Is privacy a matter of
transparency and control?
Towards a Privacy Adaptation Procedure
Outline

1. Beyond transparency and control
   Privacy calculus, more paradoxes, and bounded rationality

2. Privacy nudging
   A solution inspired by decision sciences... with some flaws

3. Privacy Adaptation Procedure
   Adaptive nudges based on a contextualized
   understanding of users’ privacy concerns



                                                INFORMATION AND COMPUTER SCIENCES
Beyond transparency and control
Privacy calculus, more paradoxes, and bounded rationality
The state of privacy, 2013




                             INFORMATION AND COMPUTER SCIENCES
A model by Smith et al. 2011
             Why aren’t these more
               strongly related?



                                                   Transparency




                                                       Control




                               INFORMATION AND COMPUTER SCIENCES
Transparency and control
 Transparency                       Control




Informed consent                 User empowerment
   “companies should               “companies should offer
   provide clear descriptions      consumers clear and
   of [...] why they need the      simple choices [...] about
   data, how they will use it”     personal data collection,
                                   use, and disclosure”




                                                INFORMATION AND COMPUTER SCIENCES
Examples from your work
Na Wang, Heng Xu, and Jens Grossklags

   “Our new designs encompass control and awareness as
   the essential dimensions of users’ privacy concerns in the
   context of third-party apps on Facebook.”


Jessica Vitak

   “Users may also employ advanced privacy settings to
   segregate audiences, so they can still share relevant
   content with their various connections”

                                                 INFORMATION AND COMPUTER SCIENCES
Examples from your work
Stacy Blasiola

   “By drawing awareness to the issue, users will be better
   equipped to understand the vulnerabilities posed by third
   party applications”


Ralf De Wolf and Jo Pierson

   “different audience management strategies [...] can be
   used as a framework for access control models and/or
   feedback and awareness tools”

                                                INFORMATION AND COMPUTER SCIENCES
The Transparency Paradox


                Useful for concerned users,
                but bad for others
                   Makes them more fearful

                Any mention of privacy,
                whether it is favorable or not,
                triggers privacy concerns




                                 INFORMATION AND COMPUTER SCIENCES
Example: Website A/B testing




                          INFORMATION AND COMPUTER SCIENCES
The Control Paradox
                Decisions are too numerous
                   Most Facebook users
                   don’t know implications of
                   their own privacy settings!

                Decisions are difficult
                   Uncertain and delayed
                   outcomes

                Control gives a false sense of
                security


                                 INFORMATION AND COMPUTER SCIENCES
Beyond control
Eden Litt

   “while many sites give users a variety of buttons and
   dashboards to help them technologically enforce their
   privacy, these features are only useful if users are aware
   that they exist, know where to find them, and use them
   effectively”


Ralf De Wolf and Jo Pierson

   “in an online environment managing privacy becomes a
   time-consuming chore”
                                                  INFORMATION AND COMPUTER SCIENCES
Example: Facebook
“bewildering tangle of options” (New York Times, 2010)

“labyrinthian” controls” (U.S. Consumer Magazine, 2012)




                                              INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
                                     Introducing an “extreme”
                                     sharing option
               E                        Nothing - City - Block
benefits -->




                                        Add the option Exact
                   B
                                     Expected:
                         C
                                        Some will choose Exact
                                        instead of Block
                                 N
                                     Unexpected:
                   privacy -->
                                        Sharing increases across
                                        the board!

                          bit.ly/chi2013privacy      INFORMATION AND COMPUTER SCIENCES
Bounded rationality
                 People’s decisions are
                 inconsistent and seemingly
                 irrational
                  - Framing effects
                  - Default effects
                  - Order effects
                 Transparency:
                      Information overload

                 Control:
                      Choice overload
                                  INFORMATION AND COMPUTER SCIENCES
Example: Acquisti et al.




     Foot in the door           Door in the face
 (innocuous requests first)   (risqué requests first)

                                         INFORMATION AND COMPUTER SCIENCES
Example: Acquisti et al.
                                            1400



                                            1200
Cumulative admission rates in percentages




                                            1000



                                            800
                                                                                                                                                            Decreasing
                                                                                                                                                            Increasing
                                            600                                                                                                             Baseline


                                            400



                                            200



                                              0
                                                   1   2   3   4   5   6   7   8   9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
                                                                                       Question number (Increasing condition)




                                                                                                                                    INFORMATION AND COMPUTER SCIENCES
Example: Lai and Hui


A         Please send me Vortrex Newsletters and information.             25%
                                                                            4.
B         Please do not send me Vortrex Newsletters and
          information.                                                    37%the
                                                                            In

C         Please send me Vortrex Newsletters and information.             53%
                                                                            inher
                                                                            defau

D         Please do not send me Vortrex Newsletters and
          information.                                                    0% t
                                                                            onlin
                                                                            The
 Figure 4: Subjects were assigned one of the following conditions
                                                                                      the s
                     in the registration page.
                                                                                      Conn
 3.1. Data Analysis and Results                                                       actio
 The mean levels of participations in each experimental condition are                 nega
 reported in Table 1 below.                                                           conv
  Table 1: Mean participation levels as a function of frames and                      posit
                                                       INFORMATION AND COMPUTER SCIENCES
Summary of part 1


        We need to move beyond
        control and transparency
           Rational privacy decision-
           making is bounded
           Transparency and control
           increase choice difficulty




                                        INFORMATION AND COMPUTER SCIENCES
Privacy nudging
A solution inspired by decision sciences... with some flaws
A new model
Jessica Vitak

   “it is likely that users employ a number of strategies when
   making decisions regarding what and with whom to share
   content online”


These strategies are not rational, therefore:
 - People do not always choose what is best for them
 - There is significant leeway to influence people's decisions
 - Being objectively neutral is impossible
                                                 INFORMATION AND COMPUTER SCIENCES
A new model
Jessica Vitak

   “it is likely that users employ a number of strategies when
   making decisions regarding what and with whom to share
   content online”


These strategies are not rational, therefore:
 - People do not always choose what is best for them
 - There is significant leeway to influence people's decisions
 - Being objectively neutral is impossible
                                                 INFORMATION AND COMPUTER SCIENCES
A new model

                             Behavioral reactions
                            (including disclosures)


               Default                                     Default
               Nudge                                       Nudge
                order                                       value

                                  Decision
                              Privacy Calculus
                                 strategies


Justification
   Nudge                                                               Justification
                                                                          Nudge

                    Risk/                             Benfits
                    Costs



                                                                INFORMATION AND COMPUTER SCIENCES
A new model
                                Default
Justification
                                 value

A succinct reason to          Relieve users from the
disclose (or not disclose)    burden of making decisions
a piece of information
                               - Path of least resistance
 - Make it easier to           - Implicit normative cue
   rationalize the decision      (what I should do)
 - Minimize the potential      - Endowment effect (what
   regret of choosing the        I have is worth more than
   wrong option                  what I don’t have)

                                              INFORMATION AND COMPUTER SCIENCES
Example: Acquisti et al.
                                            1400



                                            1200
Cumulative admission rates in percentages




                                            1000



                                            800
                                                                                                                                                            Decreasing
                                                                                                                                                            Increasing
                                            600                                                                                                             Baseline


                                            400



                                            200



                                              0
                                                   1   2   3   4   5   6   7   8   9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
                                                                                       Question number (Increasing condition)




                                                                                                                                    INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa
                              Disclosure*behavior*
                                              *


           Demographics*disclosure       *                *Context*disclosure*
        Context#first#    Demographics#first#       Context#first#      Demograpics#first#
100%#
 90%#
 80%#
 70%#
 60%#
 50%#
 40%#
 30%#
 20%#
 10%#
  0%#




                            bit.ly/tiis2013                          INFORMATION AND COMPUTER SCIENCES
Example: Lai and Hui


A         Please send me Vortrex Newsletters and information.             25%
                                                                            4.
B         Please do not send me Vortrex Newsletters and
          information.                                                    37%the
                                                                            In

C         Please send me Vortrex Newsletters and information.             53%
                                                                            inher
                                                                            defau

D         Please do not send me Vortrex Newsletters and
          information.                                                    0% t
                                                                            onlin
                                                                            The
 Figure 4: Subjects were assigned one of the following conditions
                                                                                      the s
                     in the registration page.
                                                                                      Conn
 3.1. Data Analysis and Results                                                       actio
 The mean levels of participations in each experimental condition are                 nega
 reported in Table 1 below.                                                           conv
  Table 1: Mean participation levels as a function of frames and                      posit
                                                       INFORMATION AND COMPUTER SCIENCES
Example: Brown & Krishna
     %pt increase in “High”
         compared to baseline


                                              Default




    High default
       works              Reactance
                      when aware of motives
                                        INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa


                   5 justification types
                      None
                      Useful for you
                      Number of others
                      Useful for others
                      Explanation




           bit.ly/tiis2013          INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa
                                   Disclosure*behavior*
                                                   *


           Demographics*disclosure             *                  *Context*disclosure*
        Context"first"        Demographics"first"           Context"first"        Demograpics"first"
100%"
 90%"        1"
 80%"             ***"
 70%"                                                      *" **" *"
 60%"                                                                                   *" *"
 50%"
 40%"
 30%"
 20%"
 10%"
  0%"
           none"     useful"for"you"   #"of"others"    useful"for"others"   explanaDon"




                                bit.ly/tiis2013                                INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa
                                                        Sa#sfac#on)with))
                                   Disclosure*behavior*   the)system)
Anticipated satisfaction with *
           Demographics*disclosure
                                                 *

                                                                    *Context*disclosure*
the system (intention to use):
        Context"first"   Demographics"first"            1,00" Context"first"        Demograpics"first"
100%"
                                                      0,75"
 90%" 6 items,1"e.g. “I would
                ***"                                  0,50"
 80%"
      recommend the system
 70%"                                                 0,25" *" **" *"
 60%" to others”                                      0,00"                               *" *"
 50%"
                                                     $0,25"
Lower for any justification!
40%"
 30%"                                                $0,50"
                                                                                               1"
 20%"                                                $0,75"                 **" **"
 10%"
                                                     $1,00"                           ***"
  0%"
             none"   useful"for"you"   #"of"others"     useful"for"others"    explanaDon"


                                 bit.ly/tiis2013                                INFORMATION AND COMPUTER SCIENCES
Problems with Privacy Nudging

What should be the purpose of the nudge?



“More information = better, e.g. for personalization”
   Techniques to increase disclosure cause reactance in the
   more privacy-minded users

“Privacy is an absolute right“
   More difficult for less privacy-minded users to enjoy the
   benefits that disclosure would provide


                                                 INFORMATION AND COMPUTER SCIENCES
Problems with Privacy Nudging
                 Smith, Goldstein & Johnson:
                    “What is best for
                    consumers depends upon
                    characteristics of the
                    consumer: An outcome
                    that maximizes consumer
                    welfare may be
                    suboptimal for some
                    consumers in a context
                    where there is
                    heterogeneity in
                    preferences.”

                                INFORMATION AND COMPUTER SCIENCES
Summary of part 2
        Nudges work
           Defaults and justifications
           can influence users’
           decisions

        But we cannot nudge
        everyone the same way!
           Users differ in their
           disclosure preferences
           Nudges should respect
           these differences

                                        INFORMATION AND COMPUTER SCIENCES
Privacy Adaptation Procedure
  Adaptive nudges based on a contextualized
   understanding of users’ privacy concerns
Contextualized preferences
Sameer Patil et al.

   “One of the factors contributing to this “privacy paradox” is
   the decoupling of the circumstances in which privacy-
   affecting behaviors occur from the time at which privacy
   concerns are expressed”


Sam McNeilly, Luke Hutton, and Tristan Henderson

   “Participants were willing to share different types of
   information in different ways”

                                                  INFORMATION AND COMPUTER SCIENCES
Contextualized preferences
Pamela Wisniewski and Heather Richter Lipford

   “By operationalizing SNS desired privacy level at a more
   granular level, we were able to unpack, if not disprove,
   aspects of the privacy paradox”


Sam McNeilly, Luke Hutton, and Tristan Henderson

   “privacy settings are fairly robust to capturing people's
   contextual norms over time”

                                                  INFORMATION AND COMPUTER SCIENCES
Contextualized preferences

                      Contextualize
                                          The optimal justification and
                        different users
                                          default may depend on:
                                           - type of info (what)
  different context




                           Privacy         - user characteristics (who)
                           decision
                                           - recipient (to whom)
                                           - etc...


                                                          INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
  Type of data         ID    Items
                        1    Wall
                        2    Status updates
  Facebook activity     3    Shared links
                        4    Notes
                        5    Photos
                        6  “What?”
                            Hometown
  Location              7
                               =
                            Location (city)
                        8   Location (state/province)
                        9   Four
                            Residence (street address)
  Contact info           dimensions
                        11  Phone number
                        12   Email address
                        13   Religious views
  Life/interests        14   Interests (favorite movies, etc.)
                        15   Facebook groups

                      bit.ly/privdim                   INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.

 “Who?”
     =
   Five
disclosure
 profiles

   159 pps tend to share little information overall (LowD)
   26 pps tend to share activities and interests (Act+IntD)
   50 pps tend to share location and interests (Loc+IntD)
   65 pps tend to share everything but contact info (Hi-ConD)
   59 pps tend to share everything
                         bit.ly/privdim            INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.



                                            Detect
                                             class
                                           member-
                                             ship




            bit.ly/privdim    INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa

          I care about
          the benefits




                I do whatever
                   others do


                                INFORMATION AND COMPUTER SCIENCES
disclosure tendency, where requesting context data first
leads to less threat and more trust.                                Best Strategy to Achieve High Total Disclosure
                                                                    Since it is best to ask demographics first to increase
Figure 4 compares for each group the best strategy (marked          demographics disclosure, and context first to increase

      Example: Knijnenburg & Kobsa
with an arrow) against all other strategies. Strategies that        context disclosure, increasing total disclosure asks for a
perform significantly worse than the best strategy are              compromise. The best way to attain this compromise is to
labeled with a p-value.                                             first choose a preferred request order, and then to select a


       User type             Context first                                   Demographics first
       Males with low        The ‘useful for you’ justification gives the    Providing no justification gives the highest
       disclosure tendency   highest demographics disclosure.                context disclosure.
       Females with low      Providing no justification gives the highest    The ‘explanation’ justification keeps
       disclosure tendency   demographics disclosure.                        context disclosure on par.
       Males with high       The ‘useful for others’ justification keeps     The ‘useful for you’ justification keeps
       disclosure tendency   demographics disclosure almost on par.          context disclosure on par.
       Females with high     Providing no justification gives a high         The ‘useful for you’ justification gives the
       disclosure tendency   demographics disclosure.                        highest context disclosure.

                                  Table 2: Best strategies to achieve high overall disclosures.


      User type                                     Best strategy
      Males with low disclosure tendency            Demographics first with ‘useful for you’.
      Males with high disclosure tendency           The ‘useful for you’ justification in any order.
      Females with low disclosure tendency          Context first with ‘useful for you’.
      Females with high disclosure tendency         Context first with no justification, but ‘useful for you’ is second
                                                    best.

                                   Table 3: Best strategies to achieve high user satisfaction.




                                               bit.ly/iui2013                                     INFORMATION AND COMPUTER SCIENCES
The Adaptive Privacy Procedure

   • Determine the item-. user-, and recipient-type
   • Select the default and justification that fits best
     for this context


     pshare = α + βitemtype + βusertype + βrecipienttype




                                             OUTPUT
              INPUT




     {user, item, recipient}       {defaults, justification}

                                                      INFORMATION AND COMPUTER SCIENCES
The Adaptive Privacy Procedure

Practical use:
 - Automatic initial defaults in line with “disclosure profile”
 - Personalized disclosure justifications
Relieves some of the burden of the privacy decision:
   The right privacy-related information
   The right amount of control

“Realistic empowerment”


                                                    INFORMATION AND COMPUTER SCIENCES
Summary of part 3

        Smith, Goldstein & Johnson:
           “the idea of an adaptive
           default preserves
           considerable consumer
           autonomy [...] and strikes
           a balance between
           providing more choice
           and providing the right
           choices.”



                                        INFORMATION AND COMPUTER SCIENCES
Final summary

1. Beyond transparency and control
   Rational privacy decision-making is bounded, and
   transparency and control only increase choice difficulty

2. Privacy nudging
   Needs to move beyond the one-size-fits-all approach

3. Privacy Adaptation Procedure
   The optimal balance between nudges and control



                                                 INFORMATION AND COMPUTER SCIENCES

More Related Content

PDF
Information Disclosure Profiles for Segmentation and Recommendation
PDF
Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions
PPTX
Social Networking, Permission Boundaries and User Adoption
PDF
Online persuasion and compliance
PDF
Big social data analytics - social network analysis
PPT
Introduction to User Experience
PPTX
Social network analysis
PDF
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
Information Disclosure Profiles for Segmentation and Recommendation
Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions
Social Networking, Permission Boundaries and User Adoption
Online persuasion and compliance
Big social data analytics - social network analysis
Introduction to User Experience
Social network analysis
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...

What's hot (16)

PDF
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
PDF
Social Network Theory and Google
PDF
Dissertation Social Network Sites
PDF
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
PDF
Introduction to Social Network Analysis
PPTX
Roles In Networks
DOC
182287550 finance-solved-cases-doc
PPTX
Sourcing lecture 3 ITSM Cloudsourcing and outsourcing
PDF
1999 ACM SIGCHI - Counting on Community in Cyberspace
PDF
A Perspective on Graph Theory and Network Science
DOCX
Ep 180 - How Autonomous Vehicles create a more Inclusive & Diverse Workplace
PPT
Social Network Analysis
PDF
Reproduction of Hierarchy? A Social Network Analysis of the American Law Pro...
PPT
How to conduct a social network analysis: A tool for empowering teams and wor...
PPT
Social Network Analysis (SNA) and its implications for knowledge discovery in...
PPT
Discovery Posters
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Social Network Theory and Google
Dissertation Social Network Sites
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Introduction to Social Network Analysis
Roles In Networks
182287550 finance-solved-cases-doc
Sourcing lecture 3 ITSM Cloudsourcing and outsourcing
1999 ACM SIGCHI - Counting on Community in Cyberspace
A Perspective on Graph Theory and Network Science
Ep 180 - How Autonomous Vehicles create a more Inclusive & Diverse Workplace
Social Network Analysis
Reproduction of Hierarchy? A Social Network Analysis of the American Law Pro...
How to conduct a social network analysis: A tool for empowering teams and wor...
Social Network Analysis (SNA) and its implications for knowledge discovery in...
Discovery Posters
Ad

Similar to CSCW networked privacy workshop - keynote (20)

PDF
hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...
PDF
Dr. dzaharudin mansor microsoft
PDF
Differential Privacy in AI Model Training.pdf
PDF
Building AI with Security and Privacy in mind
PDF
Building AI with Security Privacy in Mind
PPTX
Putting data science into perspective
PDF
Data Sharing and the Polar Information Commons
PDF
Opening keynote gianni cooreman
PPT
Thesis Defense MBI
PDF
Future of the Internet - National Geographic - Digital Capital Week
PDF
Cloud Computing IT Lexicon's Latest Hot Spot
PDF
Private Cloud: Debunking Myths Preventing Adoption
PPTX
Drexel University: Business and Privacy in the Cloud
PPTX
Implications of GDPR for IoT Big Data Security and Privacy Fabric
PPTX
DATA SCIENCE
PPT
The Impact of the Internet on Institutions in the Future
PPTX
Internet of things enabling tech - challenges - opportunities (2016)
PPTX
Opportunities with data science
PDF
BYOD: Risks and Opportunities
PDF
Data Explosion and Big Data Require New Strategies for Data Management and Re...
hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...
Dr. dzaharudin mansor microsoft
Differential Privacy in AI Model Training.pdf
Building AI with Security and Privacy in mind
Building AI with Security Privacy in Mind
Putting data science into perspective
Data Sharing and the Polar Information Commons
Opening keynote gianni cooreman
Thesis Defense MBI
Future of the Internet - National Geographic - Digital Capital Week
Cloud Computing IT Lexicon's Latest Hot Spot
Private Cloud: Debunking Myths Preventing Adoption
Drexel University: Business and Privacy in the Cloud
Implications of GDPR for IoT Big Data Security and Privacy Fabric
DATA SCIENCE
The Impact of the Internet on Institutions in the Future
Internet of things enabling tech - challenges - opportunities (2016)
Opportunities with data science
BYOD: Risks and Opportunities
Data Explosion and Big Data Require New Strategies for Data Management and Re...
Ad

More from Bart Knijnenburg (14)

PDF
Profiling Facebook Users' Privacy Behaviors
PDF
Counteracting the negative effect of form auto-completion on the privacy calc...
PDF
FYI: Communication Style Preferences Underlie Differences in Location-Sharing...
PDF
Preference-based Location Sharing: Are More Privacy Options Really Better?
PPTX
Big data - A critical appraisal
PDF
Helping Users with Information Disclosure Decisions: Potential for Adaptation...
PPTX
Hcsd talk ibm
PDF
Inspectability and Control in Social Recommenders
PDF
Tutorial on Conducting User Experiments in Recommender Systems
PDF
Privacy in Mobile Personalized Systems - The Effect of Disclosure Justifications
PDF
Explaining the User Experience of Recommender Systems with User Experiments
PPTX
Using latent features diversification to reduce choice difficulty in recommen...
KEY
Recsys2011 presentation "Each to his own - How Different Users Call for Diffe...
KEY
Recommendations and Feedback - The user-experience of a recommender system
Profiling Facebook Users' Privacy Behaviors
Counteracting the negative effect of form auto-completion on the privacy calc...
FYI: Communication Style Preferences Underlie Differences in Location-Sharing...
Preference-based Location Sharing: Are More Privacy Options Really Better?
Big data - A critical appraisal
Helping Users with Information Disclosure Decisions: Potential for Adaptation...
Hcsd talk ibm
Inspectability and Control in Social Recommenders
Tutorial on Conducting User Experiments in Recommender Systems
Privacy in Mobile Personalized Systems - The Effect of Disclosure Justifications
Explaining the User Experience of Recommender Systems with User Experiments
Using latent features diversification to reduce choice difficulty in recommen...
Recsys2011 presentation "Each to his own - How Different Users Call for Diffe...
Recommendations and Feedback - The user-experience of a recommender system

Recently uploaded (20)

PDF
advance database management system book.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
HVAC Specification 2024 according to central public works department
PDF
IGGE1 Understanding the Self1234567891011
PDF
International_Financial_Reporting_Standa.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
20th Century Theater, Methods, History.pptx
advance database management system book.pdf
Hazard Identification & Risk Assessment .pdf
Virtual and Augmented Reality in Current Scenario
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Unit 4 Computer Architecture Multicore Processor.pptx
AI-driven educational solutions for real-life interventions in the Philippine...
Chinmaya Tiranga quiz Grand Finale.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
B.Sc. DS Unit 2 Software Engineering.pptx
What if we spent less time fighting change, and more time building what’s rig...
HVAC Specification 2024 according to central public works department
IGGE1 Understanding the Self1234567891011
International_Financial_Reporting_Standa.pdf
Weekly quiz Compilation Jan -July 25.pdf
My India Quiz Book_20210205121199924.pdf
20th Century Theater, Methods, History.pptx

CSCW networked privacy workshop - keynote

  • 1. Is privacy a matter of transparency and control? Towards a Privacy Adaptation Procedure
  • 2. Outline 1. Beyond transparency and control Privacy calculus, more paradoxes, and bounded rationality 2. Privacy nudging A solution inspired by decision sciences... with some flaws 3. Privacy Adaptation Procedure Adaptive nudges based on a contextualized understanding of users’ privacy concerns INFORMATION AND COMPUTER SCIENCES
  • 3. Beyond transparency and control Privacy calculus, more paradoxes, and bounded rationality
  • 4. The state of privacy, 2013 INFORMATION AND COMPUTER SCIENCES
  • 5. A model by Smith et al. 2011 Why aren’t these more strongly related? Transparency Control INFORMATION AND COMPUTER SCIENCES
  • 6. Transparency and control Transparency Control Informed consent User empowerment “companies should “companies should offer provide clear descriptions consumers clear and of [...] why they need the simple choices [...] about data, how they will use it” personal data collection, use, and disclosure” INFORMATION AND COMPUTER SCIENCES
  • 7. Examples from your work Na Wang, Heng Xu, and Jens Grossklags “Our new designs encompass control and awareness as the essential dimensions of users’ privacy concerns in the context of third-party apps on Facebook.” Jessica Vitak “Users may also employ advanced privacy settings to segregate audiences, so they can still share relevant content with their various connections” INFORMATION AND COMPUTER SCIENCES
  • 8. Examples from your work Stacy Blasiola “By drawing awareness to the issue, users will be better equipped to understand the vulnerabilities posed by third party applications” Ralf De Wolf and Jo Pierson “different audience management strategies [...] can be used as a framework for access control models and/or feedback and awareness tools” INFORMATION AND COMPUTER SCIENCES
  • 9. The Transparency Paradox Useful for concerned users, but bad for others Makes them more fearful Any mention of privacy, whether it is favorable or not, triggers privacy concerns INFORMATION AND COMPUTER SCIENCES
  • 10. Example: Website A/B testing INFORMATION AND COMPUTER SCIENCES
  • 11. The Control Paradox Decisions are too numerous Most Facebook users don’t know implications of their own privacy settings! Decisions are difficult Uncertain and delayed outcomes Control gives a false sense of security INFORMATION AND COMPUTER SCIENCES
  • 12. Beyond control Eden Litt “while many sites give users a variety of buttons and dashboards to help them technologically enforce their privacy, these features are only useful if users are aware that they exist, know where to find them, and use them effectively” Ralf De Wolf and Jo Pierson “in an online environment managing privacy becomes a time-consuming chore” INFORMATION AND COMPUTER SCIENCES
  • 13. Example: Facebook “bewildering tangle of options” (New York Times, 2010) “labyrinthian” controls” (U.S. Consumer Magazine, 2012) INFORMATION AND COMPUTER SCIENCES
  • 14. Example: Knijnenburg et al. Introducing an “extreme” sharing option E Nothing - City - Block benefits --> Add the option Exact B Expected: C Some will choose Exact instead of Block N Unexpected: privacy --> Sharing increases across the board! bit.ly/chi2013privacy INFORMATION AND COMPUTER SCIENCES
  • 15. Bounded rationality People’s decisions are inconsistent and seemingly irrational - Framing effects - Default effects - Order effects Transparency: Information overload Control: Choice overload INFORMATION AND COMPUTER SCIENCES
  • 16. Example: Acquisti et al. Foot in the door Door in the face (innocuous requests first) (risqué requests first) INFORMATION AND COMPUTER SCIENCES
  • 17. Example: Acquisti et al. 1400 1200 Cumulative admission rates in percentages 1000 800 Decreasing Increasing 600 Baseline 400 200 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Question number (Increasing condition) INFORMATION AND COMPUTER SCIENCES
  • 18. Example: Lai and Hui A Please send me Vortrex Newsletters and information. 25% 4. B Please do not send me Vortrex Newsletters and information. 37%the In C Please send me Vortrex Newsletters and information. 53% inher defau D Please do not send me Vortrex Newsletters and information. 0% t onlin The Figure 4: Subjects were assigned one of the following conditions the s in the registration page. Conn 3.1. Data Analysis and Results actio The mean levels of participations in each experimental condition are nega reported in Table 1 below. conv Table 1: Mean participation levels as a function of frames and posit INFORMATION AND COMPUTER SCIENCES
  • 19. Summary of part 1 We need to move beyond control and transparency Rational privacy decision- making is bounded Transparency and control increase choice difficulty INFORMATION AND COMPUTER SCIENCES
  • 20. Privacy nudging A solution inspired by decision sciences... with some flaws
  • 21. A new model Jessica Vitak “it is likely that users employ a number of strategies when making decisions regarding what and with whom to share content online” These strategies are not rational, therefore: - People do not always choose what is best for them - There is significant leeway to influence people's decisions - Being objectively neutral is impossible INFORMATION AND COMPUTER SCIENCES
  • 22. A new model Jessica Vitak “it is likely that users employ a number of strategies when making decisions regarding what and with whom to share content online” These strategies are not rational, therefore: - People do not always choose what is best for them - There is significant leeway to influence people's decisions - Being objectively neutral is impossible INFORMATION AND COMPUTER SCIENCES
  • 23. A new model Behavioral reactions (including disclosures) Default Default Nudge Nudge order value Decision Privacy Calculus strategies Justification Nudge Justification Nudge Risk/ Benfits Costs INFORMATION AND COMPUTER SCIENCES
  • 24. A new model Default Justification value A succinct reason to Relieve users from the disclose (or not disclose) burden of making decisions a piece of information - Path of least resistance - Make it easier to - Implicit normative cue rationalize the decision (what I should do) - Minimize the potential - Endowment effect (what regret of choosing the I have is worth more than wrong option what I don’t have) INFORMATION AND COMPUTER SCIENCES
  • 25. Example: Acquisti et al. 1400 1200 Cumulative admission rates in percentages 1000 800 Decreasing Increasing 600 Baseline 400 200 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Question number (Increasing condition) INFORMATION AND COMPUTER SCIENCES
  • 26. Example: Knijnenburg & Kobsa Disclosure*behavior* * Demographics*disclosure * *Context*disclosure* Context#first# Demographics#first# Context#first# Demograpics#first# 100%# 90%# 80%# 70%# 60%# 50%# 40%# 30%# 20%# 10%# 0%# bit.ly/tiis2013 INFORMATION AND COMPUTER SCIENCES
  • 27. Example: Lai and Hui A Please send me Vortrex Newsletters and information. 25% 4. B Please do not send me Vortrex Newsletters and information. 37%the In C Please send me Vortrex Newsletters and information. 53% inher defau D Please do not send me Vortrex Newsletters and information. 0% t onlin The Figure 4: Subjects were assigned one of the following conditions the s in the registration page. Conn 3.1. Data Analysis and Results actio The mean levels of participations in each experimental condition are nega reported in Table 1 below. conv Table 1: Mean participation levels as a function of frames and posit INFORMATION AND COMPUTER SCIENCES
  • 28. Example: Brown & Krishna %pt increase in “High” compared to baseline Default High default works Reactance when aware of motives INFORMATION AND COMPUTER SCIENCES
  • 29. Example: Knijnenburg & Kobsa 5 justification types None Useful for you Number of others Useful for others Explanation bit.ly/tiis2013 INFORMATION AND COMPUTER SCIENCES
  • 30. Example: Knijnenburg & Kobsa Disclosure*behavior* * Demographics*disclosure * *Context*disclosure* Context"first" Demographics"first" Context"first" Demograpics"first" 100%" 90%" 1" 80%" ***" 70%" *" **" *" 60%" *" *" 50%" 40%" 30%" 20%" 10%" 0%" none" useful"for"you" #"of"others" useful"for"others" explanaDon" bit.ly/tiis2013 INFORMATION AND COMPUTER SCIENCES
  • 31. Example: Knijnenburg & Kobsa Sa#sfac#on)with)) Disclosure*behavior* the)system) Anticipated satisfaction with * Demographics*disclosure * *Context*disclosure* the system (intention to use): Context"first" Demographics"first" 1,00" Context"first" Demograpics"first" 100%" 0,75" 90%" 6 items,1"e.g. “I would ***" 0,50" 80%" recommend the system 70%" 0,25" *" **" *" 60%" to others” 0,00" *" *" 50%" $0,25" Lower for any justification! 40%" 30%" $0,50" 1" 20%" $0,75" **" **" 10%" $1,00" ***" 0%" none" useful"for"you" #"of"others" useful"for"others" explanaDon" bit.ly/tiis2013 INFORMATION AND COMPUTER SCIENCES
  • 32. Problems with Privacy Nudging What should be the purpose of the nudge? “More information = better, e.g. for personalization” Techniques to increase disclosure cause reactance in the more privacy-minded users “Privacy is an absolute right“ More difficult for less privacy-minded users to enjoy the benefits that disclosure would provide INFORMATION AND COMPUTER SCIENCES
  • 33. Problems with Privacy Nudging Smith, Goldstein & Johnson: “What is best for consumers depends upon characteristics of the consumer: An outcome that maximizes consumer welfare may be suboptimal for some consumers in a context where there is heterogeneity in preferences.” INFORMATION AND COMPUTER SCIENCES
  • 34. Summary of part 2 Nudges work Defaults and justifications can influence users’ decisions But we cannot nudge everyone the same way! Users differ in their disclosure preferences Nudges should respect these differences INFORMATION AND COMPUTER SCIENCES
  • 35. Privacy Adaptation Procedure Adaptive nudges based on a contextualized understanding of users’ privacy concerns
  • 36. Contextualized preferences Sameer Patil et al. “One of the factors contributing to this “privacy paradox” is the decoupling of the circumstances in which privacy- affecting behaviors occur from the time at which privacy concerns are expressed” Sam McNeilly, Luke Hutton, and Tristan Henderson “Participants were willing to share different types of information in different ways” INFORMATION AND COMPUTER SCIENCES
  • 37. Contextualized preferences Pamela Wisniewski and Heather Richter Lipford “By operationalizing SNS desired privacy level at a more granular level, we were able to unpack, if not disprove, aspects of the privacy paradox” Sam McNeilly, Luke Hutton, and Tristan Henderson “privacy settings are fairly robust to capturing people's contextual norms over time” INFORMATION AND COMPUTER SCIENCES
  • 38. Contextualized preferences Contextualize The optimal justification and different users default may depend on: - type of info (what) different context Privacy - user characteristics (who) decision - recipient (to whom) - etc... INFORMATION AND COMPUTER SCIENCES
  • 39. Example: Knijnenburg et al. Type of data ID Items 1 Wall 2 Status updates Facebook activity 3 Shared links 4 Notes 5 Photos 6 “What?” Hometown Location 7 = Location (city) 8 Location (state/province) 9 Four Residence (street address) Contact info dimensions 11 Phone number 12 Email address 13 Religious views Life/interests 14 Interests (favorite movies, etc.) 15 Facebook groups bit.ly/privdim INFORMATION AND COMPUTER SCIENCES
  • 40. Example: Knijnenburg et al. “Who?” = Five disclosure profiles 159 pps tend to share little information overall (LowD) 26 pps tend to share activities and interests (Act+IntD) 50 pps tend to share location and interests (Loc+IntD) 65 pps tend to share everything but contact info (Hi-ConD) 59 pps tend to share everything bit.ly/privdim INFORMATION AND COMPUTER SCIENCES
  • 41. Example: Knijnenburg et al. Detect class member- ship bit.ly/privdim INFORMATION AND COMPUTER SCIENCES
  • 42. Example: Knijnenburg & Kobsa I care about the benefits I do whatever others do INFORMATION AND COMPUTER SCIENCES
  • 43. disclosure tendency, where requesting context data first leads to less threat and more trust. Best Strategy to Achieve High Total Disclosure Since it is best to ask demographics first to increase Figure 4 compares for each group the best strategy (marked demographics disclosure, and context first to increase Example: Knijnenburg & Kobsa with an arrow) against all other strategies. Strategies that context disclosure, increasing total disclosure asks for a perform significantly worse than the best strategy are compromise. The best way to attain this compromise is to labeled with a p-value. first choose a preferred request order, and then to select a User type Context first Demographics first Males with low The ‘useful for you’ justification gives the Providing no justification gives the highest disclosure tendency highest demographics disclosure. context disclosure. Females with low Providing no justification gives the highest The ‘explanation’ justification keeps disclosure tendency demographics disclosure. context disclosure on par. Males with high The ‘useful for others’ justification keeps The ‘useful for you’ justification keeps disclosure tendency demographics disclosure almost on par. context disclosure on par. Females with high Providing no justification gives a high The ‘useful for you’ justification gives the disclosure tendency demographics disclosure. highest context disclosure. Table 2: Best strategies to achieve high overall disclosures. User type Best strategy Males with low disclosure tendency Demographics first with ‘useful for you’. Males with high disclosure tendency The ‘useful for you’ justification in any order. Females with low disclosure tendency Context first with ‘useful for you’. Females with high disclosure tendency Context first with no justification, but ‘useful for you’ is second best. Table 3: Best strategies to achieve high user satisfaction. bit.ly/iui2013 INFORMATION AND COMPUTER SCIENCES
  • 44. The Adaptive Privacy Procedure • Determine the item-. user-, and recipient-type • Select the default and justification that fits best for this context pshare = α + βitemtype + βusertype + βrecipienttype OUTPUT INPUT {user, item, recipient} {defaults, justification} INFORMATION AND COMPUTER SCIENCES
  • 45. The Adaptive Privacy Procedure Practical use: - Automatic initial defaults in line with “disclosure profile” - Personalized disclosure justifications Relieves some of the burden of the privacy decision: The right privacy-related information The right amount of control “Realistic empowerment” INFORMATION AND COMPUTER SCIENCES
  • 46. Summary of part 3 Smith, Goldstein & Johnson: “the idea of an adaptive default preserves considerable consumer autonomy [...] and strikes a balance between providing more choice and providing the right choices.” INFORMATION AND COMPUTER SCIENCES
  • 47. Final summary 1. Beyond transparency and control Rational privacy decision-making is bounded, and transparency and control only increase choice difficulty 2. Privacy nudging Needs to move beyond the one-size-fits-all approach 3. Privacy Adaptation Procedure The optimal balance between nudges and control INFORMATION AND COMPUTER SCIENCES