The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios

As increasingly many Internet-of-Things (IoT) devices collect personal data, users face more privacy decisions. Personal privacy assistants can provide social cues and help users make informed decisions by presenting information about how others have decided in similar cases. To better understand which social cues are relevant and whose recommendations users are more likely to follow, we presented 1000 online participants with nine IoT data-collection scenarios. Some participants were told the percentage of experts or friends who allowed data collection in each scenario, while other participants were provided no social cue. At the conclusion of each scenario, participants were asked whether they would allow the described data collection. Our results help explain under what circumstances users are more or less likely to be swayed by the reported behavior of others in similar scenarios. For example, our results indicate that when friends denied data collection, our participants were more influenced than when friends allowed data collection. On the other hand, participants were more influenced by experts when they allowed data collection. We also observed that influence could get stronger or wear off when participants were exposed to a sequence of scenarios. For example, when experts and friends repeatedly allowed data collection in scenarios with clear risk or denied it in scenarios with clear benefits, participants were less likely to be influenced by them in subsequent scenarios.

[1]  John M. Levine,et al.  Social support and conformity: The role of independent assessment of reality , 1971 .

[2]  Edward Lank,et al.  Privacy Personas: Clustering Users via Attitudes and Behaviors toward Security Practices , 2016, CHI.

[3]  M. Angela Sasse,et al.  Desperately seeking assurances: Segmenting users by their information-seeking preferences , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.

[4]  Roger Ratcliff,et al.  Statistical mimicking of reaction time data: Single-process models, parameter variability, and mixtures , 1995, Psychonomic bulletin & review.

[5]  Bill Tomlinson,et al.  Who are the Turkers? Worker Demographics in Amazon Mechanical Turk , 2009 .

[6]  Herman Aguinis,et al.  Best Practice Recommendations for Designing and Implementing Experimental Vignette Methodology Studies , 2014 .

[7]  Todd Lucas,et al.  Self‐efficacy and independence from social influence: Discovery of an efficacy–difficulty effect , 2006 .

[8]  V. L. Allen Situational Factors In Conformity1 , 1965 .

[9]  Alfred Kobsa,et al.  Understanding user privacy in Internet of Things environments , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[10]  Hauke R. Heekeren,et al.  How Expert Advice Influences Decision Making , 2012, PloS one.

[11]  Diego Andres Perez Ruiz Statistical Rethinking: A Bayesian Course with Examples in R and Stan Richard McElreath CRC Press, 2015, 469 pages, £67.99, hardcover ISBN: 978-1-482-25344-3 , 2017 .

[12]  Andrew T. Hartnett,et al.  This PDF file includes: Materials and Methods SOM Text Figs. S1 to S12 Table S1 Full Reference List , 2022 .

[13]  Robert S. Baron,et al.  The forgotten variable in conformity research: Impact of task importance on social influence. , 1996 .

[14]  Laura A. Dabbish,et al.  Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.

[15]  Ponnurangam Kumaraguru,et al.  Privacy Indexes: A Survey of Westin's Studies , 2005 .

[16]  Joseph A. Konstan,et al.  Collaborative Filtering: Supporting Social Navigation in Large, Crowded Infospaces , 2003, Designing Information Spaces.

[17]  N. Lazar,et al.  Methods and Criteria for Model Selection , 2004 .

[18]  Izak Benbasat,et al.  A Research Agenda for Trust in Online Environments , 2008, J. Manag. Inf. Syst..

[19]  Tao Zhou,et al.  An Empirical Examination of Initial Trust in Mobile Banking , 2011, Internet Res..

[20]  D. Moore,et al.  Effects of Task Difficulty on Use of Advice , 2007 .

[21]  Alfred Kobsa,et al.  With a little help from my friends: can social navigation inform interpersonal privacy preferences? , 2011, CSCW.

[22]  Judy Kay,et al.  Viewing and Controlling Personal Sensor Data: What Do Users Want? , 2013, PERSUASIVE.

[23]  Michael D. Buhrmester,et al.  Amazon's Mechanical Turk , 2011, Perspectives on psychological science : a journal of the Association for Psychological Science.

[24]  V. Isaeva Self-organization in biological systems , 2012, Biology Bulletin.

[25]  Diane M. Mackie,et al.  Systematic and nonsystematic processing of majority and minority persuasive communications. , 1987 .

[26]  Yaniv,et al.  Advice Taking in Decision Making: Egocentric Discounting and Reputation Formation. , 2000, Organizational behavior and human decision processes.

[27]  J. Baron Thinking and Deciding , 2023 .

[28]  Elizabeth D. Mynatt,et al.  Supporting Privacy Management via Community Experience and Expertise , 2005 .

[29]  E. Renold,et al.  The use of vignettes in qualitative research , 1999 .

[30]  R. L. Winkler,et al.  Combining Economic Forecasts , 1986 .

[31]  R. Burt Structural Holes versus Network Closure as Social Capital , 2001 .

[32]  Serge Egelman,et al.  Information Disclosure Concerns in The Age of Wearable Computing , 2016 .

[33]  Albert E. Mannes Are We Wise About the Wisdom of Crowds? The Use of Group Judgments in Belief Revision , 2009, Manag. Sci..

[34]  Heather Richter Lipford,et al.  The impact of social navigation on privacy policy configuration , 2010, SOUPS.

[35]  Lorrie Faith Cranor,et al.  Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.

[36]  Panagiotis G. Ipeirotis,et al.  Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.

[37]  H. Kelman Compliance, identification, and internalization three processes of attitude change , 1958 .

[38]  A. Jenness,et al.  The role of discussion in changing opinion regarding a matter of fact. , 1932 .

[39]  Laura A. Dabbish,et al.  The Role of Social Influence in Security Feature Adoption , 2015, CSCW.

[40]  Jeffrey T. Hancock,et al.  Should I Share That? Prompting Social Norms That Influence Privacy Behaviors on a Social Networking Site , 2017, J. Comput. Mediat. Commun..

[41]  Eleanor McLellan,et al.  Codebook Development for Team-Based Qualitative Analysis , 1998 .

[42]  Eran Toch,et al.  Susceptibility to Social Influence of Privacy Behaviors: Peer versus Authoritative Sources , 2017, CSCW.

[43]  Claudio J. Tessone,et al.  Effects of Social Influence on the Wisdom of Crowds , 2012, ArXiv.

[44]  R L Sielken,et al.  Estimation of "safe doses" in carcinogenic experiments. , 1977, Journal of environmental pathology and toxicology.

[45]  Ilaria Torre,et al.  Supporting users to take informed decisions on privacy settings of personal devices , 2018, Personal and Ubiquitous Computing.

[46]  Sally Andrews,et al.  To transform or not to transform: using generalized linear mixed models to analyse reaction time data , 2015, Front. Psychol..

[47]  B. Latané The psychology of social impact. , 1981 .

[48]  Anupam Das,et al.  Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice , 2018, IEEE Pervasive Computing.

[49]  Paul Hewson Statistical Rethinking: a Bayesian Course with Examples in R and Stan R. McElreath, 2015 Boca Raton Chapman and Hall–CRC 470 pp., £60.99 ISBN 978‐1‐482‐25344‐3 , 2016 .

[50]  R. Nickerson Confirmation Bias: A Ubiquitous Phenomenon in Many Guises , 1998 .

[51]  Helmut Jungermann,et al.  Using Expertise and Experience for Giving and Taking Advice , 2014 .

[52]  Paul Dourish,et al.  Social navigation as a model for usable security , 2005, SOUPS '05.

[53]  D. Helbing,et al.  How social influence can undermine the wisdom of crowd effect , 2011, Proceedings of the National Academy of Sciences.

[54]  Richard P. Larrick,et al.  Intuitions About Combining Opinions: Misappreciation of the Averaging Principle , 2006, Manag. Sci..

[55]  L. Weingart,et al.  Representational gaps, information processing, and conflict in functionally diverse teams , 2007 .

[56]  Rodney X. Sturdivant,et al.  Applied Logistic Regression: Hosmer/Applied Logistic Regression , 2005 .

[57]  Noah J. Goldstein,et al.  Social influence: compliance and conformity. , 2004, Annual review of psychology.

[58]  L. Festinger A Theory of Social Comparison Processes , 1954 .

[59]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[60]  Robin Martin,et al.  Levels of consensus and majority and minority influence. , 2002 .

[61]  Amar Cheema,et al.  Data collection in a flat world: the strengths and weaknesses of mechanical turk samples , 2013 .

[62]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[63]  Nora A Draper,et al.  From Privacy Pragmatist to Privacy Resigned: Challenging Narratives of Rational Choice in Digital Privacy Debates , 2017 .

[64]  S. Asch Studies of independence and conformity: I. A minority of one against a unanimous majority. , 1956 .

[65]  Bert H. Hodges,et al.  Speaking from ignorance: not agreeing with others we believe are correct. , 2014, Journal of personality and social psychology.

[66]  Alfred Kobsa,et al.  Privacy preference modeling and prediction in a simulated campuswide IoT environment , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[67]  Oded Nov,et al.  The Effect of Exposure to Social Annotation on Online Informed Consent Beliefs and Behavior , 2016, CSCW.

[68]  Richard P. Larrick,et al.  Cognitive Repairs : How Organizational Practices Can Compensate for Individual Shortcomings , 1998 .

[69]  Dirk Helbing,et al.  Collective Information Processing and Pattern Formation in Swarms, Flocks, and Crowds , 2009, Top. Cogn. Sci..

[70]  Bart P. Knijnenburg Privacy? I Can’t Even! Making a Case for User-Tailored Privacy , 2017, IEEE Security & Privacy.

[71]  Lujo Bauer,et al.  Privacy Expectations and Preferences in an IoT World , 2017, SOUPS.

[72]  Klaus Wehrle,et al.  Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.

[73]  S. Bikhchandani,et al.  You have printed the following article : A Theory of Fads , Fashion , Custom , and Cultural Change as Informational Cascades , 2007 .

[74]  J. R. Landis,et al.  The measurement of observer agreement for categorical data. , 1977, Biometrics.

[75]  Claudio J. Tessone,et al.  Quantifying the effects of social influence , 2013, Scientific Reports.

[76]  Richard McElreath Statistical rethinking: A bayesian course with R examples , 2015 .

[77]  David W. Hosmer,et al.  Applied Logistic Regression , 1991 .

[78]  Albert E. Mannes,et al.  Judgmental aggregation strategies depend on whether the self is involved , 2011 .

[79]  Alessandro Acquisti,et al.  Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions , 2016, SOUPS.

[80]  Damla Turgut,et al.  Investigating the Value of Privacy within the Internet of Things , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[81]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[82]  Ulf Toelch,et al.  Decreased environmental variability induces a bias for social information use in humans , 2009 .

[83]  R. R. Blake,et al.  Task difficulty and conformity pressures. , 1958, Journal of abnormal psychology.

[84]  Michael Vitale,et al.  The Wisdom of Crowds , 2015, Cell.

[85]  N. Harvey,et al.  Taking Advice: Accepting Help, Improving Judgment, and Sharing Responsibility☆☆☆ , 1997 .

[86]  Muzafer Sherif,et al.  A study of some social factors in perception. , 1935 .

[87]  Predrag V. Klasnja,et al.  Exploring Privacy Concerns about Personal Sensing , 2009, Pervasive.

[88]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[89]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[90]  M. Deutsch,et al.  A study of normative and informational social influences upon individual judgement. , 1955, Journal of abnormal psychology.

[91]  Elizabeth D. Mynatt,et al.  Challenges in supporting end-user privacy and security management with social navigation , 2009, SOUPS.

[92]  Richard Chow,et al.  The Last Mile for IoT Privacy , 2017, IEEE Security & Privacy.