"2012" . . "RIV/00216224:14330/12:00061784!RIV13-MSM-14330___" . . . "2"^^ . . "90" . . . "14330" . "The Real Value of Private Information - Two Experimental Studies"@en . "2"^^ . . "0926-4981" . . "The Real Value of Private Information - Two Experimental Studies" . . "privacy; exeriment; valuation"@en . . "As a part of our research on privacy protection and identity management, we conducted two experiments to find out how people value their private information. Privacy and control of private information sharing/flow is becoming a crucial part of everyday \u201Conline\u201D life. But still, people seem to be prepared to disclose some of their private data for a very modest reward \u2013 loyalty cards, for example, allow profiling of customers behavior and use this information for, e.g., personalized advertisements. Search engines and social networks can track users browsing activities via embedded sharing buttons \u2013 this is a very common technique and even if we are not a member of a social network, there is a lot of evidence about our browsing history. This can also be used for providing customized content."@en . "Kumpo\u0161t, Marek" . . "164239" . . "[9EFFAE298972]" . "P(LA09016)" . "ERCIM News" . "RIV/00216224:14330/12:00061784" . . . "2"^^ . "Maty\u00E1\u0161, V\u00E1clav" . "FR - Francouzsk\u00E1 republika" . . "The Real Value of Private Information - Two Experimental Studies"@en . . "As a part of our research on privacy protection and identity management, we conducted two experiments to find out how people value their private information. Privacy and control of private information sharing/flow is becoming a crucial part of everyday \u201Conline\u201D life. But still, people seem to be prepared to disclose some of their private data for a very modest reward \u2013 loyalty cards, for example, allow profiling of customers behavior and use this information for, e.g., personalized advertisements. Search engines and social networks can track users browsing activities via embedded sharing buttons \u2013 this is a very common technique and even if we are not a member of a social network, there is a lot of evidence about our browsing history. This can also be used for providing customized content." . "The Real Value of Private Information - Two Experimental Studies" . .