ASYMPTOTIC BAYES ANALYSIS FOR THE FINITE-HORIZON ONE-ARMED-BANDIT PROBLEM
Probability in the Engineering and Informational Sciences
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
PRINDA: Architecture and design of non-disclosure agreements in privacy policy framework
Data & Knowledge Engineering
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Electronic Commerce Research and Applications
Journal of Management Information Systems
A Comparative Study of Online Privacy Policies and Formats
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
No Free Lunch: Price Premium for Privacy Seal-Bearing Vendors
Journal of Management Information Systems
On honesty in sovereign information sharing
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
Privacy is a process, not a PET: a theory for effective privacy practice
Proceedings of the 2012 workshop on New security paradigms
A framework for context-aware privacy of sensor data on mobile systems
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications
Two new economic models for privacy
ACM SIGMETRICS Performance Evaluation Review
Privacy intrusiveness and web audiences: Empirical evidence
Telecommunications Policy
Hi-index | 0.00 |
Consumers want to interact with web sites, but they also want to keep control of their private information. Asymmetric information about whether web sites will sell private information or not leads to a lemons market for privacy. We discuss privacy policies as signals in a lemons market and ways in which current realizations of privacy policies may fail to be effective signals. As a result of these shortcomings, we consider a "lemons market with testing," where consumers have a cost of determining whether a site meets their privacy requirement. Our model explains empirical data concerning privacy policies and privacy seals. We end by discussing cyclic instability in the number of web sites that sell consumer information.