Preference-based location sharing: are more privacy options really better?

We examine the effect of coarse-grained vs. fine-grained location sharing options on users' disclosure decisions when configuring a sharing profile in a location-sharing service. Our results from an online user experiment (N=291) indicate that users who would otherwise select one of the finer-grained options will employ a compensatory decision strategy when this option is removed. This means that they switch either in the direction of more privacy and less benefit, or less privacy and more benefit, depending on the subjective distance between the omitted option and the remaining options. This explanation of users' disclosure behavior is in line with fundamental decision theories, as well as the well-established notion of "privacy calculus". Two alternative hypotheses that we tested were not supported by our experimental data.

[1]  Alessandro Acquisti,et al.  Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .

[2]  Gregory D. Abowd,et al.  Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service , 2005, UbiComp.

[3]  Lorrie Faith Cranor,et al.  Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.

[4]  V. Srinivasan,et al.  A CONJUNCTIVE-COMPENSATORY APPROACH TO THE SELF-EXPLICATION OF MULTIATTRIBUTED PREFERENCES* , 1988 .

[5]  G. Loewenstein,et al.  Misplaced Confidences: Privacy and the Control Paradox. , 2010 .

[6]  M. F. Luce,et al.  Constructive Consumer Choice Processes , 1998 .

[7]  R. Luce,et al.  The Choice Axiom after Twenty Years , 1977 .

[8]  Jens Grossklags,et al.  What Can Behavioral Economics Teach Us about Privacy , 2008 .

[9]  R. Duncan Luce,et al.  Individual Choice Behavior: A Theoretical Analysis , 1979 .

[10]  Lorrie Faith Cranor,et al.  Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.

[11]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[12]  Alfred Kobsa,et al.  Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems , 2013, TIIS.

[13]  George P. Huber,et al.  Multi-Attribute Utility Models: A Review of Field and Field-Like Studies , 1974 .

[14]  R. Luce,et al.  Individual Choice Behavior: A Theoretical Analysis. , 1960 .

[15]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[16]  S. Davies Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity , 1997 .

[17]  Joel Huber,et al.  Market Boundaries and Product Choice: Illustrating Attraction and Substitution Effects , 1983 .

[18]  Lorrie Faith Cranor,et al.  Location-Sharing Technologies: Privacy Risks and Controls , 2009 .

[19]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.

[20]  Lorrie Faith Cranor,et al.  Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.

[21]  A. Tversky Elimination by aspects: A theory of choice. , 1972 .

[22]  Rui Aguiar,et al.  Low-latency privacy-enabled Context Distribution Architecture , 2012, 2012 IEEE International Conference on Communications (ICC).

[23]  Lorrie Faith Cranor,et al.  Empirical models of privacy in location sharing , 2010, UbiComp.

[24]  Daniel P. Siewiorek,et al.  The implications of offering more disclosure choices for social location sharing , 2012, CHI.

[25]  I. Simonson,et al.  Choice Based on Reasons: The Case of Attraction and Compromise Effects , 1989 .

[26]  B. Schwartz The Paradox of Choice: Why More Is Less , 2004 .

[27]  A. Acquisti,et al.  Digital privacy : theory, technologies, and practices , 2007 .

[28]  Alfred Kobsa,et al.  Don't Disturb My Circles! Boundary Preservation Is at the Center of Location-Sharing Concerns , 2012, ICWSM.

[29]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[30]  Aniket Kittur,et al.  Crowdsourcing user studies with Mechanical Turk , 2008, CHI.

[31]  Alfred Kobsa,et al.  Methodological reflections on a field study of a globally distributed software project , 2011, Inf. Softw. Technol..

[32]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[33]  Alistair Kelman,et al.  Database Nation: The Death of Privacy in the 21st Century , 2000, J. Inf. Law Technol..

[34]  M. Carlson,et al.  Panopticon.com: Online Surveillance and the Commodification of Privacy , 2002 .

[35]  Bas van Schoonhoven,et al.  User Privacy in Applications for Well-being and Well-working : Requirements and Approaches for User Controlled Privacy , 2012 .

[36]  Tristan Henderson,et al.  Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.

[37]  Kai-Lung Hui,et al.  Internet opt-in and opt-out: investigating the roles of frames, defaults and privacy concerns , 2006, SIGMIS CPR '06.

[38]  A. Chernev When More Is Less and Less Is More: the Role of Ideal Point Availability and Assortment in Consumer Choice This Research Argues That Choices from Different Size Assort- Ments Are a Function of the Degree to Which Consumers Have , 2022 .

[39]  Luís Fernandes Sousa PRIVACY POLICY DYNAMICS IN LOCATION SHARING APPLICATIONS , 2009 .

[40]  Alessandro Acquisti,et al.  Nudging Users Towards Privacy on Mobile Devices , 2011 .

[41]  Alfred Kobsa,et al.  Uncovering privacy attitudes and practices in instant messaging , 2005, GROUP.

[42]  Aarathi Prasad Exposing privacy concerns in mHealth data sharing , 2012 .