|
|
Assessment of Personal Information Value and Individual Differences Under the Situation of Information Leakage: An Empirical Study Based on Discrete Choice Experiment |
Deng Shengli, Zhao Haiping |
Center for Studies of Information Resources, Wuhan University, Wuhan 430072 |
|
|
Abstract In the era of big data, the collection of massive amounts of personal information provides value for both governments and enterprises, but also raises concerns about data security and the leakage of personal information. Based on the discrete choice model, this study analyzes the relationship between different types of personal information leakage and individualswillingness to accept the leak by designing experiments. This study quantitatively assesses the value of each type of information from the perspective of the user, and we classify the samples by gender, age, education, and frequency of Internet use. The results show that ① basic personal information has the highest value, whereas social network information has the lowest. ② The expected value of women for all types of personal information is generally higher than that of men. ③ Compared with 18-30-year-olds, people over the age of 40 are less concerned about Internet search information. ④ People with higher academic qualifications have a higher expected value for various types of personal information. ⑤ Compared with those with lower Internet usage frequency, people with high frequency of Internet usage pay more attention to shopping and payment information. This study illustrates a quantitative analysis method for assessing the value of personal information. The results will help the information-collection department understand the preferences of individualspersonal information and the adjustment of information-collection strategies. This work also provides reference for government departments to formulate personal information-protection policies.
|
Received: 13 August 2018
|
|
|
|
1 AcquistiA, BrandimarteL, LoewensteinG. Privacy and human behavior in the age of information[J]. Science, 2015, 347(6221): 509-514. 2 李林. 2009法治蓝皮书——中国法治发展报告No. 7(2009)[M]. 北京: 社会科学文献出版社, 2009. 3 互联网法治研究中心. 中国个人信息安全和隐私保护报告[R/OL]. [2018-03-20]. http://www.199it.com/archives/540836.html. 4 Morrison, FoersterLLP. Are you ready for the amended Japanese privacy law?[EB/OL]. [2018-04-10]. https://www.lexology.com/library/detail.aspx?g=883f053e-24cc-43be-bc18-86fececc2993 5 ConsultingIntersoft. General Data Protection Regulation (GDPR) (EU)2016/679[EB/OL]. [2018-04-14]. https://gdpr-info.eu/. 6 中国人大网. 中华人民共和国网络安全法[EB/OL]. [2018-04-09]. http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.htm. 7 SmithH J, DinevT, XuH. Information privacy research: an interdisciplinary review[J]. MIS Quarterly, 2011, 35(4): 989-1016. 8 YongJ P, CampbellS W, N. AffectKwak, cognition and reward: Predictors of privacy protection online[J]. Computers in Human Behavior, 2012, 28(3): 1019-1027. 9 WuK W, HuangS Y, YenD C, et al. The effect of online privacy policy on consumer privacy concern and trust[J]. Computers in Human Behavior, 2012, 28(3): 889-897. 10 WoodmanR W, GansterD C, AdamsJ, et al. A survey of employee perceptions of information privacy in organizations[J]. Academy of Management Journal, 1982, 25(3): 647-663. 11 BainbridgeD, PearceG. The UK data protection act 1998—Data subjectsrights[J]. Computer Law & Security Review, 1998, 14(6): 401-406. 12 PhelpsJ E, Souza GD, NowakG J. Antecedents and consequences of consumer privacy concerns: An empirical investigation[J]. Journal of Interactive Marketing, 2001, 15(4): 2-17. 13 LimS, WooJ R, LeeJ, et al. Consumer valuation of personal information in the age of big data[J]. Journal of the Association for Information Science and Technology, 2018, 69(1): 60-71. 14 OtsukiM, SoneharaN. Estimating the value of personal information with SNS utility[C]// Proceedings of the Eighth International Conference on Availability, Reliability and Security. Los Alamitos: IEEE Computer Society Press, 2013: 512-516. 15 HannI H, HuiK L, LeeS Y T, et al. Analyzing online information privacy concerns: An information processing theory approach[J]. Journal of Management Information Systems, 2007, 24(2): 13-42. 16 SteinfeldN. Trading with privacy: the price of personal information[J]. Online Information Review, 2015, 39(7): 923-938. 17 MinJ, KimB. How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost[J]. Journal of the Association for Information Science and Technology, 2015, 66(4): 839-857. 18 BauerC, KorunovskaJ. Spiekermann S. On the value of information—What Facebook users are willing to pay[C]// Proceedings of the European Conference on Information Systems. 2012: 217-223. 19 MichelS, ThomasH, FaranakF. On the willingness to pay for privacy as a freemium model: First empirical evidence[J]. Journal of Chemical Physics, 2013, 124(2): 43-50. 20 SpiekermannS, KorunovskaJ, BauerC. Psychology of ownership and asset defense: Why people value their personal information beyond privacy[C]// Proceedings of the International Conference on Information Systems. 2012: 41-47. 21 GrossklagsJ, AcquistiA. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information[OL]. https://www.econinfosec.org/archive/weis2007/papers/66.pdf. 22 RacherlaP, BabbJ, KeithM. Pay-what-you-want pricing for mobile applications: The effect of social information and privacy assurances[C]// Proceedings of the Conference for Information Systems Applied Research, Wilmington North Carolina, USA. 2011, 4: n1833. 23 KimJ E, YeoJ. Valuation of consumerspersonal information: A South Korean example[J]. Journal of Family and Economic Issues, 2010, 31(3): 297-306. 24 KwonH, LeeE, KimT, et al. Estimating compensation for personal information infringement in Korea using contingent valuation methods[J]. Journal of the Korea Institute of Information Security and Cryptology, 2012, 22: 367-377. 25 黄逸珺, 陆桐, 闫强. 电子商务网站个人信息价值评估[J]. 北京邮电大学学报(社会科学版), 2017(5): 33-41. 26 BeresfordA R, KüblerD, PreibuschS. Unwillingness to pay for privacy: A field experiment[J]. IZA Discussion Papers, 2012, 117(1): 25-27. 27 EgelmanS, FeltA P, WagnerD. Choice architecture and smartphone privacy: There s a price for that[M]// B?hme R. (eds) The Economics of Information Security and Privacy. Heidelberg: Springer, 2013: 211-236. 28 RiceD, D’ArcyJ. A personal information auction: Measuring the differential value of privacy[C]// Proceedings of Americas Conference on Information Systems, 2007: 206. 29 BenndorfV, NormannH T. The willingness to sell personal data[OL]. [2018-04-12]. https://www.econstor.eu/bitstream/10419/100663/1/79530904X.pdf. 30 BarakO, CohenG, GazitA, et al. The price is right? Economic value of location sharing[C]// Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication. New York: ACM Press, 2013: 891-900. 31 KimJ, NamC, KimS. The economic value of personal information and policy implication[C]// Proceedings of the 26th European Regional ITS Conference. International Telecommunications Society, 2015. 32 AdamsJ S. Inequity in social exchange[J]. Advances in Experimental Social Psychology, 1965, 2(4): 267-299. 33 安徽省人民代表大会常务委员会. 安徽省消费者权益保护条例[J]. 安徽省人民政府公报, 2004(18): 10-18. 34 刘文卿. 应用统计学系列教材: 实验设计[M]. 北京: 清华大学出版社, 2005. 35 GlasgowG, ButlerS. The value of personal information to consumers of online services: Evidence from a discrete choice experiment[OL]. [2018-03-25]. http://www.nera.com/content/dam/nera/publications/archive2/PUB_Value_Personal_Info_0714.pdf. 36 AcquistiA, GrossklagsJ. Privacy and rationality in individual decision making[J]. IEEE Security & Privacy, 2005, 3(1): 26-33. 37 RoseJ, RehseO, R?berB. The value of our digital identity[EB/OL]. [2018-03-28]. https://www.bcg.com/publications/2012/digital-economy-consumer-insight-value-of-our-digital-identity.aspx. 38 FogelJ, NehmadE. Internet social network communities: Risk taking, trust, and privacy concerns[J]. Computers in Human Behavior, 2009, 25(1): 153-160. 39 HeraviA, MubarakS, ChooK K R. Information privacy in online social networks: Uses and gratification perspective[J]. Computers in Human Behavior, 2018, 84: 441-459. 40 BarthS, de JongM D T. The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review[J]. Telematics and Informatics, 2017, 34(7): 1038-1058. 41 艰难维权: 五起个人信息泄露案件分析[OL]. [2018-04-10]. http://tech.sina.com.cn/i/2015-01-19/doc-ichmifpx4644951.shtml. |
|
|
|