Unpicking the privacy paradox: can structuration theory help to explain location-based privacy decisions?

Social Media and Web 2.0 tools have dramatically increased the amount of previously private data that users share on the Web; now with the advent of GPS-enabled smartphones users are also actively sharing their location data through a variety of applications and services. Existing research has explored people's privacy attitudes, and shown that the way people trade their personal data for services of value can be inconsistent with their stated privacy preferences (a phenomenon known as the privacy paradox). In this paper we present a study into privacy and location sharing, using quantitative analysis to show the presence of the paradox, and qualitative analysis in order to reveal the factors that lie behind it. Our analysis indicates that privacy decision-making can be seen as a process of structuration, in that people do not make location-sharing decisions as entirely free agents and are instead heavily influenced by contextual factors (external structures) during trade-off decisions. Collectively these decisions may themselves become new structures influencing future decisions. Our work has important consequences both for the understanding of how users arrive at privacy decisions, and also for the potential design of privacy systems.

[1]  Lorrie Faith Cranor,et al.  Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.

[2]  Andrew M. Odlyzko,et al.  Privacy, economics, and price discrimination on the Internet , 2003, ICEC '03.

[3]  Kai Lung Hui,et al.  Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.

[4]  Alessandro Acquisti,et al.  Misplaced Confidences , 2013, WEIS.

[5]  Tiffany Wong,et al.  Review Essay — Helen Nissenbaum's Privacy in Context: Technology, Policy, and the Integrity of Social Life (2010) , 2011, German Law Journal.

[6]  Daniel P. Siewiorek,et al.  The implications of offering more disclosure choices for social location sharing , 2012, CHI.

[7]  Stefanos Gritzalis,et al.  Digital Privacy , 2007 .

[8]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..

[9]  Acquisti Carnegie NudgingPrivacy The Behavioral Economics of Personal Information , 2009 .

[10]  M. F. Luce,et al.  Constructive Consumer Choice Processes , 1998 .

[11]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[12]  Yvonne Rogers,et al.  From spaces to places: emerging contexts in mobile privacy , 2009, UbiComp.

[13]  John Zimmerman,et al.  Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share , 2011, UbiComp '11.

[14]  W. Orlikowski The Duality of Technology: Rethinking the Concept of Technology in Organizations , 2014 .

[15]  Craig E. Wills,et al.  A Personalized Approach to Web Privacy - Awareness, Attitudes and Actions , 2011, Inf. Manag. Comput. Secur..

[16]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[17]  Jens Grossklags,et al.  What Can Behavioral Economics Teach Us about Privacy , 2008 .

[18]  Danah Boyd,et al.  Facebook privacy settings: Who cares? , 2010, First Monday.

[19]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[20]  A. Cavoukian Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices , 2012 .

[21]  A. Kellerman,et al.  The Constitution of Society : Outline of the Theory of Structuration , 2015 .

[22]  Jessica Staddon,et al.  Indirect content privacy surveys: measuring privacy without asking about it , 2011, SOUPS.

[23]  David E. Millard,et al.  Location data and privacy: a framework for analysis , 2012 .

[24]  Trevor Darrell,et al.  Privacy in Context , 2001, Hum. Comput. Interact..

[25]  Matthew R. Jones,et al.  Giddens's Structuration Theory and Information Systems Research , 2008, MIS Q..

[26]  Gerardine DeSanctis,et al.  Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory , 1994 .

[27]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .