Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences

Allison Woodruff Google 1600 Amphitheatre Pkwy Mountain View, CA 94043 woodruff@acm.org Vasyl Pihur Google 1600 Amphitheatre Pkwy Mountain View, CA 94043 vpihur@google.com Sunny Consolvo Google 1600 Amphitheatre Pkwy Mountain View, CA 94043 sconsolvo@google.com Lauren Schmidt Google 1600 Amphitheatre Pkwy Mountain View, CA 94043 schmidtl@google.com Laura Brandimarte Carnegie Mellon University 5000 Forbes Av. HBH 2105C Pittsburgh, PA 15213 lbrandim@andrew.cmu.edu Alessandro Acquisti Carnegie Mellon University 5000 Forbes Av. HBH 2105C Pittsburgh, PA 15213 acquisti@andrew.cmu.edu

[1]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[2]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[3]  Dean S. Karlan,et al.  Tying Odysseus to the Mast: Evidence from a Commitment Savings Product in the Philippines , 2005 .

[4]  J. Shaffer Multiple Hypothesis Testing , 1995 .

[5]  S. Gosling,et al.  A very brief measure of the Big-Five personality domains , 2003 .

[6]  Lorrie Faith Cranor,et al.  Improving Computer Security Dialogs , 2011, INTERACT.

[7]  Joseph Turow,et al.  Americans Online Privacy: The System Is Broken , 2003 .

[8]  Martin Ortlieb,et al.  A Comparison of Six Sample Providers Regarding Online Privacy Benchmarks , 2014 .

[9]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[10]  Brian A. Nosek,et al.  Liberals and conservatives rely on different sets of moral foundations. , 2009, Journal of personality and social psychology.

[11]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[12]  Adam N. Joinson,et al.  Privacy, Trust, and Self-Disclosure Online , 2010, Hum. Comput. Interact..

[13]  Wei-Yin Loh,et al.  Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..

[14]  T. Rajaretnam,et al.  Statistics for social sciences , 2016 .

[15]  Adam N. Joinson,et al.  Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..

[16]  S. Frederick Journal of Economic Perspectives—Volume 19, Number 4—Fall 2005—Pages 25–42 Cognitive Reflection and Decision Making , 2022 .

[17]  Ponnurangam Kumaraguru,et al.  Privacy Indexes: A Survey of Westin's Studies , 2005 .

[18]  J. Turow,et al.  Open to Exploitation: America's Shoppers Online and Offline , 2005 .

[19]  Arthur D. Fisk,et al.  Privacy and technology: folk definitions and perspectives , 2008, CHI Extended Abstracts.

[20]  M. Johnston,et al.  Measures in Health Psychology: A User's Portfolio , 1995 .

[21]  M. Angela Sasse,et al.  Privacy is a process, not a PET: a theory for effective privacy practice , 2012, NSPW '12.

[22]  Jennifer King,et al.  A Supermajority of Californians Supports Limits on Law Enforcement Access to Cell Phone Location Information , 2008 .

[23]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[24]  Su Li,et al.  Mobile Phones and Privacy , 2012 .

[25]  S. Stanley Young,et al.  Deming, data and observational studies , 2011 .

[26]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[27]  Tomasz Zaleskiewicz,et al.  Beyond risk seeking and risk aversion: personality and the dual nature of economic risk taking , 2001 .

[28]  D. Bates,et al.  Linear Mixed-Effects Models using 'Eigen' and S4 , 2015 .

[29]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[30]  Konstantin Beznosov,et al.  Does my password go up to eleven?: the impact of password meters on password selection , 2013, CHI.

[31]  Sören Preibusch,et al.  Guide to measuring privacy concern: Review of survey and observational instruments , 2013, Int. J. Hum. Comput. Stud..

[32]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..

[33]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[34]  Brian C. Grams Privacy Concerns and Personality Traits Influencing Online Behavior: A Structural Model , 2005 .

[35]  M. Angela Sasse,et al.  "Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure , 2013, TRUST.

[36]  Panagiotis G. Ipeirotis,et al.  Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.

[37]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.

[38]  Susan Landau,et al.  Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations , 2013, IEEE Security & Privacy.

[39]  Mario Callegaro,et al.  Online Panel Research: A Data Quality Perspective , 2014 .

[40]  Jr. A. P. Mac Donald,et al.  Revised Scale for Ambiguity Tolerance: Reliability and Validity , 1970 .