k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Privacy, economics, and price discrimination on the Internet
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Measuring privacy loss and the impact of privacy protection in web browsing
Proceedings of the 3rd symposium on Usable privacy and security
Legal issues surrounding monitoring during network research
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Mechanism Design via Differential Privacy
FOCS '07 Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
On the leakage of personally identifiable information via online social networks
Proceedings of the 2nd ACM workshop on Online social networks
Power-Law Distributions in Empirical Data
SIAM Review
Nudging Privacy: The Behavioral Economics of Personal Information
IEEE Security and Privacy
Anatomy of the long tail: ordinary people with extraordinary tastes
Proceedings of the third ACM international conference on Web search and data mining
Privacy leakage in mobile online social networks
WOSN'10 Proceedings of the 3rd conference on Online social networks
I know what you will do next summer
ACM SIGCOMM Computer Communication Review
Privad: practical privacy in online advertising
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Proceedings of the 12th ACM conference on Electronic commerce
Auctions in do-not-track compliant internet advertising
Proceedings of the 18th ACM conference on Computer and communications security
ACM SIGCOMM Computer Communication Review
Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing
Proceedings of the 18th annual international conference on Mobile computing and networking
For some eyes only: protecting online information sharing
Proceedings of the third ACM conference on Data and application security and privacy
Insured access: an approach to ad-hoc information sharing for virtual organizations
Proceedings of the third ACM conference on Data and application security and privacy
An economic analysis of user-privacy options in ad-supported services
WINE'12 Proceedings of the 8th international conference on Internet and Network Economics
A theory of pricing private data
Proceedings of the 16th International Conference on Database Theory
CAMEO: a middleware for mobile advertisement delivery
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
Mosaic: quantifying privacy leakage in mobile networks
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Your browsing behavior for a big mac: economics of personal information online
Proceedings of the 22nd international conference on World Wide Web
Information bazaar: a contextual evaluation
Proceedings of the 5th ACM workshop on HotPlanet
Challenges of keyword-based location disclosure
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Hi-index | 0.00 |
Monetizing personal information is a key economic driver of online industry. End-users are becoming more concerned about their privacy, as evidenced by increased media attention. This paper proposes a mechanism called 'transactional' privacy that can be applied to personal information of users. Users decide what personal information about themselves is released and put on sale while receiving compensation for it. Aggregators purchase access to exploit this information when serving ads to a user. Truthfulness and efficiency, attained through an unlimited supply auction, ensure that the interests of all parties in this transaction are aligned. We demonstrate the effectiveness of transactional privacy for web-browsing using a large mobile trace from a major European capital. We integrate transactional privacy in a privacy-preserving system that curbs leakage of information. These mechanisms combine to form a market of personal information that can be managed by a trusted third party.