Skip to main content

Privacy Attitudes and Privacy Behavior

Losses, Gains, and Hyperbolic Discounting

  • Chapter
Economics of Information Security

Part of the book series: Advances in Information Security ((ADIS,volume 12))

We discuss which factors play a role in the decision process of individuals with respect to their privacy and information security concerns

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Acquisti, Alessandro (2002a). Privacy and security of personal information: Economic incentives and technological solutions. In 1st SIMS Workshop on Economics and Information Security.

    Google Scholar 

  • Acquisti, Alessandro (2002b). Protecting privacy with economics: Economic incentives for preventive technologies in ubiquitous computing environments. In Workshop on Socially-informed Design of Privacyenhancing Solutions, 4th International Conference on Ubiquitous Computing-UBICOMP’ 02.

    Google Scholar 

  • Acquisti, Alessandro and Varian, Hal R. (2002). Conditioning prices on purchase history. Technical report, University of California, Berkeley. First draft: 2001. Presented at the European Economic Association Conference, Venice, IT, August 2002.

    Google Scholar 

  • Ainslie, George W. (1975). Specious reward: A behavioral theory of impulsiveness and impulsive control. Psychological Bulletin, 82:463–496.

    Google Scholar 

  • Ajzen, Icek (1988). Attitudes, personality, and behavior, chapter 6. Open University Press, Milton-Keynes, England.

    Google Scholar 

  • Akerlof, George A. (1970). The market for “lemons”: Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84:488–500.

    Google Scholar 

  • Aronson, Elliot and Mills, Judson (1959). The effect of severity of initiation on the devaluation of forbidden behavior. Journal of Abnormal and Social Psychology, 59:177–181.

    Google Scholar 

  • Berger, Peter L. (1982). Models of bounded rationality, Vol. I–III. The MIT Press, Cambridge, MA.

    Google Scholar 

  • Brunk, Benjamin D. (2002). Understanding the privacy space. First Monday, 7. “http://firstmonday.org/issues/issue7_10/brunk/index.html.

  • Chellappa, Ramnath K. and Sin, Raymong (2002). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. In 2002 Informs Meeting.

    Google Scholar 

  • Coate, Stephen (1995). Altruism, the samaritan’s dilemna, and government transfer policy. American Economic Review, 85(1):46–57.

    Google Scholar 

  • Commission, Federal Trade (2000). Privacy online: Fair information practices in the electronic marketplace. http://www.ftc.gov/reports/privacy2000/privacy2000.pdf.

  • Corey, S.M. (1937). Professional attitudes and actual behavior. Journal of educational psychology, 28(1):271–280.

    Google Scholar 

  • Eagly, Alice H. and Chaiken, Shelly (1993). The Psychology of Attitudes, chapter 4. Harcourt Brace Jovanovich College Publishers, Fort Worth, TX.

    Google Scholar 

  • Fazio, Russell H. (1990). Multiple processes by which attitudes guide behavior: The mode model as an integrative framework. Advances in experimental social psychology, 23:75–109.

    Google Scholar 

  • Festinger, Leon (1957). A theory of cognitive dissonance. Row Peterson, Evanston, IL.

    Google Scholar 

  • Festinger, Leon and Carlsmith, James M. (1959). Cognitive consequences of forced compliance. Journal of Abnormal and Social Psychology, 58:203–210.

    Google Scholar 

  • Goffman, Erving (1963). Stigma: Notes on the Management of Spoiled Identity. Prentice-Hall, Englewood Cliffs, NJ.

    Google Scholar 

  • Harn, Il-Horn, Hui, Kai-Lung, Lee, Tom S., and Png, Ivan P. L. (2002). Online information privacy: Measuring the cost-benefit trade-off. In 23rd International Conference on Information Systems.

    Google Scholar 

  • Harris Interactive (2002). First major post-9-11 privacy survey finds consumers demanding companies do more to protect privacy; public wants company privacy policies to be independently verified. http://www.harrisinteractive.com/news/allnewsbydate.asp?NewsID=429.

  • Jupiter Research (2002). Seventy percent of US consumers worry about online privacy, but few take protective action. http://www.jmm.com/xp/jmm/press/2002/pr_060302.xml.

  • Laibson, David (1997). Golden eggs and hyperbolic discounting. Quarterly Journal of Economics, 62(2):443–477.

    Google Scholar 

  • LaPiere, Robert (1934). Attitudes versus actions. Social Forces, 13:230–237.

    Google Scholar 

  • Lemley, Mark (2000). Rational ignorance at the patent office. Technical report, Berkeley Olin Program in Law and Economics, Working Paper Series.

    Google Scholar 

  • McIntosh, Donald (1969). The Foundations of Human Society. The University of Chicago Press, Chicago, IL.

    Google Scholar 

  • O’Donoghue, Ted and Rabin, Matthew (2001). Choice and procrastination. Quarterly Journal of Economics, 116(1):121–160.

    Google Scholar 

  • Rabin, Matthew and O’Donoghue, Ted (2000). The economics of immediate gratification. Journal of Behavioral Decision Making, 13(2):233–250.

    Google Scholar 

  • Spiekermann, Sarah, Grossklags, Jens, and Berendt, Bettina (2002). Eprivacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. In 3rd ACM Conference on Electronic Commerce-EC’ 01, pages 38–47.

    Google Scholar 

  • Thaler, Richard and Shefrin, Hersh M. (1981). An economic theory of self-control. The Journal of Political Economy, 89:392–406.

    Article  Google Scholar 

  • Varian, Hal R. (1996). Economic aspects of personal privacy. In Privacy and Self-Regulation in the Information Age. National Telecommunications and Information Administration.

    Google Scholar 

  • Whitten, Alma and Tygar, J. D. (1999). Why Johnny can’t encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium. http://citeseer.nj.nec.com/whitten99why.html.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer Science + Business Media, Inc.

About this chapter

Cite this chapter

Acquisti, A., Grossklags, J. (2004). Privacy Attitudes and Privacy Behavior. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_13

Download citation

  • DOI: https://doi.org/10.1007/1-4020-8090-5_13

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-8089-0

  • Online ISBN: 978-1-4020-8090-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics