The document discusses approaches to simplifying privacy decisions through interactive and adaptive solutions. It first examines how transparency and control approaches have limitations due to bounded rationality, information overload, and choice overload. It then discusses privacy nudging and persuasion approaches using defaults, justifications, and framing to influence decisions. However, these approaches can also reduce user satisfaction and autonomy. The document proposes an adaptive privacy procedure to provide contextualized nudges based on a dynamic understanding of user concerns.
Consumer behavior
Week 2 of 13 of the 2007 Internet Marketing Course. Content is based in part on Dann, S and Dann S 2004 Strategic Internet Marketing 2.0, Milton: Wiley. Diagrams taken from the Dann and Dann text are copyright to their respective copyright holders.
You Tweeted WHAT?!: Legal Risks of Social MediaSMB Seattle
What liabilities do companies face when using social media platforms?
Kraig Baker, Chair of the Technology, e-Business and Digital Media Practice at Davis Wright Tremaine LLP delivers an enlightening and timely discussion to SMB Seattle about legal issues surrounding the corporate use of social media.
Social Distortion: Privacy, Consent, and Social Networksdariphagen
Brian Holland, visiting associate professor at the Dickinson School of Law at Penn State University, talks about Voluntary disclosure of personal information to private institutions. At the Conference on Privacy in Social Network Sites: www.privacyinsocialnetworksites.nl
Consumer behavior
Week 2 of 13 of the 2007 Internet Marketing Course. Content is based in part on Dann, S and Dann S 2004 Strategic Internet Marketing 2.0, Milton: Wiley. Diagrams taken from the Dann and Dann text are copyright to their respective copyright holders.
You Tweeted WHAT?!: Legal Risks of Social MediaSMB Seattle
What liabilities do companies face when using social media platforms?
Kraig Baker, Chair of the Technology, e-Business and Digital Media Practice at Davis Wright Tremaine LLP delivers an enlightening and timely discussion to SMB Seattle about legal issues surrounding the corporate use of social media.
Social Distortion: Privacy, Consent, and Social Networksdariphagen
Brian Holland, visiting associate professor at the Dickinson School of Law at Penn State University, talks about Voluntary disclosure of personal information to private institutions. At the Conference on Privacy in Social Network Sites: www.privacyinsocialnetworksites.nl
The Interwoven Complexities of Social Media, Privacy and Data SecurityArmstrong Teasdale
CLE Presentation: Daniel C. Nelson and Jeffrey Schultz attorneys at Armstrong Teasdale
Social media has infiltrated most aspects of society, presenting a wide range of potential legal issues for any attorney or business. To gain a thorough understanding of how social media's many intersections with changing privacy law and data security requirements impact your business, this presentation will discuss how to navigate through this tangled web.
The choice of a lawyer is an important decision and should not be based solely on this presentation. All rights are reserved and content may not be reproduced, disseminated or transferred, in any form or by means, except with the prior written consent of Armstrong Teasdale.
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Subscriber Churn Prediction Model using Social Network Analysis In Telecommunication Industry โดย เชษฐพงศ์ ปัญญาชนกุล อาจารย์ ดร. อานนท์ ศักดิ์วรวิชญ์
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox
ZoneFox is an award winning market leader in User Behaviour Analytics, providing critical insights around data-flow that you need to secure against the Insider Threat.
New General Data Protection Regulation (Agnes Andersson Hammarstrand)Nordic APIs
This is a session given by Agnes Andersson Hammarstrand at Nordic APIs 2016 Platform Summit on October 25th, in Stockholm Sweden.
Description:
This spring a new EU General Data Protection Regulation was adopted to replace the current personal data legislations. Companies that break the rules risk fines of up to 4 % of the worldwide group turnover. The new regulations entail a large number of news that all companies should be informed about. Among other things, IT systems need to be adapted to privacy under the principles of privacy by design.
Agnes Hammarstrand, partner at Delphi Law firm and expert within IT and online provides an introduction to the new regulations and what you need to do.
To become compliant with upcoming GDPR, organisations cannot rely solely on rules, these will protect against the known threats, while Machine Learning protects from the unknown.
The pre-conference workshop entitled 'Trust is a Terrible Thing to Waste' from the 2010 International Association of Privacy Professionals conference in Washington, D.C. The session reviewed why trust is important, how to handle crisis communications, and how to build trust before a crisis hits.
The Interwoven Complexities of Social Media, Privacy and Data SecurityArmstrong Teasdale
CLE Presentation: Daniel C. Nelson and Jeffrey Schultz attorneys at Armstrong Teasdale
Social media has infiltrated most aspects of society, presenting a wide range of potential legal issues for any attorney or business. To gain a thorough understanding of how social media's many intersections with changing privacy law and data security requirements impact your business, this presentation will discuss how to navigate through this tangled web.
The choice of a lawyer is an important decision and should not be based solely on this presentation. All rights are reserved and content may not be reproduced, disseminated or transferred, in any form or by means, except with the prior written consent of Armstrong Teasdale.
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Subscriber Churn Prediction Model using Social Network Analysis In Telecommunication Industry โดย เชษฐพงศ์ ปัญญาชนกุล อาจารย์ ดร. อานนท์ ศักดิ์วรวิชญ์
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox
ZoneFox is an award winning market leader in User Behaviour Analytics, providing critical insights around data-flow that you need to secure against the Insider Threat.
New General Data Protection Regulation (Agnes Andersson Hammarstrand)Nordic APIs
This is a session given by Agnes Andersson Hammarstrand at Nordic APIs 2016 Platform Summit on October 25th, in Stockholm Sweden.
Description:
This spring a new EU General Data Protection Regulation was adopted to replace the current personal data legislations. Companies that break the rules risk fines of up to 4 % of the worldwide group turnover. The new regulations entail a large number of news that all companies should be informed about. Among other things, IT systems need to be adapted to privacy under the principles of privacy by design.
Agnes Hammarstrand, partner at Delphi Law firm and expert within IT and online provides an introduction to the new regulations and what you need to do.
To become compliant with upcoming GDPR, organisations cannot rely solely on rules, these will protect against the known threats, while Machine Learning protects from the unknown.
The pre-conference workshop entitled 'Trust is a Terrible Thing to Waste' from the 2010 International Association of Privacy Professionals conference in Washington, D.C. The session reviewed why trust is important, how to handle crisis communications, and how to build trust before a crisis hits.
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...Adam Thierer
"The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital Privacy." A slide show by Adam Thierer presented on January 17, 2012 before George Mason University Law & Economics Center conference on Privacy, Regulation, & Antitrust.
While there is tendency to publicly acclaim GDPR as a wonderful advancement, the sad truth is that EU operators now need sophisticated techniques to extract at least part of the knowledge that is freely available in other Countries. One of the main tools is Data Anonymization. Full anonymization amounts to data destruction. But there are levels. What is actually required to be compliant? How different situations require different anonymization levels? How to measure?
Attitudes toward Online Availability of US Public RecordsSean Munson
Many have enthusiastically greeted the ability to search and view public records online as a great advance for transparency and accountability. Such ability, however, also creates value tensions with privacy and other important human values. In this paper, we report findings from a survey of 134 residents of the US Pacific Northwest on their awareness of and attitudes towards online access to political campaign records and real estate transaction histories, bringing to light some of the social implications of technological changes that increase ease of access to public records. We show that, while respondents often understood the reason behind making these records public, considerable concern about the current accessibility of these records exists, along with a precautionary indication that such open access may reduce public participation for some individuals.
European public and policy elite views of US tech companies
This presentation explores consumer attitudes to US tech companies in France, Germany, the UK and Brussels, how that interacts with media coverage, and what is driving the European regulatory agenda towards the internet and technology companies.
For more information please contact:
Chris Blundell: http://www.brunswickgroup.com/people/directory/chris-blundell/
Philippe Blanchard: http://www.brunswickgroup.com/people/directory/philippe-blanchard/
At the Advertising Research Foundation’s (ARF) 2011 annual re:think convention, a key issues forum presentation was held entitled Research Quality. The topic of Research Quality forum was Should We Dismantle the Factory?An Approach to Evaluate Data Collected from Multiple Sample Sources and Generated through Different Approaches. Measuring online research was discussed. George Terhanian, Ph.D. presented and Gian Fulgoni moderated.
Debunking the oft-repeated assertion that young people don\’t care about privacy, new research shows that Web users between the ages of 18 and 24 are highly protective of certain information about themselves.
This is report for a study about social media behaviour by Canadian advertising agency People from Cossette.
The goal of the research is to transcend trends and hype, avoid the brands and buzz of the moment, and focus on behaviour.
The research covered Canada, the US and the UK.
Achieving both GDPR Compliance and a Positive Customer ExperienceTransUnion
There’s plenty of fear-mongering going around, so what’s the upside?
We believe that complying with the upcoming General Data Protection Regulation (GDPR) provides an opportunity to create a competitive advantage rather than bringing about the end of the world as we know it.
Some of the core tenants of GDPR, such as Privacy by Design and Data Minimisation will give organizations the opportunity to rethink the customer relationship and their buying journey. Rather than considering security and customer experience separately, this change allows you to take a more holistic view of the customer experience.
Some simplified slides I developed to use in briefings and discussions about “data sharing” and the “data sharing” provisions in the Digital Economy Bill (now Digital Economy Act)
Similar to Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions (20)
Privacy in Mobile Personalized Systems - The Effect of Disclosure JustificationsBart Knijnenburg
Paper Presentation at the Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM) at the Symposium On Usable Privacy and Security (SOUPS) 2012
Paper can be found here: http://appanalysis.org/u-prism/soups12_mobile-final11.pdf
Full journal paper (under review): http://bit.ly/TiiSprivacy
Explaining the User Experience of Recommender Systems with User ExperimentsBart Knijnenburg
A talk I gave at the Netflix offices on July 2nd, 2012.
Please do not use any of the slides or their contents without my explicit permission (bart@usabart.nl for inquiries).
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2. INFORMATION AND COMPUTER SCIENCES
About me...
PhD candidate at UC Irvine
Recommender Systems:
- Choice overload
- Adaptive preference elicitation
- User-centric evaluation
- Social recommenders
Privacy:
- Form auto-completion tools
- App recommenders
- Location-sharing social
networks
Samsung research intern,
Google PhD Fellow
@usabart
3. INFORMATION AND COMPUTER SCIENCES
Outline
1. Transparency and control
Privacy calculus, paradoxes, and bounded rationality
2. Privacy nudging and persuasion
A solution inspired by decision sciences... with some flaws
3. Privacy Adaptation Procedure
Adaptive nudges based on a contextualized
understanding of users’ privacy concerns
5. INFORMATION AND COMPUTER SCIENCES
The Privacy Paradox
For many participants this behavior stands in sharp contrast
to their self-reported privacy attitude
- Spiekermann et al., 2001
Seventy percent of US consumers worry about online
privacy, but few take protective action
- Jupiter research report, 2002
Recent surveys, anecdotal evidence, and experiments have
highlighted an apparent dichotomy between privacy
attitudes and actual behavior
- Acquisti & Grossklags, 2005
7. INFORMATION AND COMPUTER SCIENCES
A model by Smith et al. 2011
Why aren’t these more
strongly related?
8.
9.
10.
11. INFORMATION AND COMPUTER SCIENCES
Horror stories
“My daughter [is] still in high
school, and you’re sending
her coupons for baby clothes
and cribs? Are you trying to
encourage her to get
pregnant?”
“I had a talk with my
daughter. It turns out [...]
she’s due in August. I owe
you an apology.”
12. INFORMATION AND COMPUTER SCIENCES
A model by Smith et al. 2011
Why aren’t these more
strongly related?
Control
Transparency
13. INFORMATION AND COMPUTER SCIENCES
Transparency and control
ControlTransparency
Informed consent
“companies should
provide clear descriptions
of [...] why they need the
data, how they will use it”
User empowerment
“companies should offer
consumers clear and
simple choices [...] about
personal data collection,
use, and disclosure”
14. INFORMATION AND COMPUTER SCIENCES
Are transparency and control really the key to
better privacy decisions?
16. INFORMATION AND COMPUTER SCIENCES
The Transparency Paradox
Transparency is useful for concerned users, but bad for
others
Makes them more fearful
Mentions of privacy (even favorable ones) often trigger
privacy concerns
17. INFORMATION AND COMPUTER SCIENCES
44
Example: John et al.43
Appendix C: Experiment 2A: Screenshots of survey interface manipulation.
Frivolous:
Baseline:
Serious:
18. INFORMATION AND COMPUTER SCIENCES
Example: John et al.
43
Appendix C: Experiment 2A: Screenshots of survey interface manipulation.
Frivolous:
Baseline:
20. INFORMATION AND COMPUTER SCIENCES
44
Example: John et al.43
Appendix C: Experiment 2A: Screenshots of survey interface manipulation.
Frivolous:
Baseline:
Serious:
21. INFORMATION AND COMPUTER SCIENCES
37
0.7
0.8
0.9
1
1.1
1.2
1.3
Serious Frivolous
AARrelativetooverallaverageAAR
withinquestiontype
Tame Intrusive
Figure 6. The average AAR within each inquiry condition, relative to the overall average AAR
for the questions of the given intrusiveness level (Experiment 2B). The value of 1 on the y axis
represents the overall average AAR.
Example: John et al.
22. INFORMATION AND COMPUTER SCIENCES
!
!
!
75%
80%
85%
90%
95%
100%
BlogHeroes I♡WRK Codacare
Auto
!
BlogHeroes
R
! !
!
75%
80%
85%
90%
95%
100%
BlogHeroes I♡WRK Codacare
Contact info Interests Job skills Health record
Control example: Knijnenburg et al.
Normally, people are more
likely to disclose information
when the type of requested
information matches the
purpose of the website
Please tell us more about yourself
BlogHeroes will assign a "guild" to you based on the information you provide below. Note that none
of the fields are required, but our classification will be better if you provide more information.
General info about me
Please provide some background info to get our matching process started.
Name (first): John (last): Smith
E-mail address: john@smith.com
Gender: Male
Age (years): 23
Address: 123 Main St.
City: New York State: NY Zip: 12345
What I do for a living
> For employers
> For investors
> Contact
> About us
Please enter your information
I WRK will find jobs based on the information you enter on this form.
None of the items on the form are required, but if you provide more
information the jobs will be a better match.
GENERAL AND CONTACT INFO
General and contact information
FIRST NAME
John
LAST NAME
Smith clear
AGE
23 clear
GENDER
Male clear
E-MAIL ADDRESS
john@smith.com clear
ADDRESS
123 Main St.
CITY
New York
STATE
NY
ZIP
12345 clear
Enter your details, please
Your personal Codacare health insurance policy will be based on the
information you provide. Please note that none of the items are
required, but the insurance will be better tailored to your needs if you
provide more information.
General information
Please provide your general information.
Name (first): (last):
fill
Address:
fillCity: State: Zip:
Gender:
fill
Age:
fill
E-‐mail:
fill
Health
23. INFORMATION AND COMPUTER SCIENCES
!
!
!
75%
80%
85%
90%
95%
100%
BlogHeroes I♡WRK Codacare
Auto
! ! !
BlogHeroes I♡WRK Codacare
Remove
!
BlogHeroes I♡
A
Control example: Knijnenburg et al.
Auto-completion tools
make it so easy to submit a
fully completed form that
users may skip weighing the
benefits and risk of disclosing
a certain piece of information
in a specific situation
Please tell us more about yourself
BlogHeroes will assign a "guild" to you based on the information you provide below. Note that none
of the fields are required, but our classification will be better if you provide more information.
General info about me
Please provide some background info to get our matching process started.
Name (first): John (last): Smith
E-mail address: john@smith.com
Gender: Male
Age (years): 23
Address: 123 Main St.
City: New York State: NY Zip: 12345
What I do for a living
Some guilds write about their jobs. Tell us more about yours, and we can provide a better match.
bit.ly/icis2013
!
Codacare
ealth record
24. INFORMATION AND COMPUTER SCIENCES
!
Codacare
! ! !
BlogHeroes I♡WRK Codacare
Remove
! ! !
BlogHeroes I♡WRK Codacare
Add
Control example: Knijnenburg et al.
Adding a simple “clear”
button reduces overall
disclosure and makes it more
purpose-specific again
Why?
Users have more control!
> For employers
> For investors
> Contact
> About us
Please enter your information
I WRK will find jobs based on the information you enter on this form.
None of the items on the form are required, but if you provide more
information the jobs will be a better match.
GENERAL AND CONTACT INFO
General and contact information
FIRST NAME
John
LAST NAME
Smith clear
AGE
23 clear
GENDER
Male clear
E-MAIL ADDRESS
john@smith.com clear
ADDRESS CITY STATE ZIPbit.ly/icis2013
25. INFORMATION AND COMPUTER SCIENCES
!
Codacare
! ! !
BlogHeroes I♡WRK Codacare
Add
Control example: Knijnenburg et al.
Using a “fill” button
instead does not further
reduce disclosure, and
actually leads to a higher
user satisfaction
Why?
Even more control!
Enter your details, please
Your personal Codacare health insurance policy will be based on the
information you provide. Please note that none of the items are
required, but the insurance will be better tailored to your needs if you
provide more information.
General information
Please provide your general information.
Name (first): (last):
fill
Address:
fill
City: State: Zip:
Gender:
fill
Age:
fill
E-‐mail:
fill
bit.ly/icis2013
26. INFORMATION AND COMPUTER SCIENCES
Example: Facebook
“bewildering tangle of options” (New York Times, 2010)
“labyrinthian” controls” (U.S. Consumer Magazine, 2012)
27. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
Introducing an “extreme”
sharing option
Nothing - City - Block
Add the option Exact
Expected:
Some will choose Exact
instead of Block
Unexpected:
Sharing increases across
the board!
B
N
privacy -->
benefits-->
C
E
bit.ly/chi2013privacy
28. INFORMATION AND COMPUTER SCIENCES
The Control Paradox
Decisions are too numerous
Most Facebook users
don’t know implications of
their own privacy settings!
Decisions are difficult
Uncertain and delayed
outcomes
Result: people just pick the
middle option!
29. INFORMATION AND COMPUTER SCIENCES
Bounded rationality
Why do transparency and
control not work?
People’s decisions are
inconsistent and seemingly
irrational
-Framing effects
-Default effects
-Order effects
30. INFORMATION AND COMPUTER SCIENCES
Please send me Vortrex Newsletters and information.
Please do not send me Vortrex Newsletters and
information.
Please send me Vortrex Newsletters and information.
Please do not send me Vortrex Newsletters and
information.
Figure 4: Subjects were assigned one of the following conditions
in the registration page.
3.1. Data Analysis and Results
The mean levels of participations in each experimental condition are
reported in Table 1 below.
Table 1: Mean participation levels as a function of frames and
4.
In the
inher
defau
onlin
The t
the s
Conn
actio
nega
conv
posit
Framing and defaults: Lai and Hui
0%
25%
37%
53%
D
A
B
C
31. INFORMATION AND COMPUTER SCIENCES
Default order: Acquisti et al.
Foot in the door
(innocuous requests first)
Door in the face
(risqué requests first)
33. INFORMATION AND COMPUTER SCIENCES
Bounded rationality
Why do transparency and
control not work?
Transparency:
Information overload
Control:
Choice overload
34. INFORMATION AND COMPUTER SCIENCES
Bounded rationality
Why do transparency and
control not work?
Transparency:
Information overload
Control:
Choice overload
35. INFORMATION AND COMPUTER SCIENCES
Summary of part 1
We need to move beyond
control and transparency
Rational privacy decision-
making is bounded
Transparency and control
increase choice difficulty
36. Privacy nudging and persuasion
A solution inspired by decision sciences... with some flaws
37. INFORMATION AND COMPUTER SCIENCES
Starting point...
People’s decisions are inconsistent and seemingly irrational,
therefore:
-People do not always choose what is best for them
-There is significant leeway to influence people's decisions
-Being objectively neutral is impossible
38. INFORMATION AND COMPUTER SCIENCES
Privacy Calculus
A new model
Decision
heuristics
Benefits
Behavioral reactions
(including disclosures)
Risk/
Costs
Nudge Nudge
Persuasion PersuasionJustification
Default
value
Default
order
Justification
39. INFORMATION AND COMPUTER SCIENCES
A new model
Default
value
Justification
A succinct reason to
disclose (or not disclose)
a piece of information
-Make it easier to
rationalize the decision
-Minimize the potential
regret of choosing the
wrong option
Relieve users from the
burden of making decisions
-Path of least resistance
-Implicit normative cue
(what I should do)
-Endowment effect (what
I have is worth more than
what I don’t have)
40. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa
5 justification types
None
Useful for you
Number of others
Useful for others
Explanation
bit.ly/tiis2013
43. INFORMATION AND COMPUTER SCIENCES
**" **"
***"
1"
$1,00"
$0,75"
$0,50"
$0,25"
0,00"
0,25"
0,50"
0,75"
1,00"
Sa#sfac#on)with))
the)system)
Justifications: Knijnenburg & Kobsa
Anticipated satisfaction with
the system (intention to use):
6 items, e.g. “I would
recommend the system
to others”
Lower for any justification!
*"
1"
**"
*"
***"
*"
*"
0%"
10%"
20%"
30%"
40%"
50%"
60%"
70%"
80%"
90%"
100%"
Context"first" Demographics"first" Context"first" Demograpics"first"
Disclosure*behavior**
Demographics*disclosure * *Context*disclosure*
none" useful"for"you" #"of"others" useful"for"others" explanaDon"
bit.ly/tiis2013
44. INFORMATION AND COMPUTER SCIENCES
Please send me Vortrex Newsletters and information.
Please do not send me Vortrex Newsletters and
information.
Please send me Vortrex Newsletters and information.
Please do not send me Vortrex Newsletters and
information.
Figure 4: Subjects were assigned one of the following conditions
in the registration page.
3.1. Data Analysis and Results
The mean levels of participations in each experimental condition are
reported in Table 1 below.
Table 1: Mean participation levels as a function of frames and
4.
In the
inher
defau
onlin
The t
the s
Conn
actio
nega
conv
posit
Framing and Defaults: Lai and Hui
0%
25%
37%
53%
D
A
B
C
45. INFORMATION AND COMPUTER SCIENCES
Problems with Privacy Nudging
What should be the purpose of the nudge?
“More data collection = better, e.g. for personalization”
Techniques to increase disclosure cause reactance in the
more privacy-minded users
“Privacy is an absolute right“
More difficult for less privacy-minded users to enjoy the
benefits that disclosure would provide
46. INFORMATION AND COMPUTER SCIENCES
Problems with Privacy Nudging
Smith, Goldstein & Johnson:
“What is best for
consumers depends upon
characteristics of the
consumer: An outcome
that maximizes consumer
welfare may be
suboptimal for some
consumers in a context
where there is
heterogeneity in
preferences.”
47. INFORMATION AND COMPUTER SCIENCES
Summary of part 2
Nudges work
Defaults and justifications
can influence users’
decisions
But we cannot nudge
everyone the same way!
Users differ in their
disclosure preferences
Nudges should respect
these differences
49. INFORMATION AND COMPUTER SCIENCES
What kind of system helps users find what
they want in the presence of heterogeneous
preferences?
A recommender system!
(more specifically, a Privacy Adaptation Procedure)
50. INFORMATION AND COMPUTER SCIENCES
Towards Privacy Adaptation
“Figure out what people want, then help them do that.”
Explicate the privacy calculus/heuristics
What best captures people’s privacy preferences? What
are the underlying reasons to disclose or not?
Contextualize the privacy calculus/heuristics
Who discloses and who doesn’t? What do they disclose
and what do they withhold? Under what circumstances do
they disclose?
51. INFORMATION AND COMPUTER SCIENCES
Contextualize
Privacy
decision
different users
differentcontext
Contextualizing privacy
The optimal justification and
default may depend on:
-type of info (what)
-user characteristics (who)
-recipient (to whom)
-etc...
52. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
Type of data ID Items
Facebook activity
1 Wall
Facebook activity
2 Status updates
Facebook activity 3 Shared linksFacebook activity
4 Notes
Facebook activity
5 Photos
Location
6 Hometown
Location 7 Location (city)Location
8 Location (state/province)
Contact info
9 Residence (street address)
Contact info 11 Phone numberContact info
12 Email address
Life/interests
13 Religious views
Life/interests 14 Interests (favorite movies, etc.)Life/interests
15 Facebook groups
bit.ly/privdim
53. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
Type of data ID Items
Facebook activity
1 Wall
Facebook activity
2 Status updates
Facebook activity 3 Shared linksFacebook activity
4 Notes
Facebook activity
5 Photos
Location
6 Hometown
Location 7 Location (city)Location
8 Location (state/province)
Contact info
9 Residence (street address)
Contact info 11 Phone numberContact info
12 Email address
Life/interests
13 Religious views
Life/interests 14 Interests (favorite movies, etc.)Life/interests
15 Facebook groups
“What?”
=
Four
dimensions
bit.ly/privdim
54. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
159 pps tend to share little information overall (LowD)
26 pps tend to share activities and interests (Act+IntD)
50 pps tend to share location and interests (Loc+IntD)
65 pps tend to share everything but contact info (Hi-ConD)
59 pps tend to share everything
“Who?”
=
Five
disclosure
profiles
bit.ly/privdim
55. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
Detect
class
member-
ship
bit.ly/privdim
56. INFORMATION AND COMPUTER SCIENCES
! !
!
75%
80%
85%
90%
95%
100%
BlogHeroes I♡WRK Codacare
Contact info Interests Job skills Health record
Example: Knijnenburg et al.
Please tell us more about yourself
BlogHeroes will assign a "guild" to you based on the information you provide below. Note that none
of the fields are required, but our classification will be better if you provide more information.
General info about me
Please provide some background info to get our matching process started.
Name (first): John (last): Smith
E-mail address: john@smith.com
Gender: Male
Age (years): 23
Address: 123 Main St.
City: New York State: NY Zip: 12345
What I do for a living
> For employers
> For investors
> Contact
> About us
Please enter your information
I WRK will find jobs based on the information you enter on this form.
None of the items on the form are required, but if you provide more
information the jobs will be a better match.
GENERAL AND CONTACT INFO
General and contact information
FIRST NAME
John
LAST NAME
Smith clear
AGE
23 clear
GENDER
Male clear
E-MAIL ADDRESS
john@smith.com clear
ADDRESS
123 Main St.
CITY
New York
STATE
NY
ZIP
12345 clear
Enter your details, please
Your personal Codacare health insurance policy will be based on the
information you provide. Please note that none of the items are
required, but the insurance will be better tailored to your needs if you
provide more information.
General information
Please provide your general information.
Name (first): (last):
fill
Address:
fillCity: State: Zip:
Gender:
fill
Age:
fill
E-‐mail:
fill
Health
“To
whom?”
matters
too!
57. INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa
I do whatever
others do
I care about
the benefits
58. INFORMATION AND COMPUTER SCIENCES
disclosure tendency, where requesting context data first
leads to less threat and more trust.
Figure 4 compares for each group the best strategy (marked
with an arrow) against all other strategies. Strategies that
perform significantly worse than the best strategy are
labeled with a p-value.
Best Strategy to Achieve High Total Disclosure
Since it is best to ask demographics first to increase
demographics disclosure, and context first to increase
context disclosure, increasing total disclosure asks for a
compromise. The best way to attain this compromise is to
first choose a preferred request order, and then to select a
User type Context first Demographics first
Males with low
disclosure tendency
The ‘useful for you’ justification gives the
highest demographics disclosure.
Providing no justification gives the highest
context disclosure.
Females with low
disclosure tendency
Providing no justification gives the highest
demographics disclosure.
The ‘explanation’ justification keeps
context disclosure on par.
Males with high
disclosure tendency
The ‘useful for others’ justification keeps
demographics disclosure almost on par.
The ‘useful for you’ justification keeps
context disclosure on par.
Females with high
disclosure tendency
Providing no justification gives a high
demographics disclosure.
The ‘useful for you’ justification gives the
highest context disclosure.
Table 2: Best strategies to achieve high overall disclosures.
User type Best strategy
Males with low disclosure tendency Demographics first with ‘useful for you’.
Males with high disclosure tendency The ‘useful for you’ justification in any order.
Females with low disclosure tendency Context first with ‘useful for you’.
Females with high disclosure tendency Context first with no justification, but ‘useful for you’ is second
best.
Table 3: Best strategies to achieve high user satisfaction.
Example: Knijnenburg & Kobsa
bit.ly/iui2013
59. INFORMATION AND COMPUTER SCIENCES
The Adaptive Privacy Procedure
pshare = α + βitemtype + βusertype + βrecipienttype
• Determine the item-. user-, and recipient-type
• Select the default and justification that fits best
for this contextINPUT
{user, item, recipient} {defaults, justification}OUTPUT
60. INFORMATION AND COMPUTER SCIENCES
The Adaptive Privacy Procedure
Practical use:
-Automatic initial defaults in line with “disclosure profile”
-Personalized disclosure justifications
Relieves some of the burden of the privacy decision:
The right privacy-related information
The right amount of control
“Realistic empowerment”
61. INFORMATION AND COMPUTER SCIENCES
Summary of part 3
Smith, Goldstein & Johnson:
“the idea of an adaptive
default preserves
considerable consumer
autonomy [...] and strikes
a balance between
providing more choice
and providing the right
choices.”
62. INFORMATION AND COMPUTER SCIENCES
Final summary
1. Transparency and control
Rational privacy decision-making is bounded, and
transparency and control only increase choice difficulty
2. Privacy nudging and persuasion
Needs to move beyond the one-size-fits-all approach
3. Privacy Adaptation Procedure
The optimal balance between nudges and control