Skip to main content

What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data Types

  • Conference paper
  • First Online:
Secure IT Systems (NordSec 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14324))

Included in the following conference series:

Abstract

Various smartphone and web applications use personal information to estimate the user’s behaviour among others for targeted advertising and improvement of personalized applications. Often applications and web services offer only two choices, either accept their privacy policies or not use the services. Hereby, the general scenario is to pay applications and web services with personal data. As privacy policies are lengthy to read and not comprehensible, most users accept the terms and conditions without the awareness of potential consequences. Thus, most users are unaware of continuously being tracked by many applications installed on their smart devices or accept sharing personal data in exchange for using applications and services online. Therefore, this study attempts to shed some light on the willingness to pay for data protection when offered this option in a continuous data-sharing scenario, and the willingness to accept when offered the option to sell personal data to two different data requestors. The study (N = 500) is conducted via crowdsourcing and examines the monetary valuation of users with respect to different data-sharing scenarios and different data types to allow for a more fine-grained analysis of user preferences. Moreover, different influencing factors such as privacy concerns, awareness and intended behaviour are examined in relation to the user’s monetary valuation. The results show significant differences between willingness to pay and accept for ten different data types and the two sharing scenarios contributing to further empirical evidence for the endowment effect. However, the sharing scenarios seem to have not a big influence on willingness to pay but showed significant differences in willingness to accept. Furthermore, the privacy influencing factors seem to negatively correlate with willingness to pay and positively correlate with willingness to accept.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The HTML files of the experiments and privacy nudges are available open source in the following GitHub repository: https://github.com/veraschmitt/MonVal_Experiment.git.

  2. 2.

    An example of the nudges for Google Maps can be found in the Appendix A.

References

  1. Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 3(1), 26–33 (2005)

    Article  Google Scholar 

  2. Acquisti, A., Taylor, C., Wagman, L.: The economics of privacy. J. Econ. Lit. 54(2), 442–92 (2016)

    Article  Google Scholar 

  3. Allcott, H., Braghieri, L., Eichmeyer, S., Gentzkow, M.: The welfare effects of social media. Am. Econ. Rev. 110(3), 629–76 (2020)

    Article  Google Scholar 

  4. Almuhimedi, H., et al.: Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 787–796 (2015)

    Google Scholar 

  5. Athey, S., Catalini, C., Tucker, C.: The digital privacy paradox: small money, small costs, small talk. Technical report, National Bureau of Economic Research (2017)

    Google Scholar 

  6. Barth, S., de Jong, M.D., Junger, M., Hartel, P.H., Roppelt, J.C.: Putting the privacy paradox to the test: online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics Inform. 41, 55–69 (2019)

    Article  Google Scholar 

  7. Baruh, L., Secinti, E., Cemalcilar, Z.: Online privacy concerns and privacy management: a meta-analytical review. J. Commun. 67(1), 26–53 (2017)

    Article  Google Scholar 

  8. Bizon, W., Poszewiecki, A.: The willingness to trade privacy in the context of WTA and WTP. Int. J. Trade Econ. Finance 7(4), 121–124 (2016)

    Article  Google Scholar 

  9. Boerman, S.C., Kruikemeier, S., Zuiderveen Borgesius, F.J.: Exploring motivations for online privacy protection behavior: insights from panel data. Commun. Res. 48(7), 953–977 (2021)

    Article  Google Scholar 

  10. Correia, J., Compeau, D.: Information privacy awareness (IPA): a review of the use, definition and measurement of IPA (2017)

    Google Scholar 

  11. Cronbach, L.J.: Coefficient alpha and the internal structure of tests. Psychometrika 16(3), 297–334 (1951). https://doi.org/10.1007/BF02310555

    Article  MATH  Google Scholar 

  12. Fleming, P., Bayliss, A.P., Edwards, S.G., Seger, C.R.: The role of personal data value, culture and self-construal in online privacy behaviour. PLoS ONE 16(7), e0253568 (2021)

    Article  Google Scholar 

  13. Hair, J., Black, W., Babin, B., Anderson, R.: Multivariate Data Analysis: Pearson College Division. Person, London (2010)

    Google Scholar 

  14. Hatamian, M., Serna, J., Rannenberg, K.: Revealing the unrevealed: mining smartphone users privacy perception on app markets. Comput. Secur. 83, 332–353 (2019)

    Article  Google Scholar 

  15. Hatamian, M., Wairimu, S., Momen, N., Fritsch, L.: A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. Empir. Softw. Eng. 26, 1–51 (2021). https://doi.org/10.1007/s10664-020-09934-4

    Article  Google Scholar 

  16. Jones, C.I., Tonetti, C.: Nonrivalry and the economics of data. Am. Econ. Rev. 110(9), 2819–58 (2020)

    Article  Google Scholar 

  17. Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. In: Handbook of the Fundamentals of Financial Decision Making: Part I, pp. 99–127. World Scientific (2013)

    Google Scholar 

  18. Kroll, T., Stieglitz, S.: Digital nudging and privacy: improving decisions about self-disclosure in social networks. Behav. Inf. Technol. 40(1), 1–19 (2021)

    Article  Google Scholar 

  19. Li, X.B., Liu, X., Motiwalla, L.: Valuing personal data with privacy consideration. Decis. Sci. 52(2), 393–426 (2021)

    Article  Google Scholar 

  20. Lieberman, M.: Pricing research: a new take on the Van Westendorp model. Quirk’s Mark. Res. Rev. 2, 1–5 (2015)

    Google Scholar 

  21. Lipovetsky, S., Magnan, S., Zanetti-Polzi, A.: Pricing models in marketing research (2011)

    Google Scholar 

  22. Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2004)

    Article  Google Scholar 

  23. Masur, P.K., Teutsch, D., Trepte, S.: Entwicklung und validierung der online-privatheitskompetenzskala (OPLIS). Diagnostica 63, 256–268 (2017)

    Article  Google Scholar 

  24. Momen, N., Hatamian, M., Fritsch, L.: Did app privacy improve after the GDPR? IEEE Secur. Priv. 17(6), 10–20 (2019)

    Article  Google Scholar 

  25. Poikela, M., Kaiser, F.: ‘it is a topic that confuses me’-privacy perceptions in usage of location-based applications. In: European Workshop on Usable Security (EuroUSEC) (2016)

    Google Scholar 

  26. Poikela, M., Toch, E.: Understanding the valuation of location privacy: a crowdsourcing-based approach. In: Proceedings of the 50th Hawaii International Conference on System Sciences (2017)

    Google Scholar 

  27. Pötzsch, S.: Privacy awareness: a means to solve the privacy paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) Privacy and Identity 2008. IAICT, vol. 298, pp. 226–236. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03315-5_17

    Chapter  Google Scholar 

  28. Prince, J., Wallsten, S.: How much is privacy worth around the world and across platforms? In: TPRC48: The 48th Research Conference on Communication, Information and Internet Policy (2020)

    Google Scholar 

  29. Schmitt, V., Li, Z., Poikela, M., Spang, R.P., Möller, S.: What is your location privacy worth? Monetary valuation of different location types and privacy influencing factors. In: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 19–29 (2023)

    Google Scholar 

  30. Schmitt, V., Nicholson, J., Möller, S.: Is your surveillance camera app watching you? A privacy analysis. In: Arai, K. (ed.) SAI 2023. LNNS, vol. 739, pp. 1375–1393. Springer, Cham (2023)

    Chapter  Google Scholar 

  31. Schmitt, V., Poikela, M., Möller, S.: Willingness to pay for the protection of different data types (2021)

    Google Scholar 

  32. Schmitt, V., Poikela, M., Möller, S.: Android permission manager, visual cues, and their effect on privacy awareness and privacy literacy. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery, New York (2022). https://doi.org/10.1145/3538969.3543790

  33. Sindermann, C., Yang, H., Yang, S., Elhai, J.D., Montag, C.: Willingness to accept (WTA), willingness to pay (WTP), and the WTA/WTP disparity in Chinese social media platforms: descriptive statistics and associations with personality and social media use. Acta Physiol. (Oxf) 223, 103462 (2022)

    Google Scholar 

  34. Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 20(2), 167–196 (1996)

    Article  Google Scholar 

  35. Solove, D.J.: The myth of the privacy paradox. Geo. Wash. L. Rev. 89, 1 (2021)

    Google Scholar 

  36. Spiekermann, S., Acquisti, A., Böhme, R., Hui, K.L.: The challenges of personal data markets and privacy. Electron. Markets 25(2), 161–167 (2015). https://doi.org/10.1007/s12525-015-0191-0

    Article  Google Scholar 

  37. Tang, Y., Wang, L.: How Chinese web users value their personal information: an empirical study on WeChat users. Psychol. Res. Behav. Manag. 14, 987 (2021)

    Article  Google Scholar 

  38. Thaler, R.H., Sunstein, C.R.: Nudge: The Final Edition. Yale University Press (2021)

    Google Scholar 

  39. Toch, E., et al.: Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, pp. 129–138 (2010)

    Google Scholar 

  40. Winegar, A.G., Sunstein, C.R.: How much is data privacy worth? A preliminary investigation. J. Consum. Policy 42(3), 425–440 (2019). https://doi.org/10.1007/s10603-019-09419-y

    Article  Google Scholar 

  41. Xu, H., Gupta, S., Rosson, M.B., Carroll, J.M.: Measuring mobile users’ concerns for information privacy (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vera Schmitt .

Editor information

Editors and Affiliations

Appendices

Appendix

A Privacy Nudges, Demographics and Relation to Influencing Factors

See Figs. 13, 14, 15, 16, 17, 18 and 19.

Fig. 13.
figure 13

Example of the privacy nudges used in the control group (nudge on the left side) and the experimental group (information nudge and visual nudge on the right side).

Fig. 14.
figure 14

Correlation between WTA and Privacy Concern with Age Categories.

Fig. 15.
figure 15

Correlation between WTP and Privacy Concern with Age Categories.

Fig. 16.
figure 16

Correlation between WTA and Privacy Concern with Education Categories.

Fig. 17.
figure 17

Correlation between WTP and Privacy Concern with Education Categories.

Fig. 18.
figure 18

Correlation between WTA and Privacy Concern with IT Background.

Fig. 19.
figure 19

Correlation between WTP and Privacy Concern with IT Background.

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Schmitt, V., Conde, D.S., Sahitaj, P., Möller, S. (2024). What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data Types. In: Fritsch, L., Hassan, I., Paintsil, E. (eds) Secure IT Systems. NordSec 2023. Lecture Notes in Computer Science, vol 14324. Springer, Cham. https://doi.org/10.1007/978-3-031-47748-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-47748-5_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-47747-8

  • Online ISBN: 978-3-031-47748-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics