[Purpose/significance] Compared with the situation in which the probability of personal data leakage is 100 percent, the situation in which personal data is leaked with a certain probability is more common. Thus, this paper aims to measure users' personal data privacy value under the certain probability of privacy leakage, which puts forward a new perspective of privacy measurement and the measurement results are of practical significance to privacy classification protection.[Method/process] Based on the multiple price list, the user's return on financial risk is measured. Modified the implementation mechanism of multiple price list to elicit users' decisions between the risk-free scheme and the scheme with the probability of privacy leakage. Based on the above steps, value of privacy under leakage probability of users can be measured.[Result/conclusion] When the probability of privacy leakage is 30%, users' average VPLP in the social networks is about RMB 89.5; at the same time, when the probability of privacy leakage is 100%, users' average "willing to accept" and "willing to pay" of personal data in the social networks is about RMB 124.1 and RMB 93.8. Users' VPLP depends on the value of personal privacy itself and probability of privacy leakage.
Zhang Kailiang
,
Zang Guoquan
. Measurement of Personal Data Privacy in the Context of Probability of Leakage[J]. Library and Information Service, 2021
, 65(9)
: 62
-69
.
DOI: 10.13266/j.issn.0252-3116.2021.09.007
[1] 新华网.华住5亿条用户信息疑泄露警方已介入调查[EB/OL].[2020-11-12]. http://www.xinhuanet.com/fortune/2018-08/29/c_1123343927.htm.
[2] 搜狐网.LinkedIn遭黑客攻击,约1.59亿用户数据被窃[EB/OL].[2020-11-12]. https://m.sohu.com/a/292645813_557054.
[3] HANN I H, HUI K L, LEE T, et al. Online information privacy:measuring the cost-benefit tradeoff[C]//Proceedings of the international conference on information systems 2002. Illinois:AIS elibrary, 2002.
[4] ACQUISTI A, GROSSKLAGS J. An online survey experiment on ambiguity and privacy[J]. Communications & strategies, 2012, 1(88):19-39.
[5] POTOGLOU D, PATIL S, GIJON C, et al. The value of personal information online:results from three stated preference discrete choice experiments in the UK[C]//Proceedings of the 21th European conference on information systems. Netherlands:ECIS Press, 2013.
[6] LIM S, WOO J R, LEE J, et al. Consumer valuation of personal information in the age of big data[J]. Journal of the Association for Information Science and Technology, 2018, 69(1):60-71.
[7] 邓胜利,赵海平.信息泄露情境下的个人信息价值评估及个体差异:基于离散选择模型的实证研究[J].情报学报,2019,38(3):266-276.
[8] GROSSKLAGS J, ACQUISTI A, HEINZ H J. When 25 cents is too much:an experiment on willingness-to-sell and willingness-to-protect personal information[C]//Proceedings of the 6th annual workshop on the economics of information security. Cambridge:WEIS Press, 2007.
[9] 黄逸珺,陆桐,闫强.电子商务网站个人信息价值评估[J].北京邮电大学学报(社会科学版),2017(5):33-41.
[10] HUBERMAN B A, ADER E, FINE L R. Valuating privacy[J]. IEEE security & privacy, 2005,3(5):22-25.
[11] 臧国全,张凯亮,闫励.个人数据价值计量研究——基于改造的BDM机制[J].图书情报工作,2020, 64(7):103-109.
[12] KRASNOVA H, HILDEBRAND T, GUNTHER O. Investigating the value of privacy in online social networks:conjoint analysis[C]//Proceedings of the international conference on information systems. Phoenix:ICIS Press, 2009.
[13] KIM J, NAM C, KIM S. The economic value of personal information and policy implication[C]//Proceedings of the 26th European regional ITS conference. Los Angeles:ITS Press, 2015.
[14] PU Y, GROSSKLAGS J. Towards a model on the factors influencing social app users' valuation of interdependent privacy[J]. Processing on privacy enhancing technologies, 2016(2):61-81.
[15] TSAI J Y, EGELMAN S, CRANOR L, et al. The effect of online privacy information on purchasing behavior:an experimental study[J]. Information systems research, 2011, 22(2):254-268.
[16] BERESFORD A R, KUEBLER D, PREIBUSCH S. Unwillingness to pay for privacy:a field experiment[J]. Economics letters, 2012, 117(1):25-27.
[17] EGELMAN S, FELT A P, WAGNER D. Choice architecture and smartphone privacy:there's a price for that[M]. The economics of information security and privacy. Heidelberg:Springer, 2013.
[18] KRASNOVA H, ELING N, ABRAMOVA O, et al. Dangers of "Facebook login" for mobile apps:is there a price tag for social information?[C]//Thirty fifth international conference on information systems. Auckland:ICIS Press,2014.
[19] KIM J E, YEO J. Valuation of consumers' personal information:a south Korean example[J]. Journal of family and economic issues, 2010, 31(3):297-306.
[20] OTSUKI M, SONEHARA N. Estimating the value of personal information with SNS utility[C]//Proceedings of the eighth international conference on availability, reliability and security. Los Alamitos:IEEE Computer Society Press, 2013.
[21] DANEZIS G, LEWIS S, ANDERSON R. How much is location privacy worth?[C]//Proceedings of the fourth workshop on the economics of information security. Cambridge:WEIS Press, 2005.
[22] SPIEKERMANN S, KORUNOVSKA J, BAUER C. Psychology of ownership and asset defense:why people value their personal information beyond privacy[C]//Proceedings of the international conference on information systems. New York:ACM Press, 2012.
[23] 百度汉语.风险[EB/OL].[2020-11-13]. https://hanyu.baidu.com/zici.
[24] BINSWANGER H P. Attitudes toward risk:experimental measurement in rural India[J]. American journal of agricultural economics, 1980, 62(3):395-407.
[25] BECKER G M, DEGROOT M H, MARSCHAK J. Measuring utility by a single response sequential method[J]. Behavioral science,1964,9(3):226-232.
[26] LAWRENCE N W.社会研究方法:定性和定量的取向[M].郝大海,译.北京:中国人民大学出版社, 2000.
[27] KAHNEMAN D, TVERSKY K A. Prospect theory:an analysis of decision under risk[J]. Econometrica, 1979, 47(2):263-291.
[28] 陈蓉,王宜峰,邱紫华.隐含风险厌恶:度量、影响因素与信息含量[J].厦门大学学报,2016(1):116-127.
[29] ACQUISTI A, TAYLOR R, WAGMAN L. The economics of privacy[J]. Journal of economic literature, 2016, 54(2):442-492.
[30] GRAEFF T R, HARMON S. Collecting and using personal data:consumers' awareness and concerns[J] Journal of consumer marketing, 2002, 19(4):302-318.
[31] LEWIS K, KAUFMAN J, CHRISTAKIS N. The taste for privacy:an analysis of college student privacy settings in an online social network[J]. Journal of computer-mediated communication, 2008, 14(1):79-100.
[32] PREIBUSCH S. Guide to measuring privacy concern:review of survey and observational instruments[J]. International journal of human-computer studies, 2013, 71(12):1133-1143.