Back
 JCC  Vol.2 No.4 , March 2014
On-Line Privacy Behavior: Using User Interfaces for Salient Factors
Abstract: The problem of privacy in social networks is well documented within literature; users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties. While numerous causes of poor behaviour have been suggested by re- search the role of the User Interface (UI) and the system itself is underexplored. The field of Per- suasive Technology would suggest that Social Network Systems persuade users to deviate from their normal or habitual behaviour. This paper makes the case that the UI can be used as the basis for user empowerment by informing them of their privacy at the point of interaction and remind- ing them of their privacy needs. The Theory of Planned Behaviour is introduced as a potential theoretical foundation for exploring the psychology behind privacy behaviour as it describes the salient factors that influence intention and action. Based on these factors of personal attitude, subjective norms and perceived control, a series of UIs are presented and implemented in con- trolled experiments examining their effect on personal information disclosure. This is combined with observations and interviews with the participants. Results from this initial, pilot experiment suggest groups with privacy salient information embedded exhibit less disclosure than the control group. This work reviews this approach as a method for exploring privacy behaviour and propos- es further work required.
Cite this paper: Hughes-Roberts, T. and Kani-Zabihi, E. (2014) On-Line Privacy Behavior: Using User Interfaces for Salient Factors. Journal of Computer and Communications, 2, 220-231. doi: 10.4236/jcc.2014.24029.
References

[1]   OFCOM Media Literacy Matters (2010) Online Trust and Privacy: People’s Attitude and Behaviour.

[2]   US Federal Trade Commission (2000) Privacy Online: Fair information Practices in the Electronic Marketplace: A Report to Con-gress. FTC, Washington DC.

[3]   Karahasanovic, A., Brandtz?g, P.B., Vanattenhoven, J., Lievens, B., Nielsen, K.T. and Pierson, J. (2009) Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications. Computer, 42, 42-49. http://dx.doi.org/10.1109/MC.2009.186

[4]   KaniZabihi, E. and Helmhout, M. (2011) Increasing Service Users’ Privacy Awareness by Introducing On-line Interactive Privacy Features. In: Pre-Proceedings of Nordsec 2011 16th Nordic Conference on Secure IT-Systems, Talinn, 26-28 October 2011, 287-306.

[5]   Gross, R. and Acquisti, A. (2005) Information Revelation and Privacy in Online Social Networks (The Facebook Case). ACM Workshop on Privacy in the Electronic Society, Virginia.

[6]   Palen, L. and Dourish, P. (2003) Unpacking “Privacy” for a Networked World. Proceeding of the SIGCHI Conference on Human Factors in Computer Systems.

[7]   Stutzman, F. (2006) An Evaluation of Identity-Sharing Behavior in Social Network Communities. iDMAa Journal, 3.

[8]   Acquisti, A. and Gross, R. (2006) Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. Proceedings of the 6th Workshop on Privacy Enhancing Technologies. http://dx.doi.org/10.1007/11957454_3

[9]   Breakwell, G.M. (2006) Research Methods in Psychology. Sage Publications Ltd, Oxford.

[10]   Ajzen, I. (1991) The Theory of Planned Behaviour. Organizational Behaviour and Human Decision Processes, 50, 179-211. http://dx.doi.org/10.1016/0749-5978(91)90020-T

[11]   Masiello, B. (2009) Deconstructing the Privacy Experience. IEEE Security and Privacy, 7, 68-70. http://dx.doi.org/10.1109/MSP.2009.88

[12]   Kolter, J. and Pernul, G. (2009) Generating User-Understandable Privacy Preferences. International Conference on Availability, Reliability and Security, 299-306.

[13]   Miller, R.E., Salmona, M. and Melton, J. (2011) Students and Social Networking Site: A Model of Inappropriate Posting. Proceedings of the Southern Association for Information Systems Conference, Atlanta.

[14]   Livingstone, S. (2008) Taking Risky Opportunities in Youthful Content Creation: Teenagers’ Use of Social Networking Sites for Intimacy, Privacy and Self-Expression. New Media and Society, 10, 393-411. http://dx.doi.org/10.1177/1461444808089415

[15]   Fogg, B.J. and Iizawa, D. (2008) Online Persuasion in Facebook and Mixi: A Cross-Cultural Comparison. In Persuasive, Berlin, 35-46.

[16]   Houghton, D.J. and Joinson, A. (2010) Privacy, Social Network Sites, and Social Relations. Journal of Technology in Human Services, 28, 74-94. http://dx.doi.org/10.1080/15228831003770775

[17]   Acquisti, A. and Grossklags, J. (2004) Privacy Attitudes and Privacy Behaviour: Losses, Gains and Hyperbolic Discounting. In: Camp, L.J. and Lewis, R., Eds., The Economics of Information Security, Klewer.

[18]   Wang, Y., et al. (2011) I Regretted the Minute I Pressed Share: A Qualitative Study of Regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, ACM. http://dx.doi.org/10.1145/2078827.2078841

[19]   LaRose, R. and Rifon, N. (2007) Promoting i-Safety: Effects of Privacy Warnings and Privacy Seals on Risk Assessment and Online Privacy Behaviour. The Journal of Consumer Affairs, 41, 127-149. http://dx.doi.org/10.1111/j.1745-6606.2006.00071.x

[20]   Brandimarte, M., Acquisti, A. and Loewenstien, G. (2012) Misplaced Confidences: Privacy and the Control Paradox. In: Workshop on the Economics of Information Security, Harvard.

[21]   Galletta, D.F. and Zhang, P. (2006) Human-Computer Interaction and Management Information Systems: Applications. Vol. 6, ME Sharpe.

[22]   Lyytined, K. (2010) HCI Research: Future Directions That Matter. AIS Transactions on Human-Computer Interaction, 2, 22-25.

[23]   P?tzsch, S. (2009) Privacy Awareness: A Means to Solve the Privacy Paradox. The Future of Identity, 226-236.

[24]   Lew, L., et al. (2011) Of Course I Wouldn?t Do That in Real Life: Advancing the Arguments for Increasing Realism in HCI Experiments. Computer Human Interaction.

[25]   Marcus, A. (1998) Metaphor Design in User Interfaces. Journal of Computer Documentation, 22, 43-57.

[26]   Portes, A. (1998) Social Capital: Its Origins and Applications in Modern Sociology. Annual Review of Sociology, 24, 1-24. http://dx.doi.org/10.1146/annurev.soc.24.1.1

[27]   Bandura, A. (1977) Self-Efficacy: Toward a Unifying Theory of Behavioural Change. Psychological Review, 84, 191- 215. http://dx.doi.org/10.1037/0033-295X.84.2.191

[28]   Macmillan, N.A. (2002) Signal Detection Theory. In: Wixted, J., Ed., Stevens’ Handbook of Experimental Psychology, John Wiley & Sons, New York. http://dx.doi.org/10.1002/0471214426.pas0402

[29]   Barnes, S.B. (2006) A Privacy Paradox: Social Networking in the United States. First Monday, 11. http://dx.doi.org/10.5210/fm.v11i9.1394

[30]   Milgra m, S. and Fleissner, R. (1974) Das Milgram-Experiment. Rowohlt.

[31]   Bishop, J. (2007) Increasing Participation in Online Communities: A Framework for Human-Computer Interaction. Computers in Human Behavior, 23, 1881-1893. http://dx.doi.org/10.1016/j.chb.2005.11.004

[32]   Bonneau, J., Anderson, J. and Church, L. (2009) Privacy Suites: Shared Privacy for Social Networks. 5th Symposium on Usable Privacy and Security.

[33]   Chiasson, S., et al. (2008) Influencing Users towards Better Passwords: Persuasive Cued Click-Points. In: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, Swin- ton, 121-130.

[34]   Fancher, R.E. (1973) Psychoanalytic Psychology: The Development of Freud’s Thought. WW Norton.

 
 
Top