“Fairly Truthful”: The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure

  • Miguel Malheiros
  • Sören Preibusch
  • M. Angela Sasse
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7904)

Abstract

While personal data is a source of competitive advantage, businesses should consider the potential reaction of individuals to certain types of data requests. Privacy research has identified some factors that impact privacy perceptions, but these have not yet been linked to actual disclosure behaviour. We describe a field-experiment investigating the effect of different factors on online disclosure behaviour. 2720 US participants were invited to participate in an Amazon Mechanical Turk survey advertised as a marketing study for a credit card company. Participants were asked to disclose several items of personal data. In a follow-up UCL branded survey, a subset (N=1851) of the same participants rated how they perceived the effort, fairness, relevance, and sensitivity of the first phase personal data requests and how truthful their answers had been. Findings show that fairness has a consistent and significant effect on the disclosure and truthfulness of data items such as weekly spending or occupation. Partial support was found for the effect of effort and sensitivity. Privacy researchers are advised to take into account the under-investigated fairness construct in their research. Businesses should focus on non-sensitive data items which are perceived as fair in the context they are collected; otherwise they risk obtaining low-quality or incomplete data from their customers.

Keywords

personal data disclosure privacy effort fairness relevance sensitivity 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ackerman, M.S., Cranor, L.F., Reagle, J.: Privacy in e-commerce: examining user scenarios and privacy preferences. In: Proceedings of the 1st ACM Conference on Electronic Commerce, EC 1999, pp. 1–8. ACM, New York (1999)CrossRefGoogle Scholar
  2. 2.
    Adams, A., Angela Sasse, M.: Privacy in multimedia communications: Protecting users, not just data. In: Blandford, A., Vanderdonckt, J., Gray, P. (eds.) People and Computers XV: Interaction without Frontiers, pp. 49–64. Springer, London (2001)CrossRefGoogle Scholar
  3. 3.
    Annacker, D., Spiekermann, S., Strobel, M.: E-privacy: Evaluating a new search cost in online environments. SFB 373 Discussion Papers 2001,80, Humboldt University of Berlin, Interdisciplinary Research Project 373: Quantification and Simulation of Economic Processes (2001)Google Scholar
  4. 4.
    Beresford, A.R., Kübler, D., Preibusch, S.: Unwillingness to pay for privacy: A field experiment. Economics Letters 117(1), 25–27 (2012)CrossRefGoogle Scholar
  5. 5.
    BITKOM: 12 Millionen Deutsche machen Falschangaben im Web (2010), http://www.bitkom.org/62107_62102.aspx
  6. 6.
    BITKOM: Jedes vierte Mitglied flunkert in sozialen Netzwerken (2011), http://www.bitkom.org/de/presse/70864_67989.aspx
  7. 7.
    Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: why, when, & what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 81–90. ACM, New York (2005)Google Scholar
  8. 8.
    Culnan, M.J.: ”How did they get my name?”: An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17(3), 341–363 (1993)CrossRefGoogle Scholar
  9. 9.
    Culnan, M.J., Armstrong, P.K.: Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science 10(1), 104–115 (1999)CrossRefGoogle Scholar
  10. 10.
    Culnan, M.J., Milne, G.R.: The Culnan-Milne survey on consumers & online privacy notices (2001)Google Scholar
  11. 11.
    Cvrcek, D., Kumpost, M., Matyas, V., Danezis, G.: A study on the value of location privacy. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, WPES 2006, pp. 109–118. ACM, New York (2006)Google Scholar
  12. 12.
    Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Information Systems Research 17(1), 61–80 (2006)CrossRefGoogle Scholar
  13. 13.
    Gerlitz, J.Y., Schupp, J.: Zur Erhebung der Big-Five-basierten Persönlichkeitsmerkmale im SOEP. Research notes, DIW Berlin (2005)Google Scholar
  14. 14.
    Grossklags, J., Acquisti, A.: When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. In: Proceedings of the Sixth Workshop on the Economics of Information Security (WEIS 2007) (2007)Google Scholar
  15. 15.
    Hann, I.H., Hui, K.L., Lee, T., Png, I.: Online information privacy: Measuring the cost-benefit trade-off. In: Applegate, L., Galliers, R.D., DeGross, J.I. (eds.) Proceedings of the Twenty-Third International Conference on Information Systems, p. paper 1 (2002)Google Scholar
  16. 16.
    Harris, Associates Inc., Westin, A.: E-commerce and privacy: What net users want. Privacy and American Business and Pricewaterhouse Coopers LLP (1998)Google Scholar
  17. 17.
    Hine, C.: Privacy in the marketplace. The Information Society 14(4), 253–262 (1998)CrossRefGoogle Scholar
  18. 18.
    Horne, D.R., Norberg, P.A., Ekin, A.C.: Exploring consumer lying in information-based exchanges. Journal of Consumer Marketing 24(2), 90–99 (2007)CrossRefGoogle Scholar
  19. 19.
    Hui, K.L., Teo, H.H., Lee, S.Y.T.: The value of privacy assurance: An exploratory field experiment. MIS Quarterly 31(1), 19–33 (2007)Google Scholar
  20. 20.
    Hunt, J., Fry, B.: Spendsmart. Piatkus Books (2009)Google Scholar
  21. 21.
    Janrain: Research study: Consumer perceptions of online registration and social sign-in (2011)Google Scholar
  22. 22.
    Lwin, M., Williams, J.: A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online. Marketing Letters 14(4), 257–272 (2003)CrossRefGoogle Scholar
  23. 23.
    Malheiros, M., Brostoff, S., Jennett, C., Sasse, M.A.: Would you sell your mother’s data? personal data disclosure in a simulated credit card application. In: 11th Annual Workshop on the Economic of Information Security (WEIS 2012) (2012)Google Scholar
  24. 24.
    Malheiros, M., Jennett, C., Patel, S., Brostoff, S., Sasse, M.A.: Too close for comfort: A study of the effectiveness and acceptability of rich-media personalized advertising. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 579–588. ACM, New York (2012)Google Scholar
  25. 25.
    Malheiros, M., Jennett, C., Seager, W., Sasse, M.A.: Trusting to learn: Trust and privacy issues in serious games. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 116–130. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  26. 26.
    Metzger, M.J.: Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication 12(2), 335–361 (2007)MathSciNetCrossRefGoogle Scholar
  27. 27.
    Milne, G.R., Gordon, M.E.: Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing 12(2), 206–215 (1993)Google Scholar
  28. 28.
    Miltgen, C.: Customers’ privacy concerns and responses toward a request for personal data on the internet: an experimental study. Tech. Rep. 369 (2007)Google Scholar
  29. 29.
    Phelps, J., Nowak, G., Ferrell, E.: Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing 19(1), 27–41 (2000)CrossRefGoogle Scholar
  30. 30.
    Preibusch, S., Krol, K., Beresford, A.R.: The privacy economics of voluntary over-disclosure in web forms. In: The Eleventh Workshop on the Economics of Information Security (WEIS) (2012)Google Scholar
  31. 31.
    Richins, M.L., Dawson, S.: A consumer values orientation for materialism and its measurement: Scale development and validation. Journal of Consumer Research: An Interdisciplinary Quarterly 19(3), 303–316 (1992)CrossRefGoogle Scholar
  32. 32.
    Sheehan, K.B., Hoy, M.G.: Flaming, complaining, abstaining: How online users respond to privacy concerns. Journal of Advertising 28(3), 37–51 (1999)CrossRefGoogle Scholar
  33. 33.
    Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, EC 2001, pp. 38–47. ACM, New York (2001)Google Scholar
  34. 34.
    Stone, E.F., Gueutal, H.G., Gardner, D.G., McClure, S.: A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology 68, 459–468 (1983)CrossRefGoogle Scholar
  35. 35.
    Tolchinsky, P.D., McCuddy, M.K., Adams, J., Ganster, D.C., Woodman, R.W., Fromkin, H.L.: Employee perceptions of invasion of privacy: A field simulation experiment. Journal of Applied Psychology 66(3), 308–313 (1981)CrossRefGoogle Scholar
  36. 36.
    Woodman, R.W., Ganster, D.C., Adams, J., McCuddy, M.K., Tolchinsky, P.D., Fromkin, H.: A survey of employee perceptions of information privacy in organizations. Academy of Management Journal 25(3), 647–663 (1982)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Miguel Malheiros
    • 1
  • Sören Preibusch
    • 2
  • M. Angela Sasse
    • 1
  1. 1.Information Security Research GroupUniversity College LondonLondonUK
  2. 2.Microsoft ResearchCambridgeUK

Personalised recommendations