Proactive vs. reactive personalization: Can customization of privacy enhance user experience?

Abstract Online recommender systems have triggered widespread privacy concerns due to their reliance on personal user data for providing personalized services. To address these concerns, some systems have started allowing users to express their preferences before receiving personalized content (i.e., reactive personalization) rather than automatically pushing it to them (i.e., proactive personalization). However, this would mean constant calls for user action, which can adversely affect user experience. One potential solution is to offer users the ability to customize their privacy settings at the outset, thus obviating the need for constant consultation. We conducted a 2 (Personalization: Reactive vs. Proactive) X 3 (Customization of Settings: Absence vs. Action vs. Cue) factorial experiment (N = 299) with a movie recommendation system. Findings show that interface cues suggesting customization enhance user experience, even in the presence of proactive personalization. They also highlight the important role played by negative privacy experiences in the past.

[1]  Hongxia Jin,et al.  Privacy Concerns in Online Recommender Systems: Influences of Control and User Data Input , 2014, SOUPS.

[2]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[3]  Paulo Duarte,et al.  How convenient is it? Delivering online shopping convenience to enhance customer satisfaction and encourage e-WOM , 2018, Journal of Retailing and Consumer Services.

[4]  N D Weinstein,et al.  Why it won't happen to me: perceptions of risk factors and susceptibility. , 1984, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[5]  Mary Beth Rosson,et al.  The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing , 2011, Decis. Support Syst..

[6]  Serge Egelman,et al.  The Myth of the Average User: Improving Privacy and Security Systems through Individualization , 2015, NSPW.

[7]  Paolo Bellavista,et al.  Location-Based Services: Back to the Future , 2008, IEEE Pervasive Computing.

[8]  John C. Mitchell,et al.  Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.

[9]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[10]  Miriam J. Metzger,et al.  An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. Sample , 2016, J. Comput. Mediat. Commun..

[11]  S. Sundar,et al.  Personalization versus Customization: The Importance of Agency, Privacy, and Power Usage , 2010 .

[12]  Dan Ariely,et al.  Controlling the Information Flow: Effects on Consumers' Decision Making and Preferences , 2000 .

[13]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[14]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[15]  A. Parasuraman,et al.  A conceptual framework for understanding e-service quality : implications for future research and managerial practice , 2000 .

[16]  Alessandro Acquisti,et al.  Sleights of privacy: framing, disclosures, and the limits of transparency , 2013, SOUPS.

[17]  Naveen Donthu,et al.  The fluent online shopping experience , 2014 .

[18]  Yan Huang,et al.  Toward a Theory of Interactive Media Effects (TIME) , 2015 .

[19]  Bo Zhang,et al.  Effects of security warnings and instant gratification cues on attitudes toward mobile websites , 2014, CHI.

[20]  S. Shyam Sundar,et al.  Microworkers as research participants: Does underpaying Turkers lead to cognitive dissonance? , 2018, Comput. Hum. Behav..

[21]  Tsai-Wei Chen,et al.  This App Would Like to Use Your Current Location to Better Serve You: Importance of User Assent and System Transparency in Personalized Mobile Services , 2018, CHI.

[22]  Daniel Votipka,et al.  User Interactions and Permission Use on Android , 2017, CHI.

[23]  Lorrie Faith Cranor,et al.  Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.

[24]  Robert R. Harmon,et al.  Perceived Effectiveness of Push vs. Pull Mobile Location Based Advertising , 2007 .

[25]  Thomas Finley,et al.  (Perceived) interactivity: does interactivity increase enjoyment and creative identity in artistic spaces? , 2009, CHI.

[26]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[27]  Richard Y. Wang,et al.  A product perspective on total data quality management , 1998, CACM.

[28]  Michael J. Singer,et al.  Measuring Presence in Virtual Environments: A Presence Questionnaire , 1998, Presence.

[29]  Alessandro Acquisti,et al.  Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .

[30]  Yang Wang,et al.  Nudges for Privacy and Security , 2017, ACM Comput. Surv..

[31]  Heng Xu,et al.  The Effects of Self-Construal and Perceived Control on Privacy Concerns , 2007, ICIS.

[32]  Hyeyoung Kim,et al.  Effects of personalized e-mail messages on privacy risk: Moderating roles of control and intimacy , 2014, Marketing Letters.

[33]  Kai-Lung Hui,et al.  Internet opt-in and opt-out: investigating the roles of frames, defaults and privacy concerns , 2006, SIGMIS CPR '06.

[34]  Yang Wang,et al.  Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.

[35]  Catholijn M. Jonker,et al.  Designing interfaces for explicit preference elicitation: a user-centered investigation of preference representation and elicitation process , 2011, User Modeling and User-Adapted Interaction.

[36]  George R. Milne,et al.  Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .

[37]  K. Sheehan,et al.  Dimensions of Privacy Concern among Online Consumers , 2000 .

[38]  Andrew B. Whinston,et al.  Dynamic profiling of consumers for customized offerings over the Internet: a model and analysis , 2001, Decis. Support Syst..

[39]  D. Peppers,et al.  Is your company ready for one-to-one marketing? , 1999, Harvard business review.

[40]  Jinyoung Kim,et al.  Do we trust the crowd or information system? Effects of personalization and bandwagon cues on users' attitudes and behavioral intentions toward a restaurant recommendation website , 2016, Comput. Hum. Behav..

[41]  Roger Jianxin Jiao,et al.  Customizability analysis in design for mass customization , 2004, Comput. Aided Des..

[42]  S. Shyam Sundar,et al.  What drives customization?: control or identity? , 2011, CHI.

[43]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[44]  Izak Benbasat,et al.  E-Commerce Product Recommendation Agents: Use, Characteristics, and Impact , 2007, MIS Q..

[45]  Hairong Li,et al.  Forced Exposure and Psychological Reactance: Antecedents and Consequences of the Perceived Intrusiveness of Pop-Up Ads , 2002 .

[46]  Pamela J. Wisniewski,et al.  Bridging the Gap between Privacy by Design and Privacy in Practice , 2016, CHI Extended Abstracts.

[47]  Bart P. Knijnenburg,et al.  Explaining the user experience of recommender systems , 2012, User Modeling and User-Adapted Interaction.

[48]  S. Sundar Self as source: Agency and customization in interactive media , 2008 .