Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm

This paper explores how the design of online technology influences social factors and manipulates users' online privacy behaviours. In short, users reveal information and participate in online activities even when reluctant due to the influence of dark patterns. We propose FoMO-Centric Design as a paradigm for explaining how dark pattern-infused design may lead users to reluctantly behave in a less secure or privacy-preserving way than their attitudes reflect. We review the literature for evidence pointing to the existence of such design and for potential explanations for how it works. We then discuss the implications, present a list of preliminary recommendations, and offer an agenda for the research community based on our findings.

[1]  Andrew K. Przybylski,et al.  Motivational, emotional, and behavioral correlates of fear of missing out , 2013, Comput. Hum. Behav..

[2]  Johanneke Siljee,et al.  Privacy transparency patterns , 2015, EuroPLoP.

[3]  Menno D. T. de Jong,et al.  The privacy paradox - Investigating discrepancies between expressed privacy concerns and actual online behavior - A systematic literature review , 2017, Telematics Informatics.

[4]  Dorit Alt,et al.  College students' academic motivation, media engagement and fear of missing out , 2015, Comput. Hum. Behav..

[5]  Mourad Debbabi,et al.  Security Design Patterns: Survey and Evaluation , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[6]  Edward L. Deci,et al.  Intrinsic Motivation and Self-Determination in Human Behavior , 1975, Perspectives in Social Psychology.

[7]  Daniel Susser,et al.  Invisible Influence: Artificial Intelligence and the Ethics of Adaptive Choice Architectures , 2019, AIES.

[8]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[9]  Stefanie Duguay Identity modulation in networked publics: Queer women's participation and representation on Tinder, Instagram, and Vine , 2017 .

[10]  Max Jacobson,et al.  A Pattern Language: Towns, Buildings, Construction , 1981 .

[11]  Oren Soffer,et al.  To Post or not to Post? , 2017 .

[12]  Justin W. Weeks,et al.  Problematic smartphone use and relations with negative affect, fear of missing out, and fear of negative and positive evaluation , 2017, Psychiatry Research.

[13]  John A. Fairlie,et al.  The United States Department of Justice , 1905 .

[14]  Curtis R. Taylor,et al.  The Economics of Privacy , 2016 .

[15]  Zizi Papacharissi,et al.  Fifteen Minutes of Privacy: Privacy, Sociality, and Publicity on Social Network Sites , 2011, Privacy Online.

[16]  Jaap-Henk Hoepman,et al.  A system of privacy patterns for user control , 2018, SAC.

[17]  S Kamen,et al.  The task force. , 1976, Journal of hospital dental practice.

[18]  Glenn J. Browne,et al.  An Empirical Investigation of Web Site Use Using a Commitment-Based Model , 2006, Decis. Sci..

[19]  Susanna Paasonen,et al.  Affect, data, manipulation and price in social media , 2018 .

[20]  Sarah Spiekermann,et al.  The challenges of privacy by design , 2012, Commun. ACM.

[21]  S. Utz,et al.  The privacy paradox on social network sites revisited: The role of individual characteristics and group norms , 2009 .

[22]  N. McGlynn Thinking fast and slow. , 2014, Australian veterinary journal.

[23]  Elija Cassidy,et al.  Social networking sites and participatory reluctance: A case study of Gaydar, user resistance and interface rejection , 2016, New Media Soc..

[24]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[25]  Emily van der Nagel ‘Networks that work too well’: intervening in algorithmic connections: , 2018 .

[26]  Christopher Krügel,et al.  Abusing Social Networks for Automated User Profiling , 2010, RAID.

[27]  Edgar R. Weippl,et al.  Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..

[28]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[29]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[30]  Ralph W. Thomas,et al.  The Oxford Dictionary , 1907 .

[31]  Xiao Wang,et al.  Toward a detailed understanding of illegal digital downloading intentions: An extended theory of planned behavior approach , 2011, New Media Soc..

[32]  David A. Wagner,et al.  Analyzing inter-application communication in Android , 2011, MobiSys '11.

[33]  Martin N. Yina Newport, Cal. Digital Minimalism: Choosing a Focused Life in a Noisy World , 2020 .

[34]  Jason Hong,et al.  Privacy patterns for online interactions , 2006, PLoP '06.

[35]  Saikat Guha,et al.  NOYB: privacy in online social networks , 2008, WOSN '08.

[36]  Yada Zhu,et al.  Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[37]  Paul Resnick,et al.  It's Creepy, But it Doesn't Bother Me , 2016, CHI.

[38]  David A. Wagner,et al.  Contextualizing Privacy Decisions for Better Prediction (and Protection) , 2018, CHI.

[39]  Monika Taddicken,et al.  The 'Privacy Paradox' in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure1 , 2014, J. Comput. Mediat. Commun..

[40]  H. Nissenbaum,et al.  Online Manipulation: Hidden Influences in a Digital World , 2018 .

[41]  Maarten H. Everts,et al.  Designing Privacy-by-Design , 2012, APF.

[42]  Ramona-Riin Dremljuga The Process and Affordances of Platform-Specific Social Media Disconnection , 2018 .

[43]  Norman M. Sadeh,et al.  Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing , 2010, UbiComp.

[44]  Gustavo S. Mesch,et al.  Parental mediation, peer norms and risky online behavior among adolescents , 2014, Comput. Hum. Behav..

[45]  Miriam Liss,et al.  Extraversion, neuroticism, attachment style and fear of missing out as predictors of social media use and addiction , 2017 .

[46]  Kerk F. Kee,et al.  Is There Social Capital in a Social Network Site?: Facebook Use and College Students’ Life Satisfaction, Trust, and Participation 1 , 2009 .

[47]  Frank Kargl,et al.  Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns , 2016, Proc. Priv. Enhancing Technol..

[48]  Tien Ee Dominic Yeo,et al.  Rethinking Social Media and Political Engagement: An Examination of the Disconnective Practices of Politically Active Youths in Hong Kong , 2018, SMSociety.

[49]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[50]  Heather Richter Lipford,et al.  Strategies and struggles with privacy in an online social networking community , 2008, BCS HCI.

[51]  Hironori Washizaki,et al.  A survey on security patterns , 2008 .

[52]  Rainer Böhme,et al.  Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data , 2011, Financial Cryptography.

[53]  Jonathan Mayer,et al.  Dark Patterns at Scale , 2019, Proc. ACM Hum. Comput. Interact..

[54]  Nick Doty,et al.  Privacy Design Patterns and Anti-Patterns Patterns Misapplied and Unintended Consequences , 2013 .

[55]  Zeynep Tufekci Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .

[56]  Russell B. Clayton,et al.  The Extended iSelf: The Impact of iPhone Separation on Cognition, Emotion, and Physiology , 2015, J. Comput. Mediat. Commun..

[57]  F. Okumus,et al.  Generation Y travelers' commitment to online social network websites , 2013 .

[58]  Sarah Spiekermann,et al.  Aware but not in Control - A Qualitative Value Analysis of the Effects of New Technologies , 2018, HCC.

[59]  B. J. Fogg,et al.  Persuasive technology: using computers to change what we think and do , 2002, UBIQ.