Academia.eduAcademia.edu

Outline

An Economic Response to Unsolicited Communication

2000, Advances in Economic Analysis & Policy

https://doi.org/10.2202/1538-0637.1322

Abstract

If communication involves some transactions cost to both sender and recipient, what policy ensures that correct messages -those with positive social surplus -get sent? Filters block messages that harm recipients but benefit senders by more than transactions costs. Taxes can block positive value messages, and allow harmful messages through. In contrast, we propose an "Attention Bond," allowing recipients to define a price that senders must risk to deliver the initial message.

References (33)

  1. Abadi, Martin; Birrell, Andrew; Burrows, Mike; Dabek, Frank and Wobber, Ted, "Bankable Postage for Network Services." In "Advances in Computing Sci- ence ASIAN 2003," Springer-Verlag, number 2896 in Lecture Notes in Computer Science, pp. 72-90, 2003.
  2. Akerlof, George A, "The Market for "Lemons": Quality Uncertainty and the Mar- ket Mechanism." The Quarterly Journal of Economics, 84(3), pp. 488-500, 1970.
  3. Ayres, Ian and Nalebuff, Barry, Why Not? How to Use Everyday Ingenuity to Solve Problems Big and Small. Harvard Business School Press, 2003.
  4. Bazeley, M, "New Weapon for Spam: Bounty." In "San Jose Mercury News; April 26," 2003.
  5. Cranor, Lorrie Faith and LaMacchia, Brian A., "Spam!" Communications of the ACM, 41(8), pp. 74-83, 1998, URL http://doi.acm.org/10.1145/ 280324.280336.
  6. Dwork, Cynthia and Naor, Moni, "Pricing via Processing or Combatting Junk Mail." In "Advances in Cryptology -CRYPTO 1992," Springer-Verlag, number 740 in Lecture Notes in Computer Science, pp. 139-147, 1993.
  7. Fahlman, Scott E, "Selling Interrupt Rights: A Way to Control Unwanted E-Mail and Telephone Calls." IBM Systems Journal, 41(4), pp. 759-766, 2002.
  8. Friedman, E and Resnick, Paul, "The Social Cost of Cheap Pseudonyms." Jour- nal of Economics and Management Strategy, 10(2), pp. 173-199, 2001.
  9. Glassman; Manasse; Abadi; Gauthier and Sobalvarro, "The Millicent Protocol for Inexpensive Electronic Commerce." In "Fourth International WWW Confer- ence," pp. 603-618, 1995.
  10. Graham-Cumming, John, "Beating Bayesian filters." In "MIT Spam Conference," 2004.
  11. Hann, Il-Horn; Hui, Kai-Lung; Png, I.P.L. and Lee, Sang-Yong Tom, "Direct Marketing: Privacy and Competition.", 2004, mimeo: University of Southern California.
  12. Hermalin, Benjamin E. and Katz, Michael L., "Sender or Receiver: Who Should Pay to Exchange an Electronic Message?" RAND Journal of Economics, 35(3), pp. 423-447, 2004.
  13. Kraut, R; Sunder, Shyam; Morris, J; Cronin, M and Filer, D, "Markets for Attention: Will Postage for Email Help?" In "ACM Conference on CSCW," pp. 206-215, 2003.
  14. Krishnamurthy, Balachander, "SHRED: Spam Harassment Reduction via Eco- nomic Disincentives.", 2004, URL http://www.research.att.com/ ∼ bala/papers/shred-ext.pdf, Working Paper, AT&T Research.
  15. Laurie, Ben and Clayton, Richard, "Proof-of-Work Proves Not to Work." In "Workshop on Economics and Information Security," 2004, URL http:// www.dtc.umn.edu/weis2004/clayton.pdf.
  16. Lessig, Lawrence, Code and Other Laws of Cyberspace. Basic Books, 2000.
  17. Libbey, Miles, "Learning from 2003: Spamming Trends and Key Insights." 2004, URL http://spamconference.org/talks2004.html, presentation at the 2004 MIT Spam Conference.
  18. Myerson, R and Satterthwaite, M, "Efficient Mechanisms for Bilateral Trading." Journal of Economic Theory, 29, pp. 265-281, 1983.
  19. Pantel, Patrick and Lin, Dekang, "SpamCop-A Spam Classification & Organi- zation Program." In "Proceedings of AAAI-98 Workshop on Learning for Text Categorization," 1998.
  20. Rainie, Lee and Fallows, Deborah, "The CAN-SPAM Act Has Not Helped Most Email Users So Far." 2004, http://www.pewinternet.org/report display.asp?r=116.
  21. Rasmusen, Eric, "Explaining Incomplete Contracts as the Result of Contract- Reading Costs." Advances in Economic Analysis and Policy, 1(1), 2001.
  22. Rogerson, William P, "Reputation and Product Quality." Bell Journal of Eco- nomics, 14(2), pp. 508-516, 1983.
  23. Sahami, Mehran; Dumais, Susan; Heckerman, David and Horvitz, Eric, "A Bayesian Approach to Filtering Junk E-Mail." In "Proceedings of AAAI-98 Workshop on Learning for Text Categorization," 1998.
  24. Shapiro, Carl, "Consumer Information, Product Quality, and Seller Reputation." The Bell Journal of Economics, 13(1), pp. 20-35, 1982.
  25. Spence, Michael, "Job Market Signaling." The Quarterly Journal of Economics, 87(3), pp. 355-374, 1973.
  26. Stiglitz, Joseph, "The Theory of Screening, Education, and the Distribution of Income." American Economic Review, 65(3), pp. 283-300, 1975.
  27. Tompkins, Trevor and Handley, Dan, "Giving E-mail Back to the Users: Us- ing Digital Signatures to Solve the Spam Problem." First Monday, 8(9), 2003, http://firstmonday.org/issues/issue8 9/ tompkins/index.html.
  28. van Zandt, Timothy, "Information Overload in a Network of Targeted Communi- cation." RAND Journal of Economics, 35(3), pp. 542-560, 2004.
  29. von Ahn, L.; Blum, M.; Hopper, N. and Langford, J., "CAPTCHA: Using Hard AI Problems for Security." In "Proceedings of Eurocrypt," 2003, URL http: //citeseer.ist.psu.edu/vonahn03captcha.html.
  30. Williamson, O, The Economic Institutions of Capitalism. Free Press, 1985. References
  31. Myerson, R and Satterthwaite, M, "Efficient Mechanisms for Bilateral Trading." Journal of Economic Theory, 29, pp. 265-281, 1983.
  32. Rasmusen, Eric, "Explaining Incomplete Contracts as the Result of Contract-Reading Costs." Advances in Economic Analysis and Policy, 1 (1), 2001.
  33. van Zandt, Timothy, "Information Overload in a Network of Targeted Com- munication." RAND Journal of Economics, 35 (3), pp. 542-560, 2004.