Unpacking Privacy Paradox: A Dual Process Theory Approach

Similar documents
Stop Disclosing Personal Data about Your Future Self

Jun Zhang 1 School of Management, University of Science and Technology of China Hefei, Anhui, China ABSTRACT

The Surprising Lack of Effect of Privacy Concerns on Intention to Use Online Social Networks

Understanding Privacy Decision- Making Using Social Exchange Theory

RETHINKING THE PRIVACY CALCULUS: ON THE ROLE OF DISPOSITIONAL FACTORS AND AFFECT

INFORMATION PRIVACY: AN INTERDISCIPLINARY REVIEW H. JEFF SMITH TAMARA DINEV HENG XU

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media

Death To The Privacy Calculus?

Malaysian Users Perception towards Facebook as a Social Networking Site

Towards a Software Engineering Research Framework: Extending Design Science Research

Privacy in Online Social Networking: Applying a Privacy Calculus Model

RepliPRI: Challenges in Replicating Studies of Online Privacy

Information Privacy Awareness (IPA): A Review of the Use, Definition and Measurement of IPA

Introduction. Data Source

Impediments to designing and developing for accessibility, accommodation and high quality interaction

E-commerce Technology Acceptance (ECTA) Framework for SMEs in the Middle East countries with reference to Jordan

Wireless B2B Mobile Commerce: A Study on the Usability, Acceptance, and Process Fit

Online Disclosure. Natalya N. Bazarova

Contents. Anders Persson 1 Ritualization and vulnerability - face-to-face with Goffman s perspective on social interaction 2

Identifying Multiple Categories of Cybersecurity Skills that Affect User Acceptance of Protective Information Technologies

Critical and Social Perspectives on Mindfulness

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

Human-computer Interaction Research: Future Directions that Matter

Privacy in location-based social networks: Researching the interrelatedness of scripts and usage

TOWARDS EXPLAINING THE WILLINGNESS TO DISCLOSE PERSONAL SELF-TRACKING DATA TO SERVICE PROVIDERS

Open Research Online The Open University s repository of research publications and other research outputs

Designing and Testing User-Centric Systems with both User Experience and Design Science Research Principles

Microeconomics II Lecture 2: Backward induction and subgame perfection Karl Wärneryd Stockholm School of Economics November 2016

DOES PRIVACY STILL MATTER IN THE ERA OF WEB 2.0? A QUALITATIVE STUDY OF USER BEHAVIOR TOWARDS ONLINE SOCIAL NETWORKING ACTIVITIES

The limit of artificial intelligence: Can machines be rational?

The Hong Kong Polytechnic University. Subject Description Form

The Hidden Structure of Mental Maps

The Science of the Artificial

Social, Behavioral, and Economic Influences in Security Decision Making: Lessons from Early Work in Cybersecurity

INFORMATION TECHNOLOGY ACCEPTANCE BY UNIVERSITY LECTURES: CASE STUDY AT APPLIED SCIENCE PRIVATE UNIVERSITY

Is Artificial Intelligence an empirical or a priori science?

Culturally Sensitive Design for Privacy: A case study of the Arabian Gulf

Anchoring: Introducing a Behavioral Economic Topic in Principles of Economics Courses

HUMAN COMPUTER INTERFACE

Object-Mediated User Knowledge Elicitation Method

Online Public Services Access and the Elderly: Assessing Determinants of Behaviour in the UK and Japan

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

PART I: Workshop Survey

Diffusion of Virtual Innovation

Gamification and user types: Reasons why people use gamified services

Running head: DRAWING THE DESIGN PROCESS OF IDEA NETWORKS!1. How Are Ideas Connected? Drawing the Design Process of. Idea Networks in Global Game Jam

A Survey on Norwegian User s Perspective on Privacy in Recommender Systems

Product architecture and the organisation of industry. The role of firm competitive behaviour

Leibniz Universität Hannover. Masterarbeit

AI Principles, Semester 2, Week 1, Lecture 2, Cognitive Science and AI Applications. The Computational and Representational Understanding of Mind

A FORMAL METHOD FOR MAPPING SOFTWARE ENGINEERING PRACTICES TO ESSENCE

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies

SME Adoption of Wireless LAN Technology: Applying the UTAUT Model

A framework for enhancing emotion and usability perception in design

Privacy as Impression Management

GUIDE TO SPEAKING POINTS:

SEAri Short Course Series

Intelligent Systems. Lecture 1 - Introduction

THE MECA SAPIENS ARCHITECTURE

ECONOMIC AND SOCIAL RESEARCH COUNCIL IMPACT REPORT

Syllabus, Fall 2002 for: Agents, Games & Evolution OPIM 325 (Simulation)

Understanding the evolution of Technology acceptance model

Care-receiving Robot as a Tool of Teachers in Child Education

ty of solutions to the societal needs and problems. This perspective links the knowledge-base of the society with its problem-suite and may help

Annotated Bibliography: Artificial Intelligence (AI) in Organizing Information By Sara Shupe, Emporia State University, LI 804

Available online at ScienceDirect. Procedia Computer Science 37 (2014 )

Integration and Communication: Teaching the Key Elements to Successful Product Interface Design Vicki Haberman Georgia Institute of Technology

Procedia - Social and Behavioral Sciences 210 ( 2015 ) 43 51

UNDERSTANDING EMERGENCE AND OUTCOMES OF INFORMATION PRIVACY CONCERNS: A CASE OF FACEBOOK

HUMAN FACTORS FOR TECHNICAL COMMUNICATORS By Marlana Coe (Wiley Technical Communication Library) Lecture 6

Communicating Personal Health Information in Virtual Health Communities: A Theoretical Framework

ANALYSIS OF BENEFITS AND CHALLENGES TOWARDS MALAY TECHNOLOGICAL TERMINOLOGIES IN HIGHER SKILL LEARNING

Privacy in the Age of Augmented Reality

CHAPTER 1: INTRODUCTION TO SOFTWARE ENGINEERING DESIGN

Design as a phronetic approach to policy making

From Information Technology to Mobile Information Technology: Applications in Hospitality and Tourism

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation

Experimental Economics A EXPLORATIONS IN ECONOMIC HISTORY A FINANCE AND STOCHASTICS A FINANCIAL MANAGEMENT (el.

Frontiers of big and open linked data Seminar 11 May 2016, University of Minho, Braga

The Appropriation Paradox: Benefits and Burdens of Appropriating Collaboration Technologies

Game Theory. Department of Electronics EL-766 Spring Hasan Mahmood

EC Macroeconomic Theory Supplement 11 Professor Sanjay Chugh

Information Sociology

Multi-Touchpoint Design of Services for Troubleshooting and Repairing Trucks and Buses

Introduction to Humans in HCI

LEARNING DESIGN THROUGH MAKING PRODUCTION AND TACIT KNOWING

Building Governance Capability in Online Social Production: Insights from Wikipedia

A Three Cycle View of Design Science Research

A Conceptual Modeling Method to Use Agents in Systems Analysis

Factors Influence Self-Disclosure Amount in Social Networking Sites (SNSs)

Social Identity Theory

Inequality as difference: A teaching note on the Gini coefficient

Arbitrating Multimodal Outputs: Using Ambient Displays as Interruptions

Awareness and Understanding in Computer Programs A Review of Shadows of the Mind by Roger Penrose

Human factors research at the University of Twente and a perspective on trust in the design of healthcare technology

Greek engineers and libraries in the coming years: a (human) communication model

A review of Reasoning About Rational Agents by Michael Wooldridge, MIT Press Gordon Beavers and Henry Hexmoor

The Centrality of Awareness in the Formation of User Behavioral Intention Toward Preventive Technologies in the Context of Voluntary Use

Media and Communication (MMC)

Transcription:

Unpacking Privacy Paradox: A Dual Process Theory Approach Emergent Research Forum Paper Zahra Aivazpour zahra.aivazpour@utsa.edu Rohit Valecha rohit.valecha@utsa.edu H. Raghav Rao hr.rao@utsa.edu Abstract Prior studies showed that some users tend to act against their stated privacy concerns (a phenomenon commonly known as privacy paradox). In this study, we adopt the dual process theory as our theoretical basis to account for conscious and unconscious modes of individual decision making processes to examine privacy paradox in order to gain an understanding of the reasons which cause inconsistency between privacy concern and information disclosure. We also posit that privacy paradox can occur due to the conscious mode (affected by bounded rationality) as well as unconscious biases. Keywords Privacy paradox, privacy concern, information disclosure, dual process theory Introduction Social media and social platforms have become a part of daily routine of users around the world (Palen & Dourish, 2003). Many researchers have pointed out that privacy concern plagues the use of social media (Dwyer et al., 2007). Some of these studies have concluded that owing to privacy concern, users are afraid of disclosing their private information (Li, 2011; Li, 2012). On the other hand, some studies have suggested that users act against their stated privacy concerns (Acquisti & Grossklags, 2007; Norberg et al., 2007; Spiekermann et al., 2001). This phenomenon of disclosure of private information despite privacy concern has been termed as privacy paradox (Acquisti et al., 2015). Privacy paradox is an inconsistency between users privacy attitude and their privacy behavior (sometimes also referred to a discrepancy between users privacy intention and their privacy behavior). One reason for privacy paradox is that that users do not always follow a rational decision making process in disclosure of their private information (Brandimarte et al., 2013). Some studies have investigated privacy paradox (see Awad & Krishnan, 2006 and Smith et al. 2011 for some examples), however they have unfortunately provided contradicting results and incomplete explanations of the observations (Hallam & Zanella, 2017; p. 217). One reason for this might be the lack of theoretical insights into understanding the irrationalities associated with privacy paradox (Kokolakis, 2017). Dual process theories allow us to investigate information processing related to information disclosure decision making from both rational and irrational point of view which can be useful in unpacking the privacy paradox black-box. Using dual process theories, we can help explain why privacy Twenty-third Americas Conference on Information Systems, Boston, 2017 1

paradox exists, why this dichotomy between privacy intention and privacy behavior occurs, and why some researchers have had difficulty explaining the phenomenon. In accordance, we attempt to understand the privacy paradox based on dual process theories. The rest of this article proceeds as follows: in the next section we briefly look at the literature on privacy paradox, privacy decision making and dual process theory. Subsequently, we present the explanation for privacy paradox as derived from the application of the dual process theory and the conceptual model. Finally as part of our future work we propose our research methodology. Literature Review Privacy Paradox The pertinent literature offers plethora of definitions on privacy (Altman, 1976; Gross & Acquisti, 2005) which can be conceptualized from different perspective i.e. physical, social, psychological and information privacy (Hallam & Zanella, 2017). This study is mainly concerned with information privacy, which is defined as users right to keep information about themselves from being disclosed to others (Rognehaugh, 1999; p. 125). Previous studies show that users are concerned with disclosing their information on digital environments in variety of contexts such as online shopping and personal profile creation. However some investigations indicate that individuals will disclose their information despite their privacy concerns (Belanger & Crossler, 2011; Norberg et al., 2007; Smith et al., 2011). This discrepancy between attitude and behavior is known as privacy paradox. Many studies have shown multiple reasons for this paradox. For example, in an ecommerce context, people tend to trade their privacy and personal information usually at a low price (Acquisti & Grossklags, 2007). Privacy Decision Making In this emergent research paper, we examine privacy paradox as a decision of information disclosure. We propose that privacy decision making can be influenced by both rational and irrational processes. Individual s mental processes can be affected by constraints which will impact the rational thinking. Studies suggest that in some cases, user s privacy trade-offs is not based on a rational evaluation of the available choices but is rather based on heuristics (Acquisti & Grossklags 2005; Zafeiropoulou et al., 2013). Norberg et al. (2007) also argues that actual disclosure behavior is based on trust heuristics. In their model of privacy paradox, the information disclosure intention is affected by risk evaluation. This heuristic processing or information selectivity in the decision process influence behavior independently of intentions (Bender & Speckart, 1979). On the other hand most of the studies on privacy decision making use normative theories such as privacy calculus, expectancy theory and utility-maximizing, which assume the users are rational decision makers and are able to weight the benefits and risk of the information disclosure (Adjerid et al., 2016). In contrast to this view Herbert Simon bounded rationality (1956, 1959, 2000) posits that human rational behavior is shaped by a scissors whose two blades are the environment structure and the computational capabilities of the user. (Gigerenzer & Goldstein, 1996). For example, in the digital environment users usually are forced to provide their information. Privacy setting environments are also designated in a way that limits users options to protect their information since they may be unfamiliar with the process in which their information can be exploited and utilized by applications (Acquisti & Gross, 2006; Dinev & Hu 2007). Therefore we can argue that the privacy decision making process is affected by first the environment structure (e.g. the application options, privacy setting) and then by the computational capabilities of the users (imperfect information). In the next section, we introduce dual process theory and further explain how the two modes, conscious and unconscious can affect information disclosure. Twenty-third Americas Conference on Information Systems, Boston, 2017 2

Theoretical Background Dual Process Theories Several theorists suggest that humans have two separate memory systems (Alvarez et al., 1994; McClelland et al., 1995). The main argument is that human reasoning follows two distinct modes of thoughts: rational and irrational thinking (Newell & Shanks, 2014). Researchers suggest that information processing is constituted of an initial system that is experiential associative and unconscious, and a separate conscious system which is capable of rational thoughts (Osman, 2004). The conscious mode records information incrementally and works at a slower pace, in which the memory is a reflection of large sample of experiences. The unconscious mode learns from new information rapidly so that the memory remembers the latest experience when a similar incident occurs (Smith & DeCoster, 2000). Likewise, users decision making on information disclosure can be processed in either way, while the primary decision is influenced by unconscious mode, the conscious decision making is also is limited by factors such as time pressure. This is depicted in Figure 1. Conscious Decision Making Acquisti & Grossklags (2005) indicate that the privacy paradox is the result of systematic psychological deviations from rationality, incomplete information especially through not understanding the disclosure implications and bounded rationality. Their findings provide evidence of the simultaneous role of both normative and behavioral factors. Under bounded rationality the reasoning is fast and frugal as a result of time pressure and lack of information (Gigerenzer & Selten, 2002). In the presence of factors such as time constraints and cognitive limitations, people can misevaluate their privacy decisions (i.e. information disclosure). In other words, they may fail to rationally decide what information to release and what to withhold. Therefore, we propose that the privacy decision making is affected by conscious mode. Unconscious Decision Making Human decision making can be unconscious. Newell & Shanks (2014) for instance, indicate that inadequate procedures for assessing awareness and a tendency to uncritically accept conclusions that fit with our intuitions are the results of unconscious decision making. Likewise, unconscious biases can affect privacy decision making in social media. For example, in one such optimism bias, users may overestimate the potential benefits of disclosing information while ignoring the risks of information loss. Such biases within unconscious mode can affect information disclosure behavior. Conscious mode (Bounded rationality) Unconscious mode (Bias) Impacts Privacy decision making (Information disclosure) Figure 1. Conceptual Model Privacy Paradox Built upon the abovementioned reasoning, the privacy paradox is the inconsistency between privacy attitude and privacy behavior. While in the real world individuals are concerned about their privacy on the internet, their decision making process which is manifest in information disclosure in digital environment is affected by conscious and unconscious factors of decision making that prevent them from following a completely rational decision making process. This results in a behavior that is not consistent with their Twenty-third Americas Conference on Information Systems, Boston, 2017 3

primary stated concerns. The privacy decision making is affected by both unconscious biases and bounded rationality (in conscious mode), and can be important considerations in the conceptual model of information disclosure. Methodology (Future Research) The conscious mode in privacy decision making process is limited by bounded rationality. In this emergent study cognitive limitation, we will employ information imperfection, time constraints and environmental structure, the four dimensions of Simon s bounded rationality (1956, 1959, 2000) theory, to examine the effect of conscious mode on privacy decision making. Furthermore based on the prior studies (Zafeiropoulou et al. 2013; Acquisti et al. 2007), we will also utilize major unconscious factors such as psychological biases, valence effect and optimism bias that affect privacy decision making. In this study optimism bias will be applied as the major construct to measure the impact of unconscious mode on privacy decision making. Our continuing plan includes the empirical validation of the conceptual model by conducting a survey. References Acquisti, A., Gritzalis, S., Lambrinoudakis, C., and Vimercati, S. di. 2007. Digital Privacy: Theory, Technologies, and Practices, CRC Press. Acquisti, A., and Grossklags, J. 2005. Privacy and rationality in individual decision making, IEEE Security & Privacy, (3:1), pp. 26 33. Acquisti, A., and Grossklags, J. 2007. What can behavioral economics teach us about privacy, Digital Privacy: Theory, Technologies and Practices, (18), pp. 363 377. Adjerid, I., Peer, E., and Acquisti, A. 2016. Beyond the privacy paradox: Objective versus relative risk in privacy decision making, (available at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2765097). Agosto, D. E. 2002. Bounded rationality and satisficing in young people s Web-based decision making, Journal of the American Society for Information Science and Technology, (53:1), pp. 16 27 (doi: 10.1002/asi.10024). Altman, I. 1976. Privacy: A Conceptual Analysis, Environment and Behavior, (8:1), pp. 7 30. Alvarez, P., Zola-Morgan, S., and Squire, L. R. 1994. The animal model of human amnesia: long-term memory impaired and short-term memory intact, Proceedings of the National Academy of Sciences, (91:12), pp. 5637 5641. Awad, Naveen Farag, and Mayuram S. Krishnan. "The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization." MIS quarterly (2006): 13-28. Bélanger, F., and Crossler, R. E. 2011. Privacy in the digital age: a review of information privacy research in information systems, MIS quarterly, (35:4), pp. 1017 1042. Bentler, P. M., and Speckart, G. 1979. Models of attitude behavior relations., Psychological review, (86:5), p. 452. Brandimarte, Laura, Alessandro Acquisti, and George Loewenstein. "Misplaced confidences privacy and the control paradox." Social Psychological and Personality Science 4.3 (2013): 340-347. Dinev, T., and Hu, Q. 2007. The centrality of awareness in the formation of user behavioral intention toward protective information technologies, Journal of the Association for Information Systems, (8:7), p. 386. Dwyer, Catherine, Starr Hiltz, and Katia Passerini. "Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace." AMCIS 2007 proceedings (2007): 339. Gigerenzer, G., and Goldstein, D. G. 1996. Reasoning the fast and frugal way: models of bounded rationality., Psychological review, (103:4), p. 650. Gigerenzer, G., and Selten, R. 2002. Bounded Rationality: The Adaptive Toolbox, MIT Press. Gross, R., and Acquisti, A. 2005. Information Revelation and Privacy in Online Social Networks, in Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 05, New York, NY, USA: ACM, pp. 71 80 (doi: 10.1145/1102199.1102214). Hallam, C., and Zanella, G. 2017. Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards, Computers in Human Behavior, (68), pp. 217 227 (doi: 10.1016/j.chb.2016.11.033). Twenty-third Americas Conference on Information Systems, Boston, 2017 4

Kokolakis, S. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon, Computers & Security, (64), pp. 122 134. Li, Y. (2011). Empirical studies on online information privacy concerns: literature review and an integrative framework. Communications of the Association for Information Systems, 28(1), 453-496. Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481. McClelland, J. L., McNaughton, B. L., and O reilly, R. C. 1995. Why there are complementary learning systems in the hippocampus and neocortex: insights from the successes and failures of connectionist models of learning and memory., Psychological review, (102:3), p. 419. Newell, B. R., and Shanks, D. R. 2014. Unconscious influences on decision making: A critical review, Behavioral and Brain Sciences, (37:01), pp. 1 19. Norberg, P. A., Horne, D. R., and Horne, D. A. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors, Journal of Consumer Affairs, (41:1), pp. 100 126. Palen, Leysia, and Paul Dourish. "Unpacking privacy for a networked world." Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 2003. Osman, M. 2004. An evaluation of dual-process theories of reasoning, Psychonomic bulletin & review, (11:6), pp. 988 1010. Rognehaugh, Richard. The health information technology dictionary. Aspen Pub, 1999. Simon, H. A. 1956. Rational choice and the structure of the environment., Psychological review, (63:2), p. 129. Simon, H. A. 1959. Theories of decision-making in economics and behavioral science, The American economic review, (49:3), pp. 253 283. Simon, H. A. 2000. Bounded rationality in social science: Today and tomorrow, Mind & Society, (1:1), pp. 25 39. Smith, E. R., and DeCoster, J. 2000. Dual-process models in social and cognitive psychology: Conceptual integration and links to underlying memory systems, Personality and social psychology review, (4:2), pp. 108 131. Smith, Adam. "Privacy-preserving statistical estimation with optimal convergence rates." Proceedings of the forty-third annual ACM symposium on Theory of computing. ACM, 2011. Spiekermann, S., Grossklags, J., and Berendt, B. 2001. E-privacy in 2Nd Generation E-commerce: Privacy Preferences Versus Actual Behavior, in Proceedings of the 3rd ACM Conference on Electronic Commerce, EC 01, New York, NY, USA: ACM, pp. 38 47 (doi: 10.1145/501158.501163). Zafeiropoulou, A. M., Millard, D. E., Webber, C., and O Hara, K. 2013. Unpicking the privacy paradox: can structuration theory help to explain location-based privacy decisions?, in Proceedings of the 5th Annual ACM Web Science Conference, ACM, pp. 463 472 (available at http://dl.acm.org/citation.cfm?id=2464503). Twenty-third Americas Conference on Information Systems, Boston, 2017 5