Information rules: a strategic guide to the network economy
Information rules: a strategic guide to the network economy
Database nation: the death of privacy in the 21st century
Database nation: the death of privacy in the 21st century
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
'I didn't buy it for myself' privacy and ecommerce personalization
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
'I didn't buy it for myself': privacy and Ecommerce personalization
Designing personalized user experiences in eCommerce
Learning User Preferences for Wireless Services Provisioning
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
Towards a framework for understanding the effectiveness of digital content exploitation strategies
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Communications of the ACM - Special issue: RFID
The value of privacy: optimal strategies for privacy minded agents
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
The privacy cost of the second-chance offer
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System
Information Systems Frontiers
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Randomization as a strategy for sellers during price discrimination, and impact on bidders' privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
Privacy and the clandestine evolution of e-commerce
Proceedings of the ninth international conference on Electronic commerce
Digital rights management: desirable, inevitable, and almost irrelevant
Proceedings of the 2007 ACM workshop on Digital Rights Management
Access with Fast Batch Verifiable Anonymous Credentials
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Computers in Human Behavior
Foot-driven computing: our first glimpse of location privacy issues
SIGSPATIAL Special
Optimizing price levels in e-commerce applications with respect to customer lifetime values
Proceedings of the 11th International Conference on Electronic Commerce
A Hybrid Firm's Pricing Strategy in Electronic Commerce Under Channel Migration
International Journal of Electronic Commerce
Compatibility, competition, and control in trusted computing environments
Information Security Tech. Report
Information security economics - and beyond
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
A privacy-protecting multi-coupon scheme with stronger protection against splitting
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Secure multi-coupons for federated environments: privacy-preserving and customer-friendly
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Security of economics information
AIKED'10 Proceedings of the 9th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases
A privacy-aware architecture for a web rating system
IBM Journal of Research and Development
Surveillance, privacy and the law of requisite variety
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
For sale : your data: by : you
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
A privacy-protecting coupon system
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Economics of identity management: a supply-side perspective
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Hide and Seek: Costly Consumer Privacy in a Market with Repeat Purchases
Marketing Science
Using personal portfolios to manage customer data
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Strategic pseudonym change in agent-based e-commerce
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
Detecting price and search discrimination on the internet
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Magentix2: A privacy-enhancing Agent Platform
Engineering Applications of Artificial Intelligence
How to Price Discriminate When Tariff Size Matters
Marketing Science
Proceedings of the 5th Annual ACM Web Science Conference
Game theory meets network security and privacy
ACM Computing Surveys (CSUR)
A qualitative analysis on the impacts of assured quality internet interconnection
Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks
Crowd-assisted search for price discrimination in e-commerce: first results
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
Privacy intrusiveness and web audiences: Empirical evidence
Telecommunications Policy
Automated buyer profiling control based on human privacy attitudes
Electronic Commerce Research and Applications
Strategies for avoiding preference profiling in agent-based e-commerce environments
Applied Intelligence
Hi-index | 0.00 |
The rapid erosion of privacy poses numerous puzzles. Why is it occurring, and why do people care about it? This paper proposes an explanation for many of these puzzles in terms of the increasing importance of price discrimination. Privacy appears to be declining largely in order to facilitate difierential pricing, which ofiers greater social and economic gains than auctions or shopping agents. The thesis of this paper is that what really motivates commercial organizations (even though they often do not realize it clearly themselves) is the growing incentive to price discriminate, coupled with the increasing ability to price discriminate. It is the same incentive that has led to the airline yield management system, with a complex and constantly changing array of prices. It is also the same incentive that led railroads to invent a variety of price and quality difierentiation schemes in the 19th century. Privacy intrusions serve to provide the information that allows sellers to determine buyers' willingness to pay. They also allow monitoring of usage, to ensure that arbitrage is not used to bypass discriminatory pricing.Economically, price discrimination is usually regarded as desirable, since it often increases the efficiency of the economy. That is why it is frequently promoted by governments, either through explicit mandates or through indirect means. On the other hand, price discrimination often arouses strong opposition from the public.There is no easy resolution to the conflict between sellers; incentives to price discriminate and buyers' resistance to such measures. The continuing tension between these two factors will have important consequences for the nature of the economy. It will also determine which technologies will be adopted widely. Governments will likely play an increasing role in controlling pricing, although their roles will continue to be ambiguous. Sellers are likely to rely to an even greater extent on techniques such as bundling that will allow them to extract more consumer surplus and also to conceal the extent of price discrimination. Micropayments and auctions are likely to play a smaller role than is often expected. In general, because of strong conflicting pressures, privacy is likely to prove an intractable problem that will be prominent on the the public agenda for the foreseeable future.