Understanding Privacy Decision- Making Using Social Exchange Theory

Size: px
Start display at page:

Download "Understanding Privacy Decision- Making Using Social Exchange Theory"

Transcription

1 Understanding Privacy Decision- Making Using Social Exchange Theory Jennifer King University of California Berkeley School of Information 102 South Hall Berkeley, CA Abstract Privacy surveys and related research consistently show that a majority of the U.S. public is concerned with information privacy. Despite this demonstrated concern, people often make privacy-related decisions that contradict their professed attitudes and preferences and even undermine their self-interest. This phenomenon, observed by researchers and cited by privacy critics, occurs often enough to garner it a name: the privacy paradox. I argue that Social Exchange Theory offers a framework for understanding this paradox by acknowledging the social aspects of privacy decision-making. Author Keywords Privacy; Social Exchange Theory; Risk; Behavioral Economics; Decision-making. ACM Classification Keywords H.5.m. Information interfaces and presentation (e.g., HCI): Miscellaneous. Copyright is held by the author/owner. CSCW 15, March 14-18, 2015, Vancouver, British Columbia, Canada. Introduction Privacy surveys and related research consistently show that a majority of the U.S. public is concerned with a variety information privacy issues.[6,9] Despite this demonstrated concern, people often make privacyrelated decisions that contradict their professed attitudes and preferences and even undermine their self-interest. This phenomenon, observed by researchers and cited by privacy critics, occurs often enough to garner it a name: the privacy paradox.[2, 12] Critics point to consumers use of technologies such as social media platforms or smartphones as evidence that consumers don t care about the privacy of their personal information. Their argument is that if consumers did care, they would make better choices by refusing to use technologies that pose privacy threats, or by choosing to disclose fewer bits of personal information or using privacy controls where available. In my own research, while I have encountered a small minority of participants who express few or no privacy concerns with their technology choices, most not only express concerns but also employ a range of strategies (some effective, others based on incorrect beliefs, and many highly creative) to address their privacy concerns within the confines of their technology choices.[7] Other researchers have observed users deploying a

2 range of strategies to mitigate privacy concerns, often working around the constraints of platforms or services.[3,11,13] I propose that one reason why the privacy paradox remains enigmatic is that research into privacy decision-making is currently dominated by two theoretical orientations behavioral economics and risk communications that do not consistently weigh the social factors that may influence how people make privacy choices. Privacy, however, is an ambiguous concept. In this paper, I define a privacy decision as one that impacts the disclosure of an individual s personal information. Personal information, in turn, is information that relates either to an identified or identifiable person.[10] Practicing privacy is an inherently social act; privacy is a meaningless concept without the presence of others. By ignoring the social aspects of practicing privacy (in this case, disclosure) we risk miss understanding why people make the choices they do. Every day, people make disclosure decisions with direct or indirect privacy consequences. For example: selecting a new fitness app and seeding it with health data; sharing a personal reflection with friends on a social networking service; clicking a box marked I Agree to this Privacy Policy (without reading the policy) before signing up for a new account for an online service. On the other end of a spectrum, there are disclosure decisions tied to a direct financial consequence, such as buying a product from an unfamiliar merchant, or using a mobile banking application. While the later set of privacy decisions would suggest a strong risk orientation given their connection to financial loss, it seems less clear that individual decision-makers would conceive of the privacy decisions in the first set of examples as risk calculations. If this is correct and they do not, efforts to guide their decision-making based on appealing to their sense of risk is likely askew. Social exchange theory (SET) offers a framework for anchoring this line of analysis. SET is a sociological theory which describes the relationships that develop within structures of mutual dependence between actors. [8] Actors within these relationships engage in reoccurring, mutually contingent exchanges with specific partners over time. [8] More specifically, Emerson argues that SET is a frame of reference that takes the movement of valued things (resources) through a social process as its focus. [5] Humans are wired to respond to reciprocity, a key element of social exchange. When individuals choose to disclose personal information, it is often a reciprocal response to having received something of value, such as the exchange of personal information for access to a free product or service. Even when disclosures are made to companies and organizations rather than to individuals, the disclosures are acts of social exchange primed by expectations of reciprocity and relationship building. SET offers a different lens for examining the interactions between individuals who disclose personal information and those that receive it beyond the current dominant foci of risk calculations or economic trade-offs. Consider a privacy-loving jogger contemplating using a new fitness app: when making the decision to provide the app with her personal information, the jogger is likely not actively calculating the disclosure in terms of benefit versus risk, or exclusively in terms of cost versus benefit, but rather

3 how the app is going to help her achieve her fitness goals. Secondarily, she may have concerns about the use and protection of the information she provides, but her first-order evaluation is focused on how this tool can help her improve her fitness, and the disclosure may seem an appropriate exchange for the service. When the relationship between our jogger and the application provider is examined as an exchange, her decision to use the fitness app despite its potential risk to her personal information looks less paradoxical. Considering the social elements allows us to evaluate the impact of other factors beyond the risk element and the economic value of the exchange: her motivations, the power relationship between the two parties, and the wider social context. According to Irwin Altman, the psychological practice of privacy occurs through boundary regulation, as people choose to whom and when to make selective disclosures of personal information.[1] It is through this process that we both manage access to the self and regulate our emotional needs for privacy. SET captures the social practice of disclosure, where the exchange of personal information enables us to build trust with others and reciprocate in exchange relationships. The practice of social privacy focuses on the dialectic process of regulating proximity and distance towards others. [4] Social exchange, whether comprised of goods and services or personal information, is a core component of human social organization. The exchange of personal information is generally not a unique practice (except, perhaps, for those who deliberately isolate themselves) but rather central to the social experience. Privacy norms reflect the common practices of what we disclose, to whom, and how disclosures are managed (e.g., are they kept confidential? Are they shared? Do they invoke judgment against the discloser?). Viewed through this lens, the act of disclosure, both to individuals as well as to companies and organizations, itself isn t a paradox. In many instances, it is a reasonable reciprocation to an exchange relationship. A key assumption in the privacy paradox is that as actors, we have the facts in hand and yet are inexorably choosing to work against our best interests. We understand how third party browser cookies work, yet we willingly chose to visit websites that deploy them. We understand that applications can access our personal data on our smartphones, but we persist in downloading them regardless. This assumption is short sighted. In fact, many technology users do not understand what is at stake when they download an app or visit a website. But more fundamentally, this argument misses the fact that we act as humans first and technology users second. Disclosure is often a reasonable, and even rational, response to so many of the decisions that we face, even those with detrimental privacy consequences. It s similar to the impulse that has us reaching for our smartphones to check to see who just texted us, despite the fact we are navigating a vehicle down a freeway at seventy miles per hour. The technology has been overlaid upon our existing social structures, but with none of the limitations inherent to our cognitive capacities. What can this approach inform us about privacy decision-making? Examining privacy choices using SET allows us to uncover users motivations, an aspect that both the risk communication and behavioral economics approaches tend to overlook. If users aren t approaching a privacy decision as a risk assessment,

4 then warnings and notices may not resonate with them, especially if they don t address a user s goals and motivations. Many users certainly are subject to the heuristics and cognitive biases exposed by the privacy research within the behavioral economics framework, but focusing on our cognitive limitations doesn t cover the entire spectrum of decision-making. More to the point, this focus may overlook the aspects of privacy decision-making that are socially influenced and that cannot be explained by deficiencies in normative models. One of my goals in outlining this line of analysis is to propose a means to ultimately unify these currently disparate strands of privacy research, especially as it is applicable to CSCW and more broadly, research in human-computer interaction. In many respects they are complementary, and an awareness of all three is References [1] Altman, Irwin. "The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding." (1975). [2] BARNES, Susan B. A privacy paradox: Social networking in the United States. First Monday, Sep Available at: /1312. [3] BOYD, danah; HARGITTAI, Eszter. Facebook privacy settings: Who cares?. First Monday, [S.l.], Jul Available at: [4] Dienlin, Tobias; Trepte, Sabine. Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitude3s and privacy behaviors. European Journal of Social Psychology, Eur. J. Soc. Psychol. (2014). likely necessary when confronting the complex reality of privacy choices in the real world. I suspect SET may most obviously be applicable to understanding personto-person disclosures, especially via social media platforms. Where applying SET may be less obvious (and potentially trickier) is in the examination of the relationship individuals have with organizations or companies, whether in a direct exchange (e.g., trading one s personal information for a free service), or indirectly (e.g., using a platform such as Facebook as an intermediary for exchanging information with other individuals). But just as introducing Altman s perspective has added richness to many privacy studies over the past few years, ideally introducing SET to privacy research will yield similar results as well as encourage a clearer division between the psychological and social influences on privacy decision-making. [5] Emerson, Richard M. Social Exchange Theory. Annual Review of Sociology, Vol. 2 (1976), pp [6] C. Hoofnagle, J. King, S. Li, and J. Turow. How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies? April 14, Available at: = [7] J. King. How Come I m Allowing Strangers To Go Through My Phone? Smartphones and Privacy Expectations. Presented at the Workshop on Usable Privacy and Security for Mobile Devices (U-PriSM) at SOUPS, July Washington, D.C., USA. [8] L. Molm and K. Cook. Social Exchange and Exchange Networks. In Sociological Perspectives on

5 Social Psychology. K. Cook, G. Fine, and J. House, eds. Boston: Allyn & Bacon, [9] Pew Internet Research Project. Anonymity, Privacy, and Security Online. Sept. 5, Available at: [10] Paul M. Schwartz & Daniel J. Solove, The PII Problem: Privacy and a New Concept of Personally Identifiable Information, 86 N.Y.U. L. Rev. 1814, (2011). [11] F. Stutzman and J. Kramer-Duffield. Friends only: examining a privacy-enhancing behavior in Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, USA, [12] S. Trepte, T. Dienlin, and L. Reinecke. Risky behaviors: How online experiences influence privacy behaviors. Von der Gutenberg-Galaxis zur Google- Galaxis [From the Gutenberg galaxy to the Google galaxy]. UVK, B. Stark, O. Quiring, N. Jackob, eds. Pp [13] Y. Wang, P. Leon, K. Scott, X. Chen, A. Acquisti, and L. Cranor. Privacy nudges for social media: an exploratory Facebook study. In Proceedings of the 22nd international conference on World Wide Web companion (WWW '13 Companion). International World Wide Web Conferences Steering Committee, Geneva, Switzerland,

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Xinru Page School of Information and Computer Sciences University of California, Irvine Irvine, CA 92697 USA

More information

Jun Zhang 1 School of Management, University of Science and Technology of China Hefei, Anhui, China ABSTRACT

Jun Zhang 1 School of Management, University of Science and Technology of China Hefei, Anhui, China ABSTRACT Regulate Privacy in SNS: Privacy Control on the Self-Ego Boundary and Dyadic-Boundary Chuang Wang School of Business Administration, South China University of Technology Guangzhou, Guangdong, China Jun

More information

Unpacking Privacy Paradox: A Dual Process Theory Approach

Unpacking Privacy Paradox: A Dual Process Theory Approach Unpacking Privacy Paradox: A Dual Process Theory Approach Emergent Research Forum Paper Zahra Aivazpour zahra.aivazpour@utsa.edu Rohit Valecha rohit.valecha@utsa.edu H. Raghav Rao hr.rao@utsa.edu Abstract

More information

Interactions and Applications for See- Through interfaces: Industrial application examples

Interactions and Applications for See- Through interfaces: Industrial application examples Interactions and Applications for See- Through interfaces: Industrial application examples Markus Wallmyr Maximatecc Fyrisborgsgatan 4 754 50 Uppsala, SWEDEN Markus.wallmyr@maximatecc.com Abstract Could

More information

Online Disclosure. Natalya N. Bazarova

Online Disclosure. Natalya N. Bazarova Online Disclosure Natalya N. Bazarova Bazarova, N. N. (2015). Online disclosure. In C. R. Berger & M. E. Roloff (Eds.), The International Encyclopedia of Interpersonal Communication. Hoboken, NJ: Wiley-Blackwell.

More information

Consenting Agents: Semi-Autonomous Interactions for Ubiquitous Consent

Consenting Agents: Semi-Autonomous Interactions for Ubiquitous Consent Consenting Agents: Semi-Autonomous Interactions for Ubiquitous Consent Richard Gomer r.gomer@soton.ac.uk m.c. schraefel mc@ecs.soton.ac.uk Enrico Gerding eg@ecs.soton.ac.uk University of Southampton SO17

More information

Running head: THE SUPPORTIVE BEHAVIORS OF OLDER 1. The Supportive Behaviors of Older Social Network Site Users

Running head: THE SUPPORTIVE BEHAVIORS OF OLDER 1. The Supportive Behaviors of Older Social Network Site Users Running head: THE SUPPORTIVE BEHAVIORS OF OLDER 1 The Supportive Behaviors of Older Social Network Site Users Frederic D. Stutzman, Valeda B. Stull, Cheryl A. Thompson The University of North Carolina

More information

Culturally Sensitive Design for Privacy: A case study of the Arabian Gulf

Culturally Sensitive Design for Privacy: A case study of the Arabian Gulf Culturally Sensitive Design for Privacy: A case study of the Arabian Gulf Norah Abokhodair The Information School University of Washington Seattle, WA, USA noraha@uw.edu norahak.wordpress.com Paste the

More information

Open Research Online The Open University s repository of research publications and other research outputs

Open Research Online The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications and other research outputs Evaluating User Engagement Theory Conference or Workshop Item How to cite: Hart, Jennefer; Sutcliffe,

More information

Social Interaction Design (SIxD) and Social Media

Social Interaction Design (SIxD) and Social Media Social Interaction Design (SIxD) and Social Media September 14, 2012 Michail Tsikerdekis tsikerdekis@gmail.com http://tsikerdekis.wuwcorp.com This work is licensed under a Creative Commons Attribution-ShareAlike

More information

TECHNOLOGY, INNOVATION AND HEALTH COMMUNICATION Why Context Matters and How to Assess Context

TECHNOLOGY, INNOVATION AND HEALTH COMMUNICATION Why Context Matters and How to Assess Context TECHNOLOGY, INNOVATION AND HEALTH COMMUNICATION Why Context Matters and How to Assess Context Ellen Balka, Ph.D. Senior Scholar, Michael Smith Foundation for Health Research Senior Scientist, Centre for

More information

Privacy, Technology and Economics in the 5G Environment

Privacy, Technology and Economics in the 5G Environment Privacy, Technology and Economics in the 5G Environment S A M A N T K H A J U R I A A S S I S T P R O F E S S O R, C M I K N U D E R I K S K O U B Y P R O F E S S O R, D I R E C T O R C M I S K O U B Y

More information

RepliPRI: Challenges in Replicating Studies of Online Privacy

RepliPRI: Challenges in Replicating Studies of Online Privacy RepliPRI: Challenges in Replicating Studies of Online Privacy Sameer Patil Helsinki Institute for Information Technology HIIT Aalto University Aalto 00076, FInland sameer.patil@hiit.fi Abstract Replication

More information

Personal tracking and everyday relationships: Reflections on three prior studies

Personal tracking and everyday relationships: Reflections on three prior studies Personal tracking and everyday relationships: Reflections on three prior studies John Rooksby School of Computing Science University of Glasgow Scotland, UK. John.rooksby@glasgow.ac.uk Abstract This paper

More information

Introduction to Humans in HCI

Introduction to Humans in HCI Introduction to Humans in HCI Mary Czerwinski Microsoft Research 9/18/2001 We are fortunate to be alive at a time when research and invention in the computing domain flourishes, and many industrial, government

More information

Privacy, Ethics, & Accountability. Lenore D Zuck (UIC)

Privacy, Ethics, & Accountability. Lenore D Zuck (UIC) Privacy, Ethics, & Accountability Lenore D Zuck (UIC) TAFC, June 7, 2013 First Computer Science Code of Ethics? [1942] 1. A robot may not injure a human being or, through inaction, allow a human being

More information

INFORMATION PRIVACY: AN INTERDISCIPLINARY REVIEW H. JEFF SMITH TAMARA DINEV HENG XU

INFORMATION PRIVACY: AN INTERDISCIPLINARY REVIEW H. JEFF SMITH TAMARA DINEV HENG XU INFORMATION PRIVACY: AN INTERDISCIPLINARY REVIEW H. JEFF SMITH TAMARA DINEV HENG XU WHY SUCH A BIG DEAL? 72 percent are concerned that their online behaviors were being tracked and profiled by companies

More information

Introduction. Data Source

Introduction. Data Source Introduction The emergence of digital technologies including the Internet, smartphones, tablets and other digital devices has increased both the complexity of the core definition of this construct, the

More information

Mobile Applications 2010

Mobile Applications 2010 Mobile Applications 2010 Introduction to Mobile HCI Outline HCI, HF, MMI, Usability, User Experience The three paradigms of HCI Two cases from MAG HCI Definition, 1992 There is currently no agreed upon

More information

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009 MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS Justin Becker, Hao Chen UC Davis May 2009 1 Motivating example College admission Kaplan surveyed 320 admissions offices in 2008 1 in 10 admissions officers

More information

Mediating Exposure in Public Interactions

Mediating Exposure in Public Interactions Mediating Exposure in Public Interactions Dan Chalmers Paul Calcraft Ciaran Fisher Luke Whiting Jon Rimmer Ian Wakeman Informatics, University of Sussex Brighton U.K. D.Chalmers@sussex.ac.uk Abstract Mobile

More information

THE STATE OF UC ADOPTION

THE STATE OF UC ADOPTION THE STATE OF UC ADOPTION November 2016 Key Insights into and End-User Behaviors and Attitudes Towards Unified Communications This report presents and discusses the results of a survey conducted by Unify

More information

Human-Centered Design. Ashley Karr, UX Principal

Human-Centered Design. Ashley Karr, UX Principal Human-Centered Design Ashley Karr, UX Principal Agenda 05 minutes Stories 10 minutes Definitions 05 minutes History 05 minutes Smartsheet s UX Process 30 minutes Learn by Doing Stories How does technology

More information

Research Report PRIVACY ATTITUDES, PERCEPTIONS, AND BEHAVIORS OF THE GERMAN POPULATION

Research Report PRIVACY ATTITUDES, PERCEPTIONS, AND BEHAVIORS OF THE GERMAN POPULATION FORUM PRIVATHEIT UND SELBSTBESTIMMTES LEBEN IN DER DIGITALEN WELT Research Report PRIVACY ATTITUDES, PERCEPTIONS, AND BEHAVIORS OF THE GERMAN POPULATION Research Report PRIVACY ATTITUDES, PERCEPTIONS,

More information

Designing the user experience of a multi-bot conversational system

Designing the user experience of a multi-bot conversational system Designing the user experience of a multi-bot conversational system Heloisa Candello IBM Research São Paulo Brazil hcandello@br.ibm.com Claudio Pinhanez IBM Research São Paulo, Brazil csantosp@br.ibm.com

More information

Replicating an International Survey on User Experience: Challenges, Successes and Limitations

Replicating an International Survey on User Experience: Challenges, Successes and Limitations Replicating an International Survey on User Experience: Challenges, Successes and Limitations Carine Lallemand Public Research Centre Henri Tudor 29 avenue John F. Kennedy L-1855 Luxembourg Carine.Lallemand@tudor.lu

More information

Social Network Behaviours to Explain the Spread of Online Game

Social Network Behaviours to Explain the Spread of Online Game Social Network Behaviours to Explain the Spread of Online Game 91 Marilou O. Espina orcid.org/0000-0002-4727-6798 ms0940067@yahoo.com Bukidnon State University Jovelin M. Lapates orcid.org/0000-0002-4233-4143

More information

Two Perspectives on Logic

Two Perspectives on Logic LOGIC IN PLAY Two Perspectives on Logic World description: tracing the structure of reality. Structured social activity: conversation, argumentation,...!!! Compatible and Interacting Views Process Product

More information

School of Journalism and Communication, Chinese University of Hong Kong, Shatin, Hong Kong

School of Journalism and Communication, Chinese University of Hong Kong, Shatin, Hong Kong 792691ABSXXX10.1177/0002764218792691American Behavioral ScientistChen research-article2018 Article Revisiting the Privacy Paradox on Social Media With an Extended Privacy Calculus Model: The Effect of

More information

Designing and Evaluating for Trust: A Perspective from the New Practitioners

Designing and Evaluating for Trust: A Perspective from the New Practitioners Designing and Evaluating for Trust: A Perspective from the New Practitioners Aisling Ann O Kane 1, Christian Detweiler 2, Alina Pommeranz 2 1 Royal Institute of Technology, Forum 105, 164 40 Kista, Sweden

More information

Introduction to Foresight

Introduction to Foresight Introduction to Foresight Prepared for the project INNOVATIVE FORESIGHT PLANNING FOR BUSINESS DEVELOPMENT INTERREG IVb North Sea Programme By NIBR - Norwegian Institute for Urban and Regional Research

More information

Published in: Proceedings of the Workshop on What to Study in HCI at CHI 2015 Conference on Human Factors in Computing Systems

Published in: Proceedings of the Workshop on What to Study in HCI at CHI 2015 Conference on Human Factors in Computing Systems Aalborg Universitet What to Study in HCI Kjeldskov, Jesper; Skov, Mikael; Paay, Jeni Published in: Proceedings of the Workshop on What to Study in HCI at CHI 2015 Conference on Human Factors in Computing

More information

Iowa Research Online. University of Iowa. Robert E. Llaneras Virginia Tech Transportation Institute, Blacksburg. Jul 11th, 12:00 AM

Iowa Research Online. University of Iowa. Robert E. Llaneras Virginia Tech Transportation Institute, Blacksburg. Jul 11th, 12:00 AM University of Iowa Iowa Research Online Driving Assessment Conference 2007 Driving Assessment Conference Jul 11th, 12:00 AM Safety Related Misconceptions and Self-Reported BehavioralAdaptations Associated

More information

Technical Issues and Requirements for privacy risk identification through Crowd-sourcing

Technical Issues and Requirements for privacy risk identification through Crowd-sourcing Technical Issues and Requirements for privacy risk identification through Crowd-sourcing Prof. Nancy Alonistioti nancy@di.uoa.gr Outline Introduction Problem Statement Crowd-sourcing Crowd-sourcing Techniques

More information

Child Computer Interaction

Child Computer Interaction Child Computer Interaction Child Computer Interaction is a new community for CHI. It is a place for contributions where a method or a design is proposed that is especially suited to children and that could

More information

Deep Interventions to Change How We Think and Act

Deep Interventions to Change How We Think and Act Deep Interventions to Change How We Think and Act Bran Knowles HighWire Centre for Doctoral Training The LICA Building Lancaster University Lancaster LA1 4WY, UK bran@highwire-dtc.com Abstract This paper

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

Running Head: IDENTIFYING GENERATIONAL DIFFERENCES OF IDENTITY

Running Head: IDENTIFYING GENERATIONAL DIFFERENCES OF IDENTITY Running Head: Identifying Generational Differences in the Formation of Identity in Online Communities and Networks Hannah Bluett Curtin University 1 Abstract This paper is to examine the generational differences

More information

The Home Business Cheat Sheet

The Home Business Cheat Sheet RichardGC.com The Home Business Cheat Sheet 8 essential concepts for you to learn, so that you can make an Income from home, without hounding your Friends & Family. Richard Crandall R i c h a r d G C.

More information

HCITools: Strategies and Best Practices for Designing, Evaluating and Sharing Technical HCI Toolkits

HCITools: Strategies and Best Practices for Designing, Evaluating and Sharing Technical HCI Toolkits HCITools: Strategies and Best Practices for Designing, Evaluating and Sharing Technical HCI Toolkits Nicolai Marquardt University College London n.marquardt@ucl.ac.uk Steven Houben Lancaster University

More information

Smart Specialisation in the Northern Netherlands

Smart Specialisation in the Northern Netherlands Smart Specialisation in the Northern Netherlands I. The Northern Netherlands RIS 3 The Northern Netherlands made an early start with developing its RIS3; it appeared already in 2012. The development of

More information

Self Disclosure. Danielle Catona and Kathryn Greene

Self Disclosure. Danielle Catona and Kathryn Greene 1 Self Disclosure Danielle Catona and Kathryn Greene Rutgers University, USA Individuals manage personal and/or private information through a variety of communication strategies. One aspect of information

More information

arxiv: v1 [cs.cy] 3 Jan 2017

arxiv: v1 [cs.cy] 3 Jan 2017 A Taxonomy of Privacy Constructs for Privacy-Sensitive Robotics Matthew Rueben 1, Cindy M. Grimm 1, Frank J. Bernieri 2, and William D. Smart 1 arxiv:1701.00841v1 [cs.cy] 3 Jan 2017 Abstract The introduction

More information

Day TWO: Find & Follow Building Your Community

Day TWO: Find & Follow Building Your Community Day TWO: Find & Follow Building Your Community The small print: All this material, whilst given freely for this course, is for your use only, and not for dissemination to anyone else, even inside your

More information

Four principles for selecting HCI research questions

Four principles for selecting HCI research questions Four principles for selecting HCI research questions Torkil Clemmensen Copenhagen Business School Howitzvej 60 DK-2000 Frederiksberg Denmark Tc.itm@cbs.dk Abstract In this position paper, I present and

More information

Personalized Privacy Assistant to Protect People s Privacy in Smart Home Environment

Personalized Privacy Assistant to Protect People s Privacy in Smart Home Environment Personalized Privacy Assistant to Protect People s Privacy in Smart Home Environment Yaxing Yao Syracuse University Syracuse, NY 13210, USA yyao08@syr.edu Abstract The goal of this position paper is to

More information

Presentation on the Panel Public Administration within Complex, Adaptive Governance Systems, ASPA Conference, Baltimore, MD, March 2011

Presentation on the Panel Public Administration within Complex, Adaptive Governance Systems, ASPA Conference, Baltimore, MD, March 2011 Göktuğ Morçöl Penn State University Presentation on the Panel Public Administration within Complex, Adaptive Governance Systems, ASPA Conference, Baltimore, MD, March 2011 Questions Posed by Panel Organizers

More information

Care-receiving Robot as a Tool of Teachers in Child Education

Care-receiving Robot as a Tool of Teachers in Child Education Care-receiving Robot as a Tool of Teachers in Child Education Fumihide Tanaka Graduate School of Systems and Information Engineering, University of Tsukuba Tennodai 1-1-1, Tsukuba, Ibaraki 305-8573, Japan

More information

CHI 2013: Changing Perspectives, Paris, France. Work

CHI 2013: Changing Perspectives, Paris, France. Work Gamification @ Work Janaki Kumar (moderator) 3420 Hillview Avenue Palo Alto, CA 94304. USA janaki.kumar@sap.com Mario Herger 3420 Hillview Avenue Palo Alto, CA 94304. USA Mario.herger@sap.com Sebastian

More information

AN EMPIRICAL ANALYSIS OF THE TECHNOLOGY CAMEL

AN EMPIRICAL ANALYSIS OF THE TECHNOLOGY CAMEL AN EMPIRICAL ANALYSIS OF THE TECHNOLOGY CAMEL Wallace A. Wood, Bryant University, wwood@bryant.edu Suhong Li, Bryant University, sli@bryant.edu ABSTRACT The new technology product adoption lifecycle (TALC)

More information

Comparative Interoperability Project: Collaborative Science, Interoperability Strategies, and Distributing Cognition

Comparative Interoperability Project: Collaborative Science, Interoperability Strategies, and Distributing Cognition Comparative Interoperability Project: Collaborative Science, Interoperability Strategies, and Distributing Cognition Florence Millerand 1, David Ribes 2, Karen S. Baker 3, and Geoffrey C. Bowker 4 1 LCHC/Science

More information

Understanding Human-Data Relationships: Data as Property

Understanding Human-Data Relationships: Data as Property Understanding Human-Data Relationships: Data as Property Casey Fiesler Information Science University of Colorado Boulder casey.fiesler@colorado.edu Jed R. Brubaker Information Science University of Colorado

More information

Tony Liao University of Cincinnati. Hocheol Yang Temple University. Songyi Lee. Kun Xu. Ping Feng. Spencer Bennett. Introduction

Tony Liao University of Cincinnati. Hocheol Yang Temple University. Songyi Lee. Kun Xu. Ping Feng. Spencer Bennett. Introduction Selected Papers of AoIR 2016: The 17 th Annual Conference of the Association of Internet Researchers Berlin, Germany / 5-8 October 2016 Tony Liao University of Cincinnati Hocheol Yang Songyi Lee Kun Xu

More information

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation Computer and Information Science; Vol. 9, No. 1; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education An Integrated Expert User with End User in Technology Acceptance

More information

Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011

Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011 Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011 Editor-in-Chief Jeremiah Spence Image Art!"##$%"#&&'()*+,-*.)/%0.1+2' ' ' ' ' ' ' ' ',..34556-789)5/:;

More information

Comments of the AMERICAN INTELLECTUAL PROPERTY LAW ASSOCIATION. Regarding

Comments of the AMERICAN INTELLECTUAL PROPERTY LAW ASSOCIATION. Regarding Comments of the AMERICAN INTELLECTUAL PROPERTY LAW ASSOCIATION Regarding THE ISSUES PAPER OF THE AUSTRALIAN ADVISORY COUNCIL ON INTELLECTUAL PROPERTY CONCERNING THE PATENTING OF BUSINESS SYSTEMS ISSUED

More information

Reflections on Design Methods for Underserved Communities

Reflections on Design Methods for Underserved Communities Reflections on Design Methods for Underserved Communities Tawanna R. Dillahunt School of Information University of Michigan Ann Arbor, MI 48105 USA tdillahu@umich.edu Sheena Erete College of Computing

More information

A Study on the Navigation System for User s Effective Spatial Cognition

A Study on the Navigation System for User s Effective Spatial Cognition A Study on the Navigation System for User s Effective Spatial Cognition - With Emphasis on development and evaluation of the 3D Panoramic Navigation System- Seung-Hyun Han*, Chang-Young Lim** *Depart of

More information

Questions on Design, Social Justice and Breastpumps

Questions on Design, Social Justice and Breastpumps Questions on Design, Social Justice and Breastpumps Catherine D Ignazio Emerson College Boston, MA 02115, USA catherine_dignazio@emerson.edu Abstract This paper outlines questions about the role of design

More information

Executive Summary: Understanding Risk Communication Best Practices and Theory

Executive Summary: Understanding Risk Communication Best Practices and Theory Executive Summary: Understanding Risk Communication Best Practices and Theory Report to the Human Factors/Behavioral Sciences Division, Science and Technology Directorate, U.S. Department of Homeland Security

More information

Ge Gao RESEARCH INTERESTS EDUCATION EMPLOYMENT

Ge Gao RESEARCH INTERESTS EDUCATION EMPLOYMENT Ge Gao ge.gao@uci.edu www.gegao.info 607.342.4538 RESEARCH INTERESTS Computer-supported cooperative work and social computing Computer-mediated communication Technology use in the workplace EDUCATION 2011

More information

A Field Experiment on Biased Beliefs and Information Overload in Consumer Privacy

A Field Experiment on Biased Beliefs and Information Overload in Consumer Privacy A Field Experiment on Biased Beliefs and Information Overload in Consumer Privacy Ignacio N. Cofone * and Adriana Z. Robertson ** Abstract While many scholars call for companies to implement consumer privacy

More information

Studying Norms and Social Change in a Digital Age: Identifying and Understanding a Multidimensional Gap Problem

Studying Norms and Social Change in a Digital Age: Identifying and Understanding a Multidimensional Gap Problem Studying Norms and Social Change in a Digital Age: Identifying and Understanding a Multidimensional Gap Problem De Kaminski, Marcin; Svensson, Måns; Larsson, Stefan; Alkan Olsson, Johanna; Rönkkö, Kari

More information

2. CYBERSPACE Relevance to Sustainability? Critical Features Knowledge Aggregation and Facilitation Revolution Four Cases in the Middle East**

2. CYBERSPACE Relevance to Sustainability? Critical Features Knowledge Aggregation and Facilitation Revolution Four Cases in the Middle East** ` 17.181/17.182 SUSTAINABLE DEVELOPMENT Week 4 Outline Cyberspace and Sustainability 1. ISSUES left over from WEEK 3 Brief Review Some Empirical Views 2. CYBERSPACE Relevance to Sustainability? Critical

More information

Book review: Profit and gift in the digital economy

Book review: Profit and gift in the digital economy Loughborough University Institutional Repository Book review: Profit and gift in the digital economy This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation:

More information

Balancing Privacy and Awareness in Home Media Spaces 1

Balancing Privacy and Awareness in Home Media Spaces 1 Balancing Privacy and Awareness in Home Media Spaces 1 Carman Neustaedter & Saul Greenberg University of Calgary Department of Computer Science Calgary, AB, T2N 1N4 Canada +1 403 220-9501 [carman or saul]@cpsc.ucalgary.ca

More information

UX Aspects of Threat Information Sharing

UX Aspects of Threat Information Sharing UX Aspects of Threat Information Sharing Tomas Sander Hewlett Packard Laboratories February 25 th 2016 Starting point Human interaction still critically important at many stages of Threat Intelligence

More information

Issues and Challenges in Coupling Tropos with User-Centred Design

Issues and Challenges in Coupling Tropos with User-Centred Design Issues and Challenges in Coupling Tropos with User-Centred Design L. Sabatucci, C. Leonardi, A. Susi, and M. Zancanaro Fondazione Bruno Kessler - IRST CIT sabatucci,cleonardi,susi,zancana@fbk.eu Abstract.

More information

Children s rights in the digital environment: Challenges, tensions and opportunities

Children s rights in the digital environment: Challenges, tensions and opportunities Children s rights in the digital environment: Challenges, tensions and opportunities Presentation to the Conference on the Council of Europe Strategy for the Rights of the Child (2016-2021) Sofia, 6 April

More information

Article. The Internet: A New Collection Method for the Census. by Anne-Marie Côté, Danielle Laroche

Article. The Internet: A New Collection Method for the Census. by Anne-Marie Côté, Danielle Laroche Component of Statistics Canada Catalogue no. 11-522-X Statistics Canada s International Symposium Series: Proceedings Article Symposium 2008: Data Collection: Challenges, Achievements and New Directions

More information

Board/Authority Authorized Course Framework Template

Board/Authority Authorized Course Framework Template Board/Authority Authorized Course Framework Template School District/Independent School Authority Name: Okanagan Skaha School District 67 Developed by: Fiona Bickell and Caroline Goodjohn School Name:

More information

Bridging the Gap: Moving from Contextual Analysis to Design CHI 2010 Workshop Proposal

Bridging the Gap: Moving from Contextual Analysis to Design CHI 2010 Workshop Proposal Bridging the Gap: Moving from Contextual Analysis to Design CHI 2010 Workshop Proposal Contact person: Tejinder Judge, PhD Candidate Center for Human-Computer Interaction, Virginia Tech tkjudge@vt.edu

More information

A Survey on Norwegian User s Perspective on Privacy in Recommender Systems

A Survey on Norwegian User s Perspective on Privacy in Recommender Systems A Survey on Norwegian User s Perspective on Privacy in Recommender Systems Itishree Mohallick and Özlem Özgöbek Norwegian University of Science and Technology, Trondheim 7491, Norway m.itishree@gmail.com

More information

Privacy as Impression Management

Privacy as Impression Management Institute for Software Research Privacy as Impression Management Sameer Patil patil@uci.edu Alfred Kobsa kobsa@ics.uci.edu ISR Technical Report # UCI-ISR-03-13 Institute for Software Research ICS2 210

More information

Executive Summary. Correspondence between age and grade. Grade Outside Quebec. Grade In Quebec Secondary

Executive Summary. Correspondence between age and grade. Grade Outside Quebec. Grade In Quebec Secondary Executive Summary Media Awareness Network (MNet) conducted the initial Young Canadians in a Wired World Phase I study in 2001 to provide educators, parents and policy makers with a factual framework for

More information

RETHINKING THE PRIVACY CALCULUS: ON THE ROLE OF DISPOSITIONAL FACTORS AND AFFECT

RETHINKING THE PRIVACY CALCULUS: ON THE ROLE OF DISPOSITIONAL FACTORS AND AFFECT RETHINKING THE PRIVACY CALCULUS: ON THE ROLE OF DISPOSITIONAL FACTORS AND AFFECT Research-in-Progress Flavius Kehr University of St. Gallen Chair of Operations Management Dufourstrasse 40A 9000 St. Gallen,

More information

10 Ways To Be More Assertive In Your Relationships By Barrie Davenport

10 Ways To Be More Assertive In Your Relationships By Barrie Davenport 10 Ways To Be More Assertive In Your Relationships By Barrie Davenport Anna hates to rock the boat. Whenever her best friend Linda suggests a place for dinner or a movie they might see together, Anna never

More information

INTERNET CONNECTIVITY

INTERNET CONNECTIVITY FULFILLING THE PROMISE OF INTERNET CONNECTIVITY The reach of Internet connectivity is both breathtaking and a cause for concern. In assessing its progress, the principal aspects to consider are access,

More information

Innovation in Quality

Innovation in Quality 0301 02 03 04 05 06 07 08 09 10 11 12 Innovation in Quality Labs THE DIFFERENT FACES OF THE TESTER: QUALITY ENGINEER, IT GENERALIST AND BUSINESS ADVOCATE Innovation in testing is strongly related to system

More information

Cohen, Nicole S. Writers' Rights: Freelance Journalism in a Digital Age. McGill-Queen's Press-MQUP, 2016.

Cohen, Nicole S. Writers' Rights: Freelance Journalism in a Digital Age. McGill-Queen's Press-MQUP, 2016. Book Review Cohen, Nicole S. Writers' Rights: Freelance Journalism in a Digital Age. McGill-Queen's Press-MQUP, 2016. This is perhaps the greatest contradiction of freelance cultural work: it is precisely

More information

Challenges for Establishing a Latin American Community in HCI/UX

Challenges for Establishing a Latin American Community in HCI/UX Challenges for Establishing a Latin American Community in HCI/UX J. Alfredo Sánchez Universidad de las Américas Puebla, México alfredo.sanchez@udlap.mx Elizabeth S. Furtado Universidade de Fortaleza, Brazil

More information

Ethics and technology

Ethics and technology Professional accountants the future: Ethics and technology International Ethics Standards Board for Accountants (IESBA) 19 June 2018 Agenda ACCA Professional Insights (PI) and technology Technology impact

More information

Integrated Driving Aware System in the Real-World: Sensing, Computing and Feedback

Integrated Driving Aware System in the Real-World: Sensing, Computing and Feedback Integrated Driving Aware System in the Real-World: Sensing, Computing and Feedback Jung Wook Park HCI Institute Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA, USA, 15213 jungwoop@andrew.cmu.edu

More information

Physical Affordances of Check-in Stations for Museum Exhibits

Physical Affordances of Check-in Stations for Museum Exhibits Physical Affordances of Check-in Stations for Museum Exhibits Tilman Dingler tilman.dingler@vis.unistuttgart.de Benjamin Steeb benjamin@jsteeb.de Stefan Schneegass stefan.schneegass@vis.unistuttgart.de

More information

Argumentative Interactions in Online Asynchronous Communication

Argumentative Interactions in Online Asynchronous Communication Argumentative Interactions in Online Asynchronous Communication Evelina De Nardis, University of Roma Tre, Doctoral School in Pedagogy and Social Service, Department of Educational Science evedenardis@yahoo.it

More information

Why patents DO matter to YOUR business

Why patents DO matter to YOUR business Why patents DO matter to YOUR business Robynne Sanders & Eliza Mallon DLA Piper 18 March 2015 Overview This session will cover: how to identify when patent protection should be obtained to protect your

More information

Mammoth Stickman plays Tetris: whole body interaction with large displays at an outdoor public art event

Mammoth Stickman plays Tetris: whole body interaction with large displays at an outdoor public art event Mammoth Stickman plays Tetris: whole body interaction with large displays at an outdoor public art event Derek Reilly reilly@cs.dal.ca Dustin Freeman Dept. of Computer Science University of Toronto Toronto,

More information

rainbottles: gathering raindrops of data from the cloud

rainbottles: gathering raindrops of data from the cloud rainbottles: gathering raindrops of data from the cloud Jinha Lee MIT Media Laboratory 75 Amherst St. Cambridge, MA 02142 USA jinhalee@media.mit.edu Mason Tang MIT CSAIL 77 Massachusetts Ave. Cambridge,

More information

Performativity and its implications for philosophy of science

Performativity and its implications for philosophy of science Performativity and its implications for philosophy of science Emilio Marti, Nov 19, 2018 Lecture Wissenschaftstheorie of Prof. Andreas Georg Scherer RSM - a force for positive change The beginning: Self-fulfilling

More information

Press Contact: Tom Webster. The Heavy Radio Listeners Report

Press Contact: Tom Webster. The Heavy Radio Listeners Report Press Contact: Tom Webster The April 2018 The first thing to concentrate on with this report is the nature of the sample. This study is a gold standard representation of the US population. All the approaches

More information

Comparing Privacy Attitudes of Knowledge Workers in India and the U.S.

Comparing Privacy Attitudes of Knowledge Workers in India and the U.S. Comparing Privacy Attitudes of Knowledge Workers in India and the U.S. Sameer Patil 1, Alfred Kobsa 1, Ajita John 2, and Doree Seligmann 2 1 Department of Informatics University of California, Irvine Irvine

More information

DiMe4Heritage: Design Research for Museum Digital Media

DiMe4Heritage: Design Research for Museum Digital Media MW2013: Museums and the Web 2013 The annual conference of Museums and the Web April 17-20, 2013 Portland, OR, USA DiMe4Heritage: Design Research for Museum Digital Media Marco Mason, USA Abstract This

More information

November 6, Keynote Speaker. Panelists. Heng Xu Penn State. Rebecca Wang Lehigh University. Eric P. S. Baumer Lehigh University

November 6, Keynote Speaker. Panelists. Heng Xu Penn State. Rebecca Wang Lehigh University. Eric P. S. Baumer Lehigh University Keynote Speaker Penn State Panelists Rebecca Wang Eric P. S. Baumer November 6, 2017 Haiyan Jia Gaia Bernstein Seton Hall University School of Law Najarian Peters Seton Hall University School of Law OVERVIEW

More information

A SYSTEMIC APPROACH TO KNOWLEDGE SOCIETY FORESIGHT. THE ROMANIAN CASE

A SYSTEMIC APPROACH TO KNOWLEDGE SOCIETY FORESIGHT. THE ROMANIAN CASE A SYSTEMIC APPROACH TO KNOWLEDGE SOCIETY FORESIGHT. THE ROMANIAN CASE Expert 1A Dan GROSU Executive Agency for Higher Education and Research Funding Abstract The paper presents issues related to a systemic

More information

Profitable Consulting Fees

Profitable Consulting Fees Profitable Consulting Fees Brought to you by: ConsultingVideos.com Copyright (C) 2008 - ConsultingVideos.com Page 1(22) Calculate Hourly Consulting Fees - Method 1 - Copyright (C) 2008 - ConsultingVideos.com

More information

Evaluating Socio-Technical Systems with Heuristics a Feasible Approach?

Evaluating Socio-Technical Systems with Heuristics a Feasible Approach? Evaluating Socio-Technical Systems with Heuristics a Feasible Approach? Abstract. In the digital world, human centered technologies are becoming more and more complex socio-technical systems (STS) than

More information

Optimism and Ethics An AI Reality Check

Optimism and Ethics An AI Reality Check Optimism and Ethics An AI Reality Check Artificial Intelligence is a ground-breaking technology that will fundamentally transform business on a global scale. We believe AI will act as the key driver of

More information

Human Autonomous Vehicles Interactions: An Interdisciplinary Approach

Human Autonomous Vehicles Interactions: An Interdisciplinary Approach Human Autonomous Vehicles Interactions: An Interdisciplinary Approach X. Jessie Yang xijyang@umich.edu Dawn Tilbury tilbury@umich.edu Anuj K. Pradhan Transportation Research Institute anujkp@umich.edu

More information

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. Point and Line Vulnerability as Bases for Predicting the Distribution of Power in Exchange Networks: Reply to Willer Author(s): Karen S. Cook, Mary R. Gillmore, Toshio Yamagishi Source: The American Journal

More information

If Our Research is Relevant, Why is Nobody Listening?

If Our Research is Relevant, Why is Nobody Listening? Journal of Leisure Research Copyright 2000 2000, Vol. 32, No. 1, pp. 147-151 National Recreation and Park Association If Our Research is Relevant, Why is Nobody Listening? KEYWORDS: Susan M. Shaw University

More information