skip to main content
10.1145/2468356.2468501acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
poster

Unlocking the privacy paradox: do cognitive heuristics hold the key?

Authors Info & Claims
Published:27 April 2013Publication History

ABSTRACT

Even though users have become increasingly concerned about their privacy online, they continue to disclose deeply personal information in a number of online venues, including e-commerce portals and social networking sites. Scholars have tried to explain this inconsistency between attitudes and behavior by suggesting that online users consciously weigh the trade-off between the costs and benefits of online information disclosure. We argue that online user behaviors are not always rational, but may occur due to expedient decision-making in the heat of the moment. Such decisions are based on cognitive heuristics (i.e., rules of thumb) rather than on a careful analysis of each transaction. Based on this premise, we seek to identify the specific triggers for disclosure of private information online. In the experiment reported here, we explore the operation of two specific heuristics-benefit and fuzzy boundary-in influencing privacy-related attitudes and behaviors. Theoretical and design implications are discussed.

References

  1. Ajzen, I. From intentions to actions: A theory of planned behavior. In J. Kuhl and J. Beckman, eds., Action-control: From cognition to behavior. Springer, Heidelberg, Germany, 1985, 11-- 39.Google ScholarGoogle Scholar
  2. Bellur, S. and Sundar, S.S. How can we tell when a heuristic has been used? Annual Conference of the International Communication Association (ICA), (2010).Google ScholarGoogle Scholar
  3. Chellappa, R.K. and Sin, R.G. Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management 6, 2--3 (2005), 181--202. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Eppler, M.J. and Mengis, J. The concept of information overload: A review of literature from organization science, accounting, marketing, MIS, and related disciplines. The Information Society 20, (2004), 325--344.Google ScholarGoogle ScholarCross RefCross Ref
  5. Fiske, S. T. and Taylor, S. E. Social Cognition. Addison-Wesley, Reading, MA, 1984.Google ScholarGoogle Scholar
  6. Ford, S. M. The mother-in-law effect: Managing the publicity of personal content online. Journal of Broadcasting & Electronic Media 56, 4 (2012), 550--561.Google ScholarGoogle ScholarCross RefCross Ref
  7. Kalyanaraman, S. and Sundar, S.S. The psychological appeal of personalized content in web portals: Does customization affect attitudes and behavior? Journal of Communication 56, 1 (2006), 110--132.Google ScholarGoogle ScholarCross RefCross Ref
  8. Marathe, S.S., Sundar, S.S., Bijvank, M.N., van Vugt, H. and Veldhuis, J. Who are these power users anyway? Building a psychological profile. Annual Conference of the International Communication Association (ICA), (2007).Google ScholarGoogle Scholar
  9. Metzger, M.J. Effects of site, vendor, and consumer characteristics on Web site trust and disclosure. Communication Research 33, 3 (2006), 155--179.Google ScholarGoogle ScholarCross RefCross Ref
  10. NTIA. A nation online: How Americans are Expanding Their Use of the Internet. Retrieved from. 2002. http://www.ntia.doc.gov/ntiahome/dn/html/ anationonline2.htm.Google ScholarGoogle Scholar
  11. Norberg, P.A., Horne, D.R. and Horne, D.A. The privacy paradox: Personal information disclosure intentions versus behaviors. The Journal of Consumer Affairs 41, 1 (2007), 100--127.Google ScholarGoogle ScholarCross RefCross Ref
  12. Petronio, S. Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany, NY, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  13. Sundar, S.S. The MAIN model: A heuristic approach to understanding technology effects on credibility. In M.J. Metzger, ed., Digital media, youth, and credibility. The MIT Press, Cambridge, MA, 2008, 72--100.Google ScholarGoogle Scholar

Index Terms

  1. Unlocking the privacy paradox: do cognitive heuristics hold the key?

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI EA '13: CHI '13 Extended Abstracts on Human Factors in Computing Systems
      April 2013
      3360 pages
      ISBN:9781450319522
      DOI:10.1145/2468356

      Copyright © 2013 Copyright is held by the owner/author(s)

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 April 2013

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      CHI EA '13 Paper Acceptance Rate630of1,963submissions,32%Overall Acceptance Rate6,164of23,696submissions,26%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader