Consumer Privacy and Marketing Avoidance: A Static Model
We introduce the concept of marketing avoidance--consumer efforts to conceal themselves and to deflect marketing. The setting is one in which sellers market some item through solicitations to potential consumers, who differ in their benefit from the item and suffer harm from receiving solicitations. Concealment by one consumer induces sellers to shift solicitations to other consumers, whereas deflection does not. Solicitations cause two externalities: direct harm on consumers and the (indirect) cost of consumer concealment and deflection. We find that in markets where the marginal cost of solicitation is sufficiently low, efforts by low-benefit consumers to conceal themselves will increase the cost-effectiveness of solicitations and lead sellers to market more. However, concealment by high-benefit consumers leads sellers to market less. Furthermore, concealment by low-benefit consumers increases direct privacy harm, and consumer welfare is higher with deflection than concealment. Finally, it is optimal to impose a charge on solicitations.
Volume (Year): 54 (2008)
Issue (Month): 6 (June)
|Contact details of provider:|| Postal: 7240 Parkway Drive, Suite 300, Hanover, MD 21076 USA|
Web page: http://www.informs.org/
More information through EDIRC
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Alessandro Acquisti & Hal R. Varian, 2002.
"Contidioning Prices on Purchase History,"
- Curtis R. Taylor, 2004. "Consumer Privacy and the Market for Customer Information," RAND Journal of Economics, The RAND Corporation, vol. 35(4), pages 631-650, Winter.
- Varian, Hal R, 1980. "A Model of Sales," American Economic Review, American Economic Association, vol. 70(4), pages 651-659, September.
- Gene M. Grossman & Carl Shapiro, 1984. "Informative Advertising with Differentiated Products," Review of Economic Studies, Oxford University Press, vol. 51(1), pages 63-81.
- Van Zandt, Timothy, 2001.
"Information Overload in a Network of Targeted Communication,"
CEPR Discussion Papers
2836, C.E.P.R. Discussion Papers.
- Timothy Van Zandt, 2004. "Information Overload in a Network of Targeted Communication," RAND Journal of Economics, The RAND Corporation, vol. 35(3), pages 542-560, Autumn.
- Meurer, Michael & Stahl, Dale II, 1994. "Informative advertising and product match," International Journal of Industrial Organization, Elsevier, vol. 12(1), pages 1-19, March.
- Yuxin Chen & Ganesh Iyer, 2002. "Research Note Consumer Addressability and Customized Pricing," Marketing Science, INFORMS, vol. 21(2), pages 197-208, November.
- Simon P. Anderson & André de Palma, 2006.
Virginia Economics Online Papers
364, University of Virginia, Department of Economics.
- Bulow, Jeremy I & Geanakoplos, John D & Klemperer, Paul D, 1985. "Multimarket Oligopoly: Strategic Substitutes and Complements," Journal of Political Economy, University of Chicago Press, vol. 93(3), pages 488-511, June.
- Il-Horn Hann & Kai-Lung Hui & Yee-Lin Lai & S.Y.T. Lee & I.P.L. PNG, 2006. "Who gets spammed?," Natural Field Experiments 00271, The Field Experiments Website.
- Michael R. Baye & John Morgan, 2001. "Information Gatekeepers on the Internet and the Competitiveness of Homogeneous Product Markets," American Economic Review, American Economic Association, vol. 91(3), pages 454-474, June.
- Jagmohan S. Raju & V. Srinivasan & Rajiv Lal, 1990. "The Effects of Brand Loyalty on Competitive Price Promotional Strategies," Management Science, INFORMS, vol. 36(3), pages 276-304, March.
- Ian Ayres & Steven D. Levitt, 1998.
"Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack,"
The Quarterly Journal of Economics,
Oxford University Press, vol. 113(1), pages 43-77.
- Ian Ayres & Steven D. Levitt, 1997. "Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack," NBER Working Papers 5928, National Bureau of Economic Research, Inc.
- Loder Theodore & Van Alstyne Marshall & Wash Rick, 2006. "An Economic Response to Unsolicited Communication," The B.E. Journal of Economic Analysis & Policy, De Gruyter, vol. 6(1), pages 1-38, March.
- Narasimhan, Chakravarthi, 1988. "Competitive Promotional Strategies," The Journal of Business, University of Chicago Press, vol. 61(4), pages 427-449, October.
- Hui-Wen, Koo & Png, I. P. L., 1994. "Private security: Deterrent or diversion?," International Review of Law and Economics, Elsevier, vol. 14(1), pages 87-101, March.
- McAfee R. Preston, 1994. "Endogenous Availability, Cartels, and Merger in an Equilibrium Price Dispersion," Journal of Economic Theory, Elsevier, vol. 62(1), pages 24-47, February.
- Nataly Gantman & Yossi Spiegel, 2004. "Adware, Shareware, and Consumer Privacy," Working Papers 04-02, NET Institute, revised Oct 2004.
- Yuxin Chen & Chakravarthi Narasimhan & Z. John Zhang, 2001. "Individual Marketing with Imperfect Targetability," Marketing Science, INFORMS, vol. 20(1), pages 23-41, November.
- Gerard R. Butters, 1977. "Equilibrium Distributions of Sales and Advertising Prices," Review of Economic Studies, Oxford University Press, vol. 44(3), pages 465-491.
- Robert, Jacques & Stahl, Dale O, II, 1993. "Informative Price Advertising in a Sequential Search Model," Econometrica, Econometric Society, vol. 61(3), pages 657-686, May.
- A. M. McGahan & Pankaj Ghemawat, 1994. "Competition to Retain Customers," Marketing Science, INFORMS, vol. 13(2), pages 165-176.