Quantifying Privacy Choices with Experimental Economics College of Management North Carolina State University WEIS Harvard University June 2-3, 2005 David.

Slides:



Advertisements
Similar presentations
Performance Indicator 4.08
Advertisements

11 Motivating Employees This may sound soft and mushy, but happy people are better for business. They are more creative and productive, they build environments.
Managing Online Identity References: Prepared for Trustworthy Computing Group, Microsoft by Cross-Tab Marketing Services.
3 Decision Analysis To accompany Quantitative Analysis for Management, Twelfth Edition, by Render, Stair, Hanna and Hale Power Point slides created by.
Topic 2. DECISION-MAKING TOOLS
Decision Analysis Chapter 3
Winning New Jobs: A Welfare-to-Work Success Story in Baltimore County, Maryland Max Elsman, Job Network Administrator.
Netiquette Rules.
CHAPTER 1 LIMITS, ALTERNATIVES, AND CHOICES
2005 Consumer-Directed Supports: An Introduction.
Student Participation in Experimental Economics By David Baumer, J.C. Poindexter, and Julie Earp, 2005 ©
Business Plug-In B7 Ethics.
Health Data Flows: Where PETs Can Help PORTIA Workshop on Sensitive Data July 8, 2004 Anna Slomovic, PhD Electronic Privacy Information Center.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Why be an econ major (or minor)?. Economics Major and Minor Economics is the study of decision-making and incentives among people, firms and governments.
Decision Making.
Choice. There’s never just one reinforcer Hmm…what to do?
Savings Tools Take Charge of Your Finances Family Economics & Financial Education.
Estimating the Market for Internet Service Provider-Based Cyber Security Solutions Brent Rowe – RTI International Doug Reeves – NC State University Dallas.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
12 th July 2006 Comparative analysis of the predictors of entrepreneurial intent and self-efficacy of UK engineering undergraduates Evidence from the CMI.
Objective Vulnerability Assessment Risks for Unauthorized Disclosure of Patient Information Farrokh Alemi, PhD.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Basic Economic Concepts. OBJECTIVE: The student will become familiar with the following items: Economic Fundamentals –Scarcity –Choices –Basis of Benefits.
The Model of Trust Factors in Paying through the Internet (Dissertation) Franc Bračun, PhD Merkur Day 2004 Friday, 22nd October.
1 Moderator: Thomas N. Shorter, Godfrey & Kahn, S.C. Panelists: Nancy Davis, Ministry Health Care Lee Kadel, Wheaton Franciscan Healthcare Ralph Topinka,
Decision Analysis (cont)
Insurance. Standard: Protecting and Insuring People make choices to protect themselves from the financial risk of lost income, assets, health, or identity.
1 Table of Content 1.Business Diagnostic - Establishing a case for change –Changes in demand –New opportunities –Emerging threats 2.Vision Creation - Defining.
Computer Ethics.
Teens lesson one making decisions presentation slides 04/09.
Making Financial Decisions
Ponemon Institute©: Private & Confidential Document, Please Do Not Quote Without Permission Page Most Trusted Companies for Privacy U.S. Survey.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Asymmetric Information
Can Money Buy Happiness? Evidence from the Discounting of Uncertain Happiness Tracy A. Tufenk & Daniel D. Holt Psychology Department, University of Wisconsin-Eau.
Direct Teacher: Professor Ng Reporter: Cindy Pineapple 1 Summarized from :
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Chapter 5 Choice Under Uncertainty. Chapter 5Slide 2 Topics to be Discussed Describing Risk Preferences Toward Risk Reducing Risk The Demand for Risky.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Decision Making. Get into groups of three and determine a solution to one of the three scenarios.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Feasibility Study.
Decision theory under uncertainty
Cost of Credit 2015 Educurious Partners--All rights reserved UNIT 3 LESSON 8.
G1 © Family Economics & Financial Education – Revised March 2008 – Paychecks and Taxes Unit – Understanding Your Paycheck Funded by a grant from.
Economics Making decisions. Definition of Economics Economics is the study of how we make decisions in a world where resources are limited. – Do we make.
Cookies, Lies and Consent Enrico Gerding. What is this talk about? The Biggest Lie.
1 Extra Topics. 2 Economics of Information Thus far we have assumed all economic entities have perfect information when making decisions - this is obviously.
Copyright © 2010, All rights reserved eStudy.us Changing Long Distance Michael Roberson Feb. 27, 2012.
Risk Management Phase Risk management Assessment, tracking and control – Tools: Risk Hierarchical modeling: Risk breakdown structures Risk matrixes Contingency.
Online shoppers’ perceptions of e-retailers’ ethics, cultural orientation, and loyalty An exploratory study in Taiwan MA Chu-Yi, Chen.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
OASIS Initiative: How Stuff Works April 2007 State of Indiana Family & Social Services Administration.
TECHNOLOGY ACCEPTANCE MODEL
Differences between Microeconomics and Macroeconomics
JA Economic for Success 7 th Grade Volunteer’s Name Volunteer’s Title Volunteer’s Company.
Chapter 29 Conducting Market Research. Objectives  Explain the steps in designing and conducting market research  Compare primary and secondary data.
CIS 170 MART Teaching Effectively/cis170mart.com FOR MORE CLASSES VISIT HCS 440 AID Inspiring Minds/hcs440aid.com FOR MORE CLASSES VISIT.
Presentation Pro © 2001 by Prentice Hall, Inc. Economics: Principles in Action C H A P T E R 3 American Free Enterprise.
Savings Tools Take Charge of Your Finances Family Economics & Financial Education.
Teens lesson one making decisions presentation slides 04/09.
HCS 440 AID Experience Tradition /hcs440aid.com FOR MORE CLASSES VISIT
Decision-Making.
Behavioral Finance Economics 437.
Behavioral Finance Economics 437.
Presentation transcript:

Quantifying Privacy Choices with Experimental Economics College of Management North Carolina State University WEIS Harvard University June 2-3, 2005 David L. Baumer Professor of Law Julia B. Earp Associate Professor of IT J.C. Poindexter Associate Professor of Finance

Privacy Values of Consumers q Many studies have addressed consumer privacy concerns q Why are these endeavors important? –Company policies –Enforcement –Auditing –Legislation

Privacy Values of Consumers q For Example, Earp et al. –Worldwide survey of over 1000 respondents –36 scale items –Consumers are most concerned with (in order): Information Transfer Notice / Awareness Information Storage “Examining Internet Privacy Policies within the Context of User Privacy Values.” IEEE Transactions on Engineering Management, May 2005.

Survey Limitations q There are no consequences to choices q Responses tend to make respondents look good q Sizeable disparities between what respondents say and what they do

The Continuing Question » How can we accurately determine the value that consumers place on privacy?

Uses of Experimental Economics q To test game-theoretic hypotheses (interactive behavior experiments) q To perform investigations into industrial organization issues q To test theories of individual choice –Decision-making under uncertainty

Individual Choice q Subjects participate in a game –opportunities for certain gambles or risks –real money q Construct a utility curve q Predict individual behavior

Privacy Related Objectives q Develop an economic model of consumer privacy concerns –General –Financial –Healthcare q Economic model that relates benefits/risk to access choices

Why Experimental Economics? q Unreliability of surveys q All external factors can be controlled and the system can be agitated by single influences –Passage of privacy legislation –Increased outbreaks of identity theft –New technologies

The General Experiment: Assumptions q Assume more intensive Internet usage can bring increased benefits, but can also bring additional risks q Rely on a “money account” measure for tracking net benefit from Internet usage choices

The General Experiment: Process q Participants choose a usage level q Outcomes are announced q News stories of exceptional outcomes are revealed q Sensitivity to the introduction of privacy changes –Legislation –Technology protection –Education –Hacker innovations q Participant with the highest net value in his/her account wins

Payoff Matrix q Payoff Matrix will reflect possible benefits and possible risks/burdens to using the Internet q The possible benefits of using the Internet q The possible risks of using the Internet

Pilot Experiment #1: Online Job Search q Two pilot groups q Four week time period where participants submitted resumes in an experimental setting q Grade incentive (using a money account)

Pilot Experiment #1: Online Job Search Choices q General employment websites –50% chance of being hired in the first three months –Average starting salary = $30,000. q Employer websites –Requires more information –50% probability of being hired in the first three months –Average starting salary = $40,000 q Headhunter websites –Requires much more information –25% probability of being hired in the first 3 months –Average starting salary of $60,000 q Family and friend contacts –Average starting salary = $20,000

Group A: 27 Undergrad Students GEWEWHWNone Week1Freq. Prot Week2Freq. Prot Week3Freq. Prot Week4Freq. Prot

Group B: 32 Graduate Students GEWEWHWNone Week1Freq. Prot Week2Freq. Prot Week3Freq. Prot Week4Freq. Prot

Pilot Experiment #2: Automated Process q Proof-of-Concept q General Pilot Experiment q 12 participants q No indication of probabilities presented q 5 Scenarios with 5 iterations each

Pilot Experiment #2: Scenarios 1. Moderate amount of spam / viruses 2. Increased amount of spam / viruses. Legislation and law enforcement to combatincreased malicious activity 3. Moderate amount of spam / viruses 4. Participants can purchase protection against spam / viruses 5. Participants can purchase additional protection against spam / viruses

Pilot Experiment #2: Usage and Risk Levels ScenarioGrand Avg.Risk Avg.Usage Avg Low is 3, Moderate is 10, and High is 20. No use is 0.

The Next Steps q A more sophisticated simulation environment q Several experiments –General experiment –Financial experiment –Health care experiment q Augment with survey results q In the end, determine what consumers truly value and when they are willing to compromise

For Information on Privacy Research at NCSU: and