Exploitation Business: Leveraging Information Asymmetry
- URL: http://arxiv.org/abs/2310.09802v2
- Date: Sun, 16 Jun 2024 09:42:51 GMT
- Title: Exploitation Business: Leveraging Information Asymmetry
- Authors: Kwangseob Ahn,
- Abstract summary: "Exploitation Business" focuses on businesses targeting non-experts or fraudsters who capitalize on information asymmetry to sell their products or services to desperate individuals.
This phenomenon thrives on individuals' limited access to information, lack of expertise, and Fear of Missing Out (FOMO)
The recent advancement of social media and the rising trend of fandom business have accelerated the proliferation of such exploitation business models.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: This paper investigates the "Exploitation Business" model, which capitalizes on information asymmetry to exploit vulnerable populations. It focuses on businesses targeting non-experts or fraudsters who capitalize on information asymmetry to sell their products or services to desperate individuals. This phenomenon, also described as "profit-making activities based on informational exploitation," thrives on individuals' limited access to information, lack of expertise, and Fear of Missing Out (FOMO). The recent advancement of social media and the rising trend of fandom business have accelerated the proliferation of such exploitation business models. Discussions on the empowerment and exploitation of fans in the digital media era present a restructuring of relationships between fans and media creators, highlighting the necessity of not overlooking the exploitation of fans' free labor. This paper analyzes the various facets and impacts of exploitation business models, enriched by real-world examples from sectors like cryptocurrency and GenAI, thereby discussing their social, economic, and ethical implications. Moreover, through theoretical backgrounds and research, it explores similar themes like existing exploitation theories, commercial exploitation, and financial exploitation to gain a deeper understanding of the "Exploitation Business" subject.
Related papers
- Persuasion with Large Language Models: a Survey [49.86930318312291]
Large Language Models (LLMs) have created new disruptive possibilities for persuasive communication.
In areas such as politics, marketing, public health, e-commerce, and charitable giving, such LLM Systems have already achieved human-level or even super-human persuasiveness.
Our survey suggests that the current and future potential of LLM-based persuasion poses profound ethical and societal risks.
arXiv Detail & Related papers (2024-11-11T10:05:52Z) - Understanding the Factors Influencing Self-Managed Enterprises of Crowdworkers: A Comprehensive Review [49.623146117284115]
This paper investigates the shift in crowdsourcing towards self-managed enterprises of crowdworkers (SMECs)
It reviews the literature to understand the foundational aspects of this shift, focusing on identifying key factors that may explain the rise of SMECs.
The study aims to guide future research and inform policy and platform development, emphasizing the importance of fair labor practices in this evolving landscape.
arXiv Detail & Related papers (2024-03-19T14:33:16Z) - On the Societal Impact of Open Foundation Models [93.67389739906561]
We focus on open foundation models, defined here as those with broadly available model weights.
We identify five distinctive properties of open foundation models that lead to both their benefits and risks.
arXiv Detail & Related papers (2024-02-27T16:49:53Z) - Carthago Delenda Est: Co-opetitive Indirect Information Diffusion Model
for Influence Operations on Online Social Media [6.236019068888737]
We introduce Diluvsion, an agent-based model for contested information propagation efforts on Twitter-like social media.
We account for engagement metrics in influencing stance adoption, non-social tie spreading of information, neutrality as a stance that can be spread, and themes that are analogous to media's framing effect and are symbiotic with respect to stance propagation.
arXiv Detail & Related papers (2024-02-02T21:15:24Z) - Ethical Considerations of AR Applications in Smartphones; A Systematic
Literature Review of Consumer Perspectives [0.0]
This study focuses on the ethical considerations that a consumer perceives with augmented reality (AR) in the context of smartphone applications.
This research can provide an understanding and ability for developers, product managers, digital marketers and associated business professionals.
arXiv Detail & Related papers (2023-06-06T11:22:58Z) - Navigating Surveillance Capitalism: A Critical Analysis through
philosophical perspectives in Computer Ethics [0.0]
Surveillance capitalism is the practice of collecting and analyzing massive amounts of user data.
Tech companies like Google and Facebook use users' personal information to deliver personalized content and advertisements.
Another example of surveillance capitalism is the use of military technology to collect and analyze data for national security purposes.
arXiv Detail & Related papers (2023-05-05T18:37:56Z) - The Battle of Information Representations: Comparing Sentiment and
Semantic Features for Forecasting Market Trends [0.5249805590164902]
We study whether semantic features in the form of contextual embeddings are more valuable than sentiment attributes for forecasting market trends.
We consider the corpus of Twitter posts related to the largest companies by capitalization from NASDAQ and their close prices.
Our results show that in the substantially prevailing number of cases, the use of sentiment features leads to higher metrics.
arXiv Detail & Related papers (2023-03-24T18:30:15Z) - Personal autonomy and surveillance capitalism: possible future
developments [0.0]
I focus on the threat imposed on the autonomy of human beings in the context of surveillance capitalism.
I provide an analysis of the reasons why this threat exists and what consequences we could face if we take no action against such practices.
arXiv Detail & Related papers (2023-02-17T15:27:14Z) - Fighting Money Laundering with Statistics and Machine Learning [95.42181254494287]
There is little scientific literature on statistical and machine learning methods for anti-money laundering.
We propose a unifying terminology with two central elements: (i) client risk profiling and (ii) suspicious behavior flagging.
arXiv Detail & Related papers (2022-01-11T21:31:18Z) - Understanding the origin of information-seeking exploration in
probabilistic objectives for control [62.997667081978825]
An exploration-exploitation trade-off is central to the description of adaptive behaviour.
One approach to solving this trade-off has been to equip or propose that agents possess an intrinsic 'exploratory drive'
We show that this combination of utility maximizing and information-seeking behaviour arises from the minimization of an entirely difference class of objectives.
arXiv Detail & Related papers (2021-03-11T18:42:39Z) - Explainable Patterns: Going from Findings to Insights to Support Data
Analytics Democratization [60.18814584837969]
We present Explainable Patterns (ExPatt), a new framework to support lay users in exploring and creating data storytellings.
ExPatt automatically generates plausible explanations for observed or selected findings using an external (textual) source of information.
arXiv Detail & Related papers (2021-01-19T16:13:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.