Transparency of Intentions Decreases Privacy Concerns in Ubiquitous Surveillance

An online experiment (n=1,897) was carried out to understand how data disclosure practices in ubiquitous surveillance affect users' privacy concerns. Information about the identity and intentions of a data collector was manipulated in hypothetical surveillance scenarios. Privacy concerns were found to differ across the scenarios and moderated by knowledge about the collector's identity and intentions. Knowledge about intentions exhibited a stronger effect. When no information about intentions was disclosed, the respondents postulated negative intentions. A positive effect was found for disclosing neutral intentions of an organization or unknown data collector, but not for a private data collector. The findings underline the importance of disclosing intentions of data use to users in an easily understandable manner.

[1]  Jennifer S. Tucker,et al.  Selection in the Information Age: The Impact of Privacy Concerns and Computer Experience on Applicant Reactions , 2006 .

[2]  J. Butcher,et al.  Reducing Objections to Personality Inventories with Special Instructions , 1972 .

[3]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[4]  William H. Ross,et al.  Individual differences and electronic monitoring at work , 2007 .

[5]  D. Ellsberg Decision, probability, and utility: Risk, ambiguity, and the Savage axioms , 1961 .

[6]  Lorrie Faith Cranor,et al.  A "nutrition label" for privacy , 2009, SOUPS.

[7]  A. Downs An Economic Theory of Democracy , 1957 .

[8]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[9]  R. Thaler Some empirical evidence on dynamic inconsistency , 1981 .

[10]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[11]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[12]  G. S. Taylor,et al.  Individual privacy and computer-based human resource information systems , 1989 .

[13]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[14]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[15]  Craig R. Fox,et al.  Ambiguity Aversion and Comparative Ignorance , 1995 .

[16]  David Brin,et al.  The Transparent Society , 1998 .

[17]  Alessandro Acquisti,et al.  Uncertainty, Ambiguity and Privacy , 2005, WEIS.

[18]  Hsuan-Ting Chen,et al.  Problematic Use of Social Network Sites: The Interactive Relationship Between Gratifications Sought and Privacy Concerns , 2013, Cyberpsychology Behav. Soc. Netw..

[19]  B. Caplan,et al.  Rational Ignorance versus Rational Irrationality , 2001 .

[20]  Heng Xu,et al.  Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.

[21]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[22]  Yang Wang,et al.  Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising , 2012, CHI.

[23]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[24]  Angela Paradise,et al.  (In)Visible Threats? The Third-Person Effect in Perceptions of the Influence of Facebook , 2012, Cyberpsychology Behav. Soc. Netw..

[25]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[26]  Philip E. Agre,et al.  Surveillance and Capture: Two Models of Privacy , 1994, Inf. Soc..

[27]  C. Carver,et al.  Behavioral inhibition, behavioral activation, and affective responses to impending reward and punishment: The BIS/BAS Scales , 1994 .

[28]  Tamara Dinev,et al.  Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..

[29]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[30]  Jens Riegelsberger,et al.  The researcher's dilemma: evaluating trust in computer-mediated communication , 2003, Int. J. Hum. Comput. Stud..

[31]  Wayne D. Hoyer,et al.  Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .

[32]  Colin Camerer,et al.  Recent developments in modeling preferences: Uncertainty and ambiguity , 1992 .

[33]  Emily Christofides,et al.  More Information than You Ever Wanted: Does Facebook Bring Out the Green-Eyed Monster of Jealousy? , 2009, Cyberpsychology Behav. Soc. Netw..

[34]  Jyh-Jeng Wu,et al.  Impact of Signals and Experience on Trust and Trusting Behavior , 2010, Cyberpsychology Behav. Soc. Netw..

[35]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..

[36]  D. Lyon Facing the future: Seeking ethics for everyday surveillance , 2001, Ethics and Information Technology.

[37]  Emily Christofides,et al.  Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin or Two Different Processes? , 2009, Cyberpsychology Behav. Soc. Netw..

[38]  G. Ainslie Specious reward: a behavioral theory of impulsiveness and impulse control. , 1975, Psychological bulletin.