Abstract The earnings of individuals depend on the demand for the factor services they supply. International trade may therefore affect earnings inequality because either (i) foreign consumers and firms demand domestic factor services in different proportions than domestic consumers and firms do, an export channel; or (ii) domestic consumers and firms change their demand for domestic factor services in response to the availability of foreign goods, an import channel. Building on this idea, we develop new measures of export and import exposure at the individual level and provide estimates of their incidence across the earnings distribution. The key input fed into our empirical analysis is a unique administrative data set from Ecuador that merges firm-to-firm transaction data, employer-employee matched data, owner-firm matched data, and firm-level customs transaction records. We find that export exposure is pro-middle class, import exposure is pro-rich, and in terms of overall incidence, the import channel is the dominant force. As a result, earnings inequality in Ecuador is higher than it would be in the absence of trade.
more »
« less
Competitive Markets for Personal Data
Abstract: We study competitive data markets in which consumers own their personal data and can trade it with intermediaries, such as e-commerce platforms. Intermediaries use this data to provide services to the consumers, such as targeted offers from third-party merchants. Our main results identify a novel inefficiency, resulting in equilibrium data allocations that fail to maximize welfare. This inefficiency hinges on the role that intermediaries play as information gatekeepers, a hallmark of the digital economy. We provide three solutions to this market failure: establishing data unions, which manage consumers' data on their behalf; taxing the trade of data; and letting the price of data depend on its intended use.
more »
« less
- Award ID(s):
- 2149315
- PAR ID:
- 10510223
- Publisher / Repository:
- ACM Economics and Computation
- Date Published:
- Journal Name:
- ACM EC
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Recent data protection regulations (notably, GDPR and CCPA) grant consumers various rights, including the right to access, modify or delete any personal information collected about them (and retained) by a service provider. To exercise these rights, one must submit a verifiable consumer request proving that the collected data indeed pertains to them. This action is straightforward for consumers with active accounts with a service provider at the time of data collection, since they can use standard (e.g., password-based) means of authentication to validate their requests. However, a major conundrum arises from the need to support consumers without accounts to exercise their rights. To this end, some service providers began requiring such accountless consumers to reveal and prove their identities (e.g., using government-issued documents, utility bills, or credit card numbers) as part of issuing a verifiable consumer request. While understandable as a short-term fix, this approach is cumbersome and expensive for service providers as well as privacy-invasive for consumers. Consequently, there is a strong need to provide better means of authenticating requests from accountless consumers. To achieve this, we propose VICEROY, a privacy-preserving and scalable framework for producing proofs of data ownership, which form a basis for verifiable consumer requests. Building upon existing web techniques and features, VICEROY allows accountless consumers to interact with service providers, and later prove that they are the same person in a privacy-preserving manner, while requiring minimal changes for both parties. We design and implement VICEROY with emphasis on security/privacy, deployability and usability. We also assess its practicality via extensive experiments.more » « less
-
How does protecting consumers' privacy affect the value of their personal data? We model an intermediary that uses consumers' data to influence prices set by a seller. When privacy is protected, consumers choose whether to disclose their data to the intermediary. When privacy is not protected, the intermediary can access consumers' data without their consent. We illustrate that protecting privacy has complex effects. It can increase the value of some consumers' data while decreasing that of others. It can have redistributive effects, by benefiting some consumers at the expense of others. Finally, it can increase average prices and reduce trade.more » « less
-
Many e-commerce platforms use buyers’ personal data to intermediate their transactions with sellers. How much value do such intermediaries derive from the data record of each single individual? We characterize this value and find that one of its key components is a novel externality between records, which arises when the intermediary pools some records to withhold the information they contain. Our analysis has several implications about compensating individuals for the use of their data, guiding companies’ investments in data acquisition, and more broadly studying the demand side of data markets. Our methods combine modern information design with classic duality theory and apply to a large class of principal-agent problems.more » « less
-
We consider a collection of distributed sensor nodes periodically exchanging information to achieve real-time situa- tional awareness in a communication constrained setting, e.g., collaborative sensing amongst vehicles to enable safety-critical decisions. Nodes may be both consumers and producers of sensed information. Consumers express interest in information about particular locations, e.g., obstructed regions and/or road intersections, whilst producers provide updates on what they are currently able to see. Accordingly, we introduce and explore optimizing trade-offs between the coverage and the space-time average of the “age” of the information available to consumers. We consider two settings that capture the fundamental character of the problem. The first addresses selecting a subset of producers which optimizes a weighted sum of the coverage and the average age given that producers provide updates at a fixed rate. The second addresses the minimization of the weighted average age achieved by a fixed subset of producers with possibly overlapping coverage by optimizing their update rates. The former is shown to be submodular and thus amenable to greedy optimization while the latter has a non-convex/non-concave cost function which is amenable to effective optimization using tools such as the Frank- Wolfe algorithm. Numerical results exhibit the benefits of context dependent optimization information exchanges among obstructed sensing nodes in a communication constrained environment.more » « less
An official website of the United States government

