SlideShare a Scribd company logo
1 of 53
The Challenge of Benefit-Cost Analysis As 
Applied to Online Safety & Digital Privacy 
Adam Thierer 
Senior Research Fellow 
Mercatus Center at George Mason University 
January 17, 2012 
Presentation before George Mason University Law & 
Economics Center conference on Privacy, Regulation, & 
Antitrust
Purpose of Talk / Paper 
• Explore challenges of applying benefit-cost analysis 
(BCA) to privacy & online safety 
– in many ways, they are really same debate 
• Discuss particular problem of defining harm (and, 
correspondingly, the benefits of regulation) 
• Outline the range of costs that must be considered 
(even if they prove difficult to quantify) 
• Focus on the many alternatives to regulation 
• Explain how the toolbox of solutions we apply to 
online safety can work for privacy 
2
Prefatory Note: 
Strict Rights Approach Limits BCA 
• If privacy & safety are “dignity” rights, then it trumps 
all other considerations & BCA goes out the window 
• But at least here in the U.S. the calculus has been 
more utilitarian in character 
• Better to think about privacy & safety the way we 
think about happiness: You have the right to pursue 
it, not so much a strict right to it 
• So, BCA remains important 
3
The Nuts & Bolts of RIA / BCA 
4
The Triumph of Benefit-Cost Analysis 
“It is not exactly news that we live in an era of 
polarized politics. But Republicans and Democrats 
have come to agree on one issue: the essential need 
for cost- benefit analysis in the regulatory process. In 
fact, cost-benefit analysis has become part of the 
informal constitution of the U.S. regulatory state. 
This is an extraordinary development.” 
- Cass Sunstein (2012) 
5
The Basics of RIA / BCA 
• Since early 1980s, regulatory impact 
assessments (RIAs) have been required 
• Executive Order 12291 (Reagan) 
• Executive Order 12866 (Clinton) 
• Executive Order 13563 & 13610 (Obama) 
• OMB Circular A-4 
– 3 core elements of an RIA… 
6
RIA Step #1: 
Statement of need for the regulatory action 
• a clear explanation of need for the regulatory 
action 
• “Agencies should explain whether the action is 
intended to address a market failure or to 
promote some other goal, such as improving 
governmental processes, protecting privacy, 
or combating discrimination.” 
7
RIA Step #2: 
Identify range of regulatory approaches 
• agencies must describe “range of alternative 
regulatory approaches, including the option of not 
regulating.” 
• “should consider flexible approaches that reduce 
burdens and maintain freedom of choice” 
• “should specify performance objectives, rather than 
specifying the behavior or manner of compliance that 
regulated entities must adopt.” 
8
RIA Step #3: 
Conduct the Benefit-Cost Analysis 
• estimates the benefits & costs associated with each 
alternative approach. 
• costs should be quantified and monetized to the 
extent possible 
• when quantification of a particular benefit or cost is 
not possible, it should be described qualitatively. 
• where relevant, consider “values such as equity, 
human dignity, fairness, potential distributive impacts, 
privacy, and personal freedom.” 
9
Possible Privacy Regs to Consider 
• “Do Not Track” mandate 
• Mandatory default switches 
– Opt-in mandates 
• Bans on specific practices 
– 3rd party data sharing / aggregation 
– Deep packet inspection 
• Targeted privacy laws 
– COPPA 
Note: Much harder to do BCA when these things are 
being “nudged” instead of formally mandated. 
10
The Problem of Defining the Problem 
(and how that complicates the question of 
benefits of regulation) 
11
Privacy & Safety Metrics 
= A Nightmare 
There are no good, widely agreed upon 
metrics by which to measure online safety & 
digital privacy “harms.” 
12
How Privacy & Safety Harms 
are Described in Popular Culture 
Online Safety “Harms” 
• Offensive 
• Smutty 
• Filthy 
• Hurtful / Hateful 
Privacy “Harms” 
• Invasive 
• Manipulative 
• Annoying 
• Creepy 
13 
** None of these things are even remotely quantifiable **
How Privacy & Safety Harms 
are Described in the Literature 
• Tangible vs. Intangible 
• Objective vs. Subjective 
• Direct vs. Indirect 
• Monetary vs. Non-Monetary 
• Quantifiable vs. Unquantifiable 
• Physical vs. Psychological 
14
In a perfect world… 
Intangible Harm Tangible Harm 
Monetizable Harm Easier case 
15 
Non-Monetary Harm Hard case
16 
Intangible Tangible 
Monetizable Harm 
Data Breach Invasion / Trespass 
Non-Monetary Harm 
“Creepiness” 
“Offensiveness” 
Stalking 
and sometimes that works … 
… but most of the time it doesn’t.
The Key (very, very hard) Question 
To what extent are harms that purely 
psychological in character really harms at all? 
• Clearly, some can be 
– Incessant digital harassment / cyber-bullying 
• But most not harmful in a traditional sense 
– If “creepiness” is an actionable harm, then the Net 
as we know it would have to be shut down 
17
The hopeless subjectivity of it all… 
• One person’s “creepy” is another person’s 
“killer app.” 
• Worse yet, even our own actions don’t match 
up with our professed values! 
• Stated preferences vs. revealed preferences problem 
18
What’s Your Privacy Indifference Curve 
Look Like? 
19 
Privacy 
Sociability 
and / or 
Services 
privacy 
unconcerned 
privacy 
fundamentalist 
Many people 
who say they are 
here, actually 
seem to be here.
The Privacy Paradox 
“Ask 100 people if they care [about 
privacy] and 85 will say yes. Ask those 
same 100 people if they’ll give you a DNA 
sample just to get a free Big Mac, and 85 
will say yes.” 
- Austin Hill, 2002 
20
What about “peace of mind” arguments? 
• “peace of mind” / “user trust” = primary benefit? 
– i.e. more privacy & safety regs make consumers more 
comfortable getting online 
– Analogy: post – 9/11 security mandates 
• But they had opposite impact! (see J. Law & Econ. 2007) 
• Problem with “peace of mind” = again, how to prove it 
– More people online than ever 
• Plus, could cut other way (i.e., “free” services drive 
subscribership / usage) 
• Natural experiments? (US vs. EU?) 
– Problem = many confounding variables 
21
A Value Exchange without 
Formal Contracting 
• Popular belief = If you’re not buying the 
product, you are the product. 
• Only partially correct. 
• Reality = You can be both part of value 
exchange & the recipient of the benefits of 
that value exchange. 
• Past examples = traditional broadcast & 
newspaper media advertising 
22
The Current Value Exchange 
• Almost all online media / services driven by a 
simple quid pro quo… 
– Data collection / targeted advertising in exchange 
for “free” (or cheap) content and services 
– But hard to precisely quantify this value exchange 
23
Market Failure = Lack of Options? 
• Why no “Facebook Private” or “YouTube 
Family Friendly” 
• Actually, those sites do exist (by other names 
& from other vendors), but there is very little 
demand for them 
+ (as summarized later) lots of PETs exist 
+ no requirement you use any of these 
services (Facebook isn’t a forced labor camp!) 
24
How do we factor social adaptation 
into BCA? 
• People adapt! (sometimes quicker than we imagine) 
• Today’s “technopanic” is tomorrow’s widely accepted 
technology / business practice 
– Examples: photography, caller ID, Gmail 
• 2 general lessons: 
1. Cautions against knee-jerk regulatory responses 
2. BCA should account for rapid social / cultural adjustment 
to new info-tech 
25
When All Else Fails… 
Claim False Consciousness as Harm! 
• Manipulation! Mind control! 
Siva Vaidhyanathan: 
– consumers are being tricked by the “smokescreen” of “free” 
online services and “freedom of choice.” 
– “We are conditioned to believe that having more choices… 
is the very essence of human freedom. But meaningful 
freedom implies real control over the conditions of one’s 
life.” 
• Such “people are sheep” arguments can’t stand in a 
free society (or be used in BCA) 
26
Costs of Privacy Regulation 
(Lost Outputs & Forgone Opportunities) 
27
What Data Collection Has Enabled 
• Transport yourself back a decade and consider how 
far we’ve come 
• Things that used to cost $$ and were capacity-capped: 
– Email 
– Data & document storage 
– Photo hosting 
– Mapping services 
– Security / anti-virus software 
– Online bulletin boards / hobby pages 
– Most online news 
28
The Magic of Data & Advertising 
29 
• Lowers Price: None of those services cost us a dime 
now 
• Expands Quantity: There are more of those services 
today 
• Improves Quality: All of those service are more 
diverse or innovative than before 
Data collection & advertising made it all possible 
= a huge boon for consumer welfare.
Possible Regulatory Costs BCA Must Consider 
• Will regulation tip the balance between business models? 
• instead of ad & data supported online sites and services, we 
could get… 
1) More intrusive but untargeted ads? (banner, pop-up, etc.) 
2) Pay-per-use or subscription-based? 
3) Restricted output / lower quality sites? 
4) Mix of all of the above? 
• This has both micro and macro consequences 
– For industry: If not targeted data collection / advertising, what will 
fund online content and services in the future? 
– For consumers: If those other methods fail to work = less content & 
services or more expensive content & services 
• As always, there is no free lunch 
30
Some Good Studies Showing Trade-offs 
• Beales 
– targeted advertising 2.68 times the price of run of 
network advertising 
• Tucker & Goldfarb 
– EU Privacy Directive = 65% decrease in advertising 
effectiveness in Europe 
– Because regulation decreases ad effectiveness, 
“this may change the number and types of 
businesses sustained by the advertising-supporting 
Internet.” 
31
WTP Literature is Very Thin 
• Perhaps not surprising since 
– People aren’t paying anything in real world! 
– But polls / surveys make crappy proxies 
– Stated preferences vs. revealed preferences problem 
• WTP study by CMU (2007) 
– price matters a lot, but some consumers willing to 
pay more for privacy when better informed 
32
ENISA Study 
• European Network & Information Security 
Agency (ENISA) “Study on Monetizing 
Privacy” (Feb. 2012) 
– Pointed out lack of real-world experiments 
as major problem 
• “a large share of literature is devoted to [surveys]” & 
“economic experiments that implement real purchase 
transactions are rather scarce” 
• “there are no works in economics that combine theoretical 
and experimental methods for the analysis of the interplay of 
privacy concerns, product personalization and competition.” 
33
ENISA Results 
• combined lab & field experiments (cell phone number for 
movie ticket discount) 
Results: 
• Price matters! 
– Most consumers bought from “privacy-invasive” providers if price lower 
(50 Euro cents) 
• Privacy matters (at least a little)! 
– 29% would pay extra to avoid giving up cell number; 9% would pay more 
to avoid giving up email. 
– And fully 80% preferred privacy-friendly option if no price difference at 
all. 
34
In sum, the problem we face (re: 
determining costs / WTP) … 
“Empirical research on the subject is still in its 
infancy. Most studies ask for personal opinion, rather 
than measure the digital choices people make, and 
even there, the results usually find a gap between what 
people say and what they do about their privacy 
online.” 
- Somini Sengupta, NYT (3/19/12) 
>> BCA has to account for this & try to better measure 
real-world choices & trade-offs, not polls & surveys. 
35
Other Costs / Lost Outputs to Consider 
• International competitiveness 
– Has privacy regulation limited Europe’s online market? 
– Could regulation here diminish U.S. competitive advantage 
relative to world? 
• Market structure / competition 
– Privacy mandates could lead to industry consolidation 
• Speech considerations 
– Many online safety & privacy regulations raise thorny free 
speech / 1st Amendment issues 
– Privacy & online safety regs could limit aggregate amount 
of speech produced 
36
Alternatives to Regulation 
37
Less Restrictive Alternatives to Regulation 
• Education 
• Empowerment 
• (Targeted) Enforcement Efforts 
• Evolving Norms / Social Adaptation 
This is the model we use today for online safety 
concerns. 
– Why not apply it to privacy concerns as well? 
– BCA must at least take these alternatives into account 
38
Education / Awareness-Building 
• Education & Awareness campaigns at all levels 
(from privacy advocates, govt, industry, 
educators, etc.) 
• Encouraging better online “netiquette” and “data 
hygiene” 
• Push for better transparency across the board 
39 
– Better notice & labeling 
– Need more watch-dogging of privacy promises made 
by companies 
• Govt can play key role here (ex: PSAs, help sites)
FTC’s YouTube page 
40
41 
OnGuardOnline 
Contributors: 
FTC 
DHS 
DoC 
DoE 
DOJ 
CFTC 
CFPB 
FCC 
FDIC 
IRS 
State Dept.
42 
Best Practice Guidelines 
Query: Are such “non-law law” nudges & agency threats legal / sensible? 
(see forthcoming Randy Picker paper)
Empowerment / Privacy-Enhancing 
Technologies (PETs) 
43 
= Helping users help themselves 
• User “self-help” tools are multiplying (next slide) 
• Industry self-regulation 
– More cross-industry collaboration on privacy 
programs 
– Better notice 
– Best practices & smarter defaults 
– More and better tools to respond to new 
developments and needs
Other Tools 
• AdBlockPlus 
• Ghostery 
• NoScript 
• Cookie Monster 
• Better Privacy 
• No More Cookies 
• CCleaner 
• Flush 
• Priveazy 
• Privacyfix 
• PrivacyWatch 
44 
Ad Preference Managers 
• Google, MS, Yahoo 
• DuckDuckGo 
Private Browsing Mode 
• Google “Incognito” 
• IE “InPrivate Browsing” 
• Firefox “Private Browsing” 
• Safari “Private Browsing” 
Do Not Track 
• Now in all major browsers 
• + DNT add-ons from others
45 
McAfee Privacy Notice Cartoons
The AdBlock Plus Story 
• Most demanded browser add-on in history 
• roughly 175 million people downloaded 
Firefox version (as of Oct. 2012) 
• Shows a clear demand for PETs 
• also shows that there are powerful ways for 
privacy-sensitive users to handle the problem 
• (Implications for contracting debate?) 
46
Enforcement (Targeted) 
• Holding companies to the promises they make 
47 
– stepped-up FTC Sec. 5 enforcement 
• Demand better notice & transparency 
• Mandatory disclosure of data breaches 
• Targeted regulation of sensitive data, but with 
flexibility
Miscellaneous Closing Thoughts 
48
The Legal Standard That Should 
Govern for Both Safety & Privacy 
• In 2000, the Sup. Ct. struck down a requirement that 
cable companies “fully scramble” video signals that 
include sexually explicit content (U.S. v. Playboy) 
– “Simply put, targeted blocking is less restrictive than 
banning, and the Government cannot ban speech if 
targeted blocking is a feasible and effective means of 
furthering its compelling interests.” 
– “It is no response that voluntary blocking requires a 
consumer to take action, or may be inconvenient, or may 
not go perfectly every time. A court should not assume a 
plausible, less restrictive alternative would be ineffective; 
and a court should not presume parents, given full 
information, will fail to act.” 
49
In other words… 
• If effective privacy-enhancing tools & options 
exist, they must be factored into the BCA 
process 
• Weighs heavily against use of preemptive 
regulation, especially in the absence of more 
concrete harms 
• But other govt action still possible 
50
Other Govt Options 
• Privacy awareness-building (PSAs + websites) 
• Digital literacy & labeling programs 
– nutritional labeling model 
• Govt-created privacy & safety apps? 
• Govt-created / underwritten search engine? 
– PBS model for online media / services 
• FTC oversight 
– Sec. 5 enforcement 
– best practice guidance? 
51
How is the Govt Doing On This Front? 
• Not enough focus on BCA in privacy reports, 
consent decrees, or COPPA revisions 
– Regulation treated as a costless exercise 
• Strong focus on best practices / nudging 
industry (but still little discussion of costs) 
• Good awareness-building efforts best practices 
reports, online advice (“OnGuardOnline” PSA 
efforts) 
• No govt-provided privacy apps / tools 
52
Going Forward… 
Is Formal Contracting Possible? 
• Could users contract w sites for privacy / PII “rights”? 
• If users started using more PETs & actively thwarted data 
collection / advertising, then perhaps some sort of Coasean 
bargaining would develop 
– Ex: if 25% were using DNT & AdBlockPlus = tipping point? 
• But is it possible without formal “propertiziation” of PII?? 
– Doubtful more sophisticated contracting schemes develop without 
formal propertiziation? 
– Licensing likely to have same problems / limitations as seen in 
copyright context 
• Transaction costs matter! (could hinder positive 
developments) 
53

More Related Content

What's hot

Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Jason Haislmaier
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)Jason Haislmaier
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Lilian Edwards
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Jason Haislmaier
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulationcjw119
 
Capitol Hill Campus: Drones, Bitcoin, and 3-D Printing: Regulating Emerging T...
Capitol Hill Campus: Drones, Bitcoin, and 3-D Printing: Regulating Emerging T...Capitol Hill Campus: Drones, Bitcoin, and 3-D Printing: Regulating Emerging T...
Capitol Hill Campus: Drones, Bitcoin, and 3-D Printing: Regulating Emerging T...Mercatus Center
 
How Technology is Changing the Practice of Law
How Technology is Changing the Practice of LawHow Technology is Changing the Practice of Law
How Technology is Changing the Practice of LawRon Dolin
 
Miranda Marcus – Data and ethics
Miranda Marcus – Data and ethicsMiranda Marcus – Data and ethics
Miranda Marcus – Data and ethicsNEXTConference
 
The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development Polsinelli PC
 
Innovation and Emerging Technology
Innovation and Emerging TechnologyInnovation and Emerging Technology
Innovation and Emerging TechnologyRon Dolin
 
Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Jason Haislmaier
 
When Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government WebsitesWhen Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government WebsitesJeffrey Ryan Pass
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer FirstVivastream
 
Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services Mirsky & Company, PLLC
 
Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08BookStoreLib
 
Automotive sales crashing into data? Driving customer engagement & growth in...
Automotive sales crashing into data?  Driving customer engagement & growth in...Automotive sales crashing into data?  Driving customer engagement & growth in...
Automotive sales crashing into data? Driving customer engagement & growth in...IgnitionOne
 
Thinking outside the bar - Reinvent Law Silicon Valley 2013
Thinking outside the bar - Reinvent Law Silicon Valley 2013Thinking outside the bar - Reinvent Law Silicon Valley 2013
Thinking outside the bar - Reinvent Law Silicon Valley 2013Ron Dolin
 

What's hot (20)

Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627Presentation - gener8tor - Data Privacy, Security, and Rights 130627
Presentation - gener8tor - Data Privacy, Security, and Rights 130627
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)
 
Big Data - Security Concerns
Big Data - Security ConcernsBig Data - Security Concerns
Big Data - Security Concerns
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulation
 
Capitol Hill Campus: Drones, Bitcoin, and 3-D Printing: Regulating Emerging T...
Capitol Hill Campus: Drones, Bitcoin, and 3-D Printing: Regulating Emerging T...Capitol Hill Campus: Drones, Bitcoin, and 3-D Printing: Regulating Emerging T...
Capitol Hill Campus: Drones, Bitcoin, and 3-D Printing: Regulating Emerging T...
 
How Technology is Changing the Practice of Law
How Technology is Changing the Practice of LawHow Technology is Changing the Practice of Law
How Technology is Changing the Practice of Law
 
Miranda Marcus – Data and ethics
Miranda Marcus – Data and ethicsMiranda Marcus – Data and ethics
Miranda Marcus – Data and ethics
 
The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development
 
Innovation and Emerging Technology
Innovation and Emerging TechnologyInnovation and Emerging Technology
Innovation and Emerging Technology
 
Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012
 
When Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government WebsitesWhen Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government Websites
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer First
 
Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services Social Media Law: What is NOT Unique to Financial Services
Social Media Law: What is NOT Unique to Financial Services
 
Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08
 
Automotive sales crashing into data? Driving customer engagement & growth in...
Automotive sales crashing into data?  Driving customer engagement & growth in...Automotive sales crashing into data?  Driving customer engagement & growth in...
Automotive sales crashing into data? Driving customer engagement & growth in...
 
Thinking outside the bar - Reinvent Law Silicon Valley 2013
Thinking outside the bar - Reinvent Law Silicon Valley 2013Thinking outside the bar - Reinvent Law Silicon Valley 2013
Thinking outside the bar - Reinvent Law Silicon Valley 2013
 

Viewers also liked

Lecture 2: Social Web Privacy and User Profiles (2013)
Lecture 2: Social Web Privacy and User Profiles (2013)Lecture 2: Social Web Privacy and User Profiles (2013)
Lecture 2: Social Web Privacy and User Profiles (2013)Lora Aroyo
 
The MCH-MSP INTERREG project: Project objectives, related activities and expe...
The MCH-MSP INTERREG project: Project objectives, related activities and expe...The MCH-MSP INTERREG project: Project objectives, related activities and expe...
The MCH-MSP INTERREG project: Project objectives, related activities and expe...Pan Baltic Scope / Baltic SCOPE
 
E banking p pt sst nwc
E banking p pt sst nwcE banking p pt sst nwc
E banking p pt sst nwcsiya pillai
 
OLIVIA | Entry into Online Social Networking
OLIVIA | Entry into Online Social NetworkingOLIVIA | Entry into Online Social Networking
OLIVIA | Entry into Online Social NetworkingNelson Gaytón
 
Digital Curator Vocational Education Europe: Project Objectives
Digital Curator Vocational Education Europe: Project ObjectivesDigital Curator Vocational Education Europe: Project Objectives
Digital Curator Vocational Education Europe: Project ObjectivesDigCurV
 
Cost-Benefit Analysis for the Design of Personal Knowledge Management Systems
Cost-Benefit Analysis for the Design of Personal Knowledge Management SystemsCost-Benefit Analysis for the Design of Personal Knowledge Management Systems
Cost-Benefit Analysis for the Design of Personal Knowledge Management SystemsMax Völkel
 
Objectives of the proposed system
Objectives of the proposed systemObjectives of the proposed system
Objectives of the proposed systemmic
 
Cost - Benefit Analysis & ROI of Sales Training in Brain Telecom. ltd
Cost - Benefit Analysis & ROI of Sales Training in Brain Telecom. ltdCost - Benefit Analysis & ROI of Sales Training in Brain Telecom. ltd
Cost - Benefit Analysis & ROI of Sales Training in Brain Telecom. ltdMuhammad Shahid
 
Internet Banking
Internet BankingInternet Banking
Internet Bankingsnehateddy
 
SMART Seminar: Applying Benefit-Cost Analysis to Intelligent Transportation S...
SMART Seminar: Applying Benefit-Cost Analysis to Intelligent Transportation S...SMART Seminar: Applying Benefit-Cost Analysis to Intelligent Transportation S...
SMART Seminar: Applying Benefit-Cost Analysis to Intelligent Transportation S...SMART Infrastructure Facility
 

Viewers also liked (16)

Lecture 2: Social Web Privacy and User Profiles (2013)
Lecture 2: Social Web Privacy and User Profiles (2013)Lecture 2: Social Web Privacy and User Profiles (2013)
Lecture 2: Social Web Privacy and User Profiles (2013)
 
Yadvendra IIM Raipur
Yadvendra  IIM RaipurYadvendra  IIM Raipur
Yadvendra IIM Raipur
 
The MCH-MSP INTERREG project: Project objectives, related activities and expe...
The MCH-MSP INTERREG project: Project objectives, related activities and expe...The MCH-MSP INTERREG project: Project objectives, related activities and expe...
The MCH-MSP INTERREG project: Project objectives, related activities and expe...
 
E banking p pt sst nwc
E banking p pt sst nwcE banking p pt sst nwc
E banking p pt sst nwc
 
Project management
Project managementProject management
Project management
 
OLIVIA | Entry into Online Social Networking
OLIVIA | Entry into Online Social NetworkingOLIVIA | Entry into Online Social Networking
OLIVIA | Entry into Online Social Networking
 
SMART GOALS
SMART GOALSSMART GOALS
SMART GOALS
 
Digital Curator Vocational Education Europe: Project Objectives
Digital Curator Vocational Education Europe: Project ObjectivesDigital Curator Vocational Education Europe: Project Objectives
Digital Curator Vocational Education Europe: Project Objectives
 
Cost-Benefit Analysis for the Design of Personal Knowledge Management Systems
Cost-Benefit Analysis for the Design of Personal Knowledge Management SystemsCost-Benefit Analysis for the Design of Personal Knowledge Management Systems
Cost-Benefit Analysis for the Design of Personal Knowledge Management Systems
 
Objectives of the proposed system
Objectives of the proposed systemObjectives of the proposed system
Objectives of the proposed system
 
Cost - Benefit Analysis & ROI of Sales Training in Brain Telecom. ltd
Cost - Benefit Analysis & ROI of Sales Training in Brain Telecom. ltdCost - Benefit Analysis & ROI of Sales Training in Brain Telecom. ltd
Cost - Benefit Analysis & ROI of Sales Training in Brain Telecom. ltd
 
Spm unit2
Spm unit2Spm unit2
Spm unit2
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
SMART Seminar: Applying Benefit-Cost Analysis to Intelligent Transportation S...
SMART Seminar: Applying Benefit-Cost Analysis to Intelligent Transportation S...SMART Seminar: Applying Benefit-Cost Analysis to Intelligent Transportation S...
SMART Seminar: Applying Benefit-Cost Analysis to Intelligent Transportation S...
 
E Banking
E BankingE Banking
E Banking
 
Internet banking
Internet bankingInternet banking
Internet banking
 

Similar to The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital Privacy

Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4Data-Set
 
The Problem with dots: A critique of the Lessig and Murray models
The Problem with dots: A critique of the Lessig and Murray modelsThe Problem with dots: A critique of the Lessig and Murray models
The Problem with dots: A critique of the Lessig and Murray modelsmrleiser
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - recordDigital Catapult
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 

Similar to The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital Privacy (20)

Data and ethics Training
Data and ethics TrainingData and ethics Training
Data and ethics Training
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Review questions
Review questionsReview questions
Review questions
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
The Problem with dots: A critique of the Lessig and Murray models
The Problem with dots: A critique of the Lessig and Murray modelsThe Problem with dots: A critique of the Lessig and Murray models
The Problem with dots: A critique of the Lessig and Murray models
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - record
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
E commerce
E commerce E commerce
E commerce
 

More from Adam Thierer

“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging TechnologiesAdam Thierer
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
 
The War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital EconomyThe War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital EconomyAdam Thierer
 
Cronyism: History, Costs, Case Studies and Solutions
Cronyism: History, Costs, Case Studies and SolutionsCronyism: History, Costs, Case Studies and Solutions
Cronyism: History, Costs, Case Studies and SolutionsAdam Thierer
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Adam Thierer
 
Who Needs Parental Controls (Adam Thierer Pff)
Who Needs Parental Controls (Adam Thierer   Pff)Who Needs Parental Controls (Adam Thierer   Pff)
Who Needs Parental Controls (Adam Thierer Pff)Adam Thierer
 
First Amendment Twilight Zone (Adam Thierer Pff)
First Amendment Twilight Zone (Adam Thierer   Pff)First Amendment Twilight Zone (Adam Thierer   Pff)
First Amendment Twilight Zone (Adam Thierer Pff)Adam Thierer
 
Video Games Presentation At Penn State Univ (Adam Thierer Pff)
Video Games Presentation At Penn State Univ (Adam Thierer   Pff)Video Games Presentation At Penn State Univ (Adam Thierer   Pff)
Video Games Presentation At Penn State Univ (Adam Thierer Pff)Adam Thierer
 

More from Adam Thierer (8)

“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
The War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital EconomyThe War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital Economy
 
Cronyism: History, Costs, Case Studies and Solutions
Cronyism: History, Costs, Case Studies and SolutionsCronyism: History, Costs, Case Studies and Solutions
Cronyism: History, Costs, Case Studies and Solutions
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
 
Who Needs Parental Controls (Adam Thierer Pff)
Who Needs Parental Controls (Adam Thierer   Pff)Who Needs Parental Controls (Adam Thierer   Pff)
Who Needs Parental Controls (Adam Thierer Pff)
 
First Amendment Twilight Zone (Adam Thierer Pff)
First Amendment Twilight Zone (Adam Thierer   Pff)First Amendment Twilight Zone (Adam Thierer   Pff)
First Amendment Twilight Zone (Adam Thierer Pff)
 
Video Games Presentation At Penn State Univ (Adam Thierer Pff)
Video Games Presentation At Penn State Univ (Adam Thierer   Pff)Video Games Presentation At Penn State Univ (Adam Thierer   Pff)
Video Games Presentation At Penn State Univ (Adam Thierer Pff)
 

Recently uploaded

如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 

Recently uploaded (20)

如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 

The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital Privacy

  • 1. The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital Privacy Adam Thierer Senior Research Fellow Mercatus Center at George Mason University January 17, 2012 Presentation before George Mason University Law & Economics Center conference on Privacy, Regulation, & Antitrust
  • 2. Purpose of Talk / Paper • Explore challenges of applying benefit-cost analysis (BCA) to privacy & online safety – in many ways, they are really same debate • Discuss particular problem of defining harm (and, correspondingly, the benefits of regulation) • Outline the range of costs that must be considered (even if they prove difficult to quantify) • Focus on the many alternatives to regulation • Explain how the toolbox of solutions we apply to online safety can work for privacy 2
  • 3. Prefatory Note: Strict Rights Approach Limits BCA • If privacy & safety are “dignity” rights, then it trumps all other considerations & BCA goes out the window • But at least here in the U.S. the calculus has been more utilitarian in character • Better to think about privacy & safety the way we think about happiness: You have the right to pursue it, not so much a strict right to it • So, BCA remains important 3
  • 4. The Nuts & Bolts of RIA / BCA 4
  • 5. The Triumph of Benefit-Cost Analysis “It is not exactly news that we live in an era of polarized politics. But Republicans and Democrats have come to agree on one issue: the essential need for cost- benefit analysis in the regulatory process. In fact, cost-benefit analysis has become part of the informal constitution of the U.S. regulatory state. This is an extraordinary development.” - Cass Sunstein (2012) 5
  • 6. The Basics of RIA / BCA • Since early 1980s, regulatory impact assessments (RIAs) have been required • Executive Order 12291 (Reagan) • Executive Order 12866 (Clinton) • Executive Order 13563 & 13610 (Obama) • OMB Circular A-4 – 3 core elements of an RIA… 6
  • 7. RIA Step #1: Statement of need for the regulatory action • a clear explanation of need for the regulatory action • “Agencies should explain whether the action is intended to address a market failure or to promote some other goal, such as improving governmental processes, protecting privacy, or combating discrimination.” 7
  • 8. RIA Step #2: Identify range of regulatory approaches • agencies must describe “range of alternative regulatory approaches, including the option of not regulating.” • “should consider flexible approaches that reduce burdens and maintain freedom of choice” • “should specify performance objectives, rather than specifying the behavior or manner of compliance that regulated entities must adopt.” 8
  • 9. RIA Step #3: Conduct the Benefit-Cost Analysis • estimates the benefits & costs associated with each alternative approach. • costs should be quantified and monetized to the extent possible • when quantification of a particular benefit or cost is not possible, it should be described qualitatively. • where relevant, consider “values such as equity, human dignity, fairness, potential distributive impacts, privacy, and personal freedom.” 9
  • 10. Possible Privacy Regs to Consider • “Do Not Track” mandate • Mandatory default switches – Opt-in mandates • Bans on specific practices – 3rd party data sharing / aggregation – Deep packet inspection • Targeted privacy laws – COPPA Note: Much harder to do BCA when these things are being “nudged” instead of formally mandated. 10
  • 11. The Problem of Defining the Problem (and how that complicates the question of benefits of regulation) 11
  • 12. Privacy & Safety Metrics = A Nightmare There are no good, widely agreed upon metrics by which to measure online safety & digital privacy “harms.” 12
  • 13. How Privacy & Safety Harms are Described in Popular Culture Online Safety “Harms” • Offensive • Smutty • Filthy • Hurtful / Hateful Privacy “Harms” • Invasive • Manipulative • Annoying • Creepy 13 ** None of these things are even remotely quantifiable **
  • 14. How Privacy & Safety Harms are Described in the Literature • Tangible vs. Intangible • Objective vs. Subjective • Direct vs. Indirect • Monetary vs. Non-Monetary • Quantifiable vs. Unquantifiable • Physical vs. Psychological 14
  • 15. In a perfect world… Intangible Harm Tangible Harm Monetizable Harm Easier case 15 Non-Monetary Harm Hard case
  • 16. 16 Intangible Tangible Monetizable Harm Data Breach Invasion / Trespass Non-Monetary Harm “Creepiness” “Offensiveness” Stalking and sometimes that works … … but most of the time it doesn’t.
  • 17. The Key (very, very hard) Question To what extent are harms that purely psychological in character really harms at all? • Clearly, some can be – Incessant digital harassment / cyber-bullying • But most not harmful in a traditional sense – If “creepiness” is an actionable harm, then the Net as we know it would have to be shut down 17
  • 18. The hopeless subjectivity of it all… • One person’s “creepy” is another person’s “killer app.” • Worse yet, even our own actions don’t match up with our professed values! • Stated preferences vs. revealed preferences problem 18
  • 19. What’s Your Privacy Indifference Curve Look Like? 19 Privacy Sociability and / or Services privacy unconcerned privacy fundamentalist Many people who say they are here, actually seem to be here.
  • 20. The Privacy Paradox “Ask 100 people if they care [about privacy] and 85 will say yes. Ask those same 100 people if they’ll give you a DNA sample just to get a free Big Mac, and 85 will say yes.” - Austin Hill, 2002 20
  • 21. What about “peace of mind” arguments? • “peace of mind” / “user trust” = primary benefit? – i.e. more privacy & safety regs make consumers more comfortable getting online – Analogy: post – 9/11 security mandates • But they had opposite impact! (see J. Law & Econ. 2007) • Problem with “peace of mind” = again, how to prove it – More people online than ever • Plus, could cut other way (i.e., “free” services drive subscribership / usage) • Natural experiments? (US vs. EU?) – Problem = many confounding variables 21
  • 22. A Value Exchange without Formal Contracting • Popular belief = If you’re not buying the product, you are the product. • Only partially correct. • Reality = You can be both part of value exchange & the recipient of the benefits of that value exchange. • Past examples = traditional broadcast & newspaper media advertising 22
  • 23. The Current Value Exchange • Almost all online media / services driven by a simple quid pro quo… – Data collection / targeted advertising in exchange for “free” (or cheap) content and services – But hard to precisely quantify this value exchange 23
  • 24. Market Failure = Lack of Options? • Why no “Facebook Private” or “YouTube Family Friendly” • Actually, those sites do exist (by other names & from other vendors), but there is very little demand for them + (as summarized later) lots of PETs exist + no requirement you use any of these services (Facebook isn’t a forced labor camp!) 24
  • 25. How do we factor social adaptation into BCA? • People adapt! (sometimes quicker than we imagine) • Today’s “technopanic” is tomorrow’s widely accepted technology / business practice – Examples: photography, caller ID, Gmail • 2 general lessons: 1. Cautions against knee-jerk regulatory responses 2. BCA should account for rapid social / cultural adjustment to new info-tech 25
  • 26. When All Else Fails… Claim False Consciousness as Harm! • Manipulation! Mind control! Siva Vaidhyanathan: – consumers are being tricked by the “smokescreen” of “free” online services and “freedom of choice.” – “We are conditioned to believe that having more choices… is the very essence of human freedom. But meaningful freedom implies real control over the conditions of one’s life.” • Such “people are sheep” arguments can’t stand in a free society (or be used in BCA) 26
  • 27. Costs of Privacy Regulation (Lost Outputs & Forgone Opportunities) 27
  • 28. What Data Collection Has Enabled • Transport yourself back a decade and consider how far we’ve come • Things that used to cost $$ and were capacity-capped: – Email – Data & document storage – Photo hosting – Mapping services – Security / anti-virus software – Online bulletin boards / hobby pages – Most online news 28
  • 29. The Magic of Data & Advertising 29 • Lowers Price: None of those services cost us a dime now • Expands Quantity: There are more of those services today • Improves Quality: All of those service are more diverse or innovative than before Data collection & advertising made it all possible = a huge boon for consumer welfare.
  • 30. Possible Regulatory Costs BCA Must Consider • Will regulation tip the balance between business models? • instead of ad & data supported online sites and services, we could get… 1) More intrusive but untargeted ads? (banner, pop-up, etc.) 2) Pay-per-use or subscription-based? 3) Restricted output / lower quality sites? 4) Mix of all of the above? • This has both micro and macro consequences – For industry: If not targeted data collection / advertising, what will fund online content and services in the future? – For consumers: If those other methods fail to work = less content & services or more expensive content & services • As always, there is no free lunch 30
  • 31. Some Good Studies Showing Trade-offs • Beales – targeted advertising 2.68 times the price of run of network advertising • Tucker & Goldfarb – EU Privacy Directive = 65% decrease in advertising effectiveness in Europe – Because regulation decreases ad effectiveness, “this may change the number and types of businesses sustained by the advertising-supporting Internet.” 31
  • 32. WTP Literature is Very Thin • Perhaps not surprising since – People aren’t paying anything in real world! – But polls / surveys make crappy proxies – Stated preferences vs. revealed preferences problem • WTP study by CMU (2007) – price matters a lot, but some consumers willing to pay more for privacy when better informed 32
  • 33. ENISA Study • European Network & Information Security Agency (ENISA) “Study on Monetizing Privacy” (Feb. 2012) – Pointed out lack of real-world experiments as major problem • “a large share of literature is devoted to [surveys]” & “economic experiments that implement real purchase transactions are rather scarce” • “there are no works in economics that combine theoretical and experimental methods for the analysis of the interplay of privacy concerns, product personalization and competition.” 33
  • 34. ENISA Results • combined lab & field experiments (cell phone number for movie ticket discount) Results: • Price matters! – Most consumers bought from “privacy-invasive” providers if price lower (50 Euro cents) • Privacy matters (at least a little)! – 29% would pay extra to avoid giving up cell number; 9% would pay more to avoid giving up email. – And fully 80% preferred privacy-friendly option if no price difference at all. 34
  • 35. In sum, the problem we face (re: determining costs / WTP) … “Empirical research on the subject is still in its infancy. Most studies ask for personal opinion, rather than measure the digital choices people make, and even there, the results usually find a gap between what people say and what they do about their privacy online.” - Somini Sengupta, NYT (3/19/12) >> BCA has to account for this & try to better measure real-world choices & trade-offs, not polls & surveys. 35
  • 36. Other Costs / Lost Outputs to Consider • International competitiveness – Has privacy regulation limited Europe’s online market? – Could regulation here diminish U.S. competitive advantage relative to world? • Market structure / competition – Privacy mandates could lead to industry consolidation • Speech considerations – Many online safety & privacy regulations raise thorny free speech / 1st Amendment issues – Privacy & online safety regs could limit aggregate amount of speech produced 36
  • 38. Less Restrictive Alternatives to Regulation • Education • Empowerment • (Targeted) Enforcement Efforts • Evolving Norms / Social Adaptation This is the model we use today for online safety concerns. – Why not apply it to privacy concerns as well? – BCA must at least take these alternatives into account 38
  • 39. Education / Awareness-Building • Education & Awareness campaigns at all levels (from privacy advocates, govt, industry, educators, etc.) • Encouraging better online “netiquette” and “data hygiene” • Push for better transparency across the board 39 – Better notice & labeling – Need more watch-dogging of privacy promises made by companies • Govt can play key role here (ex: PSAs, help sites)
  • 41. 41 OnGuardOnline Contributors: FTC DHS DoC DoE DOJ CFTC CFPB FCC FDIC IRS State Dept.
  • 42. 42 Best Practice Guidelines Query: Are such “non-law law” nudges & agency threats legal / sensible? (see forthcoming Randy Picker paper)
  • 43. Empowerment / Privacy-Enhancing Technologies (PETs) 43 = Helping users help themselves • User “self-help” tools are multiplying (next slide) • Industry self-regulation – More cross-industry collaboration on privacy programs – Better notice – Best practices & smarter defaults – More and better tools to respond to new developments and needs
  • 44. Other Tools • AdBlockPlus • Ghostery • NoScript • Cookie Monster • Better Privacy • No More Cookies • CCleaner • Flush • Priveazy • Privacyfix • PrivacyWatch 44 Ad Preference Managers • Google, MS, Yahoo • DuckDuckGo Private Browsing Mode • Google “Incognito” • IE “InPrivate Browsing” • Firefox “Private Browsing” • Safari “Private Browsing” Do Not Track • Now in all major browsers • + DNT add-ons from others
  • 45. 45 McAfee Privacy Notice Cartoons
  • 46. The AdBlock Plus Story • Most demanded browser add-on in history • roughly 175 million people downloaded Firefox version (as of Oct. 2012) • Shows a clear demand for PETs • also shows that there are powerful ways for privacy-sensitive users to handle the problem • (Implications for contracting debate?) 46
  • 47. Enforcement (Targeted) • Holding companies to the promises they make 47 – stepped-up FTC Sec. 5 enforcement • Demand better notice & transparency • Mandatory disclosure of data breaches • Targeted regulation of sensitive data, but with flexibility
  • 49. The Legal Standard That Should Govern for Both Safety & Privacy • In 2000, the Sup. Ct. struck down a requirement that cable companies “fully scramble” video signals that include sexually explicit content (U.S. v. Playboy) – “Simply put, targeted blocking is less restrictive than banning, and the Government cannot ban speech if targeted blocking is a feasible and effective means of furthering its compelling interests.” – “It is no response that voluntary blocking requires a consumer to take action, or may be inconvenient, or may not go perfectly every time. A court should not assume a plausible, less restrictive alternative would be ineffective; and a court should not presume parents, given full information, will fail to act.” 49
  • 50. In other words… • If effective privacy-enhancing tools & options exist, they must be factored into the BCA process • Weighs heavily against use of preemptive regulation, especially in the absence of more concrete harms • But other govt action still possible 50
  • 51. Other Govt Options • Privacy awareness-building (PSAs + websites) • Digital literacy & labeling programs – nutritional labeling model • Govt-created privacy & safety apps? • Govt-created / underwritten search engine? – PBS model for online media / services • FTC oversight – Sec. 5 enforcement – best practice guidance? 51
  • 52. How is the Govt Doing On This Front? • Not enough focus on BCA in privacy reports, consent decrees, or COPPA revisions – Regulation treated as a costless exercise • Strong focus on best practices / nudging industry (but still little discussion of costs) • Good awareness-building efforts best practices reports, online advice (“OnGuardOnline” PSA efforts) • No govt-provided privacy apps / tools 52
  • 53. Going Forward… Is Formal Contracting Possible? • Could users contract w sites for privacy / PII “rights”? • If users started using more PETs & actively thwarted data collection / advertising, then perhaps some sort of Coasean bargaining would develop – Ex: if 25% were using DNT & AdBlockPlus = tipping point? • But is it possible without formal “propertiziation” of PII?? – Doubtful more sophisticated contracting schemes develop without formal propertiziation? – Licensing likely to have same problems / limitations as seen in copyright context • Transaction costs matter! (could hinder positive developments) 53