Privacy concerns and information disclosure: An illusion of control hypothesis Laura Brandimarte and Alessandro Acquisti – Carnegie Mellon University Motivation.

Slides:



Advertisements
Similar presentations
Stay safe online Personal Information Your names:.
Advertisements

Types of Science:.
Alessandro Acquisti Heinz College/CyLab Carnegie Mellon University K. U. Leuven - Interdisciplinary Privacy Course 2010 June 2010 Privacy, Nudges, and.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Lathrop Intermediate School Cyber Savvy Week December 1 – December 5, 2014 Be RespectfulBe ResponsibleBe Safe ELA & Reading Intervention Classrooms Monday,
1 Disclosure and Privacy 10: Inter-Act, 13 th Edition 10: Inter-Act, 13 th Edition.
Psychological Methods
Basic Research Methods CSE EST ISE 323 Spring 2012 Tony Scarlatos.
An empirical approach to valuing privacy Luc Wathieu Harvard Business School Harvard University Allan Friedman Kennedy School of Government Harvard University.
Students’ online profiles for employability and community Frances Chetwynd, Karen Kear, Helen Jefferis and John Woodthorpe The Open University.
Social Networks: Facebook “Facebook Grows Up” by Steven Levy “Information Revelation and Privacy in Online Social Networks (The Facebook Case)” by Ralph.
Social Networking facebook, bebo, MySpace and others.
Digital Footprints Where have you been? Where are you going?
Risk, Ambiguity and Privacy SIMS, UC Berkeley and Heinz School, CMU Jens Grossklags (with Alessandro Acquisti)
PRIVACY: What does it mean?? Molly, Julia, Erin and Andrew Project.
Alessandro Acquisti Heinz College & CyLab Carnegie Mellon University TRUST Autumn 2009 Conference The economics (and behavioral economics) of privacy.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech / Privacy.
Facebook: 5 Years Later Zach Broderick Anna Merport Michelle Strulovic.
Information Seeking Behavior of Scientists Brad Hemminger School of Information and Library Science University of North Carolina at Chapel.
Punishing Unacceptable Behavior Janhavi Nilekani and Sarah Ong.
Privacy and Rationality: Theory and Evidence Alessandro Acquisti Heinz School, Carnegie Mellon University
Research method & design in I-O Psychology Lecture 2 (Jan 28, 2002) Major ref: Riggio, Ch 2 (w/o appendix); Supplementary reading: Spector, Ch 2 (p. 22-
Research Methods in Psychology Pertemuan 3 s.d 4 Matakuliah: L0014/Psikologi Umum Tahun: 2007.
The Study of Adult Development and Aging:
Perceptions of Behavioral Advertising among CMU Community Ashwini Rao April 21, 2014.
CHAPTER FIVE (Part II) Sampling and Survey Research.
#72 Privacy concerns and information disclosure: An illusion of control hypothesis Laura Brandimarte, Alessandro Acquisti, Goerge Loewenstein, Linda Babcock.
Copyright © 2010 Pearson Education, Inc. Chapter 22 Comparing Two Proportions.
Sociological Research Methods and Techniques
Research Methodology. Refers to search for knowledge. Research is an academic activity.
電管碩一 R 凌伊亭 Social Media Use In a Mobile Broadband Environment : Examination of Determinants of Twitter and Facebook Use International Journal of.
Controlling Your Social Networking Privacy Settings Stay safe online!
Private and Personal Information Common Sense Unit l – Lesson 2 (Cross-Curricular Categories) Privacy and Security Information Literacy.
1 Chapter 1 Research Methods When sociologists do quantitative research, they generally use either surveys or precollected data.quantitative research Qualitative.
Sociological Research Methods Sociology: Chapter 2, Section 1.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Introduction to Survey Research. Survey Research is About Asking Questions About…  Behaviors  Opinions/Attitudes  Facts  Beliefs  There are lots.
Steve Allen Marc Greco Michael Dennis. 
Introduction to Social Psychology What is Social Psychology?
Research Methods In Psychology Mrs. Andrews. Psychology… The scientific study of behavior and mental processes.
Experimental Methods in Psychology. Experimental Methods- Science and Psychology One method of psychological research is naturalistic observation, which.
Nature of Science.
Principles of Sociology SOC-201
Scientific Method & Descriptive Research Methods Module 5.
Psychological Research Methods Psychology: Chapter 2, Section 2.
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
Scientific Method, Types of Experiments and Data Processing
Happy Wednesday! You will have a little time to put your posters together.
Misplaced Confidences: Privacy and the Control Paradox L. Brandimarte, A. Acquisti, and G. Loewenstein,"Misplaced Confidences: Privacy and the control.
Privacy, Rationality, and the Economics of Immediate Gratification Heinz School, CMU Alessandro Acquisti
Research Methods Chapter 2.
Psychology As Science Psychologists use the “scientific method” Steps to the scientific method: - make observations - ask question - develop hypothesis.
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Type author names here Social Research Methods Chapter 28: E-research: Internet research methods Alan Bryman Slides authored by Tom Owens.
Psychological Research. Inductive Thinking Reasoning from particular instances to a general rule. For instance, you would find a common principle without.
SCIENTIFIC METHOD RESEARCH METHODS ETHICS PSYCHOLOGICAL RESARCH.
Sociology. Sociology is a science because it uses the same techniques as other sciences Explaining social phenomena is what sociological theory is all.
The Scientific Method and Description
8 THINGS PARENTS CAN DO TO PREVENT CYBER BULLYING Belhaven Middle School, Linwood NJ from the New Jersey Principals and Supervisors Association Cyber Safety.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
Comparing Two Proportions
Network and Internet Security and Privacy
Sociological Research
A 4 Step Process (Kind of…)
Do Now Explain the difference between an independent variable and a dependent variable.
Alessandro Acquisti Heinz College Carnegie Mellon University
Putting a face to a name: students’ use of profiles in VLE forums
What’s the Big Deal About Internet Privacy?
Personal Privacy and the Public Internet
Presentation transcript:

Privacy concerns and information disclosure: An illusion of control hypothesis Laura Brandimarte and Alessandro Acquisti – Carnegie Mellon University Motivation Attitudes/behavior dichotomy: even though people seem to be very concerned about privacy violations, they reveal a lot of private information, especially on the internet. Example: online social networks According to a survey by the Pew Internet & American Life Project, April 2007, about the use of online social networks by teenagers: 82% of surveyed profile creators posted their first name online and 29% also posted their last name (11% on publicly accessible profiles); 79% included pictures of themselves; 61% published the name of their city or town; 29% posted their address and 2% added a mobile number. Possible consequences Positive –Signaling –Self-representation –Socialization But also negative –Stalking (and cyber-stalking) –Identity theft –Price discrimination –Lost employment opportunities –… Possible explanations Rational cost benefit analysis (Posner, 1978; Stigler, 1980) Awareness (Samuelson, 2001) Trust (Culnan & Armstrong PUT YEAR) “Behavioral” explanations (Acquisti, 2004) –Prospect theory (Kahneman & Tversky, 1979) and optimism bias –Hyperbolic time discounting and Immediate gratification We suggest one concurrent explanation: “ILLUSION OF CONTROL” Control over information dissemination does not necessarily imply control over information access/usage. Still, people may conflate the two concepts or they may give more importance to control over dissemination of private information than to control over access/use of that information by others, resulting in “too much” disclosure Two studies: Study 1: survey-based randomized experiment, manipulating control over mediated or unmediated publication of personal information Study 2: survey-based randomized experiment, manipulating control over probability of publication of personal information Our approach: do people respond to manipulations of control over publication of information, even if accessibility/usage don’t change – or indeed decrease? If our hypothesis is correct, we should observe larger willingness to reveal when subjects have control over publication. Design Subjects: students of Carnegie Mellon University recruited on campus Complete online survey Justification for the survey: creation of a university networking website Questions focus on students’ life on and off campus: multiple choice, Yes/No, Rating and open-end questions; include quasi-identifiers + privacy intrusive and non- intrusive questions as rated by subjects independently in a pre-study Dependent variables –Response rate (whether subject answered or not) –Admission rate (whether subject admitted to some behaviors) Explanatory variables –Treatment –Intrusiveness –Demographics (age, gender) Study 1: Profile automatically created vs. profile created by researcher Control group “No question/field is required. With the answers you provide, a profile will be automatically created for you, with no intervention by the researcher, and published on a new CMU networking website, which will only be accessible by members of the CMU community, starting from the end of April. The data will not be used in any other way.” Treatment group “No question/field is required. The answers you provide will be collected by the researcher, who will create a profile for you and publish it on a new CMU networking website, which will only be accessible by members of the CMU community, starting from the end of April. The data will not be used in any other way.” Hypothesis: Loss of control over publication should decrease willingness to disclose private information, and especially so for the most sensitive questions: It is not the publication of private information per se that disturbs people, but the fact that someone else will publish it for them Study 2: Profile automatically published vs. profile published with 50% probability Control group “The information you provide will appear on a profile that will be automatically created for you. The profile will be published on a new CMU networking website, which will only be accessible by members of the CMU community, starting at the end of this semester. The data will not be used in any other way. NO QUESTION/FIELD REQUIRES AN ANSWER.” Treatment group “The information you provide will appear on a profile that will be automatically created for you. Half of the profiles created for the participants will be randomly picked to be published on a new CMU networking website, which will only be accessible by members of the CMU community, starting at the end of this semester. The data will not be used in any other way. NO QUESTION/FIELD REQUIRES AN ANSWER.” Hypothesis: Loss of control over publication should decrease willingness to disclose private information even though, statistically, the probability of third parties accessing/using it is halved in the treatment condition Expected Results Control over publication leads to more revelation of private information, especially for privacy intrusive questions Control leads to admit more to some sensitive behaviors People seem to care more for control over publication of private information than for control over access and use of that information When someone other than themselves is responsible for the publication, or when the publication itself becomes uncertain – which reduces the probability of access/use by others – people refrain from disclosing Results from a pilot study confirm these hypotheses Response rate for each question – Study 1 Response rate for each question – Study 2 -I've never looked through a keyhole without finding someone was looking back. -- Judy Garland, actress -- -Relying on the government to protect your privacy is like asking a peeping tom to install your window blinds. -- John Perry Barlow, founder of the Electronic Frontier Foundation --