Chapter 7: Exchange Theory and Privacy
"Exchange is not an end in itself. It is the means by which men advance their welfare."
Carl Menger, Principles of Economics (1871)^1^
Introduction
Exchange is the foundation of social cooperation.^2^ When individuals trade, they signal valuations, coordinate production, and create wealth impossible through isolated action. Price signals emerging from exchange^13^ enable the economic calculation that makes complex societies possible.
People exchange under surveillance constantly, and markets function, however imperfectly, in surveilled environments. The claim here is narrower: privacy enhances exchange. Surveillance distorts market processes in identifiable ways, and privacy protection improves many exchanges while preserving some marginal exchanges that surveillance would otherwise chill away.
7.1 The Logic of Exchange
Exchange as Mutual Benefit
Exchange occurs when parties expect to benefit. Alice values what Bob has more than what she offers; Bob values what Alice offers more than what he has. Both expect to be better off after trading than before.
Subjective value operates here directly. No objective measure exists making the exchange "fair" or "equal." Each party evaluates from their own perspective, according to their own preferences and circumstances. If both prefer to trade, both gain.
Exchange is thus positive-sum. Unlike theft or redistribution, where one party's gain is another's loss, voluntary exchange creates value for all participants. The total wealth of society increases through trade.
Exchange Requires Information
For exchange to occur, parties need information. They require knowledge of opportunity: they must know exchange is possible, find each other, communicate, and identify potential trades. They also require knowledge of terms: they must understand what is being offered and requested, since misunderstanding terms produces regret instead of mutual benefit. Finally, they require knowledge sufficient for evaluation: each party must have enough information to determine whether the exchange serves their interests.
But exchange does not require complete information. Parties routinely trade with imperfect knowledge of product quality and counterparty reliability, all under uncertain future conditions. Uncertainty is inherent in action; exchange operates within uncertainty, not by eliminating it.
Exchange Requires Deliberation
Before agreeing to trade, each party deliberates. They consider what they are giving up and what they are getting, whether this trade is better than alternatives, what the risks are and what could go wrong, and whether the trade serves their goals.
This deliberation, as Chapter 3 established, is internal.^3^ It occurs in the mind of the acting individual. The conclusions, the final valuations and choices, depend on subjective factors inaccessible to external observers.^4^
7.2 How Privacy Enhances Exchange
Protected Deliberation
Deliberation works best when protected from external interference.
If Alice knows her thinking is being monitored, her deliberation may change.^5^ She may consider how her thoughts will be perceived, avoid conclusions that might draw criticism, shape her reasoning to satisfy observers, or second-guess herself based on expected reactions.
Such thinking is performance shaped by observation, not deliberation serving Alice's interests. The "choices" emerging from monitored deliberation may not reflect Alice's actual preferences.
Privacy protects deliberation by creating space for authentic evaluation. When Alice's thinking is private, she can evaluate options according to her own standards without concern for observer reactions. Her conclusions are more likely to reflect her actual interests.
For exchange, this means: private deliberation produces better-informed trading decisions. As Chapter 3 established, deliberation is inherently internal to the actor; external observation cannot access the subjective valuation process but can distort it. Parties who can think freely evaluate opportunities more accurately than parties constrained by observation.
Negotiation Without Exposure
Negotiation is strategic interaction.^14^ Each party tries to achieve favorable terms while reaching agreement.
Effective negotiation requires controlled disclosure, because every piece of information a party reveals shifts the bargain.^6^ Revealing your maximum willingness to pay weakens your bargaining position, exposing urgency invites exploitation, showing your alternatives signals your walkaway point, and disclosing future plans enables strategic positioning by counterparties.
If all negotiation information were transparent, bargaining would tilt sharply toward the side with more patience and better alternatives, or less immediate need. Strategic interaction requires strategic information control.
Privacy enables negotiation by protecting information parties need to control. Each side can reveal what serves their interests while concealing what would weaken their position. The asymmetric disclosure is not dishonesty but appropriate boundary management: strategic interaction assumes parties manage what they reveal, and effective negotiation depends on the ability to do so.
Confidential Terms
Many exchanges benefit from confidential terms. Price confidentiality allows sellers to offer different prices to different buyers based on circumstances; if all prices were public, this flexibility would disappear and could prevent mutually beneficial trades. Custom arrangements allow terms to be tailored to specific situations, whereas public exposure would pressure parties toward standardized terms even when customization serves both parties. Revealing contract terms may inform competitors, who can then undercut or copy arrangements that required investment to develop.
Privacy enables parties to structure exchanges according to their specific needs without exposing arrangements to competitive copying or third-party interference.
Trust Building Over Time
Long-term exchange relationships require trust. Trust develops through repeated interaction and consistent performance, then deepens through graduated disclosure and mutual investment in relationship-specific assets.
Privacy supports trust building by enabling graduated disclosure. Parties can reveal more as trust increases without being forced into premature transparency. The relationship develops at its own pace, not forced by external observation.
Surveillance disrupts trust building by removing control over disclosure pace. If all interactions are observed, parties cannot manage the gradual revelation that natural trust development requires.
7.3 How Surveillance Distorts Exchange
The Chilling Effect
Surveillance chills exchange by introducing risks beyond the transaction itself.
If transactions are monitored, parties are likely to consider how the exchange will be perceived, whether the transaction could be used against them later, what inferences observers will draw, and whether the exchange is safe given who might be watching.
These considerations have nothing to do with whether the exchange benefits both parties. They are external factors imposed by surveillance that distort decision-making.
The effect, at the margin, is that some exchanges that would benefit both parties do not occur because of surveillance risk. Value that would have been created is not created. Market coordination is impaired.
Price Signal Degradation
Prices coordinate economic activity by communicating information about relative scarcity and value. Accurate prices depend on authentic exchange reflecting actual valuations.
Surveillance degrades price signals by chilling transactions that would occur without surveillance, biasing transactions toward surveilled-acceptable patterns, introducing strategic behavior to manage surveillance records, and reducing market participation by surveillance-averse parties.^7^
Prices emerging from surveilled markets reflect not just supply and demand but also surveillance avoidance. They are systematically distorted as information signals.
Strategic Behavior Shift
Under surveillance, parties shift from serving their interests to managing their records.
Instead of asking "What exchange serves my goals?", parties may ask "What exchange looks appropriate to observers?" Decision criteria are likely to shift from authentic preference toward appearance management.
Where the shift occurs, the effect is economically destructive. Resources flow not to their highest-valued uses but to their most surveillance-acceptable uses. The allocation is distorted by external judgment, not guided by participant valuations.
Third-Party Interference
Surveillance enables third-party interference with exchange.
If transactions are monitored, parties with access to monitoring data can intervene in transactions they disapprove of, tax transactions they can observe, regulate exchanges based on observed patterns, and target participants for political or competitive reasons.
This interference is possible only because surveillance provides the information enabling it. Privacy forecloses interference by denying the information it requires.
Regime Uncertainty and the Investment Chill
Robert Higgs's analysis of the Great Depression and the postwar recovery named a condition this chapter's argument depends on.^8^ Regime uncertainty is the condition in which private actors cannot predict whether the state will change the legal rules governing property, contract, regulation, and taxation. Under regime uncertainty, the expected return on long-horizon investment is discounted by the probability that the rules under which the investment pays off will be altered before the payoff arrives. Capital formation shifts toward shorter horizons, and projects whose value depends on a stable legal regime are delayed or abandoned.
Surveillance amplifies regime uncertainty along a specific axis. A transaction recorded today is a transaction that can be reinterpreted and prosecuted under whatever rules are in force at any later date. An entrepreneur who enters a line of business whose legal status is ambiguous must discount the expected return by the probability that the rules will tighten and that the records of the ambiguous period will be used to construct a case. The less private the record, the larger the discount.
The effect compounds when the categories of permissible activity shift with political weather. Speech protected in one administration invites investigation in the next. Financial flows permitted in one regulatory era become grounds for de-banking in another. The individual contemplating long-term commitment to any activity whose legal status depends on interpretation has been handed a legibility cost that the investment must overcome before it can produce a return. Privacy at the point of transaction narrows the variance of future regulatory exposure to the rules currently stated, and this is the closest substitute for stable law that a private actor can build without state cooperation.
7.4 Exchange Can Occur Under Surveillance
The claim is not that surveillance makes exchange impossible. Exchange occurs constantly under surveillance. But it is distorted.
Existing Surveilled Exchange
Most modern exchange is surveilled to some degree. Financial transactions are monitored and reported. Online purchases create data trails, while communications are subject to interception and physical movement is tracked through various means.
Markets still function in this environment. Prices emerge, goods exchange hands, and broader economic coordination still occurs.
The Distortions Are Real But Limited
The distortions described above are real. But their magnitude depends on how extensive the surveillance is, how much parties care about being observed, how likely intervention based on surveillance is, and what alternatives to surveilled exchange exist.
When surveillance is light and consequences are unlikely, distortions may be small, especially where no realistic alternatives exist. Parties then accept surveillance costs as part of doing business.
When surveillance is heavy and consequences are likely, distortions are larger, especially where alternatives exist. Parties may shift to unsurveilled channels or else forgo exchange entirely.
The Marginal Cases
Even if most exchange continues under surveillance, the marginal cases still shape outcomes:
The exchanges that do not occur are lost value. Trades that would benefit both parties are prevented by surveillance risk.
The exchanges that are distorted misallocate resources. Decisions shaped by surveillance management instead of actual preference produce inferior outcomes.
The exchanges that shift to alternatives impose adaptation costs. Resources spent creating and maintaining privacy tools are resources not available for other purposes.
Privacy protection does not make exchange possible in the abstract. It improves exchange in general and preserves some exchanges that surveillance would otherwise chill: more transactions at the margin, less distortion, more accurate prices, more efficient allocation.
7.5 Specific Exchange Contexts
Employment
Employment is ongoing exchange: labor for compensation. The relationship involves repeated negotiation and performance evaluation, along with mutual assessment that unfolds over months and years.
Privacy affects employment at every stage. A job seeker whose current employer discovers an active search may be preemptively terminated or cut off from further development. Salary negotiation requires concealing reservation wages; a candidate who reveals what they would accept anchors the offer at that floor, well below what the position would otherwise yield. Within ongoing employment, constant monitoring shifts employees from substantive work toward performance of work, optimizing for observable metrics instead of actual contribution. Meta-analyses find no significant relationship between electronic monitoring and performance but positive relationships with stress and counterproductive work behavior.^9^ Creative work, complex problem-solving, and discretionary effort all diminish under observation; the employer who monitors completely may see everything the employee does while ensuring that what the employee does has less value.
The asymmetry compounds the problem. Employers who can monitor while employees cannot observe employer intentions gain systematic advantage in wage negotiation, performance evaluation, and termination. The employee negotiating a raise cannot know whether the employer has already decided to eliminate the position; the worker asked to take on additional responsibilities cannot know whether promotion or exploitation awaits. An employee planning to leave needs confidentiality to maintain their current position while seeking alternatives, because discovery typically accelerates termination, wipes out final bonuses, and poisons references.
Professional Services
Professional services depend on confidentiality and legal systems recognize this through privilege doctrine. Attorneys cannot be compelled to reveal client communications. Physicians maintain patient confidentiality. These professions cannot function without protected disclosure.^10^
The structure is the same across the privileged professions. A client seeking legal advice must describe the facts creating the liability; a patient must describe symptoms and behavior; an investor must reveal their financial position and risk tolerance. Without protection, clients withhold relevant information, professionals advise on incomplete understanding, and the service collapses. Professional privilege was never a gift to professionals. It is institutional recognition that certain exchanges cannot function without privacy.
Business-to-Business
Business exchange involves proprietary information more complex than consumer transactions. Suppliers learn customer demand forecasts, customers learn supplier cost structures, and partners learn strategic plans. Each disclosure creates competitive vulnerability if the information reaches competitors.
Businesses handle this through graduated disclosure calibrated to relationship depth. Initial transactions reveal only what is necessary for that specific exchange. As relationships deepen and trust develops, parties share more strategic information enabling closer coordination. This graduated pattern, paralleling personal trust development, is impossible without privacy that allows parties to control what they reveal.
Price negotiation illustrates the stakes. A supplier who knows that a customer has no alternatives can extract higher prices, and a customer who knows that a supplier is desperate for revenue can demand concessions; both parties therefore conceal information about their alternatives and urgency, along with the constraints they face. Transparent negotiation would collapse into exploitation of the weaker side.
Joint ventures and partnerships require sharing information that could be exploited if the partnership fails. Development plans and customer lists, along with technical capabilities shared with partners, become competitive weapons if those partners become rivals. The exchange of information is itself the thing being traded. Without privacy protecting shared information from third parties and constraining use if the partnership ends, businesses would refuse to share what productive cooperation requires.
Supply chain relationships demonstrate how privacy enables exchange across organizational boundaries. A manufacturer sharing demand forecasts with suppliers enables those suppliers to optimize production, benefiting both parties. But those forecasts also reveal the manufacturer's expectations about their own market. Privacy allows functional disclosure to supply chain partners without strategic disclosure to competitors.
Consumer Markets
Consumer exchange appears simpler but involves privacy interests that accumulate across transactions. Any single purchase reveals little. Aggregate purchase data reveals preferences, circumstances, health conditions, political views, relationships, and vulnerabilities.
Consider how purchase patterns function as surveillance. Pharmaceutical purchases reveal health conditions; book purchases reveal intellectual interests and political leanings; grocery purchases reveal dietary restrictions that may indicate religious practice or health status. Location patterns reveal workplace and residence, along with broader associations. Financial data reveals economic status and cash flow, along with payment reliability. None of these disclosures is necessary for the transaction itself. Each is surveillance surplus extracted from the exchange.
The privacy tools that traditionally protected consumer exchange are disappearing. Cash enables purchase without identification, but cash acceptance declines as payment infrastructure shifts digital.^11^ Anonymous in-store purchase requires physical presence, but retail shifts online where every transaction is logged. Consumer privacy once required no affirmative action; now it requires deliberate tool adoption against default surveillance.
The aggregate dimension distinguishes consumer privacy from the other contexts. An employer surveilling a specific employee has a specific purpose. Corporate consumer surveillance is complete: transaction histories and location traces, along with clickstreams, are accumulated across all consumers to enable targeting, manipulation, and prediction.^15^ The consumer's privacy interest is not in any single transaction but in resisting the aggregation that turns innocuous purchases into complete profiles.
This creates collective action problems individual privacy tools cannot solve. If one consumer uses cash while others use tracked payment, the cash user maintains privacy but cannot prevent the profile construction that aggregate data enables. Consumer privacy requires either mass adoption of privacy tools or structural changes that prevent aggregation. Both face coordination challenges that employment or professional privacy does not.
Chapter Summary
Exchange is mutual benefit through trade. It requires information, deliberation, and agreement, and through price signals it coordinates production and consumption across the economy. Privacy enhances exchange at every layer: protected deliberation produces better-informed decisions, controlled disclosure lets negotiation work without collapsing into exploitation of the weaker side, confidential terms let parties structure arrangements their competitors cannot copy, and graduated revelation lets trust develop at its own pace. Surveillance distorts the same processes. Monitored deliberation shifts decisions toward appearance management, chilled transactions do not occur, and third parties intervene in exchanges they can observe.^12^^16^
The claim is comparative, not absolute. Exchange occurs under surveillance constantly; privacy does not make exchange possible but makes it better, preserving marginal transactions and reducing systematic distortion. The economic case stands independently of the normative one. Even without Chapter 4's ethical argument, the coordination gains privacy provides would justify protecting it. The axiomatic foundation in Chapter 3, the ethical prohibition in Chapter 4, and the tool-level implementation in Parts V and VI complete a picture this chapter treats strictly in economic terms.
Endnotes
^1^ Carl Menger, Principles of Economics, trans. James Dingwall and Bert F. Hoselitz (Auburn, AL: Ludwig von Mises Institute, 2007; German original 1871), chapter 4 ("The Theory of Exchange"), esp. pp. 175–191. The founding text of the Austrian School, in which Menger derives the exchange relationship from marginal utility without recourse to labor theory or equilibrium price. Mises develops the same relationship more fully in Human Action (cited at Chapter 3, note 1), 195 and part IV generally, which this chapter draws on throughout.
^2^ On exchange as the foundation of social cooperation, see Mises, Human Action (cited at Chapter 3, note 1), Part II, "Action Within the Framework of Society," and Murray N. Rothbard, Man, Economy, and State (cited at Chapter 3, note 3), chapters 2-3.
^3^ On deliberation and action, see Mises, Human Action (cited at Chapter 3, note 1), chapter 1, "Acting Man," and the analysis in Chapter 3 of this book.
^4^ On subjective value theory and exchange, see Carl Menger, Principles of Economics (cited at Chapter 3, note 5), 175-225 (the exchange chapter, distinct from the subjective-value chapter cited at Chapter 3, note 5).
^5^ On surveillance effects on behavior, see Michel Foucault, Discipline and Punish: The Birth of the Prison, trans. Alan Sheridan (New York: Vintage, 1995; French original 1975). The panopticon analysis is the standard reference for the behavioral effect of perceived observation; the economic analysis here is Austrian, not Foucauldian.
^6^ Friedrich A. Hayek, "The Use of Knowledge in Society," American Economic Review 35, no. 4 (1945): 519-530, https://www.jstor.org/stable/1809376. The canonical paper on prices as decentralized knowledge-coordination signals; the negotiation argument here extends Hayek's point that the relevant information is dispersed and cannot be aggregated by an outside observer without distorting the bargain. See also Israel M. Kirzner, Market Theory and the Price System (Indianapolis: Liberty Fund, 2011; original Van Nostrand, 1963), on the entrepreneurial function inside the price-coordinated market process.
^7^ On price signals and economic calculation, see Mises, Human Action (cited at Chapter 3, note 1), Part III, "Economic Calculation," and Mises, Socialism: An Economic and Sociological Analysis, trans. J. Kahane (Indianapolis: Liberty Fund, 1981; German original 1922), Part II. The calculation argument names the specific function prices perform that surveillance distortion impairs.
^8^ Robert Higgs, "Regime Uncertainty: Why the Great Depression Lasted So Long and Why Prosperity Resumed after the War," The Independent Review 1, no. 4 (Spring 1997): 561–590. The argument is extended in Robert Higgs, Depression, War, and Cold War: Studies in Political Economy (New York: Oxford University Press, 2006), and in "Regime Uncertainty: Pirrong Responds to Krugman," The Independent Review 16, no. 2 (Fall 2011): 243–246. Higgs is not Austrian in the strict methodological sense, but his concept is Austrian-compatible and has been taken up in Austrian political-economy writing since it was introduced. The extension to surveillance-induced uncertainty made here is this chapter's.
^9^ Daniel M. Ravid et al., "The Impact of Electronic Monitoring on Employees' Job Satisfaction, Stress, Performance, and Counterproductive Work Behavior: A Meta-Analysis," Computers in Human Behavior Reports 8 (2022). See also Paul Glavin and Scott Schieman, with Alex Bierman, "Private Eyes, They See Your Every Move: Workplace Surveillance and Worker Well-Being," Socius 10 (2024).
^10^ On attorney-client privilege, the canonical modern statement is Upjohn Co. v. United States, 449 U.S. 383 (1981), and the leading treatise treatment is John Henry Wigmore, Evidence in Trials at Common Law, ed. John T. McNaughton, vol. 8 (Boston: Little, Brown, 1961), §§2290–2329. On the federal psychotherapist-patient privilege, Jaffee v. Redmond, 518 U.S. 1 (1996). On physician-patient confidentiality as professional ethics, the Hippocratic Oath is the founding statement; the contemporary American codification is the AMA Code of Medical Ethics, Opinion 3.2.1 ("Confidentiality"). The economic-functional account given in this chapter is foreshadowed in Daniel J. Solove, Understanding Privacy (Harvard University Press, 2008), and in the contextual-integrity framework of Helen Nissenbaum, Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford University Press, 2010); both are cited at Chapter 1, note 3.
^11^ On the empirical decline of cash use, see the Federal Reserve Bank of Atlanta and Federal Reserve Bank of San Francisco, Diary of Consumer Payment Choice (annual series, 2012–present), which documents the falling cash share of consumer payments by transaction count and value. The Federal Reserve Bank of San Francisco's 2024 Findings from the Diary of Consumer Payment Choice reports cash at 16% of payments by number, down from 31% in 2016. For the comparative international picture, see Bank for International Settlements, Committee on Payments and Market Infrastructures: Red Book Statistics (annual). On the policy and institutional drivers of digital-payment substitution, Brett Scott, Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets (Harper Business, 2022), is the most accessible book-length treatment.
^12^ On surveillance as a distortion of market processes, see Shoshana Zuboff, In the Age of the Smart Machine: The Future of Work and Power (Basic Books, 1988), the foundational study of how workplace monitoring shifts employee behavior from substantive performance to performance of performance. The same mechanism operating at the level of consumer markets is the subject of Zuboff's later The Age of Surveillance Capitalism (cited in note 15 above). On chilling effects in economic behavior under legal uncertainty, see Richard A. Posner, Economic Analysis of Law, 9th ed. (Wolters Kluwer, 2014), §§1.1–1.2, on the general deterrence framework; and Higgs, "Regime Uncertainty" (cited in note 8 above), on the investment-horizon compression that surveillance of transactions produces.
^13^ Israel M. Kirzner, Competition and Entrepreneurship (Chicago: University of Chicago Press, 1973). Kirzner's central contribution is the concept of entrepreneurial alertness: profit opportunities exist in the market because prices are not yet equilibrated, and entrepreneurs who notice these gaps drive the price-coordination process. The "price signals emerging from exchange" sentence in the introduction draws on this: it is the entrepreneurial function, not a mechanical equilibrating machine, that converts dispersed valuations into useful price information. See also Kirzner, The Meaning of Market Process (Routledge, 1992), for the fuller statement of his market-process theory, and Discovery and the Capitalist Process (University of Chicago Press, 1985).
^14^ Thomas C. Schelling, The Strategy of Conflict (Cambridge: Harvard University Press, 1960). Schelling's game-theoretic analysis of bargaining, commitment, and focal points is the standard reference for strategic interaction in negotiation. His central insight - that parties in negotiation often benefit from limiting their own options, communicating credible commitments, and managing information asymmetries - grounds the argument in this section that privacy enables negotiation by letting each party control what it reveals. Schelling received the Nobel Memorial Prize in Economic Sciences in 2005. For applications to information asymmetry in bargaining specifically, see also Roger B. Myerson and Mark A. Satterthwaite, "Efficient Mechanisms for Bilateral Trading," Journal of Economic Theory 29 (1983): 265–281.
^15^ Shoshana Zuboff, The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (New York: PublicAffairs, 2019). Zuboff documents how platform firms accumulate behavioral data across all consumer interactions to build predictive profiles sold to advertisers and used for behavioral modification. Her term "surveillance capitalism" names the business model; the sentence this note anchors describes its mechanism: the aggregation of individually innocuous transactions into complete behavioral profiles. The framework of this chapter differs from Zuboff's in diagnosis and remedy - she argues for new data-property rights, this chapter locates the remedy in contract enforcement and privacy-preserving alternatives - but her empirical description of the aggregation dynamic is the reference point.
^16^ Further reading on exchange, price signals, and market process. The foundational Austrian price-theory text is Mises, Human Action (cited at Chapter 3, note 1), parts III–IV, which treats calculation, prices, and the market as an integrated process. Murray N. Rothbard, Man, Economy, and State (cited at Chapter 3, note 3), chapters 2–7, presents the same material more systematically. The nineteenth-century classical-liberal parallel is Frédéric Bastiat, Economic Harmonies, trans. W. Hayden Boyers (Foundation for Economic Education, 1964; French original 1850), which develops the argument that exchange itself constitutes society; Bastiat's Economic Sophisms (1845) is the shorter companion. On the knowledge-coordination function of prices specifically, Hayek, "The Use of Knowledge in Society" (cited in note 6 above), is the canonical paper; Hayek's "Competition as a Discovery Procedure," in New Studies in Philosophy, Politics, Economics, and the History of Ideas (University of Chicago Press, 1978), extends the argument. Israel Kirzner, Competition and Entrepreneurship (University of Chicago Press, 1973), and Discovery, Capitalism, and Distributive Justice (Blackwell, 1989), develop the entrepreneurship side of the same framework. For the mainstream treatment, Alfred Marshall, Principles of Economics, 8th ed. (Macmillan, 1920), remains the neoclassical reference; George Stigler, "The Economics of Information," Journal of Political Economy 69, no. 3 (1961): 213–225, is the mainstream starting point for information economics. For the humanistic counterweight to caricatures of market theory, Wilhelm Röpke, A Humane Economy: The Social Framework of the Free Market (Henry Regnery, 1960), develops the German ordoliberal tradition. On the behavioral literature that connects surveillance to action, Shoshana Zuboff, In the Age of the Smart Machine (Basic Books, 1988), is the earlier, pre-Surveillance Capitalism treatment and is specifically about workplace monitoring. On privacy as a condition of authentic preference expression, Alan Westin, Privacy and Freedom (cited at Chapter 1, note 1), is the classic mid-twentieth-century study; Anita L. Allen's work, cited at Chapter 1, note 3, extends the analysis.
<- **Previous: Information, Scarcity, and Property** |
-> Next: Privacy as Capital | Article
The Praxeology of Privacy -- third edition. New chapters publish daily at 1600 UTC.