Skip to main content

Auctioning Privacy-Sensitive Goods:

A Note on Incentive-Compatibility

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8450))

Abstract

One mechanism to obtain valuations of personal data from individuals is the reverse second-price Vickrey auction (RVA), which is assumed to be an incentive-compatible mechanism. Herein, it is analyzed whether conditions for RVA incentive-compatibility exist, once personal data is sensitive and induces privacy costs. In the experiment subjects could sell the result of a logic test together with their name as privacy-sensitive good using an auction mechanism. The winner’s identity and result was revealed to the group. The key result is that a significant ‘identification effect’ exists that acts as auction entry barrier. Thus, the RVA is not an incentive-compatible mechanism for obtaining valuations of privacy-sensitive goods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Danezis, G., Lewis, S., Anderson, R.: How Much is Location Privacy Worth? Working Paper presented at WEIS (2005), http://infosecon.net/workshop/pdf/location-privacy.pdf

  2. Egelman, S., Porter Felt, A., Wagner, D.: Choice Architecture and Smartphone Privacy: There’s A Price for That, Working Paper presented at WEIS (2012), http://weis2012.econinfosec.org/papers/Egelman_WEIS2012.pdf

  3. Feri, F., Giannetti, C., Jentzsch, N.: Disclosure of Personal Data under Risk of Privacy Shocks, Quaderni DSE Working Paper N° 875 (2013), http://ideas.repec.org/p/bol/bodewp/wp875.html

  4. Huberman, B., Adar, E., Fine, L.: Valuating privacy. IEEE Security & Privacy 3(5), 22–25 (2005)

    Article  Google Scholar 

  5. Dijksterhuis, A., van Knippenberg, A.: The relation between perception and behavior, or how to win a game of Trivial Pursuit. Journal of Personality and Social Psychology 74, 865–877 (1998), doi:10.1037/0022-3514.74.4.865

    Article  Google Scholar 

  6. Ariely, D., Norton, M.: Self-deception: How we come to believe we are better than we truly are. Working Paper, Sloan School of Management. MIT (2005)

    Google Scholar 

  7. Joshi, S., Sun, Y.-A., Vora, P.L.: The Influence of Privacy Cost on Threshold Strategies in Sealed-bid First and Second-price Auctions (2005), http://www.seas.gwu.edu/poorvi/auctions.pdf

  8. Naor, M., Pinkas, B., Sumner, R.: Privacy preserving Auctions and Mechanism Design. In: Proceedings of the First ACM Conference on Electronic Commerce, pp. 129–139. ACM Press (1999)

    Google Scholar 

  9. Gosh, A., Roth, A.: Selling Privacy at Auction, Working Paper, http://arxiv.org/abs/1011.1375 (November 29, 20011)

  10. McSherry, F., Talwar, K.: Mechanism Design via Differential Privacy, In: Proceedings of the 48th Annual Symposium on Foundations of Computer Science (2007), http://research.microsoft.com/apps/pubs/default.aspx?id=65075

  11. Horowitz, J.K.: The Becker-DeGroot-Marschak mechanism is not necessarily incentive compatible, even for non-random goods. Economics Letters 93(1), 6–11 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  12. Shogren, J.F., Cho, S., Koo, C., List, J., Park, C., Polo, P., Wilhelmi, R.: Auction Mechanisms and the Measurement of WTP and WTA. Resource and Energy Economics 23, 97–109 (2001)

    Article  Google Scholar 

  13. Azmat, G., Iriberri, N.: The importance of relative performance feedback information: Evidence from a natural experiment using high school students. Journal of Public Economics 94(7-8), 435–452 (2010)

    Article  Google Scholar 

  14. Lusk, J.L., Alexander, C., Rousu, M.C.: Designing Experimental Auctions for Marketing Research: The Effect of Values, Distributions, and Mechanisms on Incentives for Truthful Bidding. Review of Marketing Science 5(3) (2007), http://www.researchgate.net/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Jentzsch, N. (2014). Auctioning Privacy-Sensitive Goods:. In: Preneel, B., Ikonomou, D. (eds) Privacy Technologies and Policy. APF 2014. Lecture Notes in Computer Science, vol 8450. Springer, Cham. https://doi.org/10.1007/978-3-319-06749-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06749-0_9

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06748-3

  • Online ISBN: 978-3-319-06749-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics