Economics of Personal Data Management: Fair Personal Information Trades

  • A. Tasidou
  • P. S. Efraimidis
  • V. Katos
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 26)

Abstract

Individuals today have no control over the way their personal information is being used even though they are the ones to suffer the consequences of any unwanted uses of their information. We propose addressing this externality through the creation of a market for personal information, where licenses to access individuals’ personal information will be voluntarily traded. Through this market, satisfactory compensation to the information owner is provided, whilst personal information remains under the owner’s control. Using cryptographic tools and micropayments we propose and develop a prototype for personal information trades where the above principles are implemented and tested.

Keywords

Economics of Privacy Information Markets Privacy Enhancing Technologies 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Acquisti, A.: Privacy and security of personal information: Technological solutions and economic incentives. In: Camp, J., Lewis, R. (eds.) The Economics of Information Security, pp. 165–178. Kluwer, Dordrecht (2004)CrossRefGoogle Scholar
  2. 2.
    Adar, E., Huberman, B.A.: A market for secrets. First Monday 6, 200–201 (2001)CrossRefGoogle Scholar
  3. 3.
    Anderson, R.: U.k. government loses personal data on 25 million citizens. EDRI-gram 5.22 (November 21, 2007)Google Scholar
  4. 4.
    Anderson, R., Moore, T.: The economics of information security. Science 314(5799)Google Scholar
  5. 5.
    Cha, S.-C., Joung, Y.-J.: From p3p to data licenses. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 205–222. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Efraimidis, P.S., Drosatos, G., Nalbadis, F., Tasidou, A.: Towards privacy in personal data management. Accepted for publication in Information Management and Computer Security, EmeraldGoogle Scholar
  7. 7.
    Georgakopoulos, G.: Privacy enhancing technologies for personal data management. Master’s thesis, Dept. Electr.& Comp. Eng., DUTH, Greece (October 2008)Google Scholar
  8. 8.
    Goldberg, I.: Privacy-enancing technologies for the internet iii: Ten years later. In: Acquisti, A., Gritzalis, S., Lambrinoudakis, C., di Vimercati, S. (eds.) Digital Privacy: Theory, Technologies, and Practices, December 2007, ch. 1 (2007)Google Scholar
  9. 9.
    Gopal, R., Garfinkel, R., Nunez, M., Rice, D.: Electronic markets for private information: Economic and security considerations. In: HICSS 2006: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, Washington, DC, USA. IEEE Computer Society, Los Alamitos (2006)Google Scholar
  10. 10.
    Greenstadt, R., Smith, M.D.: Protecting personal information: Obstacles and directions. In: WEIS 2005 (2005)Google Scholar
  11. 11.
    Gritzalis, S.: Enhancing web privacy and anonymity in the digital era. Information Management and Computer Security 12(3), 255–287 (2004)CrossRefGoogle Scholar
  12. 12.
    Bernardo, A.H., Adar, E., Fine, L.R.: Valuating privacy. IEEE Security and Privacy 3(5), 22–25 (2005)CrossRefGoogle Scholar
  13. 13.
    Katos, V., Patel, A.: A partial equilibrium view on security and privacy. Information Management & Computer Security 16, 74–83 (2008)CrossRefGoogle Scholar
  14. 14.
    Katsikas, S.K., Lopez, J., Pernul, G.: Trust, privacy and security in e-business: Requirements and solutions. In: Bozanis, P., Houstis, E.N. (eds.) PCI 2005. LNCS, vol. 3746, pp. 548–558. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  15. 15.
    Kleinberg, J., Papadimitriou, C., Raghavan, P.: On the value of private information. TARK: Theoretical Aspects of Reasoning about Knowledge 8 (2001)Google Scholar
  16. 16.
    Laudon, K.C.: Markets and privacy. Commun. ACM 39(9), 92–104 (1996)CrossRefGoogle Scholar
  17. 17.
    Rivest, R.L., Shamir, A.: Payword and micromint: two simple micropayment schemes. In: CryptoBytes, vol. 2, pp. 69–87 (1996)Google Scholar
  18. 18.
    Tasidou, A., Efraimidis, P.S., Katos, V.: Economics of personal data management: Fair personal information trades. Technical Report LPDP-2009-01, Dept. Electr.& Comp. Eng., DUTH, Greece (2009)Google Scholar
  19. 19.
    Varian, H.: Economic aspects of personal privacy. U.S. Dept. of Commerce, Privacy and Self-Regulation in the Information Age (1996)Google Scholar
  20. 20.

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2010

Authors and Affiliations

  • A. Tasidou
    • 1
  • P. S. Efraimidis
    • 1
  • V. Katos
    • 1
  1. 1.Department of Electrical and Computer EngineeringDemocritus University of ThraceXanthiGreece

Personalised recommendations