Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3290607.3312932acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
abstract
Public Access

Online Privacy in Public Places: How do Location, Terms and Conditions and VPN Influence Disclosure?

Published: 02 May 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Do we disclose more information online when we access Wi-Fi from home compared to the University, or an Airbnb rental, or a coffee shop? Does it matter if we are shown terms and conditions (T&C) before getting online? Will signing into a virtual private network (VPN) affect our disclosure? We conducted an experiment (N = 276) to find out. Our results suggest that while VPN promotes disclosure of personal information and unethical behaviors in an Airbnb network, the provision of T&C inhibits this disclosure. Conversely, in a University network, provision of terms and conditions encourages disclosure of unethical behavior, but the presence of VPN cue inhibits it. Further, a user's belief in the publicness heuristic (public networks are risky) dictate how much users reveal in various locations based on their perceptions of relative security of accessing Wi-Fi from those locations.

    Supplementary Material

    MP4 File (lbw2616p.mp4)
    Preview video

    References

    [1]
    Alessandro Acquisti and Jens Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy 3, 1: 26--33.
    [2]
    Tsai-Wei Chen and S. Shyam Sundar. 2018. This app would like to use your current location to better serve you: Importance of user assent and system transparency in personalized mobile services. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI'18), ACM, New York, NY, USA, 254--268.
    [3]
    Douglas. P. Crowne and David Marlowe. 1960. A new scale of social desirability independent of psychopathology. Journal of Consulting Psychology 24, 4: 349--354.
    [4]
    Serge Egelman, Janice Tsai, Lorrie Cranor, and Alessandro Acquisti. 2009. Timing is everything? The effects of timing and placement of online privacy indicators. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'09), ACM, New York, NY, USA, 319--328.
    [5]
    Andrew Gambino, Jinyoung Kim, S. Shyam Sundar, Jun Ge, and Mary Beth Rosson. 2016. User disbelief in privacy paradox: Heuristics that determine disclosure. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI' 16), ACM, New York, NY, USA, 2837--2843.
    [6]
    Leslie K. John, Alessandro Acquisti, and George Loewenstein. 2011. Strangers on a plane: Context-dependent willingness to divulge sensitive information. Journal of Consumer Research 37, 5 (February 2011), 858--873.
    [7]
    Muniruddeen Lallmahamood. 2007. An examination of individual's perceived security and privacy of the internet in Malaysia and the influence of this on their intention to use e-commerce: Using an extension of the technology acceptance model. Journal of Internet Banking and Commerce 12, 3, 1--26.
    [8]
    Patricia A. Norberg, Daniel R. Horne, and David A. Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. The Journal of Consumer Affairs 41, 1, 100--126.
    [9]
    S. Shyam Sundar, Jinyong Kim, and Mary Beth Rosson. 2019. The role of interface cues in online privacy: Cognitive heuristics that predict information disclosure. In 69th Annual Conference of the International Communication Association (ICA), Washington, DC.
    [10]
    S. Shyam Sundar and Sampada S. Marathe. 2010. Personalization versus customization: The importance of agency, privacy, and power usage. Human Communication Research 36, 3: 298--322.
    [11]
    S. Shyam Sundar. 2008. The MAIN model: A heuristic approach to understanding technology effects on credibility. Digital media, youth, and credibility. The MIT Press, Cambridge, MA, 72--100.
    [12]
    Mark Weiser. 1993. Ubiquitous computing. Computer 26, 10: 71.

    Cited By

    View all
    • (2023)A Survey of User Perspectives on Security and Privacy in a Home Networking EnvironmentACM Computing Surveys10.1145/355809555:9(1-38)Online publication date: 16-Jan-2023
    • (2023)Perspectives of non-expert users on cyber security and privacyComputers and Security10.1016/j.cose.2022.103008125:COnline publication date: 1-Feb-2023
    • (2021)Enhancing Game-Based Learning Through Infographics in the Context of Smart Home SecurityEntertainment Computing – ICEC 202010.1007/978-3-030-65736-9_2(18-36)Online publication date: 5-Jan-2021
    • Show More Cited By

    Index Terms

    1. Online Privacy in Public Places: How do Location, Terms and Conditions and VPN Influence Disclosure?

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI EA '19: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems
      May 2019
      3673 pages
      ISBN:9781450359719
      DOI:10.1145/3290607
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 May 2019

      Check for updates

      Author Tags

      1. location
      2. privacy
      3. publicness heuristic
      4. terms and conditions
      5. vpn

      Qualifiers

      • Abstract

      Funding Sources

      Conference

      CHI '19
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)186
      • Downloads (Last 6 weeks)18
      Reflects downloads up to 11 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)A Survey of User Perspectives on Security and Privacy in a Home Networking EnvironmentACM Computing Surveys10.1145/355809555:9(1-38)Online publication date: 16-Jan-2023
      • (2023)Perspectives of non-expert users on cyber security and privacyComputers and Security10.1016/j.cose.2022.103008125:COnline publication date: 1-Feb-2023
      • (2021)Enhancing Game-Based Learning Through Infographics in the Context of Smart Home SecurityEntertainment Computing – ICEC 202010.1007/978-3-030-65736-9_2(18-36)Online publication date: 5-Jan-2021
      • (2020)Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing TechnologyProceedings on Privacy Enhancing Technologies10.2478/popets-2020-00062020:1(83-102)Online publication date: 7-Jan-2020

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media