Privacy and human behavior in the age of information

This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people’s uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people’s concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age.

[1]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[2]  H. Kelley,et al.  The social psychology of groups , 1960 .

[3]  R. F. Murphy,et al.  Social Distance and the Veil1 , 1964 .

[4]  R. Harrison,et al.  Predicting Small Group Behavior with the Self-Disclosure Inventory , 1964 .

[5]  B. Schwartz The Social Psychology of Privacy , 1968, American Journal of Sociology.

[6]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[7]  E. Goffman Relations in Public: Microstudies of the Public Order , 1971 .

[8]  I. Altman,et al.  Social penetration: The development of interpersonal relationships , 1973 .

[9]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[10]  Sarah J. Miller,et al.  Effects of room environment on self-disclosure in a counseling analogue. , 1976 .

[11]  E. Sundstrom,et al.  Interpersonal relationships and personal space: Research review and theoretical model , 1976 .

[12]  P. Klopfer,et al.  The Concept Privacy and Its Biological Basis , 1977 .

[13]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[14]  D. Langmeyer,et al.  The effects of interaction distance and gender on self-disclosure in the dyad. , 1977, Sociometry.

[15]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[16]  I. Ajzen,et al.  Attitude-behavior relations: A theoretical analysis and review of empirical research. , 1977 .

[17]  V. Derlega,et al.  Privacy and self-disclosure in social relationships. , 1977 .

[18]  Donald J. Munro,et al.  Individualism and Holism , 1981 .

[19]  R. Posner The Economics of Privacy , 1981 .

[20]  Sara Kiesler,et al.  Social psychological aspects of computer-mediated communication , 1984 .

[21]  Alan Westin Philosophical Dimensions of Privacy: The origins of modern claims to privacy , 1984 .

[22]  Lewis A. Coser,et al.  Privacy: Studies in Social and Cultural History. , 1985 .

[23]  Privacy in Confucian and Taoist Thought , 1985 .

[24]  Barrington Moore,et al.  Privacy: Studies in Social and Cultural History. , 1986 .

[25]  John C. Traupman,et al.  A History of Private Life: From Pagan Rome to Byzantium , 1990 .

[26]  Hans-Jürgen Hippler,et al.  CONFIDENTIALITY ASSURANCES IN SURVEYS: REASSURANCE OR THREAT? , 1992 .

[27]  J. Pennebaker Putting stress into words: health, linguistic, and therapeutic implications. , 1993, Behaviour research and therapy.

[28]  P. Slovic The Construction of Preference , 1995 .

[29]  Suzanne P. Weisband,et al.  Self disclosure on computer forms: meta-analysis and implications , 1996, CHI.

[30]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[31]  T. Postmes,et al.  Deindividuation and antinormative behavior: A meta-analysis. , 1998 .

[32]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[33]  Youngme Moon Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .

[34]  Julie E. Cohen Examined Lives: Informational Privacy and the Subject as Object , 2000 .

[35]  M. Milinski,et al.  Cooperation through image scoring in humans. , 2000, Science.

[36]  G. Marx Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.

[37]  A. Joinson Self‐disclosure in computer‐mediated communication: The role of self‐awareness and visual anonymity , 2001 .

[38]  Privacy in antiquity , 2001 .

[39]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[40]  Katelyn Y. A. McKenna,et al.  Can you see the real me? Activation and expression of the "true self" on the Internet. , 2002 .

[41]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[42]  Jin H. Im,et al.  Privacy , 2002, Encyclopedia of Information Systems.

[43]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[44]  Gerald L. Lohse,et al.  Defaults, Framing and Privacy: Why Opting In-Opting Out1 , 2002 .

[45]  Eric J. Johnson,et al.  The Construction of Preference: Do Defaults Save Lives? , 2006 .

[46]  S. Margulis Privacy as a Social Issue and Behavioral Concept , 2003 .

[47]  Colin Camerer,et al.  Regulation for Conservatives: Behavioral Economics and the Case for 'Asymmetric Paternalism' , 2003 .

[48]  Molly J. Walker Wilson,et al.  Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit , 2003 .

[49]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[50]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.

[51]  Colin Potts,et al.  Privacy policies as decision-making tools: an evaluation of online privacy notices , 2004, CHI.

[52]  John Suler,et al.  The Online Disinhibition Effect , 2004, Cyberpsychology Behav. Soc. Netw..

[53]  E. Deci,et al.  Self‐determination theory and work motivation , 2005 .

[54]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[55]  宁北芳,et al.  疟原虫var基因转换速率变化导致抗原变异[英]/Paul H, Robert P, Christodoulou Z, et al//Proc Natl Acad Sci U S A , 2005 .

[56]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..

[57]  Stacey R. Finkelstein,et al.  Recommendations Implicit in Policy Defaults , 2006, Psychological science.

[58]  Acknowledgments , 2006, Molecular and Cellular Endocrinology.

[59]  J. Frattaroli Experimental disclosure and its moderators: a meta-analysis. , 2006, Psychological bulletin.

[60]  Stephen A. Weis Privacy Enhancing Technologies , 2006, IEEE Security & Privacy Magazine.

[61]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[62]  A. Shariff,et al.  PSYCHOLOGICAL SCIENCE Research Article God Is Watching You Priming God Concepts Increases Prosocial Behavior in an Anonymous Economic Game , 2022 .

[63]  R. Tourangeau,et al.  Sensitive questions in surveys. , 2007, Psychological bulletin.

[64]  Muhammad Aslam Hayat Privacy and Islam: From the Quran to data protection in Pakistan , 2007 .

[65]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[66]  Kai Lung Hui,et al.  Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..

[67]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[68]  E. Hargittai This is the pre-print copy of a chapter in Grusky, David. 2008. Social Stratification. Boulder, Colorado: Westview Press. Do not distribute on any mailing lists or post on any Web site. The Digital Reproduction of Inequality , 2008 .

[69]  N. Ellison,et al.  Social capital, self-esteem, and use of online social network sites: A longitudinal analysis , 2008 .

[70]  Zeynep Tufekci Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .

[71]  S. Shavitt,et al.  Getting too personal: Reactance to highly personalized email solicitations , 2008 .

[72]  S. Kitayama,et al.  Minimal Social Cues in the Dictator Game , 2009 .

[73]  Aleecia M. McDonald,et al.  The Cost of Reading Privacy Policies , 2009 .

[74]  Michael A. Menlowe,et al.  Philosophical Dimensions of Privacy: An Anthology , 2009 .

[75]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[76]  Alessandro Acquisti,et al.  Misplaced Confidences , 2013, WEIS.

[77]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[78]  F. Gino,et al.  Good Lamps Are the Best Police , 2010, Psychological science.

[79]  Mikko Tapani Karaiste Delete: The virtue of forgetting in the digital age , 2010 .

[80]  Jacob Kramer-Duffield,et al.  Friends only: examining a privacy-enhancing behavior in facebook , 2010, CHI.

[81]  Gregory J. Conti,et al.  Malicious interface design: exploiting the user , 2010, WWW '10.

[82]  Alessandro Acquisti,et al.  Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .

[83]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[84]  Woodrow Hartzog Website Design as Contract , 2011 .

[85]  Desney S. Tan,et al.  Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, 2008, Florence, Italy, April 5-10, 2008 , 2005, CHI 2008.

[86]  Avi Goldfarb,et al.  Online Display Advertising: Targeting and Obtrusiveness , 2011, Mark. Sci..

[87]  Jason P. Mitchell,et al.  Disclosing information about the self is intrinsically rewarding , 2012, Proceedings of the National Academy of Sciences.

[88]  G. Loewenstein,et al.  The Impact of Relative Standards on the Propensity to Disclose , 2012 .

[89]  Antti Oulasvirta,et al.  Long-term effects of ubiquitous surveillance in the home , 2012, UbiComp.

[90]  Erik Brynjolfsson,et al.  Big data: the management revolution. , 2012, Harvard business review.

[91]  R. Altman,et al.  Data-Driven Prediction of Drug Effects and Interactions , 2012, Science Translational Medicine.

[92]  Alessandro Acquisti,et al.  Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.

[93]  Ryan Calo Digital Market Manipulation , 2013 .

[94]  Daniel J. Solove,et al.  Introduction: Privacy Self-Management and the Consent Dilemma , 2013 .

[95]  G. Loewenstein,et al.  What Is Privacy Worth? , 2013, The Journal of Legal Studies.

[96]  Jeffrey T. Hancock,et al.  Self-Affirmation Underlies Facebook Use , 2013, Personality & social psychology bulletin.

[97]  danah boyd,et al.  It's Complicated: The Social Lives of Networked Teens , 2014 .

[98]  Kate M. Miltner,et al.  Critiquing Big Data: Politics, Ethics, Epistemology , 2014 .

[99]  Jennifer M. Urban,et al.  Alan Westin's Privacy Homo Economicus , 2014 .

[100]  Laurence Clennett-Sirois It's Complicated: The Social Lives of Networked Teens , 2014 .

[101]  Lois Ann Scheidt,et al.  It’s Complicated: The Social Lives of Networked Teens , 2015, New Media Soc..

[102]  J. Reeve,et al.  Solutions to problematic polypharmacy: learning from the expertise of patients. , 2015, The British journal of general practice : the journal of the Royal College of General Practitioners.