Abstract
Recommender systems increasingly use contextual and demographical data as a basis for recommendations. Users, however, often feel uncomfortable providing such information. In a privacy-minded design of recommenders, users are free to decide for themselves what data they want to disclose about themselves. But this decision is often complex and burdensome, because the consequences of disclosing personal information are uncertain or even unknown. Although a number of researchers have tried to analyze and facilitate such information disclosure decisions, their research results are fragmented, and they often do not hold up well across studies. This article describes a unified approach to privacy decision research that describes the cognitive processes involved in users’ “privacy calculus” in terms of system-related perceptions and experiences that act as mediating factors to information disclosure. The approach is applied in an online experiment with 493 participants using a mock-up of a context-aware recommender system. Analyzing the results with a structural linear model, we demonstrate that personal privacy concerns and disclosure justification messages affect the perception of and experience with a system, which in turn drive information disclosure decisions. Overall, disclosure justification messages do not increase disclosure. Although they are perceived to be valuable, they decrease users’ trust and satisfaction. Another result is that manipulating the order of the requests increases the disclosure of items requested early but decreases the disclosure of items requested later.
Supplemental Material
Available for Download
The proof is given in an electronic appendix, available online in the ACM Digital Library.
- Ackerman, M. S., Cranor, L. F., and Reagle, J. 1999. Privacy in e-commerce: Examining user scenarios and privacy preferences. In Proceedings of the 1st ACM Conference on Electronic Commerce. ACM Press, 1--8. DOI:http://dx.doi.org/10.1145/336992.336995. Google ScholarDigital Library
- Acquisti, A. and Grossklags, J. 2005. Privacy and rationality in individual decision making. IEEE Secur. Privacy 3, 1, 26--33. DOI:http://dx.doi.org/10.1109/MSP.2005.22. Google ScholarDigital Library
- Acquisti, A. and Grossklags, J. 2008. What can behavioral economics teach us about privacy? In Digital Privacy: Theory, Technologies, and Practices, A. Acquisti, S. de Capitani di Vimercati, S. Gritzalis, and C. Lambrinoudakis Eds., Taylor & Francis, 363--377.Google Scholar
- Acquisti, A., John, L., and Loewenstein, G. 2009. What is privacy worth? In Proceedings of the 21st Workshop on Information Systems and Economics.Google Scholar
- Acquisti, A., John, L. K., and Loewenstein, G. 2011. The impact of relative standards on the propensity to disclose. J. Marketing Res. 1--15. DOI:http://dx.doi.org/10.1509/jmr.09.0215.Google Scholar
- Adomavicius, G. and Tuzhilin, A. 2011. Context-aware recommender systems. In Recommender Systems Handbook, F. Ricci, L. Rokach, B. Shapira and P. B. Kantor Eds., Springer, 217--253. DOI:http://dx.doi.org/10.1007/978-0-387-85820-3_7.Google Scholar
- Archer, R. L. and Berg, J. H. 1978. Disclosure reciprocity and its limits: A reactance analysis. J. Exp. Social Psych. 14, 6, 527--540. DOI:http://dx.doi.org/10.1016/0022-1031(78)90047-1.Google ScholarCross Ref
- Bélanger, F. and Crossler, R. E. 2011. Privacy in the digital age: A review of information privacy research in information systems. MIS Quart. 35, 4, 1017--1045. Google ScholarDigital Library
- Bentler, P. M. and Bonett, D. G. 1980. Significance tests and goodness of fit in the analysis of covariance structures. Psych. Bull. 88, 3, 588--606.Google ScholarCross Ref
- Besmer, A., Watson, J., and Lipford, H. R. 2010. The impact of social navigation on privacy policy configuration. In Proceedings of the 6th Symposium on Usable Privacy and Security. DOI:http://dx.doi.org/10.1145/1837110.1837120. Google ScholarDigital Library
- Böhmer, M., Bauer, G., and Krüger, A. 2010. Exploring the design space of context-aware recommender systems that suggest mobile applications. In Proceedings of the 2nd Workshop on Context-Aware Recommender Systems.Google Scholar
- Buchanan, T., Paine, C., Joinson, A. N., and Reips, U.-D. 2007. Development of measures of online privacy concern and protection for use on the internet. J. Amer. Soc. Inf. Sci. Tech. 58, 2, 157--165. DOI:http://dx.doi.org/10.1002/asi.20459. Google ScholarDigital Library
- Canny, J. 2002a. Collaborative filtering with privacy. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Press, 45--57. DOI:http://dx.doi.org/10.1109/SECPRI.2002.1004361. Google ScholarDigital Library
- Canny, J. 2002b. Collaborative filtering with privacy via factor analysis. In Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM Press, 238--245. DOI:http://dx.doi.org/10.1145/564376.564419. Google ScholarDigital Library
- Chellappa, R. K. and Sin, R. G. 2005. Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Inf. Tech. Manage. 6, 2, 181--202. DOI:http://dx.doi.org/10.1007/s10799-005-5879-y. Google ScholarDigital Library
- Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. 2005. Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 81--90. DOI:http://dx.doi.org/10.1145/1054972.1054985. Google ScholarDigital Library
- Culnan, M. J. 1993. “How did they get my name?”: An exploratory investigation of consumer attitudes toward secondary information use. MIS Quart. 17, 3, 341--363. DOI:http://dx.doi.org/10.2307/249775. Google ScholarDigital Library
- Davidsson, C. and Moritz, S. 2011. Utilizing implicit feedback and context to recommend mobile applications from first use. In Proceedings of the Workshop on Context-Awareness in Retrieval and Recommendation. ACM Press, 19--22. DOI:http://dx.doi.org/10.1145/1961634.1961639. Google ScholarDigital Library
- Egelman, S., Tsai, J., Cranor, L. F., and Acquisti, A. 2009. Timing is everything?: The effects of timing and placement of online privacy indicators. In Proceedings of the 27th International Conference on Human Factors in computing Systems. ACM Press, 319--328. DOI:http://dx.doi.org/10.1145/1518701.1518752. Google ScholarDigital Library
- Fitzsimons, G. J. and Lehmann, D. R. 2004. Reactance to recommendations: When unsolicited advice yields contrary responses. Marketing Sci. 23, 1, 82--94. DOI:http://dx.doi.org/10.1287/mksc.1030.0033. Google ScholarDigital Library
- Gigerenzer, G. and Goldstein, D. G. 1996. Reasoning the fast and frugal way: Models of bounded rationality. Psych. Rev. 103, 4, 650--669. DOI:http://dx.doi.org/10.1037/0033-295X.103.4.650.Google ScholarCross Ref
- Girardello, A. and Michahelles, F. 2010. AppAware: Which mobile applications are hot? In Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services. ACM Press, 431--434. DOI:http://dx.doi.org/10.1145/1851600.1851698. Google ScholarDigital Library
- Harris, L. and Associates. 1990. The Equifax Report on Consumers in the Information Age. Equifax Inc., Atlanta, GA.Google Scholar
- Harris, L. and Associates. 1991. Harris-Equifax Consumer Privacy Survey 1991. Equifax Inc., Atlanta, GA.Google Scholar
- Harris, L., Associates, and Westin, A. F. 1998. Personalized marketing and privacy on the net: What consumers want. Privacy Amer. Business Newsl.Google Scholar
- Harris, L., Westin, A. F., and Associates. 2003. Consumer Privacy Attitudes: A Major Shift Since 2000 and Why. Harris Interactive, Inc.Google Scholar
- Hassenzahl, M. 2005. The thing and I: Understanding the relationship between user and product. In Funology, Human-Computer Interaction Series, M. A. Blythe, K. Overbeeke, A. F. Monk and P. C. Wright Eds., Springer, 31--42. DOI:http://dx.doi.org/10.1007/1-4020-2967-5_4.Google Scholar
- Hu, L. and Bentler, P. M. 1999. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Struct. Equation Model.: A Multidisciplinary J. 6, 1, 1--55. DOI:http://dx.doi.org/10.1080/10705519909540118.Google ScholarCross Ref
- Hui, K.-L., Tan, B. C. Y., and Goh, C.-Y. 2006. Online information disclosure: Motivators and measurements. ACM Trans. Internet Technol. 6, 4, 415--441. DOI:http://dx.doi.org/10.1145/1183463.1183467. Google ScholarDigital Library
- Hui, K.-L., Teo, H. H., and Lee, S.-Y. T. 2007. The value of privacy assurance: An exploratory field experiment. MIS Quart. 31, 1, 19--33. Google ScholarDigital Library
- Iachello, G. and Hong, J. 2007. End-user privacy in human-computer interaction. Found. Trends in Human-Computer Interact. 1, 1, 1--137. DOI:http://dx.doi.org/10.1561/1100000004. Google ScholarDigital Library
- Jarvenpaa, S. and Tractinsky, N. 1999. Consumer trust in an internet store: A cross-cultural validation. J. Comput. Mediated Commun. 5, 2. DOI:http://dx.doi.org/10.1111/j.1083-6101.1999.tb00337.x.Google Scholar
- John, L. K., Acquisti, A., and Loewenstein, G. 2011. Strangers on a plane: Context-dependent willingness to divulge sensitive information. J. Consumer Res. 37, 5, 858--873. DOI:http://dx.doi.org/10.1086/656423.Google ScholarCross Ref
- Kahneman, D. and Tversky, A. 1979. Prospect theory: An analysis of decision under risk. Econometrica 47, 2, 263--292. DOI:http://dx.doi.org/10.2307/1914185.Google ScholarCross Ref
- Kahneman, D., Slovic, P., and Tversky, A. 1982. Judgment under Uncertainty: Heuristics and Biases. Cambridge University Press, Cambridge, UK.Google ScholarCross Ref
- Kahneman, D., Knetsch, J. L., and Thaler, R. H. 1990. Experimental tests of the endowment effect and the Coase theorem. J. Political Economy 98, 6, 1325--1348. DOI:http://dx.doi.org/10.1086/261737.Google ScholarCross Ref
- Keith, M. J., Babb, J. S., Lowry, P. B., Furner, C. P., and Abdullat, A. 2011. The Roles of privacy assurance, network effects, and information cascades in the adoption of and willingness to pay for location-based services with mobile applications. In Proceedings of the Dewald Roode Information Security Workshop. http://ifip.byu.edu/2011/Keith%20et%20al.%20Mobile%20Applications.pdf.Google Scholar
- Kittur, A., Chi, E. H., and Suh, B. 2008. Crowdsourcing user studies with Mechanical Turk. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM Press, 453--456. DOI:http://dx.doi.org/10.1145/1357054.1357127. Google ScholarDigital Library
- Knijnenburg, B. P. and Kobsa, A. 2013. Helping users with information disclosure decisions: Potential for adaptation. In Proceedings of the ACM International Conference on Intelligent User Interfaces. ACM Press, 407--416. DOI:http://dx.doi.org/10.1145/2449396.2449448. Google ScholarDigital Library
- Knijnenburg, B. P., Willemsen, M. C., Gantner, Z., Soncu, H., and Newell, C. 2012. Explaining the user experience of recommender systems. User Model. User-Adapted Interact. 22, 4--5, 441--504. DOI:http://dx.doi.org/10.1007/s11257-011-9118-4. Google ScholarDigital Library
- Kobsa, A. 2007. Privacy-enhanced web personalization. In The Adaptive Web: Methods and Strategies of Web Personalization, P. Brusilovsky, A. Kobsa, and W. Nejdl Eds., Springer, 628--670. DOI:http://dx.doi.org/10.1007/978-3-540-72079-9_21. Google ScholarDigital Library
- Kobsa, A. and Teltzrow, M. 2005. Contextualized communication of privacy practices and personalization benefits: Impacts on users’ data sharing and purchase behavior. In Revised Selected Papers of the 4th International Workshop on Privacy Enhancing Technologies, D. Martin and A. Serjantov Eds., Springer, 329--343. DOI:http://dx.doi.org/10.1007/b136164. Google ScholarDigital Library
- Kolter, J. and Pernul, G. 2009. Generating user-understandable privacy preferences. In Proceedings of the International Conference on Availability, Reliability and Security. IEEE, 299--306. DOI:http://dx.doi.org/10.1109/ARES.2009.89.Google Scholar
- Laufer, R. S. and Wolfe, M. 1977. Privacy as a concept and a social issue: A multidimensional developmental theory. J. Social Issues 33, 3, 22--42. DOI:http://dx.doi.org/10.1111/j.1540-4560.1977.tb01880.x.Google ScholarCross Ref
- Laufer, R. S., Proshansky, H. M., and Wolfe, M. 1973. Some analytic dimensions of privacy. In Proceedings of the Lund Conference on Architectural Psychology, R. Küller Ed., Dowden, Hutchinson & Ross.Google Scholar
- Lederer, S., Mankoff, J., and Dey, A. K. 2003. Who wants to know what when? Privacy preference determinants in ubiquitous computing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM Press, 724--725. DOI:http://dx.doi.org/10.1145/765891.765952. Google ScholarDigital Library
- Lee, H. J. and Park, S. J. 2007. MONERS: A news recommender for the mobile web. Expert Syst. Appl. 32, 1, 143--150. DOI:http://dx.doi.org/10.1016/j.eswa.2005.11.010.Google ScholarCross Ref
- Lee, J. and Lee, J. 2007. Context awareness by case-based reasoning in a music recommendation system. In Proceedings of the 4th International Symposium on Ubiquitous Computing Systems. H. Ichikawa, W.-D. Cho, I. Satoh, and H. Youn Eds., Springer, 45--58. DOI:http://dx.doi.org/10.1007/978-3-540-76772-5_4. Google ScholarDigital Library
- Li, H., Sarathy, R., and Xu, H. 2010. Understanding situational online information disclosure as a privacy calculus. J. Comput. Inf. Syst. 51, 1, 62--71.Google Scholar
- Li, H., Sarathy, R., and Xu, H. 2011. The role of affect and cognition on online consumers’ decision to disclose personal information to unfamiliar online vendors. Decision Support Syst. 51, 3, 434--445. DOI:http://dx.doi.org/10.1016/j.dss.2011.01.017. Google ScholarDigital Library
- Li, X. and Santhanam, R. 2008. Will it be disclosure or fabrication of personal information? An examination of persuasion strategies on prospective employees. Int. J. Inf. Secur. Privacy 2, 4, 91--109. DOI:http://dx.doi.org/10.4018/jisp.2008100105.Google ScholarCross Ref
- Mabley, K. 2000. Privacy vs. Personalization: Part III. Cyber Dialogue, Inc.Google Scholar
- Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Inf. Syst. Res. 15, 4, 336--355. DOI:http://dx.doi.org/10.1287/isre.1040.0032. Google ScholarDigital Library
- Metzger, M. J. 2004. Privacy, trust, and disclosure: Exploring barriers to electronic commerce. J. Comput. Mediated Commun. 9, 4.Google Scholar
- Metzger, M. J. 2006. Effects of site, vendor, and consumer characteristics on web site trust and disclosure. Commun. Res. 33, 3, 155--179. DOI:http://dx.doi.org/10.1177/0093650206287076.Google ScholarCross Ref
- Nissenbaum, H. F. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books, Stanford, CA. Google ScholarDigital Library
- Nowak, G. J. and Phelps, J. 1995. Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters. J. Direct Marketing 9, 3, 46--60. DOI:http://dx.doi.org/10.1002/dir.4000090307.Google ScholarCross Ref
- Oh, J.-M. and Moon, N. 2012. User-selectable interactive recommendation system in mobile environment. Multimedia Tools Appl. 57, 2, 295--313. DOI:http://dx.doi.org/10.1007/s11042-011-0737-x. Google ScholarDigital Library
- Patil, S., Page, X., and Kobsa, A. 2011. With a little help from my friends: can social navigation inform interpersonal privacy preferences? In Proceedings of the ACM Conference on Computer Supported Cooperative Work. ACM Press, 391--394. DOI:http://dx.doi.org/10.1145/1958824.1958885. Google ScholarDigital Library
- Polat, H. and Du, W. 2005a. Privacy-preserving collaborative filtering. Int. J. Electron. Commerce 9, 4, 9--35.Google ScholarCross Ref
- Polat, H. and Du, W. 2005b. SVD-based collaborative filtering with privacy. In Proceedings of the ACM Symposium on Applied Computing. ACM Press, 791--795. DOI:http://dx.doi.org/10.1145/1066677.1066860. Google ScholarDigital Library
- Pu, P., Chen, L., and Hu, R. 2011. A user-centric evaluation framework for recommender systems. In Proceedings of the 5th ACM Conference on Recommender Systems. ACM Press, 157--164. DOI:http://dx.doi.org/10.1145/2043932.2043962. Google ScholarDigital Library
- Ricci, F. 2011. Mobile recommender systems. Inf. Tech. Tourism 12, 3, 205--231. DOI:http://dx.doi.org/10.3727/109830511X12978702284390.Google ScholarCross Ref
- Rifon, N. J., LaRose, R., and Choi, S. M. 2005. Your privacy is sealed: Effects of web privacy seals on trust and personal disclosures. J. Consumer Affairs 39, 2, 339--360. DOI:http://dx.doi.org/10.1111/j.1745-6606.2005.00018.x.Google ScholarCross Ref
- Smith, H. J., Dinev, T., and Xu, H. 2011. Information privacy research: An interdisciplinary review. MIS Quart. 35, 4, 989--1015. Google ScholarDigital Library
- Smith, H. J., Milberg, S. J., and Burke, S. J. 1992. Concern for privacy instrument. Working document, School of Business, Georgetown University, Washington, DC.Google Scholar
- Smith, H. J., Milberg, S. J., and Burke, S. J. 1996. Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quart. 20, 2, 167--196. DOI:http://dx.doi.org/10.2307/249477. Google ScholarDigital Library
- Solove, D. J. 2006. A taxonomy of privacy. U. Penn. Law Rev. 154, 3, 477--564.Google ScholarCross Ref
- Spiekermann, S., Grossklags, J., and Berendt, B. 2001. E-privacy in 2nd generation e-commerce: Privacy Preferences versus actual Behavior. In Proceedings of the 3rd ACM Conference on Electronic Commerce. ACM Press, 38--47. DOI:http://dx.doi.org/10.1145/501158.501163. Google ScholarDigital Library
- Stewart, K. A. and Segars, A. H. 2002. An empirical examination of the concern for information privacy instrument. Inf. Syst. Res. 13, 1, 36--49. DOI:http://dx.doi.org/10.1287/isre.13.1.36.97. Google ScholarDigital Library
- Taylor, D., Davis, D., and Jillapalli, R. 2009. Privacy concern and online personalization: The moderating effects of information control and compensation. Electronic Commerce Res. 9, 3, 203--223. DOI:http://dx.doi.org/10.1007/s10660-009-9036-2. Google ScholarDigital Library
- Teo, H. H., Wan, W., and Li, L. 2004. Volunteering personal information on the Internet: Effects of reputation, privacy initiatives, and reward on online consumer behavior. In Proceedings of the 37th Hawaii International Conference on System Sciences. IEEE Press, 181--190. DOI:http://dx.doi.org/10.1109/HICSS.2004.1265435. Google ScholarDigital Library
- Thaler, R. 1980. Toward a positive theory of consumer choice. J. Econ. Behav. Org. 1, 1, 39--60. DOI:http://dx.doi.org/10.1016/0167-2681(80)90051-7.Google ScholarCross Ref
- Tsai, J. Y., Egelman, S., Cranor, L., and Acquisti, A. 2010. The effect of online privacy information on purchasing behavior: An experimental study. Inf. Syst. Res. DOI:http://dx.doi.org/10.1287/isre.1090.0260. Google ScholarDigital Library
- Turow, J., King, J., Hoofnagle, C. J., Bleakley, A., and Hennessy, M. 2009. Americans reject tailored advertising and three activities that enable it. Manuscript (posted on the Social Science Research Network http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1478214).Google Scholar
- Van de Garde-Perik, E., Markopoulos, P., de Ruyter, B., Eggen, B., and Ijsselsteijn, W. 2008. Investigating privacy attitudes and behavior in relation to personalization. Social Sci. Comput. Rev. 26, 1, 20--43. DOI:http://dx.doi.org/10.1177/0894439307307682. Google ScholarDigital Library
- Wang, W. and Benbasat, I. 2007. Recommendation agents for electronic commerce: Effects of explanation facilities on trusting beliefs. J. Manage. Inf. Syst. 23, 4, 217--246. Google ScholarDigital Library
- Wenning, R. and Schunter, M. 2006. The platform for privacy preferences 1.1 (P3P1.1) Specification. W3C Working Group Note.Google Scholar
- Westin, A. F., Harris, L., et al. 1981. The Dimensions of Privacy: A National Opinion Research Survey of Attitudes toward Privacy. Garland Publishing, New York.Google Scholar
- Xu, H., Luo, X. (Robert), Carroll, J. M., and Rosson, M. B. 2011. The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Syst. 51, 42--52. DOI:http://dx.doi.org/10.1016/j.dss.2010.11.017. Google ScholarDigital Library
- Xu, H., Teo, H.-H., Tan, B., and Agarwal, R. 2009. The role of push-pull technology in privacy calculus: The case of location-based services. J. Manage. Inf. Syst. 26, 3, 135--174. DOI:http://dx.doi.org/10.2753/MIS0742-1222260305. Google ScholarDigital Library
- Zhang, N., Wang, C., and Xu, Y. 2011. Privacy in online social networks. In Proceedings of the International Conference on Information Systems. http://aisel.aisnet.org/icis2011/proceedings/ISsecurity/3.Google Scholar
- Zheng, V. W., Zheng, Y., Xie, X., and Yang, Q. 2012. Towards mobile intelligence: Learning from GPS history data for collaborative recommendation. Artif. Intell. 184--185, 17--37. DOI:http://dx.doi.org/10.1016/j.artint.2012.02.002. Google ScholarDigital Library
Index Terms
- Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems
Recommendations
Helping users with information disclosure decisions: potential for adaptation
IUI '13: Proceedings of the 2013 international conference on Intelligent user interfacesPersonalization relies on personal data about each individual user. Users are quite often reluctant though to disclose information about themselves and to be "tracked" by a system. We investigated whether different types of rationales (justifications) ...
Recommender Systems for Privacy Management: A Framework
HASE '14: Proceedings of the 2014 IEEE 15th International Symposium on High-Assurance Systems EngineeringSocial media and online service providers are increasingly collecting personal information. In order for users to make decisions about their online privacy, they will have to read through a dense and hard-to-understand privacy policy. We developed a ...
Preventing sensitive relationships disclosure for better social media preservation
A fundamental aspect of all social networks is information sharing. It is one of the most common forms of online interaction that is tightly associated with social media preservation and information disclosure. As such, information sharing is commonly ...
Comments