-
1
-
-
84961306906
-
-
Oct. 3 1:46 PM
-
See Rebecca J. Rosen, Is This the Grossest Advertising Strategy of All Time?, ATLANTIC (Oct. 3, 2013, 1:46 PM), http://www.theatlantic.com/technology/archive/2013/10/is-this-the-gross-est-advertising-strategy-of-all-time/280242/.
-
(2013)
Is this the Grossest Advertising Strategy of all Time?
-
-
Rosen, R.J.1
-
3
-
-
84877980070
-
Psst, you in aisle 5
-
Feb. 19 54-55
-
Charles Duhigg, Psst, You in Aisle 5, N.Y. TIMES MAG., Feb. 19, 2012, at 30, 54-55.
-
(2012)
N.Y. Times Mag.
, pp. 30
-
-
Duhigg, C.1
-
4
-
-
84969777415
-
2) / satisfying crunch) × pleasing mouth feel = A food designed to addict
-
Feb. 24
-
2) / Satisfying Crunch) × Pleasing Mouth Feel = A Food Designed to Addict, N.Y. TIMES MAG., Feb. 24, 2013, at 34
-
(2013)
N.Y. Times Mag.
, pp. 34
-
-
Moss, M.1
-
5
-
-
84961332121
-
To choose is to lose
-
Aug. 21 34
-
see also John Tierney, To Choose Is to Lose, N.Y. TIMES MAG., Aug. 21, 2011, at 32, 34 ("When people fended off the temptation to scarf down M&M's [sic] or freshly baked chocolate-chip cookies, they were then less able to resist other temptations.").
-
(2011)
N.Y. Times Mag.
, pp. 32
-
-
Tierney, J.1
-
6
-
-
84961319308
-
-
Oct. 11 3:13 PM
-
Furthermore, companies as ubiquitous as Mondelez International, the brand behind Cadbury chocolates and Trident gum, are investigating how to increase impulse buying with digitally-enhanced shelves that detect and respond to the individual aspects of the shopper. See Clint Boulton, Snackmaker Modernizes the Impulse Buy with Sensors, Analytics, WALL ST. J. CIO J. BLOG (Oct. 11, 2013, 3:13 PM), http://blogs.wsj.com/cio/2013/10/11/snackmaker-modern-izes-the-impulse-buy-with-sensors-analytics/.
-
(2013)
Snackmaker Modernizes the Impulse Buy with Sensors, Analytics
-
-
Boulton, C.1
-
7
-
-
0003844041
-
-
rev. ed.
-
VANCE PACKARD, THE HIDDEN PERSUADERS 11-17 (rev. ed. 1981) (describing the ascension of the "depth approach").
-
(1981)
The Hidden Persuaders
, pp. 11-17
-
-
Packard, V.1
-
8
-
-
18844444913
-
How a publicity blitz created the myth of subliminal advertising
-
12-17
-
See Stuart Rogers, How a Publicity Blitz Created the Myth of Subliminal Advertising, PUB. REL. Q., Winter 1992-1993, at 12, 12-17 (discussing James Vicary's work).
-
Pub. Rel. Q., Winter 1992-1993
, pp. 12
-
-
Rogers, S.1
-
9
-
-
84961349500
-
Advertising by television stations
-
Public Notice Concerning the Use of "Subliminal Perception" Advertising by Television Stations, 40 F.C.C. 10 (1957).
-
(1957)
F.C.C.
, vol.40
, pp. 10
-
-
-
10
-
-
84961369083
-
-
Mar. 9
-
The controversy resurfaced just a few years ago when two United States Senators wrote a letter to the FCC saying they had "reason to believe that broadcasters are airing television advertisements that contain subliminal messages." See Press Statement of Gloria Tristani, Comm'r, Fed. Commc'ns Comm'n (Mar. 9, 2001) (on file with The George Washington Law Review) (explaining that the Senators believed the Republic National Committee had created ads attempting subliminally to associate Vice President Al Gore with the word "RATS" and that the Commission investigated but ultimately dismissed the allegation).
-
(2001)
Press Statement of Gloria Tristani, Comm'r, Fed. Commc'ns Comm'n
-
-
-
14
-
-
84877972720
-
Toward a positive theory of privacy law
-
see also Lior Jacob Strahilevitz, Toward a Positive Theory of Privacy Law, 126 HARV. L. REV. 2010, 2022-33 (2013) (analyzing the discriminatory effect of big data on some consumers).
-
(2010)
Harv. L. Rev.
, vol.126
, pp. 2022-2033
-
-
Strahilevitz, L.J.1
-
15
-
-
84877991268
-
The dangers of surveillance
-
E.g., Neil M. Richards, The Dangers of Surveillance, 126 HARV. L. REV. 1934, 1955-56 (2013) (noting that "[surveillance also gives the watcher increased power to persuade").
-
(1934)
Harv. L. Rev.
, vol.126
, pp. 1955-1956
-
-
Richards, N.M.1
-
16
-
-
33750010030
-
Online privacy, tailoring, and persuasion
-
219-21 Katherine J. Strandburg & Daniela Stan Raicu eds.
-
Tal Zarsky devotes a few paragraphs to the relationship between profiling and persuasion in a short book chapter, but without offering an account of its mechanics, contours, or harms, beyond noting that personalized persuasion is "manipulative." Tal Z. Zarsky, Online Privacy, Tailoring, and Persuasion, in PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION 209, 219-21 (Katherine J. Strandburg & Daniela Stan Raicu eds., 2006).
-
(2006)
Privacy and Technologies of Identity: A Cross-Disciplinary Conversation
, pp. 209
-
-
Zarsky, T.Z.1
-
17
-
-
84961292276
-
-
Conference Program June 13-15
-
See Conference Program, 32nd Annual Advertising and Consumer Psychology Conference: Consumer Psychology in a Social Media World 11 (June 13-15, 2013), http://www.myscp.org/pdf/ACP%20Final%20Schedule.pdf [hereinafter Conference Program, Consumer Psychology in a Social Media World) (describing panel entitled Visceral Targeting: Using Personalized Face Composites for Implicit Targeted Marketing)
-
(2013)
32nd Annual Advertising and Consumer Psychology Conference: Consumer Psychology in a Social Media World
, vol.11
-
-
-
18
-
-
60449098090
-
Facial similarity between voters and candidates causes influence
-
935-61
-
see also Jeremy N. Bailenson et al., Facial Similarity Between Voters and Candidates Causes Influence, 72 PUB. OPINION. Q. 935, 935-61 (2008).
-
(2008)
Pub. Opinion. Q.
, vol.72
, pp. 935
-
-
Bailenson, J.N.1
-
19
-
-
84897990024
-
-
Jan. 19
-
Nothing in a social network's terms of service or privacy policy would stand in the way of this potentially lucrative practice. See, e.g., Privacy Policy, INSTAGRAM (Jan. 19, 2013), http://instagram.com/legal/privacy/# ("[W]e may use information that we receive to⋯ provide personalized content and information to you and others, which could include online ads or other forms of marketing⋯.")
-
(2013)
Privacy Policy
-
-
-
20
-
-
84904547976
-
-
Jan. 19
-
Terms of Use, INSTAGRAM (Jan. 19, 2013), http://instagram.com/legal/terms/# ("[Y]ou hereby grant to Instagram a non-exclusive, fully paid and royalty-free, transferable, sub-licensable, worldwide license to use the Content that you post on or through the Service, subject to the Service's Privacy Policy⋯."). Moreover, in its Terms of Use, Instagram states, "You acknowledge that we may not always identify paid services, sponsored content, or commercial communications as such." Terms of Use, supra.
-
(2013)
Terms of Use
-
-
-
21
-
-
0141463591
-
Interpreting deceptive advertising
-
Richard Craswell and others have explored the line between deceptive and nondeceptive advertising. See generally Richard Craswell, Interpreting Deceptive Advertising, 65 B.U. L. REV. 657 (1985) [hereinafter Craswell, Interpreting Deceptive Advertising]
-
(1985)
B.U. L. Rev.
, vol.65
, pp. 657
-
-
Craswell, R.1
-
22
-
-
0012102814
-
Regulating deceptive advertising: The role of cost-benefit analysis
-
Richard Craswell, Regulating Deceptive Advertising: The Role of Cost-Benefit Analysis, 64 S. CAL. L. REV. 549 (1991).
-
(1991)
S. Cal. L. Rev.
, vol.64
, pp. 549
-
-
Craswell, R.1
-
23
-
-
33750562783
-
The best puffery article ever
-
David Hoffman has developed a comprehensive account of "puffery," meaning the practice of exaggerating the quality of goods and services. David A. Hoffman, The Best Puffery Article Ever, 91 IOWA L. REV. 1395 (2006). These and other accounts, however, do not account for the mediating effects of contemporary technology.
-
(2006)
Iowa L. Rev.
, vol.91
, pp. 1395
-
-
Hoffman, D.A.1
-
24
-
-
84860208959
-
Empirically informed regulation
-
1399
-
See Cass R. Sunstein, Empirically Informed Regulation, 78 U. CHI. L. REV. 1349, 1399 (2011) ("Other default rules are personalized, in the sense that they draw on available information about which approach best suits individuals, and potentially even each individual, in the relevant population.")).
-
(2011)
U. Chi. L. Rev.
, vol.78
, pp. 1349
-
-
Sunstein, C.R.1
-
25
-
-
84893356825
-
Personalizing default rules and disclosure with big data
-
1421
-
See Ariel Porat & Lior Jacob Strahilevitz, Personalizing Default Rules and Disclosure with Big Data, 112 MICH. L. REV. 1417, 1421 (2014) (observing that variable legal defaults may be more effective in changing citizen behavior).
-
(2014)
Mich. L. Rev.
, vol.112
, pp. 1417
-
-
Porat, A.1
Strahilevitz, L.J.2
-
26
-
-
37849189662
-
Taking behavioralism seriously: Some evidence of market manipulation
-
1564-65
-
See Jon D. Hanson & Douglas A. Kysar, Taking Behavioralism Seriously: Some Evidence of Market Manipulation, 112 HARV. L. REV. 1420, 1564-65 (1999).
-
(1999)
Harv. L. Rev.
, vol.112
, pp. 1420
-
-
Hanson, J.D.1
Kysar, D.A.2
-
27
-
-
22644448880
-
Taking behavioralism seriously: The problem of market manipulation
-
747
-
See Hanson & Kysar, supra note 16, at 1425; Jon D. Hanson & Douglas A. Kysar, Taking Behavioralism Seriously: The Problem of Market Manipulation, 74 N.Y.U. L. REV. 630, 747 (1999).
-
(1999)
N.Y.U. L. Rev.
, vol.74
, pp. 630
-
-
Hanson, J.D.1
Kysar, D.A.2
-
28
-
-
0348246071
-
A behavioral approach to law and economics
-
1474
-
See Christine Jolls et al., A Behavioral Approach to Law and Economics, 50 STAN. L. REV. 1471, 1474 (1998).
-
(1998)
Stan. L. Rev.
, vol.50
, pp. 1471
-
-
Jolls, C.1
-
30
-
-
84859015072
-
Against notice skepticism in privacy (and elsewhere)
-
1031-32
-
This is particularly true of the many regimes that rely on mandatory disclosure. See, e.g., M. Ryan Calo, Against Notice Skepticism in Privacy (and Elsewhere), 87 NOTRE DAME L. REV. 1027, 1031-32 (2012) (privacy)
-
(2012)
Notre Dame L. Rev.
, vol.87
, pp. 1027
-
-
Ryan Calo, M.1
-
31
-
-
79251571384
-
Empirical and behavioral critiques of mandatory disclosure: Socio-economics and the quest for truth in lending
-
242
-
Matthew A. Edwards, Empirical and Behavioral Critiques of Mandatory Disclosure: Socio-Economics and the Quest for Truth in Lending, 14 CORNELL J.L. & PUB. POL'Y 199, 242 (2005) (lending)
-
(2005)
Cornell J.L. & Pub. Pol'y
, vol.14
, pp. 199
-
-
Edwards, M.A.1
-
32
-
-
77649087706
-
The hydraulic theory of disclosure regulation and other costs of disclosure
-
494-97
-
Geoffrey A. Manne, The Hydraulic Theory of Disclosure Regulation and Other Costs of Disclosure, 58 ALA. L. REV. 473, 494-97 (2007) (securities)
-
(2007)
Ala. L. Rev.
, vol.58
, pp. 473
-
-
Manne, G.A.1
-
33
-
-
55349147804
-
Decisionmaking and the limits of disclosure: The problem of predatory lending: Price
-
713-14
-
Lauren E. Willis, Decisionmaking and the Limits of Disclosure: The Problem of Predatory Lending: Price, 65 MD. L. REV. 707, 713-14 (2006) (lending).
-
(2006)
Md. L. Rev.
, vol.65
, pp. 707
-
-
Willis, L.E.1
-
34
-
-
33645299546
-
Debiasing through law
-
200-01
-
Christine Jolls & Cass R. Sunstein, Debiasing Through Law, 35 J. LEGAL STUD. 199, 200-01 (2006)
-
(2006)
J. Legal Stud.
, vol.35
, pp. 199
-
-
Jolls, C.1
Sunstein, C.R.2
-
37
-
-
0742306363
-
Libertarian paternalism is not an oxymoron
-
1161-62
-
Cass R. Sunstein & Richard H. Thaler, Libertarian Paternalism Is Not an Oxymoron, 70 U. CHI. L. REV. 1159, 1161-62 (2003)
-
(2003)
U. Chi. L. Rev.
, vol.70
, pp. 1159
-
-
Sunstein, C.R.1
Thaler, R.H.2
-
38
-
-
1842863101
-
Behavioral economics, public policy, and paternalism: Libertarian paternalism
-
May 175-79
-
Richard H. Thaler & Cass R. Sunstein, Behavioral Economics, Public Policy, and Paternalism: Libertarian Paternalism, AM. ECON. REV., May 2003, at 175, 175-79.
-
(2003)
Am. Econ. Rev.
, pp. 175
-
-
Thaler, R.H.1
Sunstein, C.R.2
-
39
-
-
84961350550
-
-
No. 2:11-cv-00828-MJP W.D. Wash. Mar. 6
-
See generally FTC v. Willms, No. 2:11-cv-00828-MJP (W.D. Wash. Mar. 6, 2012) (stipulated final judgment and order)
-
(2012)
Ftc v. Willms
-
-
-
40
-
-
84961352893
-
-
Dec. 11
-
One example is bid-to-pay auctions, which leverage the endowment effect and optimism bias to generate as high as 500 percent profits on average consumer goods. See Jeff Atwood, Profitable Until Deemed Illegal, CODING HORROR (Dec. 11, 2008), http://blog.codinghorror.com/profitable-until-deemed-illegal/.
-
(2008)
Profitable Until Deemed Illegal
-
-
Atwood, J.1
-
41
-
-
84873148585
-
'Nudging' healthy lifestyles: The UK experiments with the behavioural alternative to regulation and the market
-
4
-
If anything, regulators have themselves developed a taste for nudging citizens toward policy goals. See Adam Burgess, 'Nudging' Healthy Lifestyles: The UK Experiments with the Behavioural Alternative to Regulation and the Market, 1 EUR. J. RISK REG. 3, 4 (2012)
-
(2012)
Eur. J. Risk Reg.
, vol.1
, pp. 3
-
-
Burgess, A.1
-
42
-
-
65549087561
-
How obama is using the science of change
-
Apr. 13 29-30
-
Michael Grunwald, How Obama Is Using the Science of Change, TIME, Apr. 13, 2009, at 28, 29-30.
-
(2009)
Time
, pp. 28
-
-
Grunwald, M.1
-
43
-
-
0034566648
-
The surveillant assemblage
-
605-06
-
I use the term "mediated" in a practical sense to refer to the fact that consumers literally experience commercial, civic, and personal life through the technology they use, including mobile phones, tables, kiosks, and the like. There is a long-standing, but recently accelerating, surveillance literature that explores the mediating influence of society on subjects in a more theoretical frame. See, e.g., Kevin D. Haggerty & Richard V. Ericson, The Surveillant Assemblage, 51 BRIT. J. SOC. 605, 605-06 (2000)
-
(2000)
Brit. J. Soc.
, vol.51
, pp. 605
-
-
Haggerty, K.D.1
Ericson, R.V.2
-
44
-
-
84861720723
-
The pastoral power of technology. Rethinking alienation in digital culture
-
510-11
-
Katarina Giritli Nygren & Katarina L. Gidlund, The Pastoral Power of Technology. Rethinking Alienation in Digital Culture, 10 TRIPLEC 509, 510-11 (2012).
-
(2012)
Triplec
, vol.10
, pp. 509
-
-
Nygren, K.G.1
Gidlund, K.L.2
-
45
-
-
84877985079
-
Irrational privacy?
-
245
-
Thank you to Julie Cohen for flagging this helpful distinction. This Article self-consciously adopts a technocratic stance which assumes, with the liberal tradition, the existence of a market and of market actors who can take material advantage of one another. Cf. Julie E. Cohen, Irrational Privacy?, 10 J. TELECOMM. & HIGH TECH. L. 241, 245 (2012) (describing "[s]cholarship in the technocratic market-calibration mode").
-
(2012)
J. Telecomm. & High Tech. L.
, vol.10
, pp. 241
-
-
Cohen, J.E.1
-
46
-
-
85052411318
-
-
Mirko Presser ed. available at
-
In a comic book depicting the effect of technology on society, Gérald Santucci estimates that about fifty billion devices will be networked by 2015 into an "Internet of Things." See Gérald Santucci, Foreword to ALEXANDRA INST., INSPIRING THE INTERNET OF THINGS! 3, 3 (Mirko Presser ed., 2011), available at http://www.alexandra.dk/uk/services/publications/documents/iot-comic-book.pdf.
-
(2011)
Foreword to Alexandra Inst., Inspiring the Internet of Things!
, vol.3
, Issue.3
-
-
Santucci, G.1
-
47
-
-
84890525765
-
Regulating online behavioral advertising
-
901-04
-
See Steven C. Bennett, Regulating Online Behavioral Advertising, 44 J. MARSHALL L. REV. 899, 901-04 (2011).
-
(2011)
J. Marshall L. Rev.
, vol.44
, pp. 899
-
-
Bennett, S.C.1
-
48
-
-
33645796029
-
"Mine your own business!": Making the case for the implications of the data mining of personal information in the forum of public opinion
-
6-8
-
See Tal Z. Zarsky, "Mine Your Own Business!": Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion, 5 YALE J.L. & TECH. 1, 6-8 (2002-2003)
-
(2002)
Yale J.L. & Tech.
, vol.5
, pp. 1
-
-
Zarsky, T.Z.1
-
49
-
-
42349108508
-
Data mining and internet profiling: Emerging regulatory and technological approaches
-
272-73
-
see also Ira S. Rubinstein et al., Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches, 75 U. CHI. L. REV. 261, 272-73 (2008) (describing the capabilities of data mining).
-
(2008)
U. Chi. L. Rev.
, vol.75
, pp. 261
-
-
Rubinstein, I.S.1
-
50
-
-
84922205302
-
The direct selling industry: An empirical study
-
Project 895-922
-
See, e.g., Project, The Direct Selling Industry: An Empirical Study, 16 UCLA L. REV. 883, 895-922 (1969). The FTC promulgated regulations in 1972, for instance, by imposing a "cooling off" period for door-to-door sales.
-
(1969)
Ucla L. Rev.
, vol.16
, pp. 883
-
-
-
51
-
-
85052408315
-
Cooling-off period for door-to-door sales
-
22937
-
Cooling-off Period for Door-to-Door Sales, 37 Fed. Reg. 22934, 22937 (1972) (codified as amended at 16 C.F.R. § 429.1 (2014)).
-
(1972)
Fed. Reg.
, vol.37
-
-
-
52
-
-
78751483886
-
User information regimes: How social media shape patterns of consumption
-
598
-
37 Fed. Reg. at 22939 n. 44 ("The door to door selling technique strips from the consumer one of the fundamentals in his role as an informed purchaser, the decision as to when, where, and how he will present himself to the marketplace."); cf. James G. Webster, User Information Regimes: How Social Media Shape Patterns of Consumption, 104 NW. U. L. REV. 593, 598 (2010) (describing the difference between the "pull" method of audience building and the "push" or "interruption" method)).
-
(2010)
Nw. U. L. Rev.
, vol.104
, pp. 593
-
-
Webster, J.G.1
-
54
-
-
84859353719
-
Freedom of contract in an augmented reality: The case of consumer contracts
-
679
-
Scott R. Peppet, Freedom of Contract in an Augmented Reality: The Case of Consumer Contracts, 59 UCLA L. REV. 676, 679 (2012).
-
(2012)
Ucla L. Rev.
, vol.59
, pp. 676
-
-
Peppet, S.R.1
-
55
-
-
33846522980
-
A coasean analysis of marketing
-
1202-09
-
Eric Goldman, A Coasean Analysis of Marketing, 2006 WIS. L. REV. 1151, 1202-09. Although possible in theory, today's filters are not run for the benefit of consumers and how these filters will be used in the future is unclear. Furthermore, as Goldman acknowledges, "[m]arketers are notorious for finding ways to bypass filters." Id. at 1207 n. 285.
-
(2006)
Wis. L. Rev.
, pp. 1151
-
-
Goldman, E.1
-
56
-
-
77954568098
-
Malicious interface design: Exploiting the user
-
available at
-
West Point computer scientist Gregory Conti refers to "malicious interfaces" that are the opposite of usable or user-centric. See Gregory Conti & Edward Sobiesk, Malicious Interface Design: Exploiting the User, in PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON THE WORLD WIDE WEB 271, 271-80 (2010), available at http://dl.acm.org/citation.cfm?id=1772719.
-
(2010)
Proceedings of the 19Th International Conference on the World Wide Web
, vol.271
, pp. 271-280
-
-
Conti, G.1
Sobiesk, E.2
-
57
-
-
84961300157
-
-
(last visited Aug. 21, 2014)
-
British user experience designer Harry Brignull refers to user interface designs that work against the user as "dark patterns." See DARK PATTERNS, http://darkpatterns.org (last visited Aug. 21, 2014).
-
-
-
-
59
-
-
77953963633
-
Faster progress bars: Manipulating perceived duration with visual augmentations
-
1545-48 available at
-
Chris Harrison et al., Faster Progress Bars: Manipulating Perceived Duration with Visual Augmentations, in PROCEEDINGS OF THE SIGCHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS 1545, 1545-48 (2010), available at http://dl.acm.org/citation.cfm?id=1753556&CFID=391340722&CFTOKEN=55472072 (finding new progress bar reduces perceived duration by eleven percent in subjects).
-
(2010)
Proceedings of the Sigchi Conference on Human Factors in Computing Systems
, pp. 1545
-
-
Harrison, C.1
-
60
-
-
84961338425
-
-
July 15 2:03 AM
-
Jesus Diaz, This Is How Much the New iPhone 4 Signal Bars Have Grown, GIZMODO (July 15, 2010, 2:03 AM), http://gizmodo.com/5587535/this-is-how-much-the-new-iphone-4-signal-bars-have-grown ("Free tip: If you paint flames on the back of your iPhone 4, it runs 2.3x faster."). Chances are Apple is using what it understands about the psychology of design to substitute illusion for greater quality. At the extremes, the ability to design an interface from scratch means slot machines at a casino that create "near wins" to trigger the release of dopamine by the gambler's brain.
-
(2010)
This Is How Much the New Iphone 4 Signal Bars Have Grown
-
-
Diaz, J.1
-
61
-
-
59649111240
-
Gambling near-misses enhance motivation to gamble and recruit win-related brain circuitry
-
481
-
See Luke Clark et al., Gambling Near-Misses Enhance Motivation to Gamble and Recruit Win-Related Brain Circuitry, 61 NEURON 481, 481 (2009).
-
(2009)
Neuron
, vol.61
, pp. 481
-
-
Clark, L.1
-
63
-
-
33748754899
-
Rationality and administrative decision making
-
HERBERT A. SIMON, Rationality and Administrative Decision Making, in MODELS OF MAN: SOCIAL AND RATIONAL 196, 200-01 (1957).
-
(1957)
Models of Man: Social and Rational
, vol.196
, pp. 200-201
-
-
Simon, H.A.1
-
64
-
-
3142698048
-
Time-shifted rationality and the law of law's leverage: Behavioral economics meets behavioral biology
-
1150-51 & nn. 30-32
-
See Owen D. Jones, Time-Shifted Rationality and the Law of Law's Leverage: Behavioral Economics Meets Behavioral Biology, 95 NW. U. L. REV. 1141, 1150-51 & nn. 30-32 (2001).
-
(2001)
Nw. U. L. Rev.
, vol.95
, pp. 1141
-
-
Jones, O.D.1
-
65
-
-
0016264378
-
Judgment under uncertainty: Heuristics and biases
-
1124
-
See, e.g., Amos Tversky & Daniel Kahneman, Judgment Under Uncertainty: Heuristics and Biases, 185 SCI. 1124, 1124 (1974).
-
(1974)
Sci.
, vol.185
, pp. 1124
-
-
Tversky, A.1
Kahneman, D.2
-
66
-
-
33745847757
-
Belief in the law of small numbers
-
105-10
-
See, e.g., Id.; Amos Tversky & Daniel Kahneman, Belief in the Law of Small Numbers, 76 PSYCHOL. BULL. 105, 105-10 (1971) [hereinafter Tversky & Kahneman, Belief]
-
(1971)
Psychol. Bull.
, vol.76
, pp. 105
-
-
Tversky, A.1
Kahneman, D.2
-
67
-
-
0019392722
-
The framing of decisions and the psychology of choice
-
453-58
-
Amos Tversky & Daniel Kahneman, The Framing of Decisions and the Psychology of Choice, 211 SCI. 453, 453-58 (1981).
-
(1981)
Sci.
, vol.211
, pp. 453
-
-
Tversky, A.1
Kahneman, D.2
-
68
-
-
79960325615
-
Behavioral economics: Toward a new paradigm
-
1100
-
See Amitai Etzioni, Behavioral Economics: Toward a New Paradigm, 55 AM. BEHAV. SCIENTIST 1099, 1100 (2011) ("The effect demonstrated by [Tversky and Kahneman], which the two scholars labeled anchoring and adjustment, has been replicated using a wide variety of stimuli and participants.")).
-
(2011)
Am. Behav. Scientist
, vol.55
, pp. 1099
-
-
Etzioni, A.1
-
69
-
-
0034338871
-
Controlling the information flow: Effects on consumers' decision making and preferences
-
233
-
E.g., Dan Ariely, Controlling the Information Flow: Effects on Consumers' Decision Making and Preferences, 27 J. CONSUMER RES. 233, 233 (2000)
-
(2000)
J. Consumer Res.
, vol.27
, pp. 233
-
-
Ariely, D.1
-
70
-
-
0030100132
-
Out of control: Visceral influences on behavior
-
272
-
George Loewenstein, Out of Control: Visceral Influences on Behavior, 65 ORGANIZATIONAL BEHAV. & HUM. DECISION PROCESSES 272, 272 (1996) (exploring effect of "visceral factors" such as hunger, thirst, and sexual desire on decisionmaking)).
-
(1996)
Organizational Behav. & Hum. Decision Processes
, vol.65
, pp. 272
-
-
Loewenstein, G.1
-
71
-
-
0000125532
-
Prospect theory: An analysis of decision under risk
-
Compare 263-91
-
The number of biases consistently discussed by the literature has remained relatively stable since the field began. Compare Daniel Kahneman & Amos Tversky, Prospect Theory: An Analysis of Decision Under Risk, 47 ECONOMETRICA 263, 263-91 (1979) (discussing approximately fifteen biases)
-
(1979)
Econometrica
, vol.47
, pp. 263
-
-
Kahneman, D.1
Tversky, A.2
-
72
-
-
85052411039
-
-
Rüdiger F. Pohl ed.
-
Rüdiger F. Pohl, Introduction to COGNITIVE ILLUSIONS: A HANDBOOK ON FALLACIES AND BIASES IN THINKING, JUDGEMENT AND MEMORY 1, 1 (Rüdiger F. Pohl ed., 2004) (noting that collection surveys twenty-one "cognitive illusions"). Varying definitions of "bias," as well as differing systems of categorization, may lead to very different estimates as to the absolute number of known irrational tendencies. Regardless of the total given in a specific study or article, it is in no way near the many thousands this Section contemplates.
-
(2004)
Introduction to Cognitive Illusions: A Handbook on Fallacies and Biases in Thinking, Judgement and Memory
, vol.1
, Issue.1
-
-
Pohl, R.F.1
-
73
-
-
0041906953
-
Toward a positive theory of consumer choice
-
41-43
-
See id. at 280-81; see also Richard Thaler, Toward a Positive Theory of Consumer Choice, 1 J. ECON. BEHAV. & ORG. 39, 41-43 (1980).
-
(1980)
J. Econ. Behav. & Org.
, vol.1
, pp. 39
-
-
Thaler, R.1
-
77
-
-
84861974217
-
Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon
-
For a more critical account, see generally Danah Boyd & Kate Crawford, Critical Questions for Big Data: Provocations for a Cultural, Technological, and Scholarly Phenomenon, 15 INFO. COMM. & SOC'Y 662 (2012).
-
(2012)
Info. Comm. & Soc'y
, vol.15
, pp. 662
-
-
Boyd, D.1
Crawford, K.2
-
78
-
-
84877957864
-
Big data for all: Privacy and user control in the age of analytics
-
245-46
-
See, e.g., Omer Tene & Jules Polonetsky, Big Data for All: Privacy and User Control in the Age of Analytics, 11 NW. J. TECH. & INTELL. PROP. 239, 245-46 (2013).
-
(2013)
Nw. J. Tech. & Intell. Prop.
, vol.11
, pp. 239
-
-
Tene, O.1
Polonetsky, J.2
-
79
-
-
84904390368
-
The underwhelming benefits of big data
-
Response 345
-
See id. But see Paul Ohm, Response, The Underwhelming Benefits of Big Data, 161 U. PA. L. REV. ONLINE 339, 345 (2013), http://www.pennlawreview.com/online/161-U-Pa-L-Rev-Online-339.pdf (urging caution in overestimating the benefits of big data, relative to the potential harms).
-
(2013)
U. Pa. L. Rev. Online
, vol.161
, pp. 339
-
-
Ohm, P.1
-
80
-
-
84890113153
-
-
WIRED, July 108-09
-
See Chris Anderson, The End of Theory, WIRED, July 2008, at 108, 108-09.
-
(2008)
The end of Theory
, pp. 108
-
-
Anderson, C.1
-
81
-
-
84877955544
-
What privacy is for
-
1920-22
-
See id. But see Julie E. Cohen, What Privacy Is For, 126 HARV. L. REV. 1904, 1920-22 (2013) ("Considered more soberly, the claim that Big Data will eliminate the need for scientific modeling simply does not make sense.")). Cohen's concerns are largely ethically based. See id. at 1922-27.
-
(2013)
Harv. L. Rev.
, vol.126
, pp. 1904
-
-
Cohen, J.E.1
-
82
-
-
84922118074
-
-
Mar. 51, available at
-
See Graeme Wood, Anthropology Inc., ATLANTIC, Mar. 2013, at 48, 51, available at http://www.theatlantic.com/magazine/archive/2013/03/anthropology-inc/309218/.
-
(2013)
Anthropology Inc.
, pp. 48
-
-
Wood, G.1
-
83
-
-
84961313016
-
-
(last visited Aug. 21, 2014)
-
See ASK ARIELY BLOG, http://www.danariely.com (last visited Aug. 21, 2014).
-
Ask Ariely Blog
-
-
-
84
-
-
84924032215
-
-
(last visited Aug. 21, 2014)
-
If the result of the big data process is highly individualized, then why is this Section titled "mass production" of bias? Sometimes personalization is the upshot of mass production; for example, when Henry Ford's assembly lines displaced public transportation in favor of a car for each family. See Thomas J. Sugrue, From Motor City to Motor Metropolis: How the Automobile Industry Reshaped Urban America, AUTOMOBILE AM. LIFE & SOC'Y, http://www.autolife.umd.umich.edu/Race/R-Overview/R-Overview.htm (last visited Aug. 21, 2014).
-
From Motor City to Motor Metropolis: How the Automobile Industry Reshaped Urban America
-
-
Sugrue, T.J.1
-
85
-
-
0037483158
-
Cyberspace and the law of the horse
-
207
-
In recognizing a possible critique to this interview-based approach, Frank Easterbrook took the occasion of an inaugural cyberlaw conference to point out that lawyers risk dilettantism when they talk about technology. Frank H. Easterbrook, Cyberspace and the Law of the Horse, 1996 U. CHI. LEGAL F. 207, 207 ("I regret to report that no one at this Symposium is going to win a Nobel Prize any time soon for advances in computer science."). What Easterbrook misses, of course, is that lawyers can and do consult with professionals (e.g., expert witnesses) and colleagues in other disciplines.
-
(1996)
U. Chi. Legal F.
, pp. 207
-
-
Easterbrook, F.H.1
-
86
-
-
68049121093
-
Anomaly detection: A survey
-
July 15:2
-
See, e.g., Varun Chandola et al., Anomaly Detection: A Survey, ACM COMPUTING SURVS., July 2009, at 15, 15:2 ("Anomaly detection finds extensive use in a wide variety of applications such as fraud detection for credit cards, insurance, or health care, intrusion detection for cyber-security, fault detection in safety critical systems, and military surveillance for enemy activities.").
-
(2009)
Acm Computing Survs
, pp. 15
-
-
Chandola, V.1
-
87
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
See generally Animesh Patcha & Jung-Min Park, An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends, 51 COMPUTER NETWORKS 3448 (2007) (surveying the anomaly detection literature in computer security context).
-
(2007)
Computer Networks
, vol.51
, pp. 3448
-
-
Patcha, A.1
Park, J.-M.2
-
88
-
-
84961326406
-
-
Mar. 28 8:17 PM
-
Cf. Quentin Hardy, Bizarre Insights From Big Data, N.Y. TIMES BITS BLOG (Mar. 28, 2012, 8:17 PM), http://bits.blogs.nytimes.com/2012/03/28/bizarre-insights-from-big-data/ (listing revelations from pattern spotting in large datasets).
-
(2012)
Bizarre Insights from Big Data
-
-
Hardy, Q.1
-
90
-
-
21344493140
-
"Good" warnings, bad products, and cognitive limitations
-
1211-15
-
See Howard Latin, "Good" Warnings, Bad Products, and Cognitive Limitations, 41 UCLA L. REV. 1193, 1211-15 (1994) (describing the information overload phenomenon).
-
(1994)
Ucla L. Rev.
, vol.41
, pp. 1193
-
-
Latin, H.1
-
91
-
-
79952175130
-
The failure of mandated disclosure
-
746
-
Omri Ben-Shahar & Carl E. Schneider, The Failure of Mandated Disclosure, 159 U. PA. L. REV. 647, 746 (2011).
-
(2011)
U. Pa. L. Rev.
, vol.159
, pp. 647
-
-
Ben-Shahar, O.1
Schneider, C.E.2
-
92
-
-
84995590301
-
What can behavioral economics teach us about privacy?
-
363-79 Alessandro Acquisti et al. eds.
-
See, e.g., Alessandro Acquisti & Jens Grossklags, What Can Behavioral Economics Teach Us About Privacy?, in DIGITAL PRIVACY: THEORY, TECHNOLOGIES, AND PRACTICES 363, 363-79 (Alessandro Acquisti et al. eds., 2008).
-
(2008)
Digital Privacy: Theory, Technologies, and Practices
, pp. 363
-
-
Acquisti, A.1
Grossklags, J.2
-
93
-
-
84878864910
-
Silent listeners: The evolution of privacy and disclosure on facebook
-
17
-
There is a revealing set of graphs in a 2012 communications paper showing how personal disclosure on the social network Facebook was trending fairly sharply downward until, around 2009, the company changed some of its privacy defaults. See Fred Stutzman et al., Silent Listeners: The Evolution of Privacy and Disclosure on Facebook, 4 J. PRIVACY & CONFIDENTIALITY, no. 2, 2012, at 7, 17, http://repository.cmu.edu/jpc/vol4/iss2/2/. From that point on, disclosure began steadily to climb again. See id.
-
(2012)
J. Privacy & Confidentiality
, vol.4
, Issue.2
, pp. 7
-
-
Stutzman, F.1
-
94
-
-
78751545877
-
Strangers on a plane: Context-dependent willingness to divulge sensitive information
-
863-68
-
See Leslie K. John et al., Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information, 37 J. CONSUMER RES. 858, 863-68 (2011).
-
(2011)
J. Consumer Res.
, vol.37
, pp. 858
-
-
John, L.K.1
-
95
-
-
84876188506
-
Misplaced confidences: Privacy and the control paradox
-
340-47
-
Laura Brandimarte et al., Misplaced Confidences: Privacy and the Control Paradox, 4 SOC. PSYCHOL. & PERSONALITY SCI. 340, 340-47 (2013).
-
(2013)
Soc. Psychol. & Personality Sci.
, vol.4
, pp. 340
-
-
Brandimarte, L.1
-
96
-
-
84961333079
-
How users reciprocate to consumers: An experiment that demonstrates behavior change
-
See, e.g., B.J. Fogg & Clifford Nass, How Users Reciprocate to Consumers: An Experiment That Demonstrates Behavior Change, in CHI '97 EXTENDED
-
Chi '97 Extended
-
-
Fogg, B.J.1
Nass, C.2
-
97
-
-
84961305425
-
-
WIRED, May
-
For an in-depth look at the rise of A/B testing, see Brian Christian, The A/B Test, WIRED, May 2012, at 176.
-
(2012)
The A/B Test
, pp. 176
-
-
Christian, B.1
-
98
-
-
84961364610
-
How banks, marketers aid scams
-
July 1
-
One can already buy socalled "sucker lists" on the open market. These are people?the elderly, for instance?who analysts have classified as vulnerable. See Karen Blumenthal, How Banks, Marketers Aid Scams, WALL ST. J., July 1, 2009, at D3.
-
(2009)
Wall St. J.
, pp. D3
-
-
Blumenthal, K.1
-
99
-
-
84961338643
-
-
(last visited Aug. 21, 2014)
-
The "What They Know" series from The Wall Street Journal has, in particular, illustrated the extent of online tracking. This section of The Wall Street Journal's website collects all articles and information related to privacy concerns and tracking information. What They Know, WALL ST. J., http://online.wsj.com/public/page/what-they-know-digital-privacy.html (last visited Aug. 21, 2014).
-
What They Know
-
-
-
102
-
-
84961295600
-
High-tech billboards tune in to drivers' tastes: Roadside signs coming to bay area listen to car radios, then adjust pitch
-
Dec. 22
-
See, e.g., Robert Salladay, High-Tech Billboards Tune In to Drivers' Tastes: Roadside Signs Coming to Bay Area Listen to Car Radios, Then Adjust Pitch, S.F. CHRON., Dec. 22, 2002, at A1.
-
(2002)
S.F. Chron.
, pp. A1
-
-
Salladay, R.1
-
103
-
-
84961377716
-
Behavioral advertising: From one-sided chicken to informational norms
-
60
-
See Richard Warner & Robert H. Sloan, Behavioral Advertising: From One-Sided Chicken to Informational Norms, 15 VAND. J. ENT. & TECH. L. 49, 60 (2012).
-
(2012)
Vand. J. Ent. & Tech. L.
, vol.15
, pp. 49
-
-
Warner, R.1
Sloan, R.H.2
-
104
-
-
84961349445
-
-
available at
-
The industry calls this practice "interest-based advertising." See NETWORK ADVER. INITIATIVE, 2013 NAI CODE OF CONDUCT 9 (2013), available at http://www.networkadvertising.org/2013-Principles.pdf.
-
(2013)
Initiative, 2013 Nai Code of Conduct
, pp. 9
-
-
-
106
-
-
84885055060
-
Combining multiple influence strategies to increase consumer compliance
-
33-51
-
See generally Maurits Kaptein & Steven Duplinsky, Combining Multiple Influence Strategies to Increase Consumer Compliance, 8 INT'L J. INTERNET MARKETING & ADVERTISING 32, 33-51 (2013)
-
(2013)
Int'l J. Internet Marketing & Advertising
, vol.8
, pp. 32
-
-
Kaptein, M.1
Duplinsky, S.2
-
110
-
-
84872650768
-
The effect of companion's gender on impulsive purchasing: The moderating factor of cohesiveness and susceptibility to interpersonal influence
-
227-36
-
See also Yin-Hui Cheng et al., The Effect of Companion's Gender on Impulsive Purchasing: The Moderating Factor of Cohesiveness and Susceptibility to Interpersonal Influence, 43 J. APPLIED SOC. PSYCHOL. 227, 227-36 (2013).
-
(2013)
J. Applied Soc. Psychol
, vol.43
, pp. 227
-
-
Cheng, Y.-H.1
-
111
-
-
77954642553
-
Selecting effective means to any end: Futures and ethics of persuasion profiling
-
82-93 Thomas Ploug et al. eds. available at
-
See id. at 187; see also Maurits Kaptein & Dean Eckles, Selecting Effective Means to Any End: Futures and Ethics of Persuasion Profiling, in PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON PERSUASIVE TECHNOLOGY 82, 82-93 (Thomas Ploug et al. eds., 2010), available at http://dl.acm.org/citation.cfm?id=2164027.
-
(2010)
Proceedings of the 5Th International Conference on Persuasive Technology
, pp. 82
-
-
Kaptein, M.1
Eckles, D.2
-
112
-
-
67449114028
-
Website morphing
-
202-06
-
See, e.g., John R. Hauser et al., Website Morphing, 28 MARKETING SCI. 202, 202-06 (2009).
-
(2009)
Marketing Sci.
, vol.28
, pp. 202
-
-
Hauser, J.R.1
-
114
-
-
0000266534
-
A market solution to green marketing: Some lessons from the economics of information
-
246-50
-
See, e.g., John M. Church, A Market Solution to Green Marketing: Some Lessons from the Economics of Information, 79 MINN. L. REV. 245, 246-50 (1994)
-
(1994)
Minn. L. Rev.
, vol.79
, pp. 245
-
-
Church, J.M.1
-
115
-
-
84961300396
-
Changing channels in broadcast regulation: Leaving television advertising to containment by market forces
-
Note 465-70
-
Dean K. Cherchiglia, Note, Changing Channels in Broadcast Regulation: Leaving Television Advertising to Containment by Market Forces, 34 CASE W. RES. L. REV. 465, 465-70 (1984).
-
(1984)
Case W. Res. L. Rev.
, vol.34
, pp. 465
-
-
Cherchiglia, D.K.1
-
116
-
-
84879938131
-
A necessary cost of freedom
-
19
-
For example, some question whether contemporary advertising is effective at generating demand at all - though this claim seems to be in tension with contemporary advertising's purported benefits and the sheer amount of money that is spent on marketing. See Tamara R. Piety, "A Necessary Cost of Freedom"? The Incoherence of Sorrell v. IMS, 64 ALA. L. REV. 1, 19 n. 102 (2012).
-
(2012)
The incoherence of Sorrell v. IMS, 64 Ala. L. Rev.
, Issue.102
, pp. 1
-
-
Piety, T.R.1
-
117
-
-
84961343416
-
-
104 F.T.C. 949 app. at 1070, 1073
-
See Int'l Harvester Co., 104 F.T.C. 949 app. at 1070, 1073 (1984) (FTC Policy Statement on Unfairness) ("To justify a finding of unfairness the injury must satisfy three tests. It must be substantial; it must not be outweighed by any countervailing benefits to consumers or competition that the practice produces; and it must be an injury that consumers themselves could not reasonably have avoided.")
-
(1984)
Int'l Harvester Co.
-
-
-
118
-
-
71949096865
-
Law's expressive value in combating cyber gender harassment
-
392-95
-
Danielle Keats Citron, Law's Expressive Value in Combating Cyber Gender Harassment, 108 MICH. L. REV. 373, 392-95 (2009) (discussing how emotional distress torts often founder on damages).
-
(2009)
Mich. L. Rev.
, vol.108
, pp. 373
-
-
Citron, D.K.1
-
119
-
-
84890953186
-
-
available at
-
For instance, Dean Eckles, co-author of several papers on persuasion profiling, now works on the "data science team" of the social network Facebook. See Dean Eckles, Curriculum Vitae, available at http://deaneckles.com/Dean-Eckles-CV.pdf. Of course, this does not mean that Facebook is using the technique, nor that the motivation behind Eckles' academic work is in any way suspect. Eckles appears aware of the potential for unethical use of the techniques he helped pioneer. See Kaptein & Eckles, supra note 128, at 82-93.
-
Curriculum Vitae
-
-
Eckles, D.1
-
120
-
-
84961341546
-
-
Nov. 20 available at
-
Letter from Mark Twain to J.H. Todd (Nov. 20, 1905), available at http://www.letter-sofnote.com/2010/01/youre-idiot-of-33rd-degree.html.
-
(1905)
Letter from Mark Twain to J.H. Todd
-
-
-
124
-
-
84885139958
-
A psychological investigation of consumer vulnerability to fraud: Legal and policy implications
-
62
-
See Jessica M. Choplin et al., A Psychological Investigation of Consumer Vulnerability to Fraud: Legal and Policy Implications, 35 LAW & PSYCHOL. REV. 61, 62 (2011) ("We hypothesize that when unscrupulous salespeople, including mortgage brokers and lenders, reassure consumers and explain away 'problematic' contract terms (i.e., terms inconsistent with what was previously promised and against the consumer's interest)), many consumers will acquiesce to the problematic terms.")
-
(2011)
Law & Psychol. Rev.
, vol.35
, pp. 61
-
-
Choplin, J.M.1
-
125
-
-
84870655511
-
The vulnerability of defensiveness: The impact of persuasion attempts and processing motivations on trust
-
962
-
Wenxia Guo & Kelley J. Main, The Vulnerability of Defensiveness: The Impact of Persuasion Attempts and Processing Motivations on Trust, 23 MARKETING LETTERS 959, 962 (2012) (describing how a clever salesperson can exploit a consumer's very defensiveness to increase the likelihood of a sale).
-
(2012)
Marketing Letters
, vol.23
, pp. 959
-
-
Guo, W.1
Main, K.J.2
-
126
-
-
84961365932
-
The economics of proof-of-work
-
336
-
See Debin Liu, The Economics of Proof-of-Work, 3 I/S: J.L. & POL'Y FOR INFO. SOC'Y 335, 336 (2007) (describing prevalence and mechanisms of spam).
-
(2007)
I/S: J.L. & Pol'y for Info. Soc'y
, vol.3
, pp. 335
-
-
Liu, D.1
-
127
-
-
84908942438
-
Regulating robocalls: Are automated calls the sound of, or a threat to, democracy?
-
Note 214-17
-
See Jason C. Miller, Note, Regulating Robocalls: Are Automated Calls the Sound of, or a Threat to, Democracy?, 16 MICH. TELECOMM. & TECH. L. REV. 213, 214-17 (2009) (describing the prevalence and mechanisms of automated or "robo" calls).
-
(2009)
Mich. Telecomm. & Tech. L. Rev.
, vol.16
, pp. 213
-
-
Miller, J.C.1
-
128
-
-
84875916594
-
The drone as privacy catalyst
-
29-33
-
Jolls, Sunstein, and Thaler discuss how a "severe departure from the reference transaction" can lead to official intervention even if such intervention does not maximize welfare. Jolls et al., supra note 18, at 1510-17. The authors use the practice of scalping tickets to an event as one such example. Id. at 1513; see also M. Ryan Calo, The Drone as Privacy Catalyst, 64 STAN. L. REV. ONLINE 29, 29-33 (2011), http://www.stanfordlawreview.org/online/drone-privacy-cata-lyst (arguing that society's visceral reaction to surveillance drones may change privacy law in ways that previous, readily analogous technologies did not).
-
(2011)
Stan. L. Rev. Online
, vol.64
, pp. 29
-
-
Calo, R.1
-
129
-
-
84961323459
-
Walking away scot-free: Trust, expert advice, and realtor responsibility
-
316-320
-
See Brent T. White, Walking Away Scot-Free: Trust, Expert Advice, and Realtor Responsibility, 40 REAL EST. L.J. 312, 316-320 (2011) (describing the role of a buyers agent in detail).
-
(2011)
Real Est. L.J.
, vol.40
, pp. 312
-
-
White, B.T.1
-
130
-
-
84961332317
-
The real estate broker and the buyer: Negligence and the duty to investigate
-
957
-
See Paula C. Murray, The Real Estate Broker and the Buyer: Negligence and the Duty to Investigate, 32 VILL. L. REV. 939, 957 (1987).
-
(1987)
Vill. L. Rev.
, vol.32
, pp. 939
-
-
Murray, P.C.1
-
131
-
-
0004001507
-
-
2d ed.
-
The idea that harm should be a threshold question in law is a staple of Western political thought. See, e.g., JOHN STUART MILL, ON LIBERTY 21-22 (2d ed. 1859) ("[T]he only purpose for which power can be rightfully exercised over any member of a civilized community, against his will, is to prevent harm to others.")).
-
(1859)
On Liberty
, pp. 21-22
-
-
Mill, J.S.1
-
132
-
-
77952022703
-
-
540 U.S. 614, 625-26
-
see also Doe v. Chao, 540 U.S. 614, 625-26 (2004) (remarking on the intent of Congress to "avoid[] giveaways to plaintiffs with nothing more than 'abstract injuries'"
-
(2004)
Doe v. Chao
-
-
-
133
-
-
72549117937
-
-
461 U.S. 95, 101-02
-
(quoting Los Angeles v. Lyons, 461 U.S. 95, 101-02 (1983)).
-
(1983)
Los Angeles v. Lyons
-
-
-
134
-
-
0000705834
-
Merit goods
-
John Eatwell et al. eds.
-
See, e.g., Richard A. Musgrave, Merit Goods, in 3 THE NEW PALGRAVE: A DICTIONARY OF ECONOMICS 452-53 (John Eatwell et al. eds., 1987). Merit goods are goods authorities want to see greater consumption of; demerit goods are goods that should be consumed less. See id.
-
(1987)
The New Palgrave: A Dictionary of Economics
, vol.3
, pp. 452-453
-
-
Musgrave, R.A.1
-
135
-
-
0003871947
-
-
See, e.g., LOUIS PHLIPS, THE ECONOMICS OF PRICE DISCRIMINATION 1 (1983) ("[G]enerally, discriminatory prices [are] required for an optimal allocation of resources in real life situations." (emphasis omitted)).
-
(1983)
The Economics of Price Discrimination
, pp. 1
-
-
Phlips, L.1
-
137
-
-
0742271634
-
Bounded rationality, standard form contracts, and unconscionability
-
1234-35, 1290, 1294
-
See, e.g., Russell Korobkin, Bounded Rationality, Standard Form Contracts, and Unconscionability, 70 U. CHI. L. REV. 1203, 1234-35, 1290, 1294 (2003)
-
(2003)
U. Chi. L. Rev.
, vol.70
, pp. 1203
-
-
Korobkin, R.1
-
138
-
-
84861977388
-
Website design as contract
-
1664
-
see also Woodrow Hartzog, Website Design as Contract, 60 AM. U. L. REV. 1635, 1664 (2011) (noting that the very design of a website might be frustrating enough to consumer choice as to be deemed unconscionable)).
-
(2011)
Am. U. L. Rev.
, vol.60
, pp. 1635
-
-
Hartzog, W.1
-
139
-
-
34250760917
-
Privacy, economics, and price discrimination on the internet
-
208 L. Jean Camp & Stephen Lewis eds.
-
See, e.g., Andrew Odlyzko, Privacy, Economics, and Price Discrimination on the Internet, in ECONOMICS OF INFORMATION SECURITY 187, 208 (L. Jean Camp & Stephen Lewis eds., 2004).
-
(2004)
Economics of Information Security
, pp. 187
-
-
Odlyzko, A.1
-
141
-
-
84877994062
-
Unpacking privacy's price
-
1328-29
-
See Jan Whittington & Chris Jay Hoofnagle, Unpacking Privacy's Price, 90 N.C. L. REV. 1327, 1328-29 (2012) (discussing how consumers' expectations of social networking services result in unanticipated costs after joining such a service)).
-
(2012)
N.C. L. Rev.
, vol.90
, pp. 1327
-
-
Whittington, J.1
Hoofnagle, C.J.2
-
142
-
-
84961388650
-
Caveat emptor.com
-
June 30
-
See, e.g., Caveat Emptor.com, ECONOMIST, June 30, 2012, at 12 (canvassing steps consumers can take to avoid dynamic price discrimination).
-
(2012)
Economist
, pp. 12
-
-
-
143
-
-
84878759256
-
-
(last updated Mar. 3, 2014)
-
See Amazon.com Privacy Notice, AMAZON.COM, http://www.amazon.com/gp/help/customer/display.html?nodeId=468496 (last updated Mar. 3, 2014) ("We receive and store certain types of information whenever you interact with us.
-
Amazon.Com Privacy Notice
-
-
-
145
-
-
84887846472
-
-
WALL ST. J., Dec. 24
-
More recently, The Wall Street Journal has uncovered extensive evidence of offers and prices changing from user to user by other companies. See Jennifer Valentino-Devries et al., Websites Vary Prices, Deals Based on Users' Information, WALL ST. J., Dec. 24, 2012, at A1.
-
(2012)
Websites Vary Prices, Deals Based on Users' information
, pp. A1
-
-
Valentino-Devries, J.1
-
146
-
-
0036045758
-
Conceptualizing privacy
-
1088-93
-
See Daniel J. Solove, Conceptualizing Privacy, 90 CAL. L. REV. 1087, 1088-93 (2002) (canvassing theories of privacy harm and finding every single one either overor under-inclusive).
-
(2002)
Cal. L. Rev.
, vol.90
, pp. 1087
-
-
Solove, D.J.1
-
147
-
-
79953138427
-
The boundaries of privacy harm
-
1132
-
See, e.g., M. Ryan Calo, The Boundaries of Privacy Harm, 86 IND. L.J. 1131, 1132 (2011).
-
(2011)
Ind. L.J.
, vol.86
, pp. 1131
-
-
Ryan Calo, M.1
-
148
-
-
0347684347
-
The death of privacy?
-
1468
-
See, e.g., A. Michael Froomkin, The Death of Privacy?, 52 STAN. L. REV. 1461, 1468 (2000) ("Privacy-destroying technologies can be divided into two categories: those that facilitate the acquisition of raw data and those that allow one to process and collate that data in interesting ways.")).
-
(2000)
Stan. L. Rev.
, vol.52
, pp. 1461
-
-
Michael Froomkin, A.1
-
149
-
-
0005462742
-
Internet privacy and the state
-
Commentary 820
-
See Paul M. Schwartz, Commentary, Internet Privacy and the State, 32 CONN. L. REV. 815, 820 (2000) ("The leading paradigm on the Internet and in the real, or offline world, conceives of privacy as a personal right to control the use of one's data.")).
-
(2000)
Conn. L. Rev.
, vol.32
, pp. 815
-
-
Schwartz, P.M.1
-
151
-
-
0345817194
-
Privacy and power: Computer databases and metaphors for information privacy
-
1419
-
Daniel J. Solove, Privacy and Power: Computer Databases and Metaphors for Information Privacy, 53 STAN. L. REV. 1393, 1419 (2001).
-
(2001)
Stan. L. Rev.
, vol.53
, pp. 1393
-
-
Solove, D.J.1
-
152
-
-
23944456610
-
Financial privacy and the theory of high-tech government surveillance
-
475
-
See supra Part III.B. 1. Peter Swire makes an analogous point in which he includes the costs associated with self-protection, entitled "cloaking costs," in his description of privacy harms. See Peter P. Swire, Financial Privacy and the Theory of High-Tech Government Surveillance, 77 WASH. U. L. Q. 461, 475 (1999).
-
(1999)
Wash. U. L. Q.
, vol.77
, pp. 461
-
-
Swire, P.P.1
-
153
-
-
77957594024
-
Broken promises of privacy: Responding to the surprising failure of anonymization
-
Compare 1703-04
-
Compare Paul Ohm, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA L. REV. 1701, 1703-04 (2010) (arguing that de-anonymizing is too routine for privacy statutes to exempt anonymized data from their ambit)
-
(2010)
Ucla L. Rev.
, vol.57
, pp. 1701
-
-
Ohm, P.1
-
154
-
-
84873888487
-
Tragedy of the data commons
-
3-4
-
Jane Yakowitz, Tragedy of the Data Commons, 25 HARV. J.L. & TECH. 1, 3-4 (2011) (asserting that the dangers of de-anonymization are overstated, and the benefits of data mining understated).
-
(2011)
Harv. J.L. & Tech.
, vol.25
, pp. 1
-
-
Yakowitz, J.1
-
155
-
-
84935185061
-
Violence and the word
-
1601
-
See Richards, supra note 11, at 1935 (discussing the public-private divide in digital surveillance); cf. Robert M. Cover, Violence and the Word, 95 YALE L.J. 1601, 1601 (1986) ("Legal interpretation takes place in a field of pain and death." (footnote omitted)).
-
(1986)
Yale L.J.
, vol.95
, pp. 1601
-
-
Cover, R.M.1
-
157
-
-
34248401523
-
-
(last updated Feb. 25, 2011)
-
See John Christman, Autonomy in Moral and Political Philosophy, STAN. ENCYCLOPEDIA PHIL., http://plato.stanford.edu/entries/autonomy-moral/ (last updated Feb. 25, 2011) ("The variety of contexts in which the concept of autonomy functions has suggested to many that there are simply a number of different conceptions of autonomy, and that the word simply refers to different elements in each such of contexts.").
-
Autonomy in Moral and Political Philosophy
-
-
Christman, J.1
-
159
-
-
26044442892
-
How much should we value autonomy?
-
July 99, available at
-
Others question autonomy as a subordinating value. See, e.g., Marina Oshana, How Much Should We Value Autonomy?, SOC. PHIL. & POL'Y, July 2003, at 99, 99, available at http://journals.cambridge.org/action/displayFulltext?type=1&pdftype=1&fid=191526&jid=SOY&volumeId=20&issueId=02&aid=191525 ("[T]he focus of this essay is on the phenomenon⋯ of being 'blinded' by the ideal of autonomy. What happens if we value autonomy too much?").
-
(2003)
Soc. Phil. & Pol'y
, pp. 99
-
-
Oshana, M.1
-
161
-
-
84864415574
-
Elucidating the concept of vulnerability: Layers not labels
-
Spring 129
-
For example, Florencia Luna defends "layers" of vulnerability over labels: "[A] way of understanding this proposal is not by thinking that someone is vulnerable, but by considering a particular situation that makes or renders someone vulnerable." See Florencia Luna, Elucidating the Concept of Vulnerability: Layers Not Labels, INT'L J. FEMINIST APPROACHES TO BIOETHICS, Spring 2009, at 121, 129.
-
(2009)
Int'l J. Feminist Approaches to Bioethics
, pp. 121
-
-
Luna, F.1
-
162
-
-
84961320524
-
-
supra note 3
-
See, e.g., BAUMEISTER & TIERNEY, supra note 3, at 1-5 (describing vulnerability studies).
-
Baumeister & Tierney
, pp. 1-5
-
-
-
163
-
-
84908271454
-
Data you can believe in: How the precision targeting of "Persuadable" voters that put obama over the top in 2012 could revolutionize the advertising industry
-
June 23
-
See generally, e.g., Jim Rutenberg, Data You Can Believe In: How The Precision Targeting of "Persuadable" Voters That Put Obama Over the Top in 2012 Could Revolutionize the Advertising Industry, N.Y. TIMES MAG., June 23, 2013, at 22 (chronicling the rise of data-driven campaigning and the migration of campaign staffers to advertising firms following the election).
-
(2013)
N.Y. Times Mag.
, pp. 22
-
-
Rutenberg, J.1
-
165
-
-
65449164925
-
-
539 U.S. 654, 656-58
-
The Supreme Court had the chance to expand or narrow the definition of commercial speech in Nike, Inc v Kasky, a case involving a corporation coming to its own defense against allegations of labor abuse. Nike, Inc v Kasky, 539 U.S. 654, 656-58 (2003). The Court declined to implement such an expansion over several dissents. Id. at 665-84.
-
(2003)
Nike, Inc v Kasky
-
-
-
166
-
-
0002775690
-
Strict liability versus negligence
-
1-2
-
Cf. Steven Shavell, Strict Liability Versus Negligence, 9 J. LEGAL STUD. 1, 1-2 (1980) (providing a classic discussion of the role of "activity level" in tort).
-
(1980)
J. Legal Stud.
, vol.9
, pp. 1
-
-
Shavell, S.1
-
167
-
-
22944455856
-
Reconciling data privacy and the first amendment
-
1182
-
Neil M. Richards, Reconciling Data Privacy and the First Amendment, 52 UCLA L. REV. 1149, 1182 (2005).
-
(2005)
Ucla L. Rev.
, vol.52
, pp. 1149
-
-
Richards, N.M.1
-
168
-
-
70849094519
-
-
532 U.S. 514, 517-18
-
Bartnicki v. Vopper, 532 U.S. 514, 517-18 (2001).
-
(2001)
Bartnicki v. Vopper
-
-
-
170
-
-
84893417051
-
Is data speech?
-
See generally Jane Bambauer, Is Data Speech?, 66 STAN. L. REV. 57 (2014).
-
(2014)
Stan. L. Rev.
, vol.66
, pp. 57
-
-
Bambauer, J.1
-
171
-
-
84871882601
-
A thinker-based approach to freedom of speech
-
See id. at 58-64. Bambauer also engages with First Amendment theory more generally, and her stated aim is to create "a satisfying analytical framework for the variety of data collection practices that will give rise to First Amendment questions." Id. at 63. She goes on, however, to adopt Seana Shiffrin's "thinker-based" approach for triggering free speech scrutiny nearly verbatim and declines to comment on the level of scrutiny that should apply to data as speech. See id. at 83, 88, 104-106 (citing Seana Valentine Shiffrin, A Thinker-Based Approach to Freedom of Speech, 27 CONST. COMMENT. 283 (2011)).
-
(2011)
Const. Comment.
, vol.27
, pp. 283
-
-
Shiffrin, S.V.1
-
172
-
-
79751509071
-
-
449 F. 2d 245 9th Cir.
-
Dietemann v. Time, Inc., 449 F. 2d 245 (9th Cir. 1971).
-
(1971)
Dietemann v. Time, Inc.
-
-
-
173
-
-
79959959201
-
-
182 F. 3d 1224 10th Cir.
-
U.S. West, Inc v FCC, 182 F. 3d 1224 (10th Cir. 1999).
-
(1999)
U.S. West, Inc v Fcc
-
-
-
175
-
-
85052408139
-
Scope of consent
-
§ 75
-
See Jack K. Levin & Lucas Martin, Scope of Consent, 75 AM. JUR. 2D Trespass § 75 (2007) ("One may become a trespasser by exceeding the scope of the consent, such as by intentionally conducting oneself in a manner differing from that allowed." (footnote omitted).
-
(2007)
Am. Jur. 2D Trespass
, vol.75
-
-
Levin, J.K.1
Martin, L.2
-
176
-
-
84867830561
-
The new intrusion
-
235
-
See id. Alternatively, one might say that society is prepared to accept Dietemann's expectation of privacy against recording technology as reasonable and compensate him accordingly. Bambauer seems to acknowledge as much in other work. See Jane Yakowitz Bambauer, The New Intrusion, 88 NOTRE DAME L. REV. 205, 235 (2012) ("The tort of intrusion reinforces norms by tracking social consensus, which means that most people will recognize what is and is not seclusion, even in new contexts. This makes the tort especially flexible and appropriate for application to new technologies.")).
-
(2012)
Notre Dame L. Rev.
, vol.88
, pp. 205
-
-
Bambauer, J.Y.1
-
177
-
-
84882385140
-
-
133 S. Ct. 1409
-
Florida v. Jardines, 133 S. Ct. 1409 (2013).
-
(2013)
Florida v. Jardines
-
-
-
178
-
-
79959959201
-
-
182 F. 3d 1224, 1229 10th Cir.
-
U.S. West, Inc v FCC, 182 F. 3d 1224, 1229 (10th Cir. 1999).
-
(1999)
U.S. West, Inc v Fcc
-
-
-
179
-
-
84860406055
-
-
131 S. Ct. 2653, 2663-64
-
Sorrell v. IMS Health Inc., 131 S. Ct. 2653, 2663-64 (2011) ("Given the legislature's expressed statement of purpose, it is apparent that [the law] imposes burdens that are based on the content of speech and that are aimed at a particular viewpoint⋯. It follows that heightened judicial scrutiny is warranted.")
-
(2011)
Sorrell v. Ims Health Inc.
-
-
-
180
-
-
57049114670
-
-
505 U.S. 377, 382-85
-
see also R.A.V v City of St. Paul, 505 U.S. 377, 382-85 (1992) (prohibiting viewpoint discrimination even for otherwise proscribable categories of speech such as "fighting words")).
-
(1992)
R.A.V v City of St. Paul
-
-
-
181
-
-
84961329218
-
-
655 F. 3d 78, 79 1st Cir.
-
See, e.g., Glik v. Cunniffe, 655 F. 3d 78, 79 (1st Cir. 2011) (videotaping the police in public)
-
(2011)
Glik v. Cunniffe
-
-
-
182
-
-
79751516791
-
-
438 F. Supp. 2d 504, 510-13 D.N.J.
-
Pomykacz v. Borough of W. Wildwood, 438 F. Supp. 2d 504, 510-13 (D.N.J. 2006) (photographing the mayor in public).
-
(2006)
Pomykacz v. Borough of W. Wildwood
-
-
-
183
-
-
84903010307
-
-
See ROBERT C. POST, DEMOCRACY, EXPERTISE, AND ACADEMIC FREEDOM: A FIRST AMENDMENT JURISPRUDENCE FOR THE MODERN STATE 1 (2012) (distinguishing "coverage," whether the First Amendment applies at all, from "protection," the level of scrutiny free speech then requires)).
-
(2012)
Democracy, Expertise, and Academic Freedom: A First Amendment Jurisprudence for the Modern State
, pp. 1
-
-
Post, R.C.1
-
185
-
-
0345848912
-
The constitutional status of commercial speech
-
38-40
-
See Robert Post, The Constitutional Status of Commercial Speech, 48 UCLA L. REV. 1, 38-40 (2000).
-
(2000)
Ucla L. Rev.
, vol.48
, pp. 1
-
-
Post, R.1
-
188
-
-
79953726595
-
-
486 U.S. 466, 475
-
See Shapero v. Ky. Bar Ass'n, 486 U.S. 466, 475 (1988) ("In assessing the potential for overreaching and undue influence, the mode of communication makes all the difference.")).
-
(1988)
Shapero v. Ky. Bar Ass'n
-
-
-
189
-
-
84961388405
-
Ad texts, tailored to location
-
Feb. 28
-
See, e.g., Tanzina Vega, Ad Texts, Tailored to Location, N.Y. TIMES, Feb. 28, 2011, at B6.
-
(2011)
N.Y. Times
, pp. B6
-
-
Vega, T.1
-
190
-
-
84961305162
-
Try it on
-
Jan.
-
See Bill Wasik, Try It On, WIRED, Jan. 2014, at 90
-
(2014)
Wired
, pp. 90
-
-
Wasik, B.1
-
191
-
-
84961306553
-
Samsung confirms it is 'Investing heavily' in wearable computers to take on google glass and apple's rumoured iWatch
-
July 9 11:40 AM
-
Mark Prigg, Samsung Confirms It Is 'Investing Heavily' in Wearable Computers to Take on Google Glass and Apple's Rumoured iWatch, DAILY MAIL ONLINE (July 9, 2013, 11:40 AM), http://www.dailymail.co.uk/sciencetech/article-2358924/Samsung-confirms-investing-heavily-wearable-computers-takes-Google-Glass-Apples-rumoured-iWatch.html.
-
(2013)
Daily Mail Online
-
-
Prigg, M.1
-
192
-
-
78149349862
-
-
558 U.S. 310
-
Citizens United v. FEC, 558 U.S. 310 (2010). In Citizens United v. FEC, the Court found inter alia that corporations constitute associations of individuals for purposes of the First Amendment. Id. at 342-65.
-
(2010)
Citizens United v. Fec
-
-
-
194
-
-
84922186341
-
Simply irresistible: Neuromarketing and the commercial speech doctrine
-
For a definition of neuromarketing, as well as a clever discussion of its intersection with commercial speech doctrine, see generally Marisa E. Main, Simply Irresistible: Neuromarketing and the Commercial Speech Doctrine, 50 DUQ. L. REV. 605 (2012).
-
(2012)
Duq. L. Rev.
, vol.50
, pp. 605
-
-
Main, M.E.1
-
195
-
-
0041577670
-
-
Roman law imposed wide-ranging duties of good faith (bonae fidei). See BARRY NICHOLAS, AN INTRODUCTION TO ROMAN LAW 176 (1962). Signs of duress (metus) and or bad faith, broadly defined (dolus), could negate a transaction. Id. Even the failure of one party to correct a misapprehension of the other party constituted bad faith. Id. I have Hugh Spitzer to thank for this point.
-
(1962)
An Introduction to Roman Law
, pp. 176
-
-
Nicholas, B.1
-
196
-
-
84927522544
-
-
Jan. 20
-
The 2013 Edelman Trust Barometer shows that of more than 31,000 respondents, only nineteen percent trust business leaders to make ethical and moral decisions. Edelman Trustbarometer: 2013 Annual Global Study, EDELMAN (Jan. 20, 2013), http://www.edelman.com/trust-downloads/global-results-2/ (showing results on slide 30 of the presentation). Twenty-three percent of respondents cited "wrong incentives for driving business decisions" as a reason for trusting business less (second only to "corruption or fraud" at twenty-seven percent). Id. at slide 12.
-
(2013)
Edelman Trustbarometer: 2013 Annual Global Study
-
-
-
197
-
-
79751519568
-
Privacy on the books and on the ground
-
303
-
See Kenneth A. Bamberger & Deirdre K. Mulligan, Privacy on the Books and on the Ground, 63 STAN. L. REV. 247, 303 (2011) ("The shortcomings of command-and-control governance⋯ are well recognized.")
-
(2011)
Stan. L. Rev.
, vol.63
, pp. 247
-
-
Bamberger, K.A.1
Mulligan, D.K.2
-
198
-
-
84859049360
-
Protecting the inner environment: What privacy regulation can learn from environmental law
-
9, 10-11, 33-37
-
Dennis D. Hirsch, Protecting the Inner Environment: What Privacy Regulation Can Learn from Environmental Law, 41 GA. L. REV. 1, 9, 10-11, 33-37 (2006) (arguing that "command-and-control type regulations would not be a good fit for the highly diverse and dynamic digital economy" due to the expense and threat to innovation)
-
(2006)
Ga. L. Rev.
, vol.41
, pp. 1
-
-
Hirsch, D.D.1
-
199
-
-
0348139875
-
Administrative substance
-
627
-
Cass R. Sunstein, Administrative Substance, 1991 DUKE L.J. 607, 627 (critiquing command-and-control regulation).
-
(1991)
Duke L.J.
, pp. 607
-
-
Sunstein, C.R.1
-
200
-
-
84874925899
-
The case for online obscurity
-
See generally Woodrow Hartzog & Frederic Stutzman, The Case for Online Obscurity, 101 CAL. L. REV. 1 (2013) (formalizing the concept of obscurity as a means to minimize the risk that information will find its way to unintended recipients)).
-
(2013)
Cal. L. Rev.
, vol.101
, pp. 1
-
-
Hartzog, W.1
Stutzman, F.2
-
201
-
-
0008213317
-
-
available at
-
See FED. TRADE COMM'N, PRIVACY ONLINE: FAIR INFORMATION PRACTICES IN THE ELECTRONIC MARKETPLACE 27-28 (2000), available at http://www.ftc.gov/sites/default/files/documents/reports/privacy-online-fair-information-practices-electronic-marketplace-federal-trade-commission-report/privacy2000text.pdf.
-
(2000)
Privacy Online: Fair Information Practices in the Electronic Marketplace
, pp. 27-28
-
-
-
202
-
-
84899022746
-
-
Mar. 31
-
See, e.g., Privacy Policy, GOOGLE (Mar. 31, 2014), http://www.google.com/policies/privacy/ (stating data collection is necessary because it enables Google to develop new and improve existing products).
-
(2014)
Privacy Policy
-
-
-
203
-
-
84961334033
-
-
(last visited Aug. 22, 2014)
-
For instance, the online auction website eBay uses data to police against shill bidding, i.e., where an auctioneer bids on his own items in order to drive up other bids. Shill Bidding Policy, EBAY, http://pages.ebay.com/help/policies/seller-shill-bidding.html (last visited Aug. 22, 2014).
-
Shill Bidding Policy
-
-
-
204
-
-
79551574209
-
The FTC and new paternalism
-
324-25
-
See generally Matthew A. Edwards, The FTC and New Paternalism, 60 ADMIN. L. REV. 323, 324-25 (2008) (illustrating the various challenges the FTC would encounter were it to try to bring claims based on behavioral economics)).
-
(2008)
Admin. L. Rev.
, vol.60
, pp. 323
-
-
Edwards, M.A.1
-
205
-
-
84961297722
-
-
Inc. 103 F.T.C. 110 app. at 174
-
Cliffdale Assocs., Inc. 103 F.T.C. 110 app. at 174 (1984) (FTC Policy Statement on Deception) (defining deception).
-
(1984)
Cliffdale Assocs
-
-
-
206
-
-
84961343416
-
-
104 F.T.C. 949 app. at 1070, 1073
-
Int'l Harvester Co., 104 F.T.C. 949 app. at 1070, 1073 (1984) (FTC Policy Statement on Unfairness) (defining unfairness).
-
(1984)
Int'l Harvester Co.
-
-
-
207
-
-
22544461059
-
Elephants and mice revisited: Law and choice of law on the internet
-
1978-79
-
Peter Swire has helpfully distinguished between "elephants," i.e., companies too big to avoid scrutiny, and "mice," who can hope to ignore the law. Peter P. Swire, Elephants and Mice Revisited: Law and Choice of Law on the Internet, 153 U. PA. L. REV. 1975, 1978-79 (2005).
-
(2005)
U. Pa. L. Rev.
, vol.153
, pp. 1975
-
-
Swire, P.P.1
-
208
-
-
85052408931
-
Federal trade commission enforcement of privacy
-
§ 4:1 Kristen J. Mathews ed.
-
Indeed, the FTC tends to seek consent orders with large companies with arguably mild privacy or security infractions, and smaller companies engaged in more flagrant behavior. See Marcia Hofmann, Federal Trade Commission Enforcement of Privacy, in Proskauer on Privacy § 4:1 (Kristen J. Mathews ed., 2013) (regularly updated summary of FTC privacy enforcement).
-
(2013)
Proskauer on Privacy
-
-
Hofmann, M.1
-
209
-
-
84879963522
-
Static versus dynamic disclosures, and how not to judge their success or failure
-
347-48
-
See Richard Craswell, Static Versus Dynamic Disclosures, and How Not to Judge Their Success or Failure, 88 WASH. L. REV. 333, 347-48 (2013).
-
(2013)
Wash. L. Rev.
, vol.88
, pp. 333
-
-
Craswell, R.1
-
210
-
-
84897687686
-
Code, nudge, or notice?
-
775-78
-
Arguably notice is about conveying information, whereas nudging is about changing behavior. See Ryan Calo, Code, Nudge, or Notice?, 99 IOWA L. REV. 773, 775-78 (2014).
-
(2014)
Iowa L. Rev.
, vol.99
, pp. 773
-
-
Calo, R.1
-
211
-
-
79958262495
-
The limits of transparency: Pitfalls and potential of disclosing conflicts of interest
-
424
-
For instance, patients might be reticent to ignore the advice of doctors who have disclosed a conflict of interest for fear of insinuating corruption. See George Loewenstein et al., The Limits of Transparency: Pitfalls and Potential of Disclosing Conflicts of Interest, 101 AM. ECON. REV. (PAPERS & PROC.) 423, 424 (2011).
-
(2011)
Am. Econ. Rev. (Papers & Proc.)
, vol.101
, pp. 423
-
-
Loewenstein, G.1
-
212
-
-
84878951120
-
-
EVGENY MOROZOV, TO SAVE EVERYTHING, CLICK HERE: THE FOLLY OF TECHNOLOGICAL SOLUTIONISM 148 (2013). There are several flaws with technology critic Evgeny Morozov's analogy as presented. There is little evidence, for instance, to suggest that Google recorded personal WiFi data on purpose, and ample evidence that the company routinely thinks through ethical dilemmas such as when and how to report government requests for censorship or user data. The problem with Google Buzz - a social network that lead to a privacy law suit - was not enough consumer testing. But analyze the observation from a different direction. When firms study consumers scientifically for gain, why should scientific norms not apply?
-
(2013)
To Save Everything, Click Here: The Folly of Technological Solutionism
, pp. 148
-
-
Morozov, E.1
-
214
-
-
84879731786
-
What the ANPRM missed: Additional needs for IRB reform
-
390
-
See Charles W. Lidz & Suzanne Garverich, What the ANPRM Missed: Additional Needs for IRB Reform, 41 J.L. MED. & ETHICS 390, 390 (2013) ("IRBs have always come under considerable criticism. Some have critiqued IRBs for using important resources inefficiently⋯. Others have critiqued the inconsistency of review of multisite projects.")).
-
(2013)
J.L. Med. & Ethics
, vol.41
, pp. 390
-
-
Lidz, C.W.1
Garverich, S.2
-
215
-
-
84961313357
-
-
Aug. 12 12:21 PM
-
Of course, these companies have other problems. See Anupam Chander, How Censorship Hurts Chinese Internet Companies, ATLANTIC (Aug. 12, 2013, 12:21 PM), http://www.theatlantic.com/china/archive/13/08/how-censorship-hurts-chinese-internet-companies/278587/.
-
(2013)
How Censorship Hurts Chinese Internet Companies
-
-
Chander, A.1
-
216
-
-
26844441347
-
-
Cf. Webster, supra note 44, at 598 (citing PHILIP M. NAPOLI, AUDIENCE ECONOMICS: MEDIA INSTITUTIONS AND THE AUDIENCE MARKETPLACE 2-3 (2003)) (distinguishing between markets in which media is sold to audiences and markets where audiences are sold to advertisers). A recent study by Juniper Networks found that free apps were between 300 and 400 percent more likely to track users than paid ones.
-
(2003)
Audience Economics: Media Institutions and the Audience Marketplace
, pp. 2-3
-
-
Napoli, P.M.1
-
218
-
-
84908175761
-
-
July 18
-
See, e.g., Mary Ellen Gordon, The History of App Pricing, and Why Most Apps Are Free, FLURRY (July 18, 2013), http://www.flurry.com/bid/99013/The-History-of-App-Pricing-And-Why-Most-Apps-Are-Free (noting that when consumers are given a choice between an advertisement free app or an app with even a nominal onetime fee, consumers overwhelmingly choose the advertisement infused free version).
-
(2013)
The History of App Pricing, and Why Most Apps Are Free
-
-
Gordon, M.E.1
-
220
-
-
0004048289
-
-
See THALER & SUNSTEIN, supra note 22, at 244-45 (citing JOHN RAWLS, A THEORY OF JUSTICE (1971)).
-
(1971)
A Theory of Justice
-
-
Rawls, J.1
-
222
-
-
33645788995
-
Behavioral economics: Human errors and market corrections
-
114-16
-
See, e.g., Richard A. Epstein, Behavioral Economics: Human Errors and Market Corrections, 73 U. CHI. L. REV. 111, 114-16 (2006) (restricting analysis of irrationality to decisions made by children and specific cases of force, fraud, or mistake)
-
(2006)
U. Chi. L. Rev.
, vol.73
, pp. 111
-
-
Epstein, R.A.1
-
223
-
-
0347487318
-
Rational choice, behavioral economics, and the law
-
1552
-
Richard A. Posner, Rational Choice, Behavioral Economics, and the Law, 50 STAN. L. REV. 1551, 1552 (1998).
-
(1998)
Stan. L. Rev.
, vol.50
, pp. 1551
-
-
Posner, R.A.1
|