Skip to main content

Wibson: A Case Study of a Decentralized, Privacy-Preserving Data Marketplace

  • Chapter
  • First Online:
Blockchain and Distributed Ledger Technology Use Cases

Part of the book series: Progress in IS ((PROIS))

Abstract

The Internet offers unprecedented opportunities to collect large amounts of personal data at low cost. Typically, it is not only the data collection process but also their further use which is opaque to the individuals. Blockchain technology promises to return Internet users control over their personal data. In this chapter we present and discuss Wibson, a decentralized data marketplace based on the blockchain that provides a way for individuals to control and monetize their personal information in a trusted environment. By using a token and blockchain-enabled smart contracts Wibson allows data sellers and buyers to interact while allowing them to keep their desired level of anonymity. This chapter is based on qualitative interviews and the thorough analysis of the technical documentation. We describe the underlying rationale and functioning of Wibson and provide suggestions for future research at the intersection of blockchain and privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Alashoor, T., Han, S., & Joseph, R. C. (2017). Familiarity with big data, privacy concerns, and self-disclosure accuracy in social networking websites: An APCO model. Communications of the Association for Information Systems, 41, 62–96.

    Google Scholar 

  • Alix, L. (2018). California passes nation’s first statewide consumer privacy law. American banker (183:126), p. 1.

    Google Scholar 

  • Associated Press. (2018). Apple, Amazon, Facebook, Alphabet, and Microsoft are collectively worth more than the entire economy of the United Kingdom. Inc.Com, April 27. https://www.inc.com/associated-press/mindblowing-facts-tech-industry-money-amazon-apple-microsoft-facebook-alphabet.html. Accessed 24 May 2019.

  • Buterin, V. (2014). Ethereum: A next-generation smart contract and decentralized application platform. Ethereum white paper. https://github.com/ethereum/wiki/wiki/White-Paper. Accessed 30 May 2019.

  • Curtis, S. R., Carre, J. R., & Jones, D. N. (2018). Consumer security behaviors and trust following a data breach. Managerial Auditing Journal, 33(4), 425–435.

    Article  Google Scholar 

  • Dorri, A., Steger, M., Kanhere, S. S., & Jurdak, R. (2017a). BlockChain: A distributed solution to automotive security and privacy. IEEE Communications Magazine, 55(12), 119–125

    Google Scholar 

  • Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017b). Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, March, pp. 618–623.

    Google Scholar 

  • Elvy, S. -A. (2017). Paying for privacy and the personal data economy. Columbia Law Review, 117(6), 1369–1459.

    Google Scholar 

  • Glaser, B. G., & Strauss, A. L. (1999). Discovery of grounded theory: Strategies for qualitative research. New Brunswick: Taylor & Francis Inc.

    Google Scholar 

  • Goode, S., Hoehle, H., Venkatesh, V., & Brown, S. A. (2017). User compensation as a data breach recovery action: An investigation of the Sony playstation network breach. MIS Quarterly, 41(3), 703-A16.

    Article  Google Scholar 

  • Gruber, T. R. (1993). A translation approach to portable ontology specifications. Knowledge Acquisition, 5(2), 199–220.

    Article  Google Scholar 

  • Inverardi, P. (2019). The European perspective on responsible computing. Communications of the ACM, 62(4), 64–69.

    Article  Google Scholar 

  • Kemppainen, L., Koivumäki, T., Pikkarainen, M., & Poikola, A. (2018). Emerging revenue models for personal data platform operators: When individuals are in control of their data. Journal of Business Models, 6(3), 79–105.

    Google Scholar 

  • Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In 2016 IEEE Symposium on Security and Privacy (SP), May, pp. 839–858.

    Google Scholar 

  • Kugler, L. (2018). The war over the value of personal data. Communications of the ACM, 61(2), 17–19.

    Article  Google Scholar 

  • Lilly, G. M. (2004). Device for and Method of One-Way Cryptographic Hashing. US Patents.

    Google Scholar 

  • Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81(1), 36–58.

    Article  Google Scholar 

  • Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126.

    Article  Google Scholar 

  • Parra-Arnau, J. (2018). Optimized, direct sale of privacy in personal data marketplaces. Information Sciences, 424, 354–384.

    Article  Google Scholar 

  • Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go? MIS Quarterly, 35(4), 977–988.

    Article  Google Scholar 

  • Protocol Labs. (2019). The IPFS project. https://ipfs.io/. Accessed 25 Jan 2018.

  • Scheeres, J. (2001). My shoe size? It’ll cost you. Wired. https://www.wired.com/2001/06/my-shoe-size-itll-cost-you/. Accessed 12 May 2019.

  • Sprenger, P. (1999). Sun on privacy: ‘Get over it.’ Wired. https://www.wired.com/1999/01/sun-on-privacy-get-over-it/. Accessed 10 April 2019.

  • Travizano, M., Minnoni, M., Ajzenman, G., Sarraute, C., & Della Penna, N. (2018). Wibson: A decentralized marketplace empowering individuals to safely monetize their personal data. White paper. https://wibson.org/#app. Accessed 5 June 2019.

  • Treiblmaier, H. (2018). The impact of the blockchain on the supply chain: A theory-based research framework and a call for action. Supply Chain Management: An International Journal, 23(6), 545–559.

    Article  Google Scholar 

  • Treiblmaier, H. (2019). Toward more rigorous blockchain research: Recommendations for writing blockchain case studies. Frontiers in Blockchain, 2(3), 1–15.

    Google Scholar 

  • Treiblmaier, H., & Pollach, I. (2011). The influence of privacy concerns on perceptions of web personalisation. International Journal of Web Science, 1(1/2), 3–20.

    Article  Google Scholar 

  • Urquhart, C. (2012). Grounded theory for qualitative research: A practical guide. SAGE Publications Ltd., London, Los Angeles.

    Google Scholar 

  • Vogelsteller, F., & Buterin, V. (2015). ERC-20 token standard. Eip-20-Token-Standard.Md. https://github.com/ethereum/EIPs/blob/master/EIPS/eip-20-token-standard.md. Accessed 23 June 2019.

  • Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, Vol. 151. https://gavwood.com/paper.pdf. Accessed 5 June 2019.

  • Yin, R. K. (2013). Case study research (5th ed.). Los Angeles: Sage Publications.

    Google Scholar 

  • Yue, X., Wang, H., Jin, D., Li, M., & Jiang, W. (2016). Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control. Journal of Medical Systems, 40(10), 218.

    Google Scholar 

  • Yun, H., Lee, G., & Kim, D. J. (2019). A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs. Information & Management, 56(4), 570–601.

    Article  Google Scholar 

  • ZawadziÅ„ski, M. (2015). The truth about online privacy: How your data is collected, shared, and sold—clearcode blog. Clearcode—Enterprise-grade software development. https://clearcode.cc/blog/online-privacy-user-data/. Accessed 24 May 2019.

  • Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops, pp. 180–184.

    Google Scholar 

Download references

Acknowledgements

The authors thank Daniel Fernandez, Cristian Adamo, Ariel Futoransky, Gustavo Ajzenman and Martin Manelli for their work on the implementation of the Wibson platform.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matias Travizano .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Travizano, M., Sarraute, C., Dolata, M., French, A.M., Treiblmaier, H. (2020). Wibson: A Case Study of a Decentralized, Privacy-Preserving Data Marketplace. In: Treiblmaier, H., Clohessy, T. (eds) Blockchain and Distributed Ledger Technology Use Cases. Progress in IS. Springer, Cham. https://doi.org/10.1007/978-3-030-44337-5_8

Download citation

Publish with us

Policies and ethics