Consumer Privacy and Marketing Avoidance: A Static Model
We introduce the concept of marketing avoidance--consumer efforts to conceal themselves and to deflect marketing. The setting is one in which sellers market some item through solicitations to potential consumers, who differ in their benefit from the item and suffer harm from receiving solicitations. Concealment by one consumer induces sellers to shift solicitations to other consumers, whereas deflection does not. Solicitations cause two externalities: direct harm on consumers and the (indirect) cost of consumer concealment and deflection. We find that in markets where the marginal cost of solicitation is sufficiently low, efforts by low-benefit consumers to conceal themselves will increase the cost-effectiveness of solicitations and lead sellers to market more. However, concealment by high-benefit consumers leads sellers to market less. Furthermore, concealment by low-benefit consumers increases direct privacy harm, and consumer welfare is higher with deflection than concealment. Finally, it is optimal to impose a charge on solicitations.
Volume (Year): 54 (2008)
Issue (Month): 6 (June)
|Contact details of provider:|| Postal: 7240 Parkway Drive, Suite 300, Hanover, MD 21076 USA|
Web page: http://www.informs.org/
More information through EDIRC
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Varian, Hal R, 1980. "A Model of Sales," American Economic Review, American Economic Association, vol. 70(4), pages 651-659, September.
- Van Zandt, Timothy, 2001.
"Information Overload in a Network of Targeted Communication,"
CEPR Discussion Papers
2836, C.E.P.R. Discussion Papers.
- Timothy Van Zandt, 2004. "Information Overload in a Network of Targeted Communication," RAND Journal of Economics, The RAND Corporation, vol. 35(3), pages 542-560, Autumn.
- Loder Theodore & Van Alstyne Marshall & Wash Rick, 2006. "An Economic Response to Unsolicited Communication," The B.E. Journal of Economic Analysis & Policy, De Gruyter, vol. 6(1), pages 1-38, March.
- Ian Ayres & Steven D. Levitt, 1997.
"Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack,"
NBER Working Papers
5928, National Bureau of Economic Research, Inc.
- Ian Ayres & Steven D. Levitt, 1998. "Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack," The Quarterly Journal of Economics, Oxford University Press, vol. 113(1), pages 43-77.
- Meurer, Michael & Stahl, Dale II, 1994. "Informative advertising and product match," International Journal of Industrial Organization, Elsevier, vol. 12(1), pages 1-19, March.
- Hui-Wen, Koo & Png, I. P. L., 1994. "Private security: Deterrent or diversion?," International Review of Law and Economics, Elsevier, vol. 14(1), pages 87-101, March.
- Curtis R. Taylor, 2004. "Consumer Privacy and the Market for Customer Information," RAND Journal of Economics, The RAND Corporation, vol. 35(4), pages 631-650, Winter.
- Alessandro Acquisti & Hal R. Varian, 2002.
"Contidioning Prices on Purchase History,"
- Bulow, Jeremy I & Geanakoplos, John D & Klemperer, Paul D, 1985. "Multimarket Oligopoly: Strategic Substitutes and Complements," Journal of Political Economy, University of Chicago Press, vol. 93(3), pages 488-511, June.
- Il-Horn Hann & Kai-Lung Hui & Yee-Lin Lai & S.Y.T. Lee & I.P.L. PNG, 2006. "Who gets spammed?," Natural Field Experiments 00271, The Field Experiments Website.
- Simon P. Anderson & André De Palma, 2008.
- Gene M. Grossman & Carl Shapiro, 1984. "Informative Advertising with Differentiated Products," Review of Economic Studies, Oxford University Press, vol. 51(1), pages 63-81.
- Gerard R. Butters, 1977. "Equilibrium Distributions of Sales and Advertising Prices," Review of Economic Studies, Oxford University Press, vol. 44(3), pages 465-491.
- Jagmohan S. Raju & V. Srinivasan & Rajiv Lal, 1990. "The Effects of Brand Loyalty on Competitive Price Promotional Strategies," Management Science, INFORMS, vol. 36(3), pages 276-304, March.
- Robert, Jacques & Stahl, Dale O, II, 1993. "Informative Price Advertising in a Sequential Search Model," Econometrica, Econometric Society, vol. 61(3), pages 657-686, May.
- Narasimhan, Chakravarthi, 1988. "Competitive Promotional Strategies," The Journal of Business, University of Chicago Press, vol. 61(4), pages 427-49, October.
- McAfee R. Preston, 1994. "Endogenous Availability, Cartels, and Merger in an Equilibrium Price Dispersion," Journal of Economic Theory, Elsevier, vol. 62(1), pages 24-47, February.
- Yuxin Chen & Ganesh Iyer, 2002. "Research Note Consumer Addressability and Customized Pricing," Marketing Science, INFORMS, vol. 21(2), pages 197-208, November.
- Yuxin Chen & Chakravarthi Narasimhan & Z. John Zhang, 2001. "Individual Marketing with Imperfect Targetability," Marketing Science, INFORMS, vol. 20(1), pages 23-41, November.
- Michael R. Baye & John Morgan, 2001. "Information Gatekeepers on the Internet and the Competitiveness of Homogeneous Product Markets," American Economic Review, American Economic Association, vol. 91(3), pages 454-474, June.
- A. M. McGahan & Pankaj Ghemawat, 1994. "Competition to Retain Customers," Marketing Science, INFORMS, vol. 13(2), pages 165-176.
- Nataly Gantman & Yossi Spiegel, 2004. "Adware, Shareware, and Consumer Privacy," Working Papers 04-02, NET Institute, revised Oct 2004.
When requesting a correction, please mention this item's handle: RePEc:inm:ormnsc:v:54:y:2008:i:6:p:1094-1103. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Mirko Janc)
If references are entirely missing, you can add them using this form.