The document discusses approaches to simplifying privacy decisions through interactive and adaptive solutions. It first examines how transparency and control approaches have limitations due to bounded rationality, information overload, and choice overload. It then discusses privacy nudging and persuasion approaches using defaults, justifications, and framing to influence decisions. However, these approaches can also reduce user satisfaction and autonomy. The document proposes an adaptive privacy procedure to provide contextualized nudges based on a dynamic understanding of user concerns.
Consumer behavior
Week 2 of 13 of the 2007 Internet Marketing Course. Content is based in part on Dann, S and Dann S 2004 Strategic Internet Marketing 2.0, Milton: Wiley. Diagrams taken from the Dann and Dann text are copyright to their respective copyright holders.
You Tweeted WHAT?!: Legal Risks of Social MediaSMB Seattle
What liabilities do companies face when using social media platforms?
Kraig Baker, Chair of the Technology, e-Business and Digital Media Practice at Davis Wright Tremaine LLP delivers an enlightening and timely discussion to SMB Seattle about legal issues surrounding the corporate use of social media.
Social Distortion: Privacy, Consent, and Social Networksdariphagen
Brian Holland, visiting associate professor at the Dickinson School of Law at Penn State University, talks about Voluntary disclosure of personal information to private institutions. At the Conference on Privacy in Social Network Sites: www.privacyinsocialnetworksites.nl
Consumer behavior
Week 2 of 13 of the 2007 Internet Marketing Course. Content is based in part on Dann, S and Dann S 2004 Strategic Internet Marketing 2.0, Milton: Wiley. Diagrams taken from the Dann and Dann text are copyright to their respective copyright holders.
You Tweeted WHAT?!: Legal Risks of Social MediaSMB Seattle
What liabilities do companies face when using social media platforms?
Kraig Baker, Chair of the Technology, e-Business and Digital Media Practice at Davis Wright Tremaine LLP delivers an enlightening and timely discussion to SMB Seattle about legal issues surrounding the corporate use of social media.
Social Distortion: Privacy, Consent, and Social Networksdariphagen
Brian Holland, visiting associate professor at the Dickinson School of Law at Penn State University, talks about Voluntary disclosure of personal information to private institutions. At the Conference on Privacy in Social Network Sites: www.privacyinsocialnetworksites.nl
The Interwoven Complexities of Social Media, Privacy and Data SecurityArmstrong Teasdale
CLE Presentation: Daniel C. Nelson and Jeffrey Schultz attorneys at Armstrong Teasdale
Social media has infiltrated most aspects of society, presenting a wide range of potential legal issues for any attorney or business. To gain a thorough understanding of how social media's many intersections with changing privacy law and data security requirements impact your business, this presentation will discuss how to navigate through this tangled web.
The choice of a lawyer is an important decision and should not be based solely on this presentation. All rights are reserved and content may not be reproduced, disseminated or transferred, in any form or by means, except with the prior written consent of Armstrong Teasdale.
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Subscriber Churn Prediction Model using Social Network Analysis In Telecommunication Industry โดย เชษฐพงศ์ ปัญญาชนกุล อาจารย์ ดร. อานนท์ ศักดิ์วรวิชญ์
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox
ZoneFox is an award winning market leader in User Behaviour Analytics, providing critical insights around data-flow that you need to secure against the Insider Threat.
New General Data Protection Regulation (Agnes Andersson Hammarstrand)Nordic APIs
This is a session given by Agnes Andersson Hammarstrand at Nordic APIs 2016 Platform Summit on October 25th, in Stockholm Sweden.
Description:
This spring a new EU General Data Protection Regulation was adopted to replace the current personal data legislations. Companies that break the rules risk fines of up to 4 % of the worldwide group turnover. The new regulations entail a large number of news that all companies should be informed about. Among other things, IT systems need to be adapted to privacy under the principles of privacy by design.
Agnes Hammarstrand, partner at Delphi Law firm and expert within IT and online provides an introduction to the new regulations and what you need to do.
To become compliant with upcoming GDPR, organisations cannot rely solely on rules, these will protect against the known threats, while Machine Learning protects from the unknown.
The pre-conference workshop entitled 'Trust is a Terrible Thing to Waste' from the 2010 International Association of Privacy Professionals conference in Washington, D.C. The session reviewed why trust is important, how to handle crisis communications, and how to build trust before a crisis hits.
The Interwoven Complexities of Social Media, Privacy and Data SecurityArmstrong Teasdale
CLE Presentation: Daniel C. Nelson and Jeffrey Schultz attorneys at Armstrong Teasdale
Social media has infiltrated most aspects of society, presenting a wide range of potential legal issues for any attorney or business. To gain a thorough understanding of how social media's many intersections with changing privacy law and data security requirements impact your business, this presentation will discuss how to navigate through this tangled web.
The choice of a lawyer is an important decision and should not be based solely on this presentation. All rights are reserved and content may not be reproduced, disseminated or transferred, in any form or by means, except with the prior written consent of Armstrong Teasdale.
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Subscriber Churn Prediction Model using Social Network Analysis In Telecommunication Industry โดย เชษฐพงศ์ ปัญญาชนกุล อาจารย์ ดร. อานนท์ ศักดิ์วรวิชญ์
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox
ZoneFox is an award winning market leader in User Behaviour Analytics, providing critical insights around data-flow that you need to secure against the Insider Threat.
New General Data Protection Regulation (Agnes Andersson Hammarstrand)Nordic APIs
This is a session given by Agnes Andersson Hammarstrand at Nordic APIs 2016 Platform Summit on October 25th, in Stockholm Sweden.
Description:
This spring a new EU General Data Protection Regulation was adopted to replace the current personal data legislations. Companies that break the rules risk fines of up to 4 % of the worldwide group turnover. The new regulations entail a large number of news that all companies should be informed about. Among other things, IT systems need to be adapted to privacy under the principles of privacy by design.
Agnes Hammarstrand, partner at Delphi Law firm and expert within IT and online provides an introduction to the new regulations and what you need to do.
To become compliant with upcoming GDPR, organisations cannot rely solely on rules, these will protect against the known threats, while Machine Learning protects from the unknown.
The pre-conference workshop entitled 'Trust is a Terrible Thing to Waste' from the 2010 International Association of Privacy Professionals conference in Washington, D.C. The session reviewed why trust is important, how to handle crisis communications, and how to build trust before a crisis hits.
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...Adam Thierer
"The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital Privacy." A slide show by Adam Thierer presented on January 17, 2012 before George Mason University Law & Economics Center conference on Privacy, Regulation, & Antitrust.
While there is tendency to publicly acclaim GDPR as a wonderful advancement, the sad truth is that EU operators now need sophisticated techniques to extract at least part of the knowledge that is freely available in other Countries. One of the main tools is Data Anonymization. Full anonymization amounts to data destruction. But there are levels. What is actually required to be compliant? How different situations require different anonymization levels? How to measure?
Attitudes toward Online Availability of US Public RecordsSean Munson
Many have enthusiastically greeted the ability to search and view public records online as a great advance for transparency and accountability. Such ability, however, also creates value tensions with privacy and other important human values. In this paper, we report findings from a survey of 134 residents of the US Pacific Northwest on their awareness of and attitudes towards online access to political campaign records and real estate transaction histories, bringing to light some of the social implications of technological changes that increase ease of access to public records. We show that, while respondents often understood the reason behind making these records public, considerable concern about the current accessibility of these records exists, along with a precautionary indication that such open access may reduce public participation for some individuals.
European public and policy elite views of US tech companies
This presentation explores consumer attitudes to US tech companies in France, Germany, the UK and Brussels, how that interacts with media coverage, and what is driving the European regulatory agenda towards the internet and technology companies.
For more information please contact:
Chris Blundell: http://www.brunswickgroup.com/people/directory/chris-blundell/
Philippe Blanchard: http://www.brunswickgroup.com/people/directory/philippe-blanchard/
At the Advertising Research Foundation’s (ARF) 2011 annual re:think convention, a key issues forum presentation was held entitled Research Quality. The topic of Research Quality forum was Should We Dismantle the Factory?An Approach to Evaluate Data Collected from Multiple Sample Sources and Generated through Different Approaches. Measuring online research was discussed. George Terhanian, Ph.D. presented and Gian Fulgoni moderated.
Debunking the oft-repeated assertion that young people don\’t care about privacy, new research shows that Web users between the ages of 18 and 24 are highly protective of certain information about themselves.
This is report for a study about social media behaviour by Canadian advertising agency People from Cossette.
The goal of the research is to transcend trends and hype, avoid the brands and buzz of the moment, and focus on behaviour.
The research covered Canada, the US and the UK.
Achieving both GDPR Compliance and a Positive Customer ExperienceTransUnion
There’s plenty of fear-mongering going around, so what’s the upside?
We believe that complying with the upcoming General Data Protection Regulation (GDPR) provides an opportunity to create a competitive advantage rather than bringing about the end of the world as we know it.
Some of the core tenants of GDPR, such as Privacy by Design and Data Minimisation will give organizations the opportunity to rethink the customer relationship and their buying journey. Rather than considering security and customer experience separately, this change allows you to take a more holistic view of the customer experience.
Some simplified slides I developed to use in briefings and discussions about “data sharing” and the “data sharing” provisions in the Digital Economy Bill (now Digital Economy Act)
Similar to Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions (20)
Privacy in Mobile Personalized Systems - The Effect of Disclosure JustificationsBart Knijnenburg
Paper Presentation at the Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM) at the Symposium On Usable Privacy and Security (SOUPS) 2012
Paper can be found here: http://appanalysis.org/u-prism/soups12_mobile-final11.pdf
Full journal paper (under review): http://bit.ly/TiiSprivacy
Explaining the User Experience of Recommender Systems with User ExperimentsBart Knijnenburg
A talk I gave at the Netflix offices on July 2nd, 2012.
Please do not use any of the slides or their contents without my explicit permission (bart@usabart.nl for inquiries).
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
2. INFORMATION AND COMPUTER SCIENCES
About me...
PhD candidate at UC Irvine
Recommender Systems:
- Choice overload
- Adaptive preference elicitation
- User-centric evaluation
- Social recommenders
Privacy:
- Form auto-completion tools
- App recommenders
- Location-sharing social
networks
Samsung research intern,
Google PhD Fellow
@usabart
3. INFORMATION AND COMPUTER SCIENCES
Outline
1. Transparency and control
Privacy calculus, paradoxes, and bounded rationality
2. Privacy nudging and persuasion
A solution inspired by decision sciences... with some flaws
3. Privacy Adaptation Procedure
Adaptive nudges based on a contextualized
understanding of users’ privacy concerns
5. INFORMATION AND COMPUTER SCIENCES
The Privacy Paradox
For many participants this behavior stands in sharp contrast
to their self-reported privacy attitude
- Spiekermann et al., 2001
Seventy percent of US consumers worry about online
privacy, but few take protective action
- Jupiter research report, 2002
Recent surveys, anecdotal evidence, and experiments have
highlighted an apparent dichotomy between privacy
attitudes and actual behavior
- Acquisti & Grossklags, 2005
7. INFORMATION AND COMPUTER SCIENCES
A model by Smith et al. 2011
Why aren’t these more
strongly related?
8.
9.
10.
11. INFORMATION AND COMPUTER SCIENCES
Horror stories
“My daughter [is] still in high
school, and you’re sending
her coupons for baby clothes
and cribs? Are you trying to
encourage her to get
pregnant?”
“I had a talk with my
daughter. It turns out [...]
she’s due in August. I owe
you an apology.”
12. INFORMATION AND COMPUTER SCIENCES
A model by Smith et al. 2011
Why aren’t these more
strongly related?
Control
Transparency
13. INFORMATION AND COMPUTER SCIENCES
Transparency and control
ControlTransparency
Informed consent
“companies should
provide clear descriptions
of [...] why they need the
data, how they will use it”
User empowerment
“companies should offer
consumers clear and
simple choices [...] about
personal data collection,
use, and disclosure”
14. INFORMATION AND COMPUTER SCIENCES
Are transparency and control really the key to
better privacy decisions?
16. INFORMATION AND COMPUTER SCIENCES
The Transparency Paradox
Transparency is useful for concerned users, but bad for
others
Makes them more fearful
Mentions of privacy (even favorable ones) often trigger
privacy concerns
17. INFORMATION AND COMPUTER SCIENCES
44
Example: John et al.43
Appendix C: Experiment 2A: Screenshots of survey interface manipulation.
Frivolous:
Baseline:
Serious:
18. INFORMATION AND COMPUTER SCIENCES
Example: John et al.
43
Appendix C: Experiment 2A: Screenshots of survey interface manipulation.
Frivolous:
Baseline:
20. INFORMATION AND COMPUTER SCIENCES
44
Example: John et al.43
Appendix C: Experiment 2A: Screenshots of survey interface manipulation.
Frivolous:
Baseline:
Serious:
21. INFORMATION AND COMPUTER SCIENCES
37
0.7
0.8
0.9
1
1.1
1.2
1.3
Serious Frivolous
AARrelativetooverallaverageAAR
withinquestiontype
Tame Intrusive
Figure 6. The average AAR within each inquiry condition, relative to the overall average AAR
for the questions of the given intrusiveness level (Experiment 2B). The value of 1 on the y axis
represents the overall average AAR.
Example: John et al.
22. INFORMATION AND COMPUTER SCIENCES
!
!
!
75%
80%
85%
90%
95%
100%
BlogHeroes I♡WRK Codacare
Auto
!
BlogHeroes
R
! !
!
75%
80%
85%
90%
95%
100%
BlogHeroes I♡WRK Codacare
Contact info Interests Job skills Health record
Control example: Knijnenburg et al.
Normally, people are more
likely to disclose information
when the type of requested
information matches the
purpose of the website
Please tell us more about yourself
BlogHeroes will assign a "guild" to you based on the information you provide below. Note that none
of the fields are required, but our classification will be better if you provide more information.
General info about me
Please provide some background info to get our matching process started.
Name (first): John (last): Smith
E-mail address: john@smith.com
Gender: Male
Age (years): 23
Address: 123 Main St.
City: New York State: NY Zip: 12345
What I do for a living
> For employers
> For investors
> Contact
> About us
Please enter your information
I WRK will find jobs based on the information you enter on this form.
None of the items on the form are required, but if you provide more
information the jobs will be a better match.
GENERAL AND CONTACT INFO
General and contact information
FIRST NAME
John
LAST NAME
Smith clear
AGE
23 clear
GENDER
Male clear
E-MAIL ADDRESS
john@smith.com clear
ADDRESS
123 Main St.
CITY
New York
STATE
NY
ZIP
12345 clear
Enter your details, please
Your personal Codacare health insurance policy will be based on the
information you provide. Please note that none of the items are
required, but the insurance will be better tailored to your needs if you
provide more information.
General information
Please provide your general information.
Name (first): (last):
fill
Address:
fillCity: State: Zip:
Gender:
fill
Age:
fill
E-‐mail:
fill
Health
23. INFORMATION AND COMPUTER SCIENCES
!
!
!
75%
80%
85%
90%
95%
100%
BlogHeroes I♡WRK Codacare
Auto
! ! !
BlogHeroes I♡WRK Codacare
Remove
!
BlogHeroes I♡
A
Control example: Knijnenburg et al.
Auto-completion tools
make it so easy to submit a
fully completed form that
users may skip weighing the
benefits and risk of disclosing
a certain piece of information
in a specific situation
Please tell us more about yourself
BlogHeroes will assign a "guild" to you based on the information you provide below. Note that none
of the fields are required, but our classification will be better if you provide more information.
General info about me
Please provide some background info to get our matching process started.
Name (first): John (last): Smith
E-mail address: john@smith.com
Gender: Male
Age (years): 23
Address: 123 Main St.
City: New York State: NY Zip: 12345
What I do for a living
Some guilds write about their jobs. Tell us more about yours, and we can provide a better match.
bit.ly/icis2013
!
Codacare
ealth record
24. INFORMATION AND COMPUTER SCIENCES
!
Codacare
! ! !
BlogHeroes I♡WRK Codacare
Remove
! ! !
BlogHeroes I♡WRK Codacare
Add
Control example: Knijnenburg et al.
Adding a simple “clear”
button reduces overall
disclosure and makes it more
purpose-specific again
Why?
Users have more control!
> For employers
> For investors
> Contact
> About us
Please enter your information
I WRK will find jobs based on the information you enter on this form.
None of the items on the form are required, but if you provide more
information the jobs will be a better match.
GENERAL AND CONTACT INFO
General and contact information
FIRST NAME
John
LAST NAME
Smith clear
AGE
23 clear
GENDER
Male clear
E-MAIL ADDRESS
john@smith.com clear
ADDRESS CITY STATE ZIPbit.ly/icis2013
25. INFORMATION AND COMPUTER SCIENCES
!
Codacare
! ! !
BlogHeroes I♡WRK Codacare
Add
Control example: Knijnenburg et al.
Using a “fill” button
instead does not further
reduce disclosure, and
actually leads to a higher
user satisfaction
Why?
Even more control!
Enter your details, please
Your personal Codacare health insurance policy will be based on the
information you provide. Please note that none of the items are
required, but the insurance will be better tailored to your needs if you
provide more information.
General information
Please provide your general information.
Name (first): (last):
fill
Address:
fill
City: State: Zip:
Gender:
fill
Age:
fill
E-‐mail:
fill
bit.ly/icis2013
26. INFORMATION AND COMPUTER SCIENCES
Example: Facebook
“bewildering tangle of options” (New York Times, 2010)
“labyrinthian” controls” (U.S. Consumer Magazine, 2012)
27. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
Introducing an “extreme”
sharing option
Nothing - City - Block
Add the option Exact
Expected:
Some will choose Exact
instead of Block
Unexpected:
Sharing increases across
the board!
B
N
privacy -->
benefits-->
C
E
bit.ly/chi2013privacy
28. INFORMATION AND COMPUTER SCIENCES
The Control Paradox
Decisions are too numerous
Most Facebook users
don’t know implications of
their own privacy settings!
Decisions are difficult
Uncertain and delayed
outcomes
Result: people just pick the
middle option!
29. INFORMATION AND COMPUTER SCIENCES
Bounded rationality
Why do transparency and
control not work?
People’s decisions are
inconsistent and seemingly
irrational
-Framing effects
-Default effects
-Order effects
30. INFORMATION AND COMPUTER SCIENCES
Please send me Vortrex Newsletters and information.
Please do not send me Vortrex Newsletters and
information.
Please send me Vortrex Newsletters and information.
Please do not send me Vortrex Newsletters and
information.
Figure 4: Subjects were assigned one of the following conditions
in the registration page.
3.1. Data Analysis and Results
The mean levels of participations in each experimental condition are
reported in Table 1 below.
Table 1: Mean participation levels as a function of frames and
4.
In the
inher
defau
onlin
The t
the s
Conn
actio
nega
conv
posit
Framing and defaults: Lai and Hui
0%
25%
37%
53%
D
A
B
C
31. INFORMATION AND COMPUTER SCIENCES
Default order: Acquisti et al.
Foot in the door
(innocuous requests first)
Door in the face
(risqué requests first)
33. INFORMATION AND COMPUTER SCIENCES
Bounded rationality
Why do transparency and
control not work?
Transparency:
Information overload
Control:
Choice overload
34. INFORMATION AND COMPUTER SCIENCES
Bounded rationality
Why do transparency and
control not work?
Transparency:
Information overload
Control:
Choice overload
35. INFORMATION AND COMPUTER SCIENCES
Summary of part 1
We need to move beyond
control and transparency
Rational privacy decision-
making is bounded
Transparency and control
increase choice difficulty
36. Privacy nudging and persuasion
A solution inspired by decision sciences... with some flaws
37. INFORMATION AND COMPUTER SCIENCES
Starting point...
People’s decisions are inconsistent and seemingly irrational,
therefore:
-People do not always choose what is best for them
-There is significant leeway to influence people's decisions
-Being objectively neutral is impossible
38. INFORMATION AND COMPUTER SCIENCES
Privacy Calculus
A new model
Decision
heuristics
Benefits
Behavioral reactions
(including disclosures)
Risk/
Costs
Nudge Nudge
Persuasion PersuasionJustification
Default
value
Default
order
Justification
39. INFORMATION AND COMPUTER SCIENCES
A new model
Default
value
Justification
A succinct reason to
disclose (or not disclose)
a piece of information
-Make it easier to
rationalize the decision
-Minimize the potential
regret of choosing the
wrong option
Relieve users from the
burden of making decisions
-Path of least resistance
-Implicit normative cue
(what I should do)
-Endowment effect (what
I have is worth more than
what I don’t have)
40. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa
5 justification types
None
Useful for you
Number of others
Useful for others
Explanation
bit.ly/tiis2013
43. INFORMATION AND COMPUTER SCIENCES
**" **"
***"
1"
$1,00"
$0,75"
$0,50"
$0,25"
0,00"
0,25"
0,50"
0,75"
1,00"
Sa#sfac#on)with))
the)system)
Justifications: Knijnenburg & Kobsa
Anticipated satisfaction with
the system (intention to use):
6 items, e.g. “I would
recommend the system
to others”
Lower for any justification!
*"
1"
**"
*"
***"
*"
*"
0%"
10%"
20%"
30%"
40%"
50%"
60%"
70%"
80%"
90%"
100%"
Context"first" Demographics"first" Context"first" Demograpics"first"
Disclosure*behavior**
Demographics*disclosure * *Context*disclosure*
none" useful"for"you" #"of"others" useful"for"others" explanaDon"
bit.ly/tiis2013
44. INFORMATION AND COMPUTER SCIENCES
Please send me Vortrex Newsletters and information.
Please do not send me Vortrex Newsletters and
information.
Please send me Vortrex Newsletters and information.
Please do not send me Vortrex Newsletters and
information.
Figure 4: Subjects were assigned one of the following conditions
in the registration page.
3.1. Data Analysis and Results
The mean levels of participations in each experimental condition are
reported in Table 1 below.
Table 1: Mean participation levels as a function of frames and
4.
In the
inher
defau
onlin
The t
the s
Conn
actio
nega
conv
posit
Framing and Defaults: Lai and Hui
0%
25%
37%
53%
D
A
B
C
45. INFORMATION AND COMPUTER SCIENCES
Problems with Privacy Nudging
What should be the purpose of the nudge?
“More data collection = better, e.g. for personalization”
Techniques to increase disclosure cause reactance in the
more privacy-minded users
“Privacy is an absolute right“
More difficult for less privacy-minded users to enjoy the
benefits that disclosure would provide
46. INFORMATION AND COMPUTER SCIENCES
Problems with Privacy Nudging
Smith, Goldstein & Johnson:
“What is best for
consumers depends upon
characteristics of the
consumer: An outcome
that maximizes consumer
welfare may be
suboptimal for some
consumers in a context
where there is
heterogeneity in
preferences.”
47. INFORMATION AND COMPUTER SCIENCES
Summary of part 2
Nudges work
Defaults and justifications
can influence users’
decisions
But we cannot nudge
everyone the same way!
Users differ in their
disclosure preferences
Nudges should respect
these differences
49. INFORMATION AND COMPUTER SCIENCES
What kind of system helps users find what
they want in the presence of heterogeneous
preferences?
A recommender system!
(more specifically, a Privacy Adaptation Procedure)
50. INFORMATION AND COMPUTER SCIENCES
Towards Privacy Adaptation
“Figure out what people want, then help them do that.”
Explicate the privacy calculus/heuristics
What best captures people’s privacy preferences? What
are the underlying reasons to disclose or not?
Contextualize the privacy calculus/heuristics
Who discloses and who doesn’t? What do they disclose
and what do they withhold? Under what circumstances do
they disclose?
51. INFORMATION AND COMPUTER SCIENCES
Contextualize
Privacy
decision
different users
differentcontext
Contextualizing privacy
The optimal justification and
default may depend on:
-type of info (what)
-user characteristics (who)
-recipient (to whom)
-etc...
52. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
Type of data ID Items
Facebook activity
1 Wall
Facebook activity
2 Status updates
Facebook activity 3 Shared linksFacebook activity
4 Notes
Facebook activity
5 Photos
Location
6 Hometown
Location 7 Location (city)Location
8 Location (state/province)
Contact info
9 Residence (street address)
Contact info 11 Phone numberContact info
12 Email address
Life/interests
13 Religious views
Life/interests 14 Interests (favorite movies, etc.)Life/interests
15 Facebook groups
bit.ly/privdim
53. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
Type of data ID Items
Facebook activity
1 Wall
Facebook activity
2 Status updates
Facebook activity 3 Shared linksFacebook activity
4 Notes
Facebook activity
5 Photos
Location
6 Hometown
Location 7 Location (city)Location
8 Location (state/province)
Contact info
9 Residence (street address)
Contact info 11 Phone numberContact info
12 Email address
Life/interests
13 Religious views
Life/interests 14 Interests (favorite movies, etc.)Life/interests
15 Facebook groups
“What?”
=
Four
dimensions
bit.ly/privdim
54. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
159 pps tend to share little information overall (LowD)
26 pps tend to share activities and interests (Act+IntD)
50 pps tend to share location and interests (Loc+IntD)
65 pps tend to share everything but contact info (Hi-ConD)
59 pps tend to share everything
“Who?”
=
Five
disclosure
profiles
bit.ly/privdim
55. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
Detect
class
member-
ship
bit.ly/privdim
56. INFORMATION AND COMPUTER SCIENCES
! !
!
75%
80%
85%
90%
95%
100%
BlogHeroes I♡WRK Codacare
Contact info Interests Job skills Health record
Example: Knijnenburg et al.
Please tell us more about yourself
BlogHeroes will assign a "guild" to you based on the information you provide below. Note that none
of the fields are required, but our classification will be better if you provide more information.
General info about me
Please provide some background info to get our matching process started.
Name (first): John (last): Smith
E-mail address: john@smith.com
Gender: Male
Age (years): 23
Address: 123 Main St.
City: New York State: NY Zip: 12345
What I do for a living
> For employers
> For investors
> Contact
> About us
Please enter your information
I WRK will find jobs based on the information you enter on this form.
None of the items on the form are required, but if you provide more
information the jobs will be a better match.
GENERAL AND CONTACT INFO
General and contact information
FIRST NAME
John
LAST NAME
Smith clear
AGE
23 clear
GENDER
Male clear
E-MAIL ADDRESS
john@smith.com clear
ADDRESS
123 Main St.
CITY
New York
STATE
NY
ZIP
12345 clear
Enter your details, please
Your personal Codacare health insurance policy will be based on the
information you provide. Please note that none of the items are
required, but the insurance will be better tailored to your needs if you
provide more information.
General information
Please provide your general information.
Name (first): (last):
fill
Address:
fillCity: State: Zip:
Gender:
fill
Age:
fill
E-‐mail:
fill
Health
“To
whom?”
matters
too!
57. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa
I do whatever
others do
I care about
the benefits
58. INFORMATION AND COMPUTER SCIENCES
disclosure tendency, where requesting context data first
leads to less threat and more trust.
Figure 4 compares for each group the best strategy (marked
with an arrow) against all other strategies. Strategies that
perform significantly worse than the best strategy are
labeled with a p-value.
Best Strategy to Achieve High Total Disclosure
Since it is best to ask demographics first to increase
demographics disclosure, and context first to increase
context disclosure, increasing total disclosure asks for a
compromise. The best way to attain this compromise is to
first choose a preferred request order, and then to select a
User type Context first Demographics first
Males with low
disclosure tendency
The ‘useful for you’ justification gives the
highest demographics disclosure.
Providing no justification gives the highest
context disclosure.
Females with low
disclosure tendency
Providing no justification gives the highest
demographics disclosure.
The ‘explanation’ justification keeps
context disclosure on par.
Males with high
disclosure tendency
The ‘useful for others’ justification keeps
demographics disclosure almost on par.
The ‘useful for you’ justification keeps
context disclosure on par.
Females with high
disclosure tendency
Providing no justification gives a high
demographics disclosure.
The ‘useful for you’ justification gives the
highest context disclosure.
Table 2: Best strategies to achieve high overall disclosures.
User type Best strategy
Males with low disclosure tendency Demographics first with ‘useful for you’.
Males with high disclosure tendency The ‘useful for you’ justification in any order.
Females with low disclosure tendency Context first with ‘useful for you’.
Females with high disclosure tendency Context first with no justification, but ‘useful for you’ is second
best.
Table 3: Best strategies to achieve high user satisfaction.
Example: Knijnenburg & Kobsa
bit.ly/iui2013
59. INFORMATION AND COMPUTER SCIENCES
The Adaptive Privacy Procedure
pshare = α + βitemtype + βusertype + βrecipienttype
• Determine the item-. user-, and recipient-type
• Select the default and justification that fits best
for this contextINPUT
{user, item, recipient} {defaults, justification}OUTPUT
60. INFORMATION AND COMPUTER SCIENCES
The Adaptive Privacy Procedure
Practical use:
-Automatic initial defaults in line with “disclosure profile”
-Personalized disclosure justifications
Relieves some of the burden of the privacy decision:
The right privacy-related information
The right amount of control
“Realistic empowerment”
61. INFORMATION AND COMPUTER SCIENCES
Summary of part 3
Smith, Goldstein & Johnson:
“the idea of an adaptive
default preserves
considerable consumer
autonomy [...] and strikes
a balance between
providing more choice
and providing the right
choices.”
62. INFORMATION AND COMPUTER SCIENCES
Final summary
1. Transparency and control
Rational privacy decision-making is bounded, and
transparency and control only increase choice difficulty
2. Privacy nudging and persuasion
Needs to move beyond the one-size-fits-all approach
3. Privacy Adaptation Procedure
The optimal balance between nudges and control