Advertisement

Public Choice

, Volume 180, Issue 3–4, pp 353–381 | Cite as

Is the market for digital privacy a failure?

  • Caleb S. FullerEmail author
Article

Abstract

Conventional wisdom holds that the market for digital privacy fails owing to widespread informational asymmetry between digital firms and their customers, behavioral biases exhibited by those customers, and negative externalities from data resale. This paper supplies both theoretical and empirical reasons to question the standard market failure conclusion. On the theoretical side, I argue that digital markets are not qualitatively different from markets for other consumer goods. To wit, just as in traditional markets, it is costly to measure product attributes (such as “privacy”) and, just as in more traditional settings, some firms offer credible commitments to reduce the threat of potential opportunism. On the empirical side, I conduct a survey of Google’s users. The most important results of this survey suggest that, at least with respect to Google, (a) the extent of informational asymmetry is minimal and (b) the demands for “unconstrained” and “constrained” privacy diverge substantially. Significantly, 86% of respondents express no willingness to pay for additional privacy when interacting with Google. Among the remaining 14%, the average expressed willingness to pay is low.

Keywords

Digital privacy Survey Market failure Privacy paradox 

JEL Classification

D23 D62 K24 L86 

Notes

Acknowledgements

I wish to thank Chris Coyne, Peter Boettke, Peter Leeson, William H.J. Hubbard, Alessandro Acquisti, David Lucas, Noah Gould, Nicholas Freiling, and an anonymous reviewer for helpful suggestions. Any errors are my own.

Funding

Caleb Fuller received funding from the Mercatus Center at George Mason University to pay Haven Insights, LLC to conduct the initial survey. In response to a revise and resubmit request, a modified survey was conducted by Haven Insights, LLC and its findings replaced the initial survey’s results. The funding for the second survey was provided by the Charles Koch Foundation.

Supplementary material

11127_2019_642_MOESM1_ESM.xlsx (3 mb)
Supplementary material 1 (XLSX 3097 kb)

References

  1. Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on electronic commerce (pp. 21–29). ACM.Google Scholar
  2. Acquisti, A. (2012). Privacy and market failures: Three reasons for concern, and three reasons for hope. Journal on Telecommunications and High Technology Law, 10, 227–233.Google Scholar
  3. Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International workshop on privacy enhancing technologies (pp. 36–58). Springer.Google Scholar
  4. Acquisti, A., John, L. K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies, 42(2), 249–274.CrossRefGoogle Scholar
  5. Acquisti, A., Taylor, C., & Wagman, L. (2016). The economics of privacy. Journal of Economic Literature, 54(2), 442–492.CrossRefGoogle Scholar
  6. Akerlof, G. A. (1970). The market for ‘lemons’: Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84(3), 488–500.CrossRefGoogle Scholar
  7. Alchian, A. A. (1967). Pricing and society. London: Institute of Economic Affairs.Google Scholar
  8. Barzel, Y. (1982). Measurement cost and the organization of markets. The Journal of Law and Economics, 25(1), 27–48.CrossRefGoogle Scholar
  9. Benson, B. (1998). How to secede in business without really leaving: Evidence of the substitution of arbitration for litigation. In D. Gordon (Ed.), Secession, state, and liberty. New Brunswick, NJ: TransactionGoogle Scholar
  10. Berendt, B., Günther, O., & Spiekermann, S. (2005). Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101–106.CrossRefGoogle Scholar
  11. Berman, J., & Mulligan, D. (1998). Privacy in the digital age: Work in progress. Nova Law Review, 23, 551–582.Google Scholar
  12. Boettke, P. J., & Candela, R. A. (2017). Price theory as prophylactic against popular fallacies. Journal of Institutional Economics, 13(3), 725–752.CrossRefGoogle Scholar
  13. Brown, I. (2016). The economics of privacy, data protection and surveillance. In Handbook on the economics of the internet. Available at SSRN 2358392 (2013).Google Scholar
  14. Calo, R. (2013). Digital market manipulation. George Washington Law Review, 82, 995–1051.Google Scholar
  15. Clark, J. R., & Powell, B. (2013). Sweatshop working conditions and employee welfare: Say it ain’t sew. Comparative Economic Studies, 55(2), 343–357.CrossRefGoogle Scholar
  16. Classroom.com. How much do Americans spend on soft drinks? September 29, 2017. https://classroom.synonym.com/how-much-do-americans-spend-on-soft-drinks-12081634.html.
  17. Cooper, J. C. (2012). Privacy and antitrust: Underpants gnomes, the first amendment, and subjectivity. George Mason Law Review, 20, 1129–1146.Google Scholar
  18. De Corniere, A., & De Nijs, R. (2016). Online advertising and privacy. The Rand Journal of Economics, 47(1), 48–72.CrossRefGoogle Scholar
  19. Demsetz, H. (1969). Information and efficiency: Another viewpoint. The Journal of Law and Economics, 12(1), 1–22.CrossRefGoogle Scholar
  20. Farrell, J. (2012). Can privacy be just another good? Journal on Telecommunications and High Technology Law, 10, 251–264.Google Scholar
  21. Federal Trade Commission. (2012). Protecting consumer privacy in an era of rapid change. FTC report, 1-112. https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protectingconsumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf. Accessed 23 Jan 2019.
  22. Fuller, C. S. (2018). Privacy law as price control. European Journal of Law and Economics, 45(2), 225–250.CrossRefGoogle Scholar
  23. Gertz, J. D. (2002). The purloined personality: Consumer profiling in financial services. San Diego Law Review, 39, 943.Google Scholar
  24. Hermalin, B. E., & Katz, M. L. (2004). Sender or receiver: Who should pay to receive an electronic message? RAND Journal of Economics, 35(3), 423–448.CrossRefGoogle Scholar
  25. Hermalin, B. E., & Katz, M. L. (2006). Privacy, property rights and efficiency: The economics of privacy as secrecy. Quantitative Marketing and Economics, 4(3), 209–239.CrossRefGoogle Scholar
  26. Hirsch, D. D. (2010). The law and policy of online privacy: Regulation, self-regulation, or co-regulation. Seattle University Law Review, 34, 439–480.Google Scholar
  27. Hoofnagle, C. J. (2003). Reflections on the NC JOLT symposium: The privacy self-regulation race to the bottom. NCJL & Tech., 5, 213–217.Google Scholar
  28. Hoofnagle, C.J. (2006). Privacy self regulation: A decade of disappointment. In: J. K. Winn (Ed.), Consumer Protection in the Age of the 'Information Economy.Google Scholar
  29. Hoofnagle, C. J. (2009). Beyond Google and evil: How policy makers, journalists and consumers should talk differently about Google and privacy. First Monday, 14, 4–6.CrossRefGoogle Scholar
  30. Hoofnagle, C. J., & Whittington, J. (2013). Free: Accounting for the costs of the internet’s most popular price. UCLA Law Review, 61, 606–670.Google Scholar
  31. Hoofnagle, C.J., Soltani, A., Good, N., & Wambach, D.J. (2012). Behavioral advertising: The offer you can't refuse. Harvard Law & Policy Review, 6, 273–296Google Scholar
  32. Hui, K. L., & Png, I. (2005). Economics of privacy. In Handbook of information systems and economics. Available at SSRN 786846.Google Scholar
  33. Goldfarb, A., & Tucker, C.E. (2011). Privacy regulation and online advertising. Management Science, 57(1), 57–71CrossRefGoogle Scholar
  34. John, L. K., Acquisti, A., & Loewenstein, G. (2011). Strangers on a plane: context-dependent willingness to divulge sensitive information. Journal of Consumer Research, 37(5), 858–873.CrossRefGoogle Scholar
  35. Leeson, P. T. (2007). Better off stateless: Somalia before and after government collapse. Journal of Comparative Economics, 35(4), 689–710.CrossRefGoogle Scholar
  36. Leeson, P. T. (2008). Social distance and self-enforcing exchange. The Journal of Legal Studies, 37(1), 161–188.CrossRefGoogle Scholar
  37. Leeson, P. T. (2014). Pirates, prisoners, and preliterates: anarchic context and the private enforcement of law. European Journal of Law and Economics, 37(3), 365–379.CrossRefGoogle Scholar
  38. Leeson, P. T., & Coyne, C. J. (2012). Conflict-inhibiting norms. Oxford handbook of the economics of peace and conflict. Oxford: Oxford University Press.Google Scholar
  39. Madden, M., & Rainie, L. (2015). Americans’ attitudes about privacy, security, and surveillance. http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/. Accessed 20 Nov 2018.
  40. Marthews, A., & Tucker, C. (2017). Government surveillance and internet search behavior. Available at SSRN 2412564.Google Scholar
  41. Milberg, S., Smith, J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.CrossRefGoogle Scholar
  42. Newman, N. (2013). The costs of lost privacy: Consumer harm and rising economic inequality in the age of Google. William Mitchell Law Review, 40, 849.Google Scholar
  43. Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126.CrossRefGoogle Scholar
  44. Odlyzko, A. (2003). Privacy, economics, and price discrimination on the Internet. In Proceedings of the 5th international conference on electronic commerce (pp. 355–366). ACM.Google Scholar
  45. Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701–1777.Google Scholar
  46. Penney, J. (2016). Chilling effects: Online surveillance and Wikipedia use. Berkeley Technology Law Journal, 31, 117–182.Google Scholar
  47. Rose, E.A. (2005). Data users versus data subjects: are consumers willing to pay for property rights to personal information? In Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Washington, D.C.: IEEE Computer Society Press.Google Scholar
  48. Sachs, B. R. (2009). Consumerism and information privacy: How Upton Sinclair can again save us from ourselves. Virginia Law Review, 95(1), 205–252.Google Scholar
  49. Savage, S. J., & Waldman, D. M. (2015). Privacy tradeoffs in smartphone applications. Economics Letters, 137, 171–175.CrossRefGoogle Scholar
  50. Solove, D. J. (2004). The digital person: Technology and privacy in the information age. New York: NYU Press.Google Scholar
  51. Statista. (2017). Google’s ad revenue from 2001 to 2017 “in billion US dollars). https://www.statista.com/statistics/266249/advertising-revenue-of-google/. Accessed 20 Nov 2018.
  52. Statista. (2018). Global digital population as of July 2018 (in millions). https://www.statista.com/statistics/617136/digital-population-worldwide/. Accessed 20 Nov 2018.
  53. Stigler, G. J. (1961). The economics of information. Journal of Political Economy, 69(3), 213–225.CrossRefGoogle Scholar
  54. Strandburg, K. J. (2013). Free fall: The online market’s consumer preference disconnect. University of Chicago Legal Forum, 5, 95–172.Google Scholar
  55. Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268.CrossRefGoogle Scholar
  56. Tucker, C. E. (2012). The economics of advertising and privacy. International Journal of Industrial Organization, 30(3), 326–329.CrossRefGoogle Scholar
  57. Turow, J., King, J., Hoofnagle, C. J., Bleakley, A., & Hennessy, M. (2009). Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214.Google Scholar
  58. Varian, H. R. (2002). Economic aspects of personal privacy. In W.H. Lehr & L. Pupillo (Eds.), Cyber Policy and Economics in an Internet Age (pp. 127–137). Boston, MA: Springer.Google Scholar
  59. Vila, T., Greenstadt, R., & Molnar, D. (2004). Why we can’t be bothered to read privacy policies. In L. J. Camp & S. Lewis (Eds.), Economics of information security (pp. 143–153). Berlin: Springer.CrossRefGoogle Scholar
  60. Williamson, O. E. (1983). Credible commitments: using hostages to support exchange. The American Economic Review, 73(4), 519–540.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Grove City CollegeGrove CityUSA

Personalised recommendations