Tuesday, 29 April 2025

Cookies: the crumbs you didn’t know you were leaving behind

 Do you really know what terms you’re accepting when clicking ‘ACCEPT COOKIES’..?

The not so sweet truth about cookies

Internet browsing has become a necessity in the digital age. Without thinking twice, we scroll on social media, make online purchases and Google every question that comes to our minds. However, have you ever wondered how a pair of jeans you looked up once suddenly followed you for months? Remember that time you liked one TikTok of a child tripping over, and now your feed makes you seem like a sadistic child-hater? The answer lies in cookies – not the chocolate chip kind, but the digital trackers that follow your every move online. This is because we, like modern-day Hansel and Gretel, leave a trail of digital cookie crumbs behind with each click, visit and search.

Cookies are small text files, websites place on your device to remember information about you (Miyazaki, 2008). They track user behavior, remember login credentials, and recommend personalized content. Nevertheless, behind the scenes, they also hold power on a broader scale for data tracking, behavioural profiling, and price manipulation.

When presented with a cookie banner, most users click 'accept' because it is the most convenient and easy, which makes it a classic example of default bias. Companies leverage this predictable irrationality to maintain data collection practices despite nominal consumer choice.

Sounds scary. It kind of is.

Wait… what is asymmetric information?

Let us break it down. Asymmetric information refers to economic transactions with an imbalance of information between the buyer and the seller (Bloomenthal, 2024). What does this actually mean? Let us look at an example by (Akerlof, 1970) in the used car market, where high-quality cars are described as 'peaches' whilst inferior cars are 'lemons'. Here, the party with more information about the vehicle being sold is the seller, and buyers don’t have adequate information to know whether they are being sold a peach or a lemon until after their purchase. Since consumers cannot differentiate between the qualities of the cars, adverse selection occurs. There is only one market price for all used cars, which is below the minimum price ‘peach’ sellers are willing to sell their cars at. This means the good stuff (peaches) leaves the market (Eeckhoudt et al., 2005) as no one wants to sell high-quality cars for the same price as low-quality cars.

This same logic applies to us… except now, the information imbalance is not about cars; it's about your data.

Cookies: tiny files, BIG power

Cookies track user information and behaviour, recording information such as their age, gender, address, and account numbers, to their movement between webpages, and how many times a particular ad appears while they’re online (Martin, Wu, and Alsaid, 2003). This tracking of internet users’ behaviour allows companies and third parties to create user profiles, allowing them to target ads, content, and products to specific consumers (Wadhwa, 2017).

Why? So, companies can target you with ads, products, and content they think you will click on. However, here’s the catch: while firms know a lot about you, you know nothing about what they know. Most people do not even understand what a cookie is, let alone how they are used (Hoofnagle, 2005).

And, yes, cookies do affect your wallet. Have you ever noticed that some things you see on Amazon are more expensive than the same things on someone else’s Amazon? Researchers

discovered that Amazon uses information about users’ browsing history, collected using cookies, to price the same products differently for different consumers. Those shopping for products after visiting different e-commerce websites were shown higher prices than those who only visited Amazon (Hannak et al., 2017). Even holiday websites get sneaky; the Wall Street Journal found that Orbitz, a travel booking company, used cookies to differentiate between PC and Mac users. Knowing that Mac users spent up to 30% more on hotel bookings than PC users, they displayed more expensive hotel options to Mac users (Huspeni, 2012). This represents the economic price discrimination theory, where companies practice charging different prices to different consumers for the same product.

The Negative Externalities: The Pollution of Privacy

Think of cookies as digital pollution. You are minding your own business and looking up a recipe for ice-cream, but your data is being scooped up and passed around. As economists call it, this creates a negative externality where the cost is put on third parties not involved in the transaction. In this case, the transaction is between the websites that collect and sell your data and the firms that use the data. And guess what? You are the third party! You do not know how your personal information is used, but you must deal with the negative consequences of losing your privacy and manipulating your online experience (Wehkamp, 2022).

According to the Coase theorem, if property rights are clearly stated and transaction costs are low, private parties can negotiate without the government interfering. Applying this theory to cookies, if users owned their data (property rights) and could negotiate with websites (low transaction cost), it could mean an efficient outcome for both parties. Users who highly value privacy could sell their data at a price that reflects this value, while those who care less about privacy can accept a lower compensation.

What can you do about it?

The good news is that there are ways to regain some control:

• Reject unnecessary cookies: The next time cookies pop up again on your screen, instead of clicking ‘accept cookies,’ you can just reject them.
• Install browser extensions: tools like the privacy badger can limit tracking.
• Clear cookies regularly: get rid of the crumbs you leave behind.

The final bite: what cookies really reveals

Cookies show how traditional economic relationships have changed due to digital technologies. Understanding how asymmetric information, biases in decision-making, and market power function, is important for both consumers and policymakers as our economy shifts online.

The next time a cookie banner pops up, remember you are participating in a complex economic system. The question is, who benefits from the digital crumbs you leave behind?




Bibliography:

Akerlof, G.A. (1970). The Market for ‘Lemons’: Quality Uncertainty and the Market Mechanism. The Quarterly Journal of Economics, [online] 84(3), pp.488–500. doi:https://doi.org/10.2307/1879431.

Bloomenthal, A. (2024). Asymmetric Information in Economics Explained. [online] Investopedia. Available at: https://www.investopedia.com/terms/a/asymmetricinformation.asp.

Eeckhoudt, L., Gollier, C. and Schlesinger, H. (2005). Economic and Financial Decisions under Risk. HAL (Le Centre pour la Communication Scientifique Directe). doi:https://doi.org/10.1515/9781400829217.

Hannak, A., Soeller, G., Lazer, D., Mislove, A. and Wilson, C. (2017). Hannak, A., Soeller, G., Lazer, D., Mislove, A. and Wilson, C. (2014) Measuring Price Discrimination and Steering on E-Commerce Web Sites. Proceedings of the Conference on Internet Measurement Conference, Vancouver, 5-7 November 2014, 305-318. - References - Scientific Research Publishing. [online] Scirp.org. Available at: https://www.scirp.org/reference/referencespapers?referenceid=2066911 [Accessed 2 Apr. 2025].

Hoofnagle, C.J., 2005. Privacy self-regulation: A decade of disappointment. [online] Electronic Privacy Information Center. Available at: http://www.epic.org/reports/decadedisappoint.pdf

Huspeni, A. (2012). Orbitz Tries To Charge Mac Users More. [online] Business Insider. Available at: https://www.businessinsider.com/orbitz-tries-to-charge-mac-users-more-2012-6.

Martin, D., Wu, H. and Alsaid, A. (2003). Hidden surveillance by Web sites. Communications of the ACM, 46(12), pp.258–264. doi:https://doi.org/10.1145/953460.953509.

Miyazaki, A.D. (2008). Online Privacy and the Disclosure of Cookie Use: Effects on Consumer Trust and Anticipated Patronage. Journal of Public Policy & Marketing, [online] 27(1), pp.19–33. doi:https://doi.org/10.1509/jppm.27.1.19.

Wehkamp, N. (2022). Internalization of Privacy Externalities through Negotiation. Companion Proceedings of the Web Conference 2022. doi:https://doi.org/10.1145/3487553.3524631.

Wadhwa, V. (2017). Leading Edge: Regaining Control Over Personal Data. ASEE Prism, 27(3), 21-22. doi:https://www.jstor.org/stable/26819919.

No comments:

Post a Comment

Note: only a member of this blog may post a comment.