Advertisement

Privacy Attitudes and Privacy Behavior

Losses, Gains, and Hyperbolic Discounting
  • Alessandro Acquisti
  • Jens Grossklags
Part of the Advances in Information Security book series (ADIS, volume 12)

Keywords

Personal Information Information Security Market Behavior Small Reward Hyperbolic Discount 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Acquisti, Alessandro (2002a). Privacy and security of personal information: Economic incentives and technological solutions. In 1st SIMS Workshop on Economics and Information Security.Google Scholar
  2. Acquisti, Alessandro (2002b). Protecting privacy with economics: Economic incentives for preventive technologies in ubiquitous computing environments. In Workshop on Socially-informed Design of Privacyenhancing Solutions, 4th International Conference on Ubiquitous Computing-UBICOMP’ 02.Google Scholar
  3. Acquisti, Alessandro and Varian, Hal R. (2002). Conditioning prices on purchase history. Technical report, University of California, Berkeley. First draft: 2001. Presented at the European Economic Association Conference, Venice, IT, August 2002.Google Scholar
  4. Ainslie, George W. (1975). Specious reward: A behavioral theory of impulsiveness and impulsive control. Psychological Bulletin, 82:463–496.Google Scholar
  5. Ajzen, Icek (1988). Attitudes, personality, and behavior, chapter 6. Open University Press, Milton-Keynes, England.Google Scholar
  6. Akerlof, George A. (1970). The market for “lemons”: Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84:488–500.Google Scholar
  7. Aronson, Elliot and Mills, Judson (1959). The effect of severity of initiation on the devaluation of forbidden behavior. Journal of Abnormal and Social Psychology, 59:177–181.Google Scholar
  8. Berger, Peter L. (1982). Models of bounded rationality, Vol. I–III. The MIT Press, Cambridge, MA.Google Scholar
  9. Brunk, Benjamin D. (2002). Understanding the privacy space. First Monday, 7. “http://firstmonday.org/issues/issue7_10/brunk/index.html.
  10. Chellappa, Ramnath K. and Sin, Raymong (2002). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. In 2002 Informs Meeting.Google Scholar
  11. Coate, Stephen (1995). Altruism, the samaritan’s dilemna, and government transfer policy. American Economic Review, 85(1):46–57.Google Scholar
  12. Commission, Federal Trade (2000). Privacy online: Fair information practices in the electronic marketplace. http://www.ftc.gov/reports/privacy2000/privacy2000.pdf.
  13. Corey, S.M. (1937). Professional attitudes and actual behavior. Journal of educational psychology, 28(1):271–280.Google Scholar
  14. Eagly, Alice H. and Chaiken, Shelly (1993). The Psychology of Attitudes, chapter 4. Harcourt Brace Jovanovich College Publishers, Fort Worth, TX.Google Scholar
  15. Fazio, Russell H. (1990). Multiple processes by which attitudes guide behavior: The mode model as an integrative framework. Advances in experimental social psychology, 23:75–109.Google Scholar
  16. Festinger, Leon (1957). A theory of cognitive dissonance. Row Peterson, Evanston, IL.Google Scholar
  17. Festinger, Leon and Carlsmith, James M. (1959). Cognitive consequences of forced compliance. Journal of Abnormal and Social Psychology, 58:203–210.Google Scholar
  18. Goffman, Erving (1963). Stigma: Notes on the Management of Spoiled Identity. Prentice-Hall, Englewood Cliffs, NJ.Google Scholar
  19. Harn, Il-Horn, Hui, Kai-Lung, Lee, Tom S., and Png, Ivan P. L. (2002). Online information privacy: Measuring the cost-benefit trade-off. In 23rd International Conference on Information Systems.Google Scholar
  20. Harris Interactive (2002). First major post-9-11 privacy survey finds consumers demanding companies do more to protect privacy; public wants company privacy policies to be independently verified. http://www.harrisinteractive.com/news/allnewsbydate.asp?NewsID=429.
  21. Jupiter Research (2002). Seventy percent of US consumers worry about online privacy, but few take protective action. http://www.jmm.com/xp/jmm/press/2002/pr_060302.xml.
  22. Laibson, David (1997). Golden eggs and hyperbolic discounting. Quarterly Journal of Economics, 62(2):443–477.Google Scholar
  23. LaPiere, Robert (1934). Attitudes versus actions. Social Forces, 13:230–237.Google Scholar
  24. Lemley, Mark (2000). Rational ignorance at the patent office. Technical report, Berkeley Olin Program in Law and Economics, Working Paper Series.Google Scholar
  25. McIntosh, Donald (1969). The Foundations of Human Society. The University of Chicago Press, Chicago, IL.Google Scholar
  26. O’Donoghue, Ted and Rabin, Matthew (2001). Choice and procrastination. Quarterly Journal of Economics, 116(1):121–160.Google Scholar
  27. Rabin, Matthew and O’Donoghue, Ted (2000). The economics of immediate gratification. Journal of Behavioral Decision Making, 13(2):233–250.Google Scholar
  28. Spiekermann, Sarah, Grossklags, Jens, and Berendt, Bettina (2002). Eprivacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. In 3rd ACM Conference on Electronic Commerce-EC’ 01, pages 38–47.Google Scholar
  29. Thaler, Richard and Shefrin, Hersh M. (1981). An economic theory of self-control. The Journal of Political Economy, 89:392–406.CrossRefGoogle Scholar
  30. Varian, Hal R. (1996). Economic aspects of personal privacy. In Privacy and Self-Regulation in the Information Age. National Telecommunications and Information Administration.Google Scholar
  31. Whitten, Alma and Tygar, J. D. (1999). Why Johnny can’t encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium. http://citeseer.nj.nec.com/whitten99why.html.

Copyright information

© Springer Science + Business Media, Inc. 2004

Authors and Affiliations

  • Alessandro Acquisti
    • 1
  • Jens Grossklags
    • 2
  1. 1.H. John Heinz III School of Public Policy and ManagementCarnegie Mellon UniversityItaly
  2. 2.School of Information Management SystemsUniversity of California at BerkeleyUSA

Personalised recommendations