Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Acquisti, Alessandro (2002). Protecting privacy with economics: Economic incentives for preventive technologies in ubiquitous computing environments. In Workshop on Socially-informed Design of Privacyenhancing Solutions, 4th International Conference on Ubiquitous Computing (UBICOMP 02). http://guir.berkeley.edu/privacyworkshop2002/papers/acquisti-ubicomp-09-19-02.pdf.
Akerlof, George A. (1970). The market for lemons: Quality uncertainty and the market mechanism. Quarterly Journal of Economics, pages 488–500.
AT&T. P3p privacy bird. http://www.privacybird.com.
Burnetas, A.N. and Katehakis, M. N. (2002). Asymptotic bayes analysis for the finite horizon one armed bandit problem. Probability in the Engineering and Informational Sciences. to appear.
Calzolari, Giacomo and Pavan, Alessandro. Optimal design of privacy policies. http://faculty.nwu.edu/faculty/pava/ODPP.pdf.
Commission, Federal Trade (2000). Privacy online: Fair information practices in the electronic marketplace. http://www.ftc.gov/reports/privacy2000/privacy2000.pdf.
EPIC (1999). Pretty poor privacy. http://www.epic.org.
Center for Democracya and Technology (2002). Surveys main page. http://www.cdt.org/privacy/guide/introduction/surveyinfo.html.
Green, Heather, France, Mike, Stepanek, Marcia, and Borrus, Amy (2000). Our four-point plan. Business Week Online.
Jr, William F. Adkinson, Eisenach, Jeffrey A., and Lenard, Thomas M. (2002). Privacy online: A report on the information practices and policies of commercial web sites. http://www.pff.org/publications/privacyonlinefinalael.pdf.
McWilliams, Brian. Real networks hit with privacy lawsuit. http://www.internetnews.com/bus-news/article.php/8161_235141.
Mulligan, Dierdre, Cavoukian, Ann, Schwartz, Ari, and Gurski, Michael (2000). P3p and privacy: An update for the privacy community. http://www.cdt.org/privacy/pet/p3pprivacy/shtml.
Resnick, Paul, Zeckhauser, Richard, Swanson, John, and Lockwood, Kate (2002). The value of reputation on ebay: A controlled experiment. http://www.si.umich.edu/~presnick/papers/postcards/.
Spence, Michael (1973). Job market signalling. The Quarterly Journal of Economics, pages 355–74.
Trust E (2003). Truste statistics. http://www.truste.org/bus/pub_bottom.html.
Varian, Hal (1996). Economic aspects of personal privacy. http://www.sims.berkeley.edu/~hal/Papers/privacy/.
Yamagichi, Toshio and Matsuda, Masafumi (2002). Improving the lemons market with a reputation system. Technical report, University of Hokkaido.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
Vila, T., Greenstadt, R., Molnar, D. (2004). Why We Can’t Be Bothered to Read Privacy Policies. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_11
Download citation
DOI: https://doi.org/10.1007/1-4020-8090-5_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8089-0
Online ISBN: 978-1-4020-8090-6
eBook Packages: Springer Book Archive