Order of Control and Perceived Control over Personal Information

Focusing on personal information disclosure, we apply control theory and the notion of the Order of Control to study people's understanding of the implications of information disclosure and their tendency to consent to disclosure. We analyzed the relevant literature and conducted a preliminary online study (N = 220) to explore the relationship between the Order of Control and perceived control over personal information. Our analysis of existing research suggests that the notion of the Order of Control can help us understand people's decisions regarding the control over their personal information. We discuss limitations and future directions for research regarding the application of the idea of the Order of Control to online privacy.

[1]  Manon Arcand,et al.  The impact of reading a web site's privacy statement on perceived control over privacy and perceived trust , 2007, Online Inf. Rev..

[2]  A. Moore,et al.  Defining Privacy , 2008 .

[3]  J. Rubenfeld The Right of Privacy , 1989 .

[4]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[5]  Jan H. P. Eloff,et al.  IFIP Advances in Information and Communication Technology , 2007 .

[6]  C. Hoffmann,et al.  The role of privacy concerns in the sharing economy , 2017 .

[7]  Kat Krol,et al.  Control versus Effort in Privacy Warnings for Webforms , 2016, WPES@CCS.

[8]  Alessandro Acquisti,et al.  Misplaced Confidences , 2013, WEIS.

[9]  Michele Vendruscolo,et al.  Different soluble aggregates of Aβ42 can give rise to cellular toxicity through different mechanisms , 2019, Nature Communications.

[10]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[11]  Marit Hansen,et al.  Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals , 2011, PrimeLife.

[12]  Mary Beth Rosson,et al.  journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .

[13]  Alfred Kobsa,et al.  Counteracting the Negative Effect of Form Auto-completion on the Privacy Calculus , 2013, ICIS.

[14]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[15]  Joachim Meyer,et al.  Is Privacy Controllable? , 2018, Privacy and Identity Management.

[16]  Jens Grossklags,et al.  Third-party apps on Facebook: privacy and the illusion of control , 2011, CHIMIT '11.

[17]  Markus Tschersich,et al.  Comparing the Configuration of Privacy Settings on Social Network Sites Based on Different Default Options , 2015, 2015 48th Hawaii International Conference on System Sciences.

[18]  Matthias Hollick,et al.  Raising User Awareness about Privacy Threats in Participatory Sensing Applications through Graphical Warnings , 2013, MoMM '13.

[19]  Bin Liu,et al.  Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions , 2015, MobileHCI.

[20]  Marit Hansen,et al.  A Process for Data Protection Impact Assessment Under the European General Data Protection Regulation , 2016, APF.

[21]  Simone Fischer-Hübner,et al.  Tools for Achieving Usable Ex Post Transparency: A Survey , 2017, IEEE Access.

[22]  Marit Hansen,et al.  Protection Goals for Privacy Engineering , 2015, 2015 IEEE Security and Privacy Workshops.

[23]  Paul Benjamin Lowry,et al.  Privacy Fatigue: The Effect of Privacy Control Complexity on Consumer Electronic Information Disclosure , 2014, ICIS.

[24]  W. Parent Privacy, morality, and the law , 1985 .

[25]  Heng Xu,et al.  The Effects of Self-Construal and Perceived Control on Privacy Concerns , 2007, ICIS.

[26]  Peter Buxmann,et al.  Handle with care: How online social network providers' privacy policies impact users' information sharing behavior , 2015, J. Strateg. Inf. Syst..

[27]  Esma Aïmeur,et al.  When changing the look of privacy policies affects user trust: An experimental study , 2016, Comput. Hum. Behav..

[28]  Klaus Wehrle,et al.  Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany , 2015 .

[29]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[30]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[31]  Nili Steinfeld,et al.  "I agree to the terms and conditions": (How) do users read privacy policies online? An eye-tracking experiment , 2016, Comput. Hum. Behav..

[32]  Robert W. Reeder,et al.  Visual vs. compact: a comparison of privacy policy interfaces , 2010, CHI.

[33]  Joseph Kunkel,et al.  Integrated TORC1 and PKA signaling control the temporal activation of glucose-induced gene expression in yeast , 2019, Nature Communications.

[34]  David A. Wagner,et al.  Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences , 2017, SOUPS.

[35]  Bo Zhang,et al.  Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes , 2016, CSCW.

[36]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .