Information Disclosure and the Online Customer Relationship Bruce Forman Brian Whitworth.

Slides:



Advertisements
Similar presentations
How Compliance Fits Sandra Dolson Wholesale Compliance Manager SLF Canada.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Technology SafeKEY.
1 Interpersonal Relationships.  Scientists believe that ALL relationships – both impersonal and personal – are based on the social exchange theory. ◦
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
EU research on the use of SNS by Children Dr Leslie Haddon EU Kids Online Meeting on European Social Networking Taskforce, Brussels, 26 th June, 2008.
Parachute Neighborhood Watch Presentation February 9, 2010.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
1 Disclosure and Privacy 10: Inter-Act, 13 th Edition 10: Inter-Act, 13 th Edition.
Critical Data Management Indiana University HR Summit April 24, 2014.
Course Title: WEB SECURITY Chapter No: 02 “I nternet: S ocial T hreats and S afety ” 1 Maiwand Institute Of Higher Education.
What you don’t know CAN hurt you!
Social Networking And Youth Presented by- Dhrolia Alefya
Outline of presentation Brief introduction of Facebook as a social networking tool Research questions Methods Findings and Results Some Experimentation.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Protecting your money: Identity Theft
Protecting Your Identity While Attending College.
Cyber Crimes.
Stay Safe on the Internet!
Digital Citizenship and Media Literacy
Digital Citizenship Texting vs. Sexting Cyberbullying.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Scams & Schemes Common Sense Media.
2 EVE&feature=player_detailpage.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Alyssa Speier, MS, CIP QA/QI Education Specialist Stanley Estime, MSCI QA/QI Specialist Interview, Survey, and Focus Group Research: IRB Processes and.
6: Inter-Act, 13th Edition Relationships.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Consumer Protection Shop Safely and Guard Your Financial Information.
By Tia, Amy & Carly Don’t share any of these things to anyone:  Phone number  address  Where you live  Your name  Age  Sex  Photos of yourself.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
You. are at risk for the fastest growing crimes crime.
How to Select and Use Privacy Settings EL Civics Assessment Task 3.
Cyber Safety Jamie Salazar.
1 6: Inter-Act, 13 th Edition 6: Inter-Act, 13 th Edition RelationshipsRelationships.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
Internet Safety.
Identity Theft It’s a crime!
Digital Citizenship Middle School
How to Protect Yourself from ID Theft and Social Engineering
Overview What is a privacy breach? 2. Examples of privacy breaches 3. Consequences of privacy breaches 4. Steps to handling a privacy breach.
Appropriate Use of Technology
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Information Disclosure and the Online Customer Relationship Bruce Forman Brian Whitworth

Information Disclosure Online purchasing is an increasingly significant part of trade Online purchasing is an increasingly significant part of trade The online disclosure of personal information (like name, address, credit card) is critical to online trade The online disclosure of personal information (like name, address, credit card) is critical to online trade  To purchase online, one must disclose personal data People are often unwilling to disclose personal information online for various reasons (privacy) People are often unwilling to disclose personal information online for various reasons (privacy)

Determinants of Disclosure Two reasons to disclose are: Two reasons to disclose are:  Rational Utility: There is a physical benefit to disclosure, e.g. in order to have a product shipped you must give your address  Social Utility: There is a social benefit to disclosure, e.g. one may gain a friend or become part of a group

Rational Utility Models 1 Administrative Model Administrative Model  Expected (Gain/Loss) = Probability (G/L) * Magnitude (G/L)  Decision-makers finite cognitive ability and limited information leads to satisficing Question: Why would anyone ever disclose anything unless there was a direct gain? Yet people do. Question: Why would anyone ever disclose anything unless there was a direct gain? Yet people do.

Rational Utility Models 2 Social Information Processing Social Information Processing  Plain text cues transmit at a slower rate than richer channels such as voice  Predicts online relationships should be slow to develop  Yet online interactions can achieve higher levels of intimacy/disclosure than face-to-face, and often disclose from the beginning of the interaction.

Example - Privacy contract   Gives customer risk information  They are being observed  How their data will be used  Who will be able to access data  How long data will be kept  Any consequences Assumes rational risk analysis  Yet 70-80% of people don’t read privacy contracts!  May be using marks like the TrustE symbol as a community warrantee

Social Penetration Model Relationships involve a turn-based process of mutual self-disclosure Relationships involve a turn-based process of mutual self-disclosure They progress from superficial to deeper: They progress from superficial to deeper:  Mutual disclosure  Mutual understanding  Intimacy Reciprocal disclosure – I disclose because you disclose, and you disclose because I do Reciprocal disclosure – I disclose because you disclose, and you disclose because I do Hence the value of initial self-disclosure Hence the value of initial self-disclosure

Reciprocal disclosure Disclosure by A Understanding by B Disclosure by B Understanding by A

Reasons to disclose - summary Include Include  Rational risk/benefit assessment (as in a privacy contract)  Personal relationship development (customer relationship)  Group trustworthiness recommendations (like the TrustE symbol) The first two are affected by the type of personal information The first two are affected by the type of personal information

Type of personal information - What “self” is disclosed?TypeDefinitionExamples Possible harm Physical Physical Being: In physical world that can be seen, touched and heard Home address Work address Photo Genetic data Physical: Property Damage Harassment Stalking Community Community being: In community records and documents Social Security # Birth record Student ID# Immigration # Marriage details Reputation: Criminal record Embarrassment Expulsion Surveillance Financial Economic being: In bank and insurance records Credit card Signature Passwords Financial: Credit theft Identity theft Interpersonal Social being: In the connections between people ( and phone lists). Home/Work/Cell phone address Home page site Online persona Communication: Telemarketing Obscene calls Being ostracized Spam

Preliminary study To define a baseline for how people disclose different types of information To define a baseline for how people disclose different types of information Participants asked what personal information they would disclose in a hypothetical online bulletin board NamePersonal Work Work Phone Home PhoneHome Address Cell PhonePhotograph

Results P < P < Disclosure seems to depend on degree of risk plus probability of risk. Disclosure seems to depend on degree of risk plus probability of risk. Name Persons Work Work phone Home phone Home address Cell phone Photo 51%41%41%35%10%8%6%6%

Future work 2x2 study of 2x2 study of  Risk declaration (privacy vs no privacy contract)  Risk compensation (, physical address)  Risk compensation (Site administrator provides self-photo and, physical address) Need to control for community symbols like TrustE that suggest community approval Need to control for community symbols like TrustE that suggest community approval  Note the TrustE symbol says nothing about the quality of the privacy contract.

Discussion Perceived online risk affects disclosure and trade Current online trade is lower than it should be   Because of perceived online risk Disclosure type affects degree of disclosure Rational risk models of disclosure are incomplete Social relationships reduce perceived social risk  Current interactions affect future interactions  Cheating jeopardizes relationship and all future gains. If online traders disclose personal information like self- photo/address, customers are more likely to trust and trade