Factors Influencing User's Attitude to Secondary Information Sharing and Usage

The increasing availability of enormous data about users online, along with availability of sophisticated tools and technology to store, aggregate, and analyze data for secondary use has raised concerns about how to balance the opportunity for secondary use of data with the need to protect the user privacy that may result from harmful use. To develop a privacy protection mechanism that is useful and meets the expectations and needs of the user, it is important to understand user’s attitude to privacy and secondary information sharing and usage of his/her data. While several studies have investigated factors influencing user’s attitude to privacy in primary data collection context, none of the existing studies have provided an understanding of user perception and attitude to privacy in secondary context. To fill this gap, this work has identified five factors that are important in a secondary usage context and carried out a study on their influence on user’s perception with respect to how their data is shared for secondary use. The main contribution of this paper is an understanding of factors influencing user decisions about privacy in secondary context, which can assist both technology designers and policy makers in the development of appropriate privacy protection that meets the needs and expectations of the user.

[1]  Alfred Kobsa,et al.  Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems , 2013, TIIS.

[2]  James Dean Brown,et al.  Choosing the Right Type of Rotation in PCA and EFA , 2009 .

[3]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[4]  Anthony Jameson,et al.  User Modeling and User-Adapted Interaction , 2004, User Modeling and User-Adapted Interaction.

[5]  Lorrie Faith Cranor,et al.  Timing is everything?: the effects of timing and placement of online privacy indicators , 2009, CHI.

[6]  Stefan Poslad,et al.  Ubiquitous Computing: Smart Devices, Environments and Interactions , 2009 .

[7]  H. E. Tinsley,et al.  Uses of factor analysis in counseling psychology research. , 1987 .

[8]  Rudolf R. Sinkovics,et al.  The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .

[9]  Michael D. Buhrmester,et al.  Amazon's Mechanical Turk , 2011, Perspectives on psychological science : a journal of the Association for Psychological Science.

[10]  Kai Lung Hui,et al.  Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.

[11]  Alessandro Acquisti,et al.  Misplaced Confidences , 2013, WEIS.

[12]  Julita Vassileva,et al.  Modeling the efficacy of persuasive strategies for different gamer types in serious games for health , 2014, User Modeling and User-Adapted Interaction.

[13]  Olli Pitkänen,et al.  Users' Awareness of Privacy on Online Social Networking Sites - Case Facebook , 2009, Bled eConference.

[14]  Julita Vassileva,et al.  Multi-Agent Multi-User Modeling in I-Help , 2003, User Modeling and User-Adapted Interaction.

[15]  Marko Sarstedt,et al.  PLS-SEM: Indeed a Silver Bullet , 2011 .

[16]  G. Loewenstein,et al.  Misplaced Confidences: Privacy and the Control Paradox. , 2010 .

[17]  Alfred Kobsa,et al.  Helping users with information disclosure decisions: potential for adaptation , 2013, IUI '13.

[18]  Mary Madden and Aaron Smith,et al.  Reputation Management and Social Media , 2010 .

[19]  Julita Vassileva,et al.  A Decentralized Architecture for Sharing and Reusing Lifelogs , 2013, UMAP Workshops.

[20]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[21]  Julita Vassileva,et al.  A Framework for Privacy-Aware User Data Trading , 2013, UMAP.

[22]  Nicola Henze,et al.  Linkage, aggregation, alignment and enrichment of public user profiles with Mypes , 2010, I-SEMANTICS '10.

[23]  Mark S. Ackerman,et al.  Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.

[24]  Ashwin Machanavajjhala,et al.  Defining and Enforcing Privacy in Data Sharing , 2008 .

[25]  John Michael Pearson,et al.  An Exploratory Examination of Antecedents to Software Piracy: A Cross-Cultural Comparison , 2012, 2012 45th Hawaii International Conference on System Sciences.

[26]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[27]  Alessandro Acquisti,et al.  1 What is privacy worth ? , 2009 .

[28]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[29]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[30]  Siddharth Suri,et al.  Conducting behavioral research on Amazon’s Mechanical Turk , 2010, Behavior research methods.

[31]  Yang Wang,et al.  Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.

[32]  G. Loewenstein,et al.  What Is Privacy Worth? , 2013, The Journal of Legal Studies.

[33]  E. Kupek,et al.  Beyond logistic regression: structural equations modelling for binary variables and its application to investigating unobserved confounders , 2006, BMC medical research methodology.

[34]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[35]  Bernardo A. Huberman,et al.  A Market for Unbiased Private Data: Paying Individuals According to Their Privacy Attitudes , 2012, First Monday.

[36]  Omer Tene Jules Polonetsky,et al.  Privacy in the Age of Big Data: A Time for Big Decisions , 2012 .

[38]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[39]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[40]  S. Holm A Simple Sequentially Rejective Multiple Test Procedure , 1979 .

[41]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[42]  Ponnurangam Kumaraguru,et al.  Privacy Indexes: A Survey of Westin's Studies , 2005 .

[43]  Boris Brandherm,et al.  Decentralized User Modeling with UserML and GUMO , 2005 .

[44]  George Danezis,et al.  A study on the value of location privacy , 2006, WPES '06.

[45]  Seng Wai Loke,et al.  Context-aware pervasive systems - architectures for a new breed of applications , 2019 .

[46]  R. Thaler Toward a positive theory of consumer choice , 1980 .

[47]  Jeffrey Heer,et al.  Crowdsourcing graphical perception: using mechanical turk to assess visualization design , 2010, CHI.

[48]  L. Carvajal,et al.  IEEE Transactions on Software Engineering , 2016 .