The Cognitive Heuristics Behind Disclosure Decisions

Despite regulatory efforts to protect personal data online, users knowingly consent to disclose more personal data than they intend, and they are also prone to disclose more than they know. We consider that a reliance on cognitive heuristics is key to explaining these aspects of users’ disclosure decisions. Also, that the cues underpinning these heuristics can be exploited by organisations seeking to extract more data than is required. Through the lens of an existing credibility heuristic framework, we qualitatively analyse 23, one-to-one, semi-structured interviews. We identify six super-ordinate classes of heuristics that users rely upon during disclosures: PROMINENCE, NETWORK, RELIABILITY, ACCORDANCE, NARRATIVE, MODALITY, and a seventh non-heuristics TRADE class. Our results suggest that regulatory efforts seeking to increase the autonomy of the informed user are inapt. Instead the key to supporting users during disclosure decisions could be to positively nudge users through the cues underpinning these simple heuristics.

[1]  Alessandro Acquisti,et al.  Nudging Users Towards Privacy on Mobile Devices , 2011 .

[2]  Pelle Guldborg Hansen,et al.  Nudge and the Manipulation of Choice , 2013, European Journal of Risk Regulation.

[3]  C. Hoofnagle Identity Theft: Making the Known Unknowns Known , 2007 .

[4]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[5]  S. Sundar The MAIN Model : A Heuristic Approach to Understanding Technology Effects on Credibility , 2007 .

[6]  Gerd Gigerenzer,et al.  Heuristic decision making. , 2011, Annual review of psychology.

[7]  Daniel J. Solove Introduction: Privacy Self-Management and the Consent Dilemma , 2013 .

[8]  G. Loewenstein,et al.  The Impact of Relative Standards on the Propensity to Disclose , 2012 .

[9]  Alessandro Acquisti,et al.  Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting , 2004, Economics of Information Security.

[10]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[11]  Gerd Gigerenzer,et al.  Fast and frugal heuristics: The adaptive toolbox. , 1999 .

[12]  B. J. Fogg,et al.  Prominence-interpretation theory: explaining how people assess credibility online , 2003, CHI Extended Abstracts.

[13]  Lorrie Faith Cranor,et al.  "Little brothers watching you": raising awareness of data leaks on smartphones , 2013, SOUPS.

[14]  Jens Grossklags,et al.  What Can Behavioral Economics Teach Us about Privacy , 2008 .

[15]  Miriam J. Metzger Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce , 2006, J. Comput. Mediat. Commun..

[16]  Helena Leino-Kilpi,et al.  Understanding Privacy in Occupational Health Services , 2006, Nursing ethics.

[17]  D. Kahneman Thinking, Fast and Slow , 2011 .

[18]  H. Bernard,et al.  Techniques to Identify Themes , 2003 .

[19]  Bo Zhang,et al.  Unlocking the privacy paradox: do cognitive heuristics hold the key? , 2013, CHI Extended Abstracts.

[20]  R. Cialdini,et al.  Social influence: Social norms, conformity and compliance. , 1998 .

[21]  A. Tversky,et al.  Judgment under Uncertainty: Heuristics and Biases , 1974, Science.

[22]  Steven Furnell,et al.  Online privacy: a matter of policy? , 2012 .

[23]  O. Günther,et al.  Privacy concerns and identity in online social networks , 2009 .

[24]  Peter Mayer,et al.  Rethinking the Privacy Calculus: On the Role of Dispositional Factors and Affect , 2013, ICIS.

[25]  Daniel Kahneman,et al.  Availability: A heuristic for judging frequency and probability , 1973 .

[26]  Justin Kruger,et al.  The Effort Heuristic , 2004 .

[27]  Acquisti Carnegie NudgingPrivacy The Behavioral Economics of Personal Information , 2009 .

[28]  Alfred Kobsa,et al.  Dimensionality of information disclosure behavior , 2013, Int. J. Hum. Comput. Stud..

[29]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[30]  Robert D. Ward,et al.  Physiological responses to different WEB page designs , 2003, Int. J. Hum. Comput. Stud..

[31]  Miriam J. Metzger,et al.  Social and Heuristic Approaches to Credibility Evaluation Online , 2010 .

[32]  E. Higgins Promotion and Prevention: Regulatory Focus as A Motivational Principle , 1998 .

[33]  Rachel Greenstadt,et al.  Why we can't be bothered to read privacy policies models of privacy economics as a lemons market , 2003, ICEC '03.

[34]  I. Holloway Basic concepts for qualitative research , 1997 .

[35]  David G. Novick,et al.  Usability inspection methods after 15 years of research and practice , 2007, SIGDOC '07.

[36]  James A. Hendler,et al.  Information accountability , 2008, CACM.

[37]  On The Dimensionality Of Information Disclosure Behavior in Social Networks , 2012 .

[38]  Mary Beth Rosson,et al.  User Disbelief in Privacy Paradox: Heuristics that determine Disclosure , 2016, CHI Extended Abstracts.

[39]  Julian N. Marewski,et al.  Fast and Frugal Heuristics Are Plausible Models of Cognition: Reply To , 2022 .

[40]  Alessandro Acquisti,et al.  Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.

[41]  Laurence B McCullough,et al.  A Typology of Shared Decision Making, Informed Consent, and Simple Consent , 2004, Annals of Internal Medicine.

[42]  J. Fereday,et al.  Demonstrating Rigor Using Thematic Analysis: A Hybrid Approach of Inductive and Deductive Coding and Theme Development , 2006 .

[43]  William Roberds,et al.  Credit and Identity Theft , 2008 .

[44]  P. Lunt,et al.  Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control , 2004 .

[45]  D. R. Danielson,et al.  How do users evaluate the credibility of Web sites?: a study with over 2,500 participants , 2003, DUX '03.

[46]  Marcie Goodman Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It , 2015 .

[47]  Miriam J. Metzger,et al.  Credibility and trust of information in online environments: The use of cognitive heuristics , 2013 .