Abstract
Participation on Online Social Networks (OSNs) inherently requires information sharing and thus exposes individuals to privacy risks. Risk mitigation then has been encouraged through adoption of usable privacy controls. Apparently stronger privacy enhancing technologies (PETs) decrease both risk and perceptions of risk. As a result individuals feel safer and may respond by in fact accepting more risk. Such perverse results have been observed offline. Risk perception offline has been understood to be a function of characteristics of the risks involved rather than as a calculus grounded only in the probability of the risk and the magnitude of harm. In this work we use nine characteristics of risk from a classic and proven offline model of perceived risk to conduct a survey based evaluation of perceptions of privacy risks on Facebook. We find that these dimensions of risk provide a statistically significant explanation of perceived risk of information sharing on Facebook.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Age is not considered as the standard deviation for this variable is \({\approx }0\).
References
Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 3(1), 26–33 (2005)
Adams, J.: Cars, cholera, and cows, vol. 335, pp. 1–49. CATO Institute (1999)
Barnes, S.B.: A privacy paradox: Social networking in the united states. First Monday 11(9) (2006)
Brandimarte, L., Acquisti, A., Loewenstein, G.: Misplaced confidences: privacy and the control paradox. Soc. Psychol. Pers. Sci. 4, 340–347 (2012)
Caine, K., Kisselburgh, L.G., Lareau, L.: Audience visualization influences disclosures in online social networks. In: Extended Abstracts on Human Factors in Computing Systems, CHI 2011, pp. 1663–1668. ACM (2011)
Cassell, M., Halperin, D., Shelton, J., Stanton, D.: Risk compensation: the achilles’ heel of innovations in HIV prevention? Br. Med. J. 332(7541), 605–607 (2006)
Christofides, E., Muise, A., Desmarais, S.: Hey mom, whats on your facebook? Comparing facebook disclosure and privacy in adolescents and adults. Soc. Psychol. Pers. Sci. 3(1), 48–54 (2012)
Farahmand, F., Spafford, E.H.: Understanding insiders: an analysis of risk-taking behavior. Inf. Syst. Front. 15, 5–15 (2013)
Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S., Combs, B.: How is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sci. 9(2), 127–152 (1978)
Garg, V., Camp, L.J.: End user perception of online risk under uncertainty. In: 45th Hawaii International Conference on System Science, pp. 3278–3287. IEEE (2012)
Garg, V., Nilizadeh, S.: Craigslist scams and community composition: investigating online fraud victimization. In: International Workshop on Cyber Crime. IEEE (2013)
Grossklags, J., Acquisti, A.: When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. In: Workshop on the Economics of Information Security (2007)
Hingson, R., McGovern, T., Howland, J., Heeren, T., Winter, M., Zakocs, R.: Reducing alcohol-impaired driving in Massachusetts: the saving lives program. Am. J. Public Health 86(6), 791–797 (1996)
Hoy, M.G., Milne, G.: Gender differences in privacy-related measures for young adult facebook users. J. Interact. Advertising 10(2), 28–45 (2010)
Lipford, H.R., Besmer, A., Watson, J.: Understanding privacy settings in facebook with an audience view. In: Proceedings of the 1st Conference on Usability, Psychology, and Security, UPSEC 2008, pp. 2:1–2:8. USENIX Association, Berkeley (2008)
Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet Users’ Information Privacy Concerns (IUIPC): the construct, the scale, and a causal model. Info. Sys. Res. 15, 336–355 (2004)
Malin, B., Sweeney, L.: Re-identification of dna through an automated linkage process. In: Proceedings of the AMIA Symposium, p. 423. American Medical Informatics Association (2001)
Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law & Politics, Stanford (2010)
Norcie, G., Caine, K., Camp, L.J.: Eliminating stop-points in the installation and use of anonymity systems: a usability evaluation of the tor browser bundle. In: HotPETS (2012)
Patil, S., Kapadia, A.: Are you exposed?: Conveying information exposure. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work Companion, pp. 191–194. ACM (2012)
Preibusch, S., Krol, K., Beresford, A.: The privacy economics of voluntary over-disclosure in web forms. In: 11th Annual Workshop on the Economics of Information Security, WEIS (2012)
Slovic, P., Fischhoff, B., Lichtenstein, S.: Why study risk perception. Risk Anal. 2(2), 83–93 (1982)
Solove, D.: Nothing to Hide: The False Tradeoff Between Privacy and Security. Yale University Press, New Haven (2011)
Tversky, A., Kahneman, D.: Judgment under uncertainty: heuristics and biases. Science 185(4157), 1124 (1974)
Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P., Cranor, L.: I regretted the minute i pressed share: a qualitative study of regrets on facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10. ACM (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Garg, V., Jean Camp, L. (2015). Cars, Condoms, and Facebook. In: Desmedt, Y. (eds) Information Security. Lecture Notes in Computer Science(), vol 7807. Springer, Cham. https://doi.org/10.1007/978-3-319-27659-5_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-27659-5_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27658-8
Online ISBN: 978-3-319-27659-5
eBook Packages: Computer ScienceComputer Science (R0)