-facebook-statistics/. Accessed 20 Jan 2015.

  • OECD. (2013). Exploring the economics of personal data: A survey of methodologies for measuring monetary value. In OECD digital economy papers. Paris: OECD.

    Google Scholar 

  • Pearson, S., & Mont, M. C. (2011). Sticky policies: an approach for managing privacy across multiple parties. IEEE Computer, 44(9), 60–68.

    Article  Google Scholar 

  • Purtova, N. (2012). Property rights in personal data: A European perspective. Uitgeverij: BOX Press.

    Google Scholar 

  • Radicati, S. (2014). E-mail statistics report, 2014–2018. Paolo Alto: The Radicati Group Inc.

    Google Scholar 

  • Roeber, B., Rehse, O., Knorrek, R., Thomsen, B. (2015). Personal data: how context shapes consumers’ data sharing with organizations from various sectors. Electronic Markets 25(2). doi:10.1007/s12525-015-0183-0.

  • Romanosky, S., Hoffman, D., Acquisti, A. (2012). Empirical analysis of data breach litigation. Proc 11th annual Workshop on the Economics of Information Security (WEIS). Berlin.

  • Sackmann, S., Strüker, J., & Accorsi, R. (2006). Personalization in privacy-aware highly dynamic systems. Communications of the ACM, 49(9), 32–38.

    Article  Google Scholar 

  • Samuelson, P. (2000). Privacy as intellectual property?. Stanford Law Review, 1125–1173.

  • Schunter, M., & Powers, C. (2003). The enterprise privacy authorization language (EPAL 1.1). http://www.zurich.ibm.com/security/enterprise-privacy/epal/. Accessed 28 Feb 2013.

  • Schwartz, P. M. (2004). Property, privacy, and personal data. Harvard Law Review, 117(7), 2056–2128.

    Article  Google Scholar 

  • Searls, D. (2012). The intention economy. Boston: Harvard Business.

    Google Scholar 

  • Shapiro, C., & Varian, H. (1998). Information rules. Boston: Harvard Business.

    Google Scholar 

  • Smith, J. H., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.

    Article  Google Scholar 

  • Solove, D. J. (2005). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477–560.

    Article  Google Scholar 

  • Spiekermann, S., & Novotny, A. (2015). A vision for global privacy bridges: technical and legal measures for international data markets. Compuer Law & Security Review (CLSR), 31(2), 181–200.

    Article  Google Scholar 

  • Spiekermann, S., Korunovska, J., Bauer, C. (2012). Psychology of ownership and asset defence: Why people value their personal information beyond privacy. Proc International Conference on Information Systems (ICIS), Orlando.

  • Sweeney, L. (2002). k-anonymity: a model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, 10(5), 557–570.

    Article  Google Scholar 

  • The Boston Consulting Group (2012). The value of our digital identity. Liberty Global.

  • Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science Technology and Society, 28(1), 20–36.

    Article  Google Scholar 

  • World Economic Forum (2011). Personal data: The emergence of a new asset class. Davos.

  • World Economic Forum (2012). Rethinking personal data: Strengthening trust. Davos.

  • Zwick, D., & Dholakia, N. (2004). Whose identity is it anyway? Consumer representation in the age of database marketing. Journal of Macromarketing, 24(1), 31–43.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarah Spiekermann.

Additional information

Responsible Editors: Rainer Alt and Hans-Dieter Zimmermann

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Spiekermann, S., Acquisti, A., Böhme, R. et al. The challenges of personal data markets and privacy. Electron Markets 25, 161–167 (2015). https://doi.org/10.1007/s12525-015-0191-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12525-015-0191-0

Keywords

JEL classification

Navigation