Conformity or Diversity: Social Implications of Transparency in Personal Data Processing
Consider the hypothetical situation of a society with virtually unconstrained storage and exchange of personal information, and shameless exploitation thereof for decision making, for example in contract negotiation. In this chapter we develop a stylised formal model to tackle the question if public knowledge about how exactly personal information is used in decision making changes aggregate behaviour. Simulation results suggest a slightly positive relationship between transparency and conformity, i.e., people tend to behave alike. This has implications on the common conjecture that collection and processing of personal information is tolerable as long as transparency is warranted.
KeywordsPenalty Function Personal Information Information Asymmetry Privacy Concern Data Owner
- Adams, C. “A Classification for Privacy Techniques,” University of Ottawa Law]& Technology Journal 3(1), 2006, 5-52.Google Scholar
- Acquisti, A., and Grossklags, J. “Privacy Attitudes and Privacy Behaviour: Losses, Gains, and Hyperbolic Discounting,” in The Economics of Information Security, Camp, L. J., and Levis, R. (Eds.), Kluwer, 2004, pp. 165-178.Google Scholar
- Baran, P. “Communications, Computers and People,” Technical report, RAND Corporation, Santa Monica, CA, 1965.Google Scholar
- Bouckaert, J., and Degryse, H. “Opt in Versus Opt Out: A Free-entry Analysis of Privacy Policies,” in 5th Workshop on the Economics of Information Security (WEIS), Cambridge, United Kingdom, June 2006.Google Scholar
- Böhme, R., and Koble, S. “On the Viability of Privacy-enhancing Technologies in a Self-regulated Business-to-Consumer Market: Will Privacy Remain a Luxury Good?”, in 6th Workshop on the Economics of Information Security (WEIS), Pittsburgh, PA, June 2007.Google Scholar
- Brandt, F. “Fully Private Auctions in a Constant Number of Rounds,” in Proceedings of Financial Cryptography, Wright, R. N. (Ed.), LNCS 2742, Springer-Verlag, Berlin, 2003, pp. 223-238. (Revised version available at http://www.tcs.ifi.lmu.de/~brandtf/papers/fc2003.pdf)
- Brin, D., The Transparent Society, Perseus Books, Reading, MA, 1998.Google Scholar
- Bellotti, V., and Sellen, A. “Design for Privacy in Ubiquitous Computing Environments,” in ECSCW’93: Proceedings of European Conference on Computer-Supported Cooperative Work, Kluwer, 1993, pp. 77-92.Google Scholar
- Dodds, S. “Hiding, Seeking, and the Evolution of Privacy Behaviour,” in 6th Workshop on the Economics of Information Security (WEIS), Pittsburgh, PA, June 2007.Google Scholar
- Ferraiolo, D. F., and Kuhn, D. R. “Role Based Access Control”, in Proceedings of the 15th National Computer Security Conference, 1992.Google Scholar
- Goldberg, I., Wagner, D., and Brewer, E. “Privacy-enhancing Technologies for the Internet,” in Proceedings of the 42nd IEEE Spring COMPCON, 1997, pp. 103-109.Google Scholar
- Hildebrandt, M. “Profiling into the Future: An Assessment of Profiling Technologies in the Context of Ambient Intelligence,” FIDIS In-house Journal, 2007, online at http://journal.fidis.net/fileadmin/journal/issues/1-2007/Profiling_into_the_future.pdf.
- Hui K.-L., and Png, I. “The Economics of Privacy,” in Handbooks in Information System and Economics, Hedershott T. J. (Ed.), volume 1, Elsevier, 2006, pp. 471-493.Google Scholar
- Jiang, X., Hong, J. I., and Landay, J. A. “Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing,” in UbiComp ‘02: Proceedings of Ubiquitous Computing, LNCS 2498, Springer-Verlag, Berlin, 2002, pp. 176-193.Google Scholar
- Kumaraguru, P., and Cranor, L. F. “Privacy Indexes: A Survey of Westin’s Studies,” Technical Report CMU-ISRI-5-138, Carnegie Mellon University, 2005.Google Scholar
- Kim, E., Lee, B., and Zhu, K. “CRM and the Incentiveto Share Customer Information,” in Workshop on Information Systems and Economics (WISE), UC Irvine, CA, 2005.Google Scholar
- Lundblad, N. “Privacy in a Noise Society,” in WHOLES Workshop: A Multiple View of Individual Privacy in a Networked World, Sigtuna, Sweden, 2004.Google Scholar
- Mayer-Schönberger, V. “Useful void: The Art of Forgetting in the Age of Ubiquitous Computing,” KSG Faculty Research Working Paper RWP07-022, 2007.Google Scholar
- Odlyzko, A. “Privacy, Economics, and Price Discrimination on the Internet,” in The Economics of Information Security, Camp, L. J., and Levis, R. (Eds.), Kluwer, 2004, pp. 187-211.Google Scholar
- Schunter, M., and Powers, C. The Enterprise Privacy Authorization Language (EPAL 1.1), 2003, online at http://www.zurich.ibm.com/security/enterprise-privacy/epal/.