It's Creepy, But it Doesn't Bother Me

Undergraduates interviewed about privacy concerns related to online data collection made apparently contradictory statements. The same issue could evoke concern or not in the span of an interview, sometimes even a single sentence. Drawing on dual-process theories from psychology, we argue that some of the apparent contradictions can be resolved if privacy concern is divided into two components we call intuitive concern, a "gut feeling," and considered concern, produced by a weighing of risks and benefits. Consistent with previous explanations of the so-called privacy paradox, we argue that people may express high considered concern when prompted, but in practice act on low intuitive concern without a considered assessment. We also suggest a new explanation: a considered assessment can override an intuitive assessment of high concern without eliminating it. Here, people may choose rationally to accept a privacy risk but still express intuitive concern when prompted.

[1]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[2]  D. Kahneman,et al.  Representativeness revisited: Attribute substitution in intuitive judgment. , 2002 .

[3]  J. Turow,et al.  Americans Reject Tailored Advertising and Three Activities that Enable It , 2009 .

[4]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[5]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[6]  G. Loewenstein,et al.  What Is Privacy Worth? , 2013, The Journal of Legal Studies.

[7]  K. Stanovich,et al.  Heuristics and Biases: Individual Differences in Reasoning: Implications for the Rationality Debate? , 2002 .

[8]  Yang Wang,et al.  Smart, useful, scary, creepy: perceptions of online behavioral advertising , 2012, SOUPS.

[9]  Clifford Nass,et al.  The media equation - how people treat computers, television, and new media like real people and places , 1996 .

[10]  D. Kahneman A perspective on judgment and choice: mapping bounded rationality. , 2003, The American psychologist.

[11]  Clifford Nass,et al.  Designing social presence of social actors in human computer interaction , 2003, CHI '03.

[12]  A. Tversky,et al.  Judgment under Uncertainty: Heuristics and Biases , 1974, Science.

[13]  Chih-Hsiung Tu,et al.  The Measurement of Social Presence in an Online Learning Environment , 2002 .

[14]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[15]  George R. Milne,et al.  Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .

[16]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[17]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[18]  Matthew L. Jensen,et al.  Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers , 2012, J. Assoc. Inf. Sci. Technol..

[19]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[20]  Irina Shklovski,et al.  Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.

[21]  鈴木 聡 Media Equation 研究の背景と動向 , 2011 .

[22]  Charles R. Crowell,et al.  Robot social presence and gender: Do females view robots differently than males? , 2008, 2008 3rd ACM/IEEE International Conference on Human-Robot Interaction (HRI).

[23]  Alessandro Acquisti,et al.  Beyond the Privacy Paradox: Objective Versus Relative Risk in Privacy Decision Making , 2018, MIS Q..

[24]  K BurgoonJudee,et al.  Toward a more robust theory and measure of social presence , 2003 .

[25]  Lorrie Faith Cranor,et al.  Location-Sharing Technologies: Privacy Risks and Controls , 2009 .

[26]  David Lyon,et al.  Everyday Surveillance: Personal data and social classifications , 2002 .

[27]  Frank Biocca,et al.  The Cyborg's Dilemma: Progressive Embodiment in Virtual Environments , 2006, J. Comput. Mediat. Commun..

[28]  Youngme Moon Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .

[29]  Sejung Marina Choi,et al.  Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures , 2005 .

[30]  Frank Biocca,et al.  Toward a More Robust Theory and Measure of Social Presence: Review and Suggested Criteria , 2003, Presence: Teleoperators & Virtual Environments.

[31]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[32]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[33]  Alessandro Acquisti,et al.  Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .

[34]  N. McGlynn Thinking fast and slow. , 2014, Australian veterinary journal.

[35]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[36]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[37]  Ellen Garbarino,et al.  Dynamic pricing in internet retail: Effects on consumer trust , 2003 .

[38]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[39]  P. C. Wason,et al.  Dual processes in reasoning? , 1975, Cognition.

[40]  Tao Zhou,et al.  Understanding users' initial trust in mobile banking: An elaboration likelihood perspective , 2012, Comput. Hum. Behav..

[41]  Julia Brande Earp,et al.  Innovative web use to learn about consumer behavior and online privacy , 2003, CACM.

[42]  Mark Lubell,et al.  Trust and Taxpaying: Testing the Heuristic Approach to Collective Action , 1998 .

[43]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.

[44]  Elgar Fleisch,et al.  Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus , 2015, Inf. Syst. J..

[45]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[46]  Sarah J. Miller,et al.  Effects of room environment on self-disclosure in a counseling analogue. , 1976 .

[47]  Antti Oulasvirta,et al.  Long-term effects of ubiquitous surveillance in the home , 2012, UbiComp.

[48]  D. Kahneman,et al.  Heuristics and Biases: The Psychology of Intuitive Judgment , 2002 .

[49]  Clifford Nass,et al.  Computers are social actors , 1994, CHI '94.

[50]  C. Farn,et al.  Investigating Initial Trust Toward E-tailers from the Elaboration Likelihood Model Perspective , 2006 .

[51]  Hirokazu Kato,et al.  Collaborative augmented reality , 2002, CACM.

[52]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..