Abstract
One mechanism to obtain valuations of personal data from individuals is the reverse second-price Vickrey auction (RVA), which is assumed to be an incentive-compatible mechanism. Herein, it is analyzed whether conditions for RVA incentive-compatibility exist, once personal data is sensitive and induces privacy costs. In the experiment subjects could sell the result of a logic test together with their name as privacy-sensitive good using an auction mechanism. The winner’s identity and result was revealed to the group. The key result is that a significant ‘identification effect’ exists that acts as auction entry barrier. Thus, the RVA is not an incentive-compatible mechanism for obtaining valuations of privacy-sensitive goods.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Danezis, G., Lewis, S., Anderson, R.: How Much is Location Privacy Worth? Working Paper presented at WEIS (2005), http://infosecon.net/workshop/pdf/location-privacy.pdf
Egelman, S., Porter Felt, A., Wagner, D.: Choice Architecture and Smartphone Privacy: There’s A Price for That, Working Paper presented at WEIS (2012), http://weis2012.econinfosec.org/papers/Egelman_WEIS2012.pdf
Feri, F., Giannetti, C., Jentzsch, N.: Disclosure of Personal Data under Risk of Privacy Shocks, Quaderni DSE Working Paper N° 875 (2013), http://ideas.repec.org/p/bol/bodewp/wp875.html
Huberman, B., Adar, E., Fine, L.: Valuating privacy. IEEE Security & Privacy 3(5), 22–25 (2005)
Dijksterhuis, A., van Knippenberg, A.: The relation between perception and behavior, or how to win a game of Trivial Pursuit. Journal of Personality and Social Psychology 74, 865–877 (1998), doi:10.1037/0022-3514.74.4.865
Ariely, D., Norton, M.: Self-deception: How we come to believe we are better than we truly are. Working Paper, Sloan School of Management. MIT (2005)
Joshi, S., Sun, Y.-A., Vora, P.L.: The Influence of Privacy Cost on Threshold Strategies in Sealed-bid First and Second-price Auctions (2005), http://www.seas.gwu.edu/poorvi/auctions.pdf
Naor, M., Pinkas, B., Sumner, R.: Privacy preserving Auctions and Mechanism Design. In: Proceedings of the First ACM Conference on Electronic Commerce, pp. 129–139. ACM Press (1999)
Gosh, A., Roth, A.: Selling Privacy at Auction, Working Paper, http://arxiv.org/abs/1011.1375 (November 29, 20011)
McSherry, F., Talwar, K.: Mechanism Design via Differential Privacy, In: Proceedings of the 48th Annual Symposium on Foundations of Computer Science (2007), http://research.microsoft.com/apps/pubs/default.aspx?id=65075
Horowitz, J.K.: The Becker-DeGroot-Marschak mechanism is not necessarily incentive compatible, even for non-random goods. Economics Letters 93(1), 6–11 (2006)
Shogren, J.F., Cho, S., Koo, C., List, J., Park, C., Polo, P., Wilhelmi, R.: Auction Mechanisms and the Measurement of WTP and WTA. Resource and Energy Economics 23, 97–109 (2001)
Azmat, G., Iriberri, N.: The importance of relative performance feedback information: Evidence from a natural experiment using high school students. Journal of Public Economics 94(7-8), 435–452 (2010)
Lusk, J.L., Alexander, C., Rousu, M.C.: Designing Experimental Auctions for Marketing Research: The Effect of Values, Distributions, and Mechanisms on Incentives for Truthful Bidding. Review of Marketing Science 5(3) (2007), http://www.researchgate.net/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Jentzsch, N. (2014). Auctioning Privacy-Sensitive Goods:. In: Preneel, B., Ikonomou, D. (eds) Privacy Technologies and Policy. APF 2014. Lecture Notes in Computer Science, vol 8450. Springer, Cham. https://doi.org/10.1007/978-3-319-06749-0_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-06749-0_9
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06748-3
Online ISBN: 978-3-319-06749-0
eBook Packages: Computer ScienceComputer Science (R0)