Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1143120.1143137acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Power strips, prophylactics, and privacy, oh my!

Published: 12 July 2006 Publication History
  • Get Citation Alerts
  • Abstract

    While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of comparison information about the privacy practices of online merchants affects users' behavior. We conducted our study using Privacy Finder, a "privacy-enhanced search engine" that displays search results annotated with the privacy policy information of each site. The privacy information is garnered from computer-readable privacy policies found at the respective sites. We asked users to purchase one non-privacy-sensitive item and then one privacy-sensitive item using Privacy Finder, and observed whether the privacy information provided by our search engine impacted users' purchasing decisions (participants' costs were reimbursed, in order to separate the effect of privacy policies from that of price). A control group was asked to make the same purchases using a search engine that produced the same results as Privacy Finder, but did not display privacy information. We found that while Privacy Finder had some influence on non-privacy-sensitive purchase decisions, it had a more significant impact on privacy-sensitive purchases. The results suggest that when privacy policy comparison information is readily available, individuals may be willing to seek out more privacy friendly web sites and perhaps even pay a premium for privacy depending on the nature of the items to be purchased.

    References

    [1]
    A. Acquisti. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the ACM Electronic Commerce Conference (EC04). pages 21--29, New York, NY, 2004. ACM Press. http://www.heinz.cmu.edu/acquisti/papers/privacy-gratification.pdf.
    [2]
    A. Acquisti and J. Grossklags. Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. In Proceedings of The 2nd Annual Workshop on Economics and Information Security (WEIS '03), 2003.
    [3]
    D. Allen. The great online privacy debate, 2000. http://www.ebusinessforum.com/index.asp? doc_id=1785&layout=rich_story.
    [4]
    L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, and J. Reagle. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, April 2002. http://www.w3.org/TR/P3P/.
    [5]
    L. F. Cranor, J. Reagle, and M. S. Ackerman. Beyond concern: Understanding net users' attitudes about online privacy. AT&T Labs-Research Technical Report TR 99.4.3, 14 April 1999. http://www.research.att.com/resources/trs/TRs/99/99.4/99.4.3/report.htm.
    [6]
    M. J. Culnan. How privacy notices promote informed consumer choice, 2002. http://www.cdt.org/privacy/ccp/notice1.pdf.
    [7]
    M. J. Culnan and G. R. Milne. The culnan-milne survey on consumers and online privacy notices, 2001. http://intra.som.umass.edu/georgemilne/pdf_files/culnan-milne.pdf.
    [8]
    B. Fogg, J. Marshall, O. Laraki, A. Osipovich, C. Varma, N. Fang, J. Paul, A. Rangekar, J. Shon, P. Swani, and M. Treinen, What Makes Web Sites Credible? A Report on a Large Quantitative Study. In Proceedings of the ACM Computer-Human Interaction Conference, Seattle, WA, March 31 - April 4, 2001. ACM.
    [9]
    S. Fox, L. Rainie, J. Horrigan, A. Lenhart, T. Spooner, and C. Carter. Trust and privacy online: Why Americans want to rewrite the rules. August 20, 2000. http://www.pewinternet.org/pdfs/PIP_Trust_Privacy_Report.pdf.
    [10]
    Harris Interactive. First major post-9/11 privacy survey finds consumers demanding companies do more to protect privacy: public wants company privacy policies to be independently verified, 2002. http://www.harrisinteractive.com/news/allnewsbydate.asp?NewsID=429.
    [11]
    Harris Interactive. Identity Theft: New Survey & Trend Report, August 2003.
    [12]
    B. Huberman, E. Adar, and L. Fine. Valuating privacy. In Proceedings of the Workshop on The Economics of Information Security, Boston, MA, June 1--3, 2005.
    [13]
    C. Jensen and C. Potts. Privacy policies as decision-making tools: An evaluation of online privacy notices. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pages 471--478, Vienna, Austria, 2004.
    [14]
    Jupiter Research. Seventy percent of us consumers worry about online privacy, but few take protective action, 2002. http://www.jmm.com/xp/jmm/press/2002/pr_060302.xml.
    [15]
    T. Moores. Do consumers understand the role of privacy seals in e-commerce? Communications of the ACM, 48(3):86--91, 2005.
    [16]
    R. F. Murphy. Social distance and veil. American Anthropologist, 66(6):1257--1274, 1964.
    [17]
    E. Rose. Data users versus data subjects: Are consumers willing to pay for property rights to personal information? In Proceedings of the 38th Hawaii International Conference on System Sciences, 2005.
    [18]
    A. Shostack. Paying for privacy: Consumers and infrastructures. In Proceedings of The 2nd Annual Workshop on Economics and Infomation Security (WEIS '03), 2003.
    [19]
    M. D. Smith and E. Brynjolfsson. Consumer Decision-Making at an Internet Shopbot. Technical Report 4206-01, MIT Sloan School of Management, October 2001. http://ssrn.com/abstract=290334.
    [20]
    S. Spiekermann, J. Grossklags, and B. Berendt. E-Privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior. In Proceedings of EC'01: Third ACM Conference on Electronic Commerce, pages 38--47, Tampa, Florida, 2001. http://www.sims.berkeley.edu/jensg/research/eprivacy_acm.html.
    [21]
    P. Syverson. The paradoxical value of privacy. In Proceedings of The 2nd Annual Workshop on Economics and Information Security (WEIS '03), 2003.
    [22]
    H. Taylor. Most People are "Privacy Pragmatists" Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits, 17, 2003. http://www.harrisinteractive.com/harris_poll/index.asp?PID=365.
    [23]
    B. Tedeschi. Everybody talks about online privacy, but few do anything about it. The New York Times, page C6, June 3, 2002.
    [24]
    J. Turow. Americans and online privacy: The system is broken, 2003. http://www.asc.upenn.edu/usr/jturow/internet-privacy-report/36-page-turow-version-9.pdf.
    [25]
    C. Varney. You Call This Self-Regulation? Wired News, June 9, 1998.
    [26]
    A. F. Westin. Harris-equifax consumer privacy survey (1991). Technical report, Equifax, Inc., Atlanta, GA, 1991.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SOUPS '06: Proceedings of the second symposium on Usable privacy and security
    July 2006
    168 pages
    ISBN:1595934480
    DOI:10.1145/1143120
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 July 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. P3P
    2. e-commerce
    3. privacy policies
    4. search engines
    5. user studies

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate 15 of 49 submissions, 31%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)23
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Locally Differentially Private Personal Data Markets Using Contextual Dynamic Pricing MechanismIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.323961520:6(5043-5055)Online publication date: Nov-2023
    • (2023)NotesThe Privacy Fallacy10.1017/9781108995825.010(173-242)Online publication date: 16-Nov-2023
    • (2023)A comic-based approach to permission request communicationComputers and Security10.1016/j.cose.2022.102942124:COnline publication date: 1-Jan-2023
    • (2021)Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link TextsProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445387(1-25)Online publication date: 6-May-2021
    • (2021)Investigating Simple Privacy Indicators for Supporting Users when Installing New Mobile AppsExtended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411763.3451791(1-7)Online publication date: 8-May-2021
    • (2020)Psychological Effects and Their Role in Online Privacy Interactions: A ReviewIEEE Access10.1109/ACCESS.2020.29695628(21236-21260)Online publication date: 2020
    • (2020)User Study of the Effectiveness of a Privacy Policy Summarization ToolInformation Systems Security and Privacy10.1007/978-3-030-49443-8_9(186-206)Online publication date: 28-Jun-2020
    • (2018)Cyber Security and Privacy Experiments: A Design and Reporting ToolkitPrivacy and Identity Management. The Smart Revolution10.1007/978-3-319-92925-5_17(243-262)Online publication date: 9-Jun-2018
    • (2015)How to Explore Consumers’ Privacy Choices with Behavioral EconomicsPrivacy in a Digital, Networked World10.1007/978-3-319-08470-1_14(313-341)Online publication date: 14-Oct-2015
    • (2013)Identity, Credibility, and Trust in Social Networking SitesSocial Network Engineering for Secure Web Data and Services10.4018/978-1-4666-3926-3.ch002(5-31)Online publication date: 2013
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media