Privacy Awareness: A Means to Solve the Privacy Paradox?
People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.
KeywordsPrivacy Privacy Awareness Privacy Paradox
- 2.Adams, A., Sasse, M.A.: Privacy in multimedia communications: Protecting users, not just data. In: Blandford, A., Vanderdonkt, J. (eds.) People and Computers XV - Interaction without frontiers. Joint Proceedings of HCI 2001, pp. 49–64 (2001)Google Scholar
- 4.Awad, N.F., Krishnan, M.S.: The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MIS Quarterly 30(1), 13–28 (2006)Google Scholar
- 5.Birnholtz, J.P., Gutwin, C., Hawkey, K.: Privacy in the open: how attention mediates awareness and privacy in open-plan offices. In: Proceedings of the 2007 international ACM Conference on Supporting Group Work. GROUP 2007, Sanibel Island, Florida, USA, November 04 - 07, pp. 51–60. ACM, New York (2007)CrossRefGoogle Scholar
- 7.Clarke, R.: Introduction to Dataveillance and Information Privacy, and Definitions and Terms. Latest revs. (August 7, 2006), http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html (last access 2008-07-29)
- 8.Cranor, L.F., Arjula, M., Guduru, P.: Use of a P3P user agent by early adopters. In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society. WPES 2002, Washington, DC, November 21, pp. 1–10. ACM, New York (2002)Google Scholar
- 9.Galletta, D.F., Henry, R., McCoy, S., Polak, P.: Web Site Delays: How Tolerant Are Users? Journal of the Association for Information Systems 5(1), 1–28 (2004)Google Scholar
- 18.PRIME General Public Tutorial v2, https://www.prime-project.eu/tutorials/gpto (last access 2008-05-15)
- 20.Simon, H.A.: Models of bounded rationality. MIT Press, Cambridge (1982)Google Scholar
- 21.Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In: Proceedings of the 3rd ACM Conference on Electronic Commerce. EC 2001, Tampa, Florida, USA, October 14 - 17, pp. 38–47. ACM, New York (2001)Google Scholar
- 22.Varian, H.R.: Economic aspects of personal privacy. In: Privacy and Self-Regulation in the Information Age, National Telecommunications and Information Administration (1996)Google Scholar
- 24.Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)Google Scholar