Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2818048.2820073acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes

Published: 27 February 2016 Publication History

Abstract

To assist users' privacy decision-making with mobile applications, prior research has investigated ways of enhancing information transparency, via improving privacy permission interfaces. This study takes a soft paternalism approach by proposing two interface cues as "privacy nudges" in a mobile permission interface: the frequency nudge indicates how frequently user information is used, and the social nudge presents the percentage of other users approving certain data permission. We compared the effects of these privacy nudges on users' creepiness emotion and privacy attitudes, through a between-subject online experimental study (n=387). Our results suggest that privacy nudges are effective in altering privacy attitudes, but the direction of effects depends on the nudge's framing valence. In addition, the creepiness emotion mediates the relationship between nudging and privacy attitudes.

References

[1]
Alessandro Acquisti. 2012. Nudging privacy: The behavioral economics of personal information. Digital Enlightenment Yearbook (2012), 193.
[2]
Alessandro Acquisti. and Jens Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy 2, (2005): 24-30.
[3]
Anne Adams and Martina Angela Sasse. 1999. Users are not the enemy. Communications of the ACM 42, 12 : 40-46.
[4]
Idris Adjerid, Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2013. Sleights of privacy: Framing, disclosures, and the limits of transparency. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13), 9. http://doi.acm.org/10.1145/2501604.2501613
[5]
Ritu Agarwal and Jayesh Prasad. 1998. A conceptual and operational definition of personal innovativeness in the domain of information technology. Information Systems Research 9, 2: 204-215.
[6]
Alistair Barr. 2015. Google Offers Users More Control Over Sharing Data with Android Apps. Retrieved August 22, 2014 from http://blogs.wsj.com/digits/2015/05/28/google-offersusers-more-control-over-sharing-data-with-androidapps/
[7]
Ron Amadeo. 2013. App Ops: Android 4.3's Hidden App Permission Manager, Control Permissions for Individual Apps! Retrieved http://www. androidpolice. com/2013/07/25/app-ops-android-4-3s-hiddenapppermission-manager-control-permissionsforindividual-apps.
[8]
Lisa Barnard. 2014. The Cost of Creepiness: How Online Behavioral Advertising Affects Consumer Purchase Intention. Doctoral dissertation, The University of North Carolina at Chapel Hill.
[9]
Lauren G. Block. 2005. Self-referenced fear and guilt appeals: The moderating role of self-construal. Journal of Applied Social Psychology 35, 11: 2290-2309.
[10]
Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced confidences privacy and the control paradox. Social Psychological and Personality Science 4, 3: 340-347.
[11]
Jose C. Brustoloni and RicardoVillamarin-Salomon. 2007. Improving security decisions with polymorphic and audited dialogs. In Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07), 76-85. http://doi.acm.org/ 10.1145/1280680.1280691
[12]
Serena Chen and Shelly Chaiken. 1999. The heuristicsystematic model in its broader context. Dual-process theories in social psychology, 73-96.
[13]
Robert B. Cialdini. 1993. Influence: The Psychology of Persuasion. New York: HarperCollins.
[14]
Gerald L. Clore, Karen Gasper, and Erika Garvin. 2001. Affect as information. In Handbook of Affect and Social Cognition. Joseph. P. Forgas (ed.). Lawrence Erlbaum Associates, Inc, Mahwah, NJ, 121-144.
[15]
Mary J. Culnan and Robert J. Bies. 2003. Consumer privacy: Balancing economic and justice considerations. Journal of social issues 59, 2: 323-342.
[16]
Fred D. Davis. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly 13, 3: 319-340.
[17]
Rachna Dhamija, J. D. Tygar, and Marti Hearst. 2006. Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in computing systems. (CHI '06), 581-590. http://doi.acm.org/10.1145/1124772.1124861
[18]
Tamara Dinev and Paul Hart. 2006. An extended privacy calculus model for e-commerce transactions. Information Systems Research 17, 1: 61-80.
[19]
Adrienne P. Felt, Serge Egelman, and David Wagner. 2012. I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices (SPSM '12), 33-44. http://doi.acm.org/10.1145/2381934.2381943
[20]
Susan T. Fiske and Shelly E. Taylor. 2013. Social cognition: From brains to culture. Sage.
[21]
Alein Forget, Sonia Chiasson, P. C. van Oorschot, and Robert Biddle. 2008. Improving text passwords through persuasion. In Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS '08), 1-12. http://doi.acm.org/10.1145/1408664.1408666
[22]
Jonathan Gratch and Stacy Marsella. 2004. A domainindependent framework for modeling emotion, Cognitive Systems Research 5, 4: 269-306. http://doi.acm.org/10.1016/j.cogsys.2004.02.002
[23]
White House. 2012. Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy. White House, Washington, DC.
[24]
Patrick G. Kelley, Joanna Bresee, Lorrie F. Cranor, and Robert W. Reeder, 2009. A nutrition label for privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09). http://doi.acm.org/10.1145/1572532.1572538
[25]
Patrick G. Kelley, Sunny Consolvo, Lorrie F. Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. 2012. A conundrum of permissions: installing applications on an android smartphone. In Financial Cryptography and Data Security 7398, 68-79.
[26]
Patrick G. Kelley, Lorrie F. Cranor, and Norman Sadeh. 2013. Privacy as part of the app decisionmaking process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 3393-3402. http://doi.acm.org/10.1145/2470654.2466466
[27]
Jennifer King. 2012. 'How come I'm allowing strangers to go through my phone?'—Smartphones and Privacy Expectations.
[28]
Bart P. Knijnenburg and Alfred Kobsa. 2013. Making decisions about privacy: information disclosure in context-aware recommender systems. ACM Transactions on Interactive Intelligent Systems (TiiS) 3, 3: 20. http://doi.acm.org/10.1145/2499670
[29]
Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Preference-based location sharing: are more privacy options really better? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. (CHI '13), 2667-2676. http://doi.acm.org/10.1145/2470654.2481369
[30]
Han Li, Rathindra Sarathy, and Heng Xu. 2011. The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems 51, 3: 434445.
[31]
Jialiu Lin, Shahriyar Amini, Jason I. Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. (Ubicomp '12), 501-510. http://doi.acm.org/10.1145/2370216.2370290
[32]
Steven Loeb. 2013. A whopping 70 billion apps to be downloaded in 2013. Retrieved from: http://vator.tv/news/2013-03-04-a-whopping-70billion-apps-to-be-downloaded-in-2013.
[33]
George F. Loewenstein, Elke U. Weber, Christopher K. Hsee, and Ned Welch. 2001. Risk as feelings. Psychological Bulletin 127, 2: 267-286.
[34]
D. Harrison McKnight, Vivek Choudhury, and Charles Kacmar. 2002. Developing and validating trust measures for e-commerce: an integrative typology. Information Systems Research 13, 3: 334-359.
[35]
Richard Nadeau, Edouard Cloutier, and J. -H. Guay. 1993. New evidence about the existence of a bandwagon effect in the opinion formation process. International Political Science Review 14, 2: 203-213.
[36]
Mohammad Nauman, Sohail Khan, and Xinwen Zhang. 2010. Apex: extending android permission model and enforcement with user-defined runtime constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10), 328-332. http://doi.acm.org/10.1145/1755688.1755732
[37]
Helen Nissenbaum. 2011. A contextual approach to privacy online. Daedalus 140, 4: 32-48.
[38]
Richard E. Petty and John T. Cacioppo. 1986. The elaboration likelihood model of persuasion. Advances in experimental social psychology 19, 123-205.
[39]
Irene Pollach. 2006. Privacy statements as a means of uncertainty reduction in WWW interactions. Journal of Organizational and End User Computing (JOEUC)18, 1: 23-49.
[40]
Anat Rafaeli and Iris Vilnai-Yavetz. 2004. Emotion as a connection of physical artifacts and organizations. Organization Science 15, 6: 671-686.
[41]
Herbert A. Simon. 1982. Models of Bounded Rationality: Empirically Grounded Economic Reason. MIT press.
[42]
H. Jeff Smith, Sandra J. Milberg, and Sandra J. Burke. 1996. Information privacy: measuring individuals' concerns about organizational practices. MIS quarterly 20, 2: 167-196.
[43]
Dianna L. Stone. 1982. The Effects of the Valence of Outcomes for Providing Data and the Perceived Relevance of the Data Requested on Privacy-Related Behaviors, Beliefs, and Attitudes. Ph.D. Dissertation. ProQuest Information & Learning.
[44]
S. Shyam Sundar. 2008. The MAIN model: A heuristic approach to understanding technology effects on credibility. Digital media, youth, and credibility, 73100.
[45]
Omer Tene and Jules Polonetsky. 2013. A theory of creepy: Technology, privacy and shifting social norms. Yale Journal of Law & Technology 16, 1: 2.
[46]
Richard H. Thaler and Cass R. Sunstein. 2008. Nudge: Improving decisions about health, wealth, and happiness. Constitutional Political Economy 19, 4: 356-360.
[47]
Adi Robertson. 2012. Path Uploads Your Entire iPhone Address Book to Its Servers. Retrieved from http://mclov.in/2012/02/08/path-uploads-your-entireaddress-book-to-their-servers.html.
[48]
Adam Thierer. 2013. Pursuit of privacy in a world where information control is failing. Harvard Journal of Law & Public Policy 36, 409-456.
[49]
Blasé Ur, Pedro G. Leon, Lorrie F. Cranor, Richard Shay, and Yang Wang. 2012. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUP '12). http://doi.acm.org/10.1145/2335356.2335362
[50]
Will Verduzco. 2013. App Ops Brings Granular Permissions Control to Android 4.3. Retrieved from http://www.xda-developers.com/app-ops-bringsgranular-permissions-control-to-android-4-3/
[51]
Jessica Vitak. 2012. The impact of context collapse and privacy on social network site disclosures. Journal of Broadcasting & Electronic Media 56, 4: 451-470.
[52]
B. J. Fogg. 2002. Persuasive technology: using computers to change what we think and do. Ubiquity, 5. http://doi.acm.org/10.1145/764008.763957
[53]
Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, and Lorrie F. Cranor. 2013. Privacy nudges for social media: an exploratory Facebook study. In Proceedings of the 22nd international conference on World Wide Web companion (WWW '13), 763-770.
[54]
Heng Xu. 2007. The effects of self-construal and perceived control on privacy concerns. In Proceedings of the International Conference on Information Systems (ICIS '07), 125.
[55]
Heng Xu, Tamara Dinev, Jeff Smith, and Paul Hart. 2011. Information privacy concerns: linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems 12, 12: 1.
[56]
Heng Xu, Hock-Hai Teo, Bernard Tan, and Ritu Agarwal. 2012. Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Information Systems Research 23, 4: 342-1363.
[57]
Theodora Zarmpou, Vaggelis Saprikis, Angelos Markos, and Maro Vlachopoulou. 2012. Modeling users' acceptance of mobile services. Electronic Commerce Research 12, 2: 225-248.
[58]
Bo Zhang, Mu Wu, Hyunjin Kang, Eun Go, and S. Shyam Sundar. 2014. Effects of security warnings and instant gratification cues on attitudes toward mobile websites. In Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems. (CHI '06). ACM, 111-114.

Cited By

View all
  • (2025)A Model of Trust in Online COVID-19 Information and Advice: Cross-Sectional Questionnaire StudyJMIR Infodemiology10.2196/593175(e59317)Online publication date: 13-Feb-2025
  • (2025)Digital Nudging: A Systematic Literature Review, Taxonomy, and Future Research DirectionsACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3715966.371597356:1(101-125)Online publication date: 28-Jan-2025
  • (2024)Explaining Privacy Paradox on WeChatInternational Journal of Information Security and Privacy10.4018/IJISP.35725018:1(1-24)Online publication date: 15-Oct-2024
  • Show More Cited By
  1. Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '16: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing
    February 2016
    1866 pages
    ISBN:9781450335928
    DOI:10.1145/2818048
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 February 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Android
    2. Creepiness
    3. Mobile Applications
    4. Nudge
    5. Privacy
    6. Privacy Attitudes

    Qualifiers

    • Research-article

    Conference

    CSCW '16
    Sponsor:
    CSCW '16: Computer Supported Cooperative Work and Social Computing
    February 27 - March 2, 2016
    California, San Francisco, USA

    Acceptance Rates

    CSCW '16 Paper Acceptance Rate 142 of 571 submissions, 25%;
    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)144
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 10 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)A Model of Trust in Online COVID-19 Information and Advice: Cross-Sectional Questionnaire StudyJMIR Infodemiology10.2196/593175(e59317)Online publication date: 13-Feb-2025
    • (2025)Digital Nudging: A Systematic Literature Review, Taxonomy, and Future Research DirectionsACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3715966.371597356:1(101-125)Online publication date: 28-Jan-2025
    • (2024)Explaining Privacy Paradox on WeChatInternational Journal of Information Security and Privacy10.4018/IJISP.35725018:1(1-24)Online publication date: 15-Oct-2024
    • (2024)Digital nudges: a systematic narrative review and taxonomyBehaviour & Information Technology10.1080/0144929X.2024.2440116(1-21)Online publication date: 20-Dec-2024
    • (2024)Digital Nudging and Cookie Rejection: An ExperimentItalian Economic Journal10.1007/s40797-024-00268-4Online publication date: 4-Apr-2024
    • (2024)Does the Anchoring Effect Influence Individuals’ Anti-phishing Behavior Intentions?Foundations and Practice of Security10.1007/978-3-031-57537-2_9(141-156)Online publication date: 25-Apr-2024
    • (2023)SoK: Anatomy of Effective Cybersecurity Label DevelopmentSSRN Electronic Journal10.2139/ssrn.4591786Online publication date: 2023
    • (2023)Femtech Data Privacy post-Dobbs: A Preliminary Analysis of User ReactionsCompanion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing10.1145/3584931.3606986(226-228)Online publication date: 14-Oct-2023
    • (2023)Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social MediaACM Transactions on Computer-Human Interaction10.1145/357701430:3(1-32)Online publication date: 2-Jan-2023
    • (2023)Creepy Assistant: Development and Validation of a Scale to Measure the Perceived Creepiness of Voice AssistantsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581346(1-18)Online publication date: 19-Apr-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media