Introduction

Privacy issues challenge researchers and regulators because of their immense complexity, and have been discussed through various lenses. Modern perspectives have matured from viewing privacy as a transactional process of information disclosure, to viewing it as a multi-faceted, socially constructed phenomenon that is closely tied to real-world modern networked technologies, and that we should endeavor to embed in the design of the tools and services we use daily (Bélanger & James, 2020; Knijnenburg et al., 2022). Particularly in the context of online platforms, where personal data is being generated and shared at lightning speed, privacy losses and violations are far from trivial to perceive and decide upon, and often remain unconsidered (Lowry, Dinev, et al., 2017; Garcia, 2017).

When investigating privacy concerns or disclosure decisions, the preponderance of privacy literature has limited its scope to a dyadic understanding of privacy, e.g., a dyadic information transfer between a company and an individual (Kamleitner & Mitchell, 2019). In contrast, recent research has called for a more versatile multi-level understanding of privacy to be able to explore complex disclosure decisions in progressively sophisticated digital environments (Bélanger & James, 2020). One crucial factor that makes privacy a highly complex affair are the various types of inherent connections among individuals. Since human beings are socially embedded and bond with each other by exchanging personal information, their personal data is often not only owned by themselves, but also co-owned by others. For example, chances are high that there are hundreds of co-owners of your phone number and email address (e.g., friends who have stored your contact information in their address book), and that a social platform (e.g., LinkedIn) has collected various information on your interests and preferences. This makes privacy protection an interdependent phenomenon (e.g., Biczók & Chia 2013; Cao et al., 2018; Wirth et al., 2019), since the violation of an individual’s privacy rights can happen through others, potentially without the original owner even noticing.

In recent years, several research streams have approached this phenomenon employing, for example, economic models (e.g., Cao et al., 2018; Symeonidis et al., 2018) or empirical studies on users’ behavior (e.g., Olteanu et al., 2018; Pu & Grossklags, 2015, 2017), have analyzed legal aspects (e.g., Symeonidis et al., 2018) or developed conceptual frameworks (e.g., Jia & Xu 2016; Kamleitner & Mitchell, 2019). Among the latter, Kamleitner & Mitchell (2019) have proposed the “3R Interdependent Privacy Protection Framework”, which postulates a sequential chain of the underlying mechanisms realization of the data transfer (RE), recognition of others’ ownership (RC), and respect for others’ rights (RS) forming an individual’s decision to protect others’ personal data. While the 3R framework advances our understanding of how interdependent privacy decision-making might unfold and can inform future research, it has not been empirically validated to date. Furthermore, while information privacy research on the individual level has investigated interventions such as transparency tools to help users make informed decisions (e.g., Almuhimedi et al., 2015; Wang et al., 2014), we have little knowledge on effective countermeasures that can help to mitigate interdependent privacy violations. This is reflected in current regulatory efforts to protect individuals’ and third parties’ privacy, for example, the European Union General Data Protection Regulation (GDPR, European Parliament and Council, 2016): Whereas the GDPR has achieved major improvements to protect users’ own information (e.g., mandatory opt-in mechanisms when collecting users’ data for marketing purposes), little has been done to protect users from interdependent privacy violations by their peers. Since others’ decisions on our privacy can have significant impacts on our everyday lives, we argue that it is paramount that we (1) understand the underlying mechanisms of interdependent privacy violations, and (2) find effective remedies that can serve as design suggestions for novel regulatory strategies. In this work, we therefore raise the following research questions:

  • RQ1: To what extent can the 3R mechanisms underlying users’ interdependent privacy decision-making be empirically validated?

  • RQ2: How can interdependent privacy infringements be reduced via design choices, such as an interdependent privacy salience nudge?

To answer our research questions, we draw on the theoretical lens of the “3R Interdependent Privacy Protection Framework” established by Kamleitner & Mitchell (2019). We conduct a quantitative vignette-based online experiment with N = 330 Instagram users, motivated by an actual Instagram prompt that encourages users to violate others’ privacy. In our experiment, we investigate the effect of an interdependent privacy salience nudge that aims to increase the salience of the other in the data transfer. We analyze our experimental data employing a serial multiple mediation analysis, which supports our hypotheses. Our post-hoc analysis of qualitative statements gives richer insights into participants’ motives, and further confirms our theoretical model.

Our study contributes to research on interdependent privacy in several important ways. First, we investigate the effect of an interdependent privacy salience nudge and show that it can significantly improve users’ protection of their peers’ privacy online. Second, we empirically evaluate the “3R Interdependent Privacy Protection Framework” (Kamleitner & Mitchell, 2019). Our results indicate a three-stage mediation of the effect of our interdependent privacy salience nudge on users’ disclosure of others’ information through RE, RC, and RS, which validates Kamleitner and Mitchell (2019)’s theoretical model of users’ interdependent privacy decision-making. Lastly, as part of our study, we develop and validate a measurement instrument for RE, RC, and RS, which can be useful for future research in this field. Our work implicates valuable insights for regulators, as it can serve as a starting point for overcoming current policy inadequacies (e.g., in the GDPR) with regard to interdependent privacy infringements.

The remainder of this paper is organized as follows. In the second section, we first introduce the phenomenon of interdependent privacy in the context of social platforms by giving several real-world examples as well as a brief overview of pertinent literature. We then introduce Kamleitner & Mitchell (2019)’s “3R Interdependent Privacy Protection Framework” as a theoretical lens for our study. Lastly, we turn to the concept of digital nudging in privacy, hence laying the conceptual foundation for the interdependent privacy salience nudge employed in our experiment. In the third section, we then develop our research model and hypotheses. We proceed with describing our research methodology and introducing the concept of serial mediation in the fourth section. After presenting the quantitative and qualitative results of our empirical study in the fifth section, we discuss our findings as well as our contributions to theory and practice in the sixth section. Finally, in the seventh section, we summarize the findings of this article.

Theoretical background

Privacy interdependence

In 1970, long before mobile devices and social networking platforms have emerged as omnipresent parts of our lives, Westin (1970) has defined privacy as “the ability to control, edit, manage, and delete information” about oneself and to “decide when, how, and to what extent information is communicated to others” (p. 7). Since then, privacy has arisen to be one of the most crucial concepts of our time: While personal information (e.g., photos, preferences or location data) is being generated and shared online at a rapid pace, recent sociopolitical movements (e.g., Harwell & Harris 2021; Isaak & Hanna, 2018) demonstrate why privacy rights are of paramount importance for individuals’ freedom and sovereignty. In 2018, based on the concept of privacy as a fundamental human right, the European Union (EU) has issued the General Data Protection Regulation (GDPR) (European Parliament and Council, 2016). The GDPR regulates the processing of personal data related to citizens of the EU and has acted as a catalyst for major transformations of privacy policies worldwide (Li et al., 2019; Linden et al., 2020). In an online context, however, privacy losses or violations represent intricate problems for both users and regulators, since they are often nontrivial to perceive and decide upon (Garcia, 2017). Contrarily, privacy is a highly complex affair, with one crucial factor being the various types of inherent connections among human beings and their personal data (Biczók et al., 2021). In the following, we will illustrate this interconnectedness drawing on the example of online platforms.

Imagine a purely individualistic perspective, where a person’s own privacy is affected only by their own decisions. Here, common theoretical approaches such as the privacy calculus model (e.g., Dienlin & Metzger 2016; Dinev & Hart, 2006; Kehr et al., 2015) can give insight into users’ analysis of perceived costs (e.g., privacy risks) and benefits (e.g., entertainment), and hence the formation of their intention to disclose their own information. With respect to online platforms, such as Facebook or LinkedIn, this assumption would hold only if individuals used such platforms in isolation. This is, however, not the case: For many online platforms, the interconnectedness of their users’ data lies at the core of their business. For example, when a user installs a third-party application on Facebook, the application might collect not only a focal user’s, but also their friends’ personal information (Symeonidis et al., 2018). This has laid the foundation for the Cambridge Analytica scandal, which came to light in 2018 (Isaak & Hanna, 2018): While only 270.000 users installed the company’s app-based personality quiz on Facebook, Cambridge Analytica harvested the personal data of an estimated 87 million people and used it for micro-targeting during the 2016 US election campaign (Kamleitner & Sotoudeh, 2019). As a second example, LinkedIn, a professional social network, relies on users’ opinions on their contacts’ skills (e.g., “Help us identify Anna Smith’s top skill”) in order to offer and sell personalized job opportunities. These examples demonstrate that a person’s own privacy is not only affected by their own decisions, but is also controlled by the actions of other individuals or organizations. We refer to this phenomenon as interdependent privacy, where “personal information is shared without the knowledge and/or direct consent of the data subject” (Biczók et al., 2021). The notion of privacy interdependence renders the aforementioned perspective of an individual privacy calculus obsolete.

In recent years, researchers from various fields (such as information security, information systems, economics or marketing) have started to spark a debate of the consequences, risks and potential mitigations of privacy interdependence. Reviewing recent literature, we found that one central concept is users’ awareness of interdependent privacy risks (e.g., Biczók & Chia 2013; Symeonidis et al., 2018): While, in an analog world, interdependent privacy protection seems to work according to implicitly negotiated “norms about what, why, and to whom information is shared within specific relationships” (Martin, 2016, p. 551), these negotiations appear to be largely absent when we consider interdependent privacy in an online context (Kamleitner & Mitchell, 2019). Prior research has demonstrated across data types (e.g., contact information or photos) that users are less considerate towards the privacy of their peers, compared to their own (Marsch et al., 2021). At the same time, new information and communication technologies allow for a tremendously larger scope of potential interdependent privacy violations, since users are able to automatically and effortlessly collect and disclose others’ information. To illustrate this, we borrow from a fictive scenario introduced by Kamleitner and Sotoudeh (2019), and imagine a person called Ada, who is on a trip to explore a foreign city. Ada is looking for a nice place to stay, and asks a woman passing by if she has any tips. The woman responds: “Well I do have some really good recommendations, but first give me the name and phone number of your father, and maybe also a picture of him.” Ada is baffled, refuses, and walks away. She implicitly feels that this information is personal, and not hers to share. In an online setting, however, Ada would consult a travel booking app, with hundreds of accommodation options being just one click away. The app might ask for access to her contacts. Her contact list includes information (such as a name, phone number, picture, and birthday) on her father, as well as pretty much anyone Ada knows. Yet, she might simply click “Allow Access”, hence becoming a sharer of her contacts’ data to an online platform without her contacts even knowing about it.

Presently, the issue of interdependent privacy displays a regulatory loophole for the GDPR (Kamleitner & Sotoudeh, 2019). The GDPR limits its scope to a dyadic understanding of privacy (e.g., between a company and a consumer), while leaving room for gray area with regard to interdependent privacy infringements. It specifies informed consent by the original data subject as a lawful prerequisite for the processing of personal data (Art. 6, GDPR), and further specifies that the original owner needs to be notified and provided with easy withdrawal of consent (Art. 7, GDPR). This regulation assumes that it is always clear who the original owner of personal information is. However, whereas Ada gives consent to share her contacts’ data, her contacts might claim the ownership and privacy rights towards this information. While the GDPR specifically excludes the processing of personal information for household or purely personal purposes (Art. 2, GDPR), it is questionable if this exception covers the transfer of personal information of several hundred individuals to a company, such as an online platform, that processes this information as part of its business model. The negligence of interdependent privacy phenomena hence poses a major shortcoming of the GDPR in its current version.

Previous literature has approached the concept of interdependent privacy from various angles. In a recent meta-analysis, Humbert et al. (2019) have summarized and analyzed prior works across the research landscape. While “interdependent privacy” seems to be the most widely used term, a variety of different terminologies is being used, such as collective privacy (e.g., Squicciarini et al., 2009), multi-party privacy (e.g., Thomas et al., 2010), or peer disclosure (e.g., Cao et al., 2018; Chen et al., 2015). Several researchers have employed game-theoretical models to investigate the externalities of privacy interdependence (e.g., Biczók & Chia, 2013; Cao et al., 2018). For example, Symeonidis et al. (2018) have calculated the extent of collateral information collection by third-party apps on Facebook, finding that a user’s chance of having their personal data shared with third-party apps through their friends is greater than 80%. This enables practices such as shadow profiling, where a company composes profiles of individuals based on data gathered from other users on a large scale (Garcia, 2017). Other works have focused on empirically exploring interdependent privacy behavior, for example, by investigating the monetary value which users of online services place on their contacts’ personal information (Marsch et al., 2021; Pu & Grossklags, 2015), or by analyzing the roles of information sensitivity (Wirth et al., 2019) or sharers’ anonymity (Pu & Grossklags, 2017).

Whereas previous research has yielded important insights into the topic of privacy interdependence, we have only little knowledge on the how and why, that is, on the underlying mechanisms of interdependent privacy behavior. By mechanisms, we refer to social mechanisms that act as “building blocks for the construction of causal explanations of social phenomena” (Avgerou, 2013, p. 407), which drive the process of forming an interdependent privacy decision and explain the observed behavior. One approach to tackle the how and why of interdependent privacy behavior is Kamleitner & Mitchell (2019)’s conceptual “3R Interdependent Privacy Protection Framework”, which we will introduce in the following section.

The 3R interdependent privacy protection framework

In their framework, Kamleitner and Mitchell (2019) have approached the phenomenon of interdependent privacy infringements by drawing on the conceptual commonality between personal data and property. Individuals feel a sense of ownership for property, and the protection of such property necessitates the “cooperation of others and their respect of what is ‘ours’” (Kamleitner & Sotoudeh, 2019, p. 2). While individuals also feel a sense of ownership for personal information, property and personal information differ with regards to their tangibility. Property refers to the right to one’s possession, that is, to goods that are mostly tangible. For example, a house can be touched and seen, and can be held by only one or few individuals at a time. We are hence usually aware that someone owns it. On the contrary, personal information is mostly intangible. Imagine, for example, a phone number. Since it can be held by an unlimited amount of people at a time, it is practically impossible to oversee how often it has been shared. Moreover, while the transfer of property usually takes place via an active acquisition (for instance, buying a house), the transfer of personal information often arises as a side effect of our daily activities. For example, when using an online platform, personal information is being shared to other individuals or organizations without the transfer of data as a good being in the focus of attention. Kamleitner and Mitchell (2019) argue that these fundamental differences make it much easier to trespass on privacy, that is, the right to one’s personal information, than property. While property infringements mostly arise from a failure of respect, interdependent privacy violations can be caused by failures at antecedent stages (Kamleitner & Sotoudeh, 2019; Kamleitner & Mitchell, 2019) have derived three sequential steps that users need to take in order to protect others’ personal information online: realization of the data transfer (RE), recognition of others’ ownership (RC), and lastly respect for others’ rights (RS). Figure 1 illustrates these steps based on the introductory example of Ada downloading an app.

Fig. 1
figure 1

The 3R interdependent privacy protection framework (Kamleitner & Mitchell, 2019), illustrated by the example of Ada (sharer) sharing her contacts’ (others’) personal information with an app provider (recipient)

According to the 3R framework, users’ realization of the data transfer (RE) represents the first step toward protecting others’ personal information. Imagine a sharer synchronizing their address book with the Instagram app. In order to realize that this implies transferring co-owned data, the sharer first needs to realize that they are about to transfer a good to another party at all. Users’ RE is based on the presence of two conditions: The sharer first needs to overcome the intangible nature of information which makes it difficult to truly comprehend data as a good, and then must realize that this good is about to be transferred from one party to another. In our example, Ada might press “Allow Access” without realizing that this will transfer data from her phone to the app provider, which would, in this moment, leave her unable to recognize others’ being involved in the data transfer.

Provided that a sharer realizes that they are about to transfer a good, they then need to recognize others’ ownershipFootnote 1(RC) of this good. When the app asks Ada for access to “her” contacts, she might not even consider the possibility of others holding a stake. Furthermore, the feeling of self-entitlement might weaken her recognition of others’ ownership: Ada might recognize that others are somewhat involved in the data about to be transferred, but might feel self-entitled to this data. This feeling of entitlement might arise, for example, if the sharer has self-collected the information on a device that they own (e.g., their phone), or if they are in close relationship to the other (e.g., a partner or parent). Both the visibility of the other and the recognition of others’ entitlement are hence important prerequisites for users’ RC.

Lastly, respect for others’ rights (RS) presents the final stage to prevent interdependent privacy violations: Once the sharer has recognized that what they are about to share belongs to another person, their respect towards others’ privacy rights affects their further actions. There are several options for a sharer to respect others’ privacy, for example, by refraining from the data transfer at all, or by obtaining consent from the other. According to Kamleitner and Mitchell (2019), there are two main antecedent forces that play a role in users’ formation of respect for others’ rights. First, while, in an analog world, norms of respect for what belongs to others are implicitly negotiated, society seems to trivialize disrespect towards others’ privacy in digital settings. Users might thus consider it socially acceptable to infringe on others’ privacy, because “everyone does it”. Second, users might weigh their own benefit of the interdependent privacy violation against their own or others’ costs, and hence deliberately infringe on others’ privacy by knowingly putting their own interests above those of others.

The 3R Interdependent Privacy Protection Framework hence postulates three sequential steps where RE is a prerequisite for RC, and RC in turn is a prerequisite for RS. Together, the three steps act as a mechanism for users’ formation of an interdependent privacy decision.

Privacy nudging

Since Thaler and Sunstein (2008) have introduced the concept of nudging in 2008, it has found widespread attention in both research and practice. Nudges describe design elements that target automatic cognitive processes, such as biases or heuristics, to gently push individuals to perform the “right” behavior without limiting their choice set. Examples from the analog world include default options in organ donation or speed signs displaying smiling or frowning emoji. In information privacy research, prior works have started to investigate the potential of digital nudges (Schneider et al., 2018) in persuading users to act in a privacy-preserving manner in individual privacy contexts (e.g., Acquisti et al., 2017; Almuhimedi et al., 2015; Wang et al., 2014). Furthermore, recent research has started to call for the design and evaluation of nudges and permission interfaces “that approach privacy not simply as an individual issue, but as an interdependent and collective concern” (Marsch et al., 2021, p. 17).

Reviewing the vast body of literature on nudging, we find that nudges can take on various designs. Popular mechanisms are, for example, default options, positioning or color coding, reminding of the consequences, or enabling social comparison (Caraban et al., 2019). In their paper on the 3R framework, Kamleitner and Mitchell (2019) have suggested several interventions to improve interdependent privacy protection across stakeholders, e.g., requiring additional steps of decision control in the transfer process, or a preview of the actual data which is about to be shared. These suggestions provide a valuable basis for the design of nudges in an interdependent privacy context.

Research model and hypothesis development

Building upon prior works on privacy nudging (e.g., Almuhimedi et al., 2015; Wang et al., 2014; Zhang & Xu, 2016) and interdependent privacy protection (Kamleitner & Mitchell, 2019), we develop a research model which suggests that users’ RE, RC, and RS carry over the effect of an interdependent privacy salience nudge (IPN) to users’ decision to disclose others’ information (DOI). Figure 2 depicts our proposed research model.

Prior research on privacy nudging suggests that nudges that are designed to enable informed decision-making can facilitate privacy-aware behavior (Almuhimedi et al., 2015; Wang et al., 2014). For instance, confronting users with feedback on how often their location data was shared with apps has been shown to make users control their app permissions more restrictively (Almuhimedi et al., 2015). Regarding the violation of interdependent privacy, we thus hypothesize the following:

  • H1: The presence (vs. absence) of an interdependent privacy salience nudge (IPN) decreases users’ disclosure of others’ information (DOI).

Fig. 2
figure 2

Research model

In our remaining hypotheses, we aim to dive deeper into the underlying mechanisms of this effect. We use Avgerou (2013)’s definition of social mechanisms as sequences of events unfolding in time, that generate causal processes and ultimately observed outcomes. Social mechanisms might show, for example, how individuals develop specific meanings of an information system, or why they act in a particular way when interacting with technology in a certain context. We draw on the 3R framework (Kamleitner & Mitchell, 2019), where the salience of the good (i.e., the personal data about to be transferred) and the salience of the transfer have been suggested as antecedents of users’ realization of the data transfer. Prior research has demonstrated that providing users with salient and accessible privacy information guides users’ attention towards the information disclosure and its potential risks (Tsai et al., 2011). Getting back to our example of Ada downloading an app, we argue that it would have been easier for her to realize the data transfer if the app would have provided her with transparent and detailed information instead of simply asking for access to her contacts. For an IPN that increases the salience of both the data and the transfer, we hypothesize the following:

  • H2a: The presence (vs. absence) of an interdependent privacy salience nudge (IPN) increases users’ realization of the data transfer (RE).

Analogously, the salience of the other has been named as the antecedent of users’ recognition of others’ ownership when sharing information in an interdependent privacy context (Kamleitner & Mitchell, 2019). Increasing the salience of the other will hence increase the user’s attention towards the role of others’ ownership during the data transfer: If the app had explicitly informed Ada that she was about to share information that does not belong to her, but to others, she would have been more likely to recognize others’ ownership of the data. For an IPN that increases the salience of the other, we hence posit:

  • H2b: The presence (vs. absence) of an interdependent privacy salience nudge (IPN) increases users’ recognition of others’ ownership (RC).

H2a and H2b reflect our expectation of how the salience and accessibility of the displayed interdependent privacy information affect users’ RE and RC.

Drawing on the 3R Interdependent Privacy Protection Framework (Kamleitner & Mitchell, 2019), we predict that RE will feed into users’ RC, which will in turn increase their RS, and ultimately decrease their DOI. In other words, we posit that the effect of the IPN on users’ DOI takes place via a three-stage serial mediation through RE, RC, and RS:

  • H3: Users’ realization of the data transfer (RE), recognition of others’ ownership (RC), and respect for others’ rights (RS) will act as a three-stage serial mediator for the effect of the interdependent privacy salience nudge (IPN) on users’ disclosure of others’ information (DOI).

Research methodology

Experimental design and procedure

To test our hypotheses, we conducted an online experiment and embedded our treatments based on vignettes depicted in an online survey. The vignette methodology has been validated as an effective measurement technique for assessing users’ perceptions of and responses to specific information privacy-related conditions (Benlian et al., 2020; Lowry, Moody, et al., 2017; Warkentin et al., 2017). We chose the social networking platform Instagram as the context for our study for two main reasons. First, Instagram and its parent company, Meta Platforms (formerly Facebook), have been increasingly facilitating users’ voluntary information disclosure about not only their own, but also others’ information (Alsarkal et al., 2018; Symeonidis et al., 2018). Employing a vignette scenario on Instagram hence allowed us to use a real-world prompt which encourages interdependent privacy violations on online platforms. Second, Instagram is among the most popular social networks as of 2021 (Statista, 2021), which allowed for a large amount of potential participants in our study.

In our online vignette experiment, participants were welcomed and told that they participated in a study on Instagram use. They were asked to answer all questions honestly, and were told that there were no right or wrong answers. Furthermore, they were informed about their anonymity and the intended use of the collected data. Participants where then asked to imagine that they were logged into their personal Instagram account. They were told to imagine that, while browsing their Instagram feed, a prompt pops up, which was shown to them in the form of a screenshot. We employed a between-subject 2 × 1 experimental design with one control group, who saw the regular Instagram prompt asking for access to their address book (see Fig. 3, left side), and one experimental group, who saw the same prompt enriched with an interdependent privacy salience nudge (IPN, right side).

Fig. 3
figure 3

Mobile screenshots of an Instagram prompt asking for permission to access the address book and synchronize contacts. Control group (left) and treatment group with interdependent privacy salience nudge (right)

Drawing on prior literature on privacy nudging, we designed our interdependent privacy salience nudge (IPN) with the following ideas in mind: Building on Kamleitner and Mitchell (2019)’s suggestions for interventions to improve interdependent privacy protection, we aimed to implement additional steps of decision control into the data transfer process by including an opt-in mechanism that requires users to actively confirm that they have their contacts’ consent to share their personal information. Furthermore, we provide examples of the actual data about to be transferred to Instagram by specifying that it includes the phone numbers, email addresses and birthdays of all contacts stored in one’s address book, to increase both the salience of the data and the data transfer as well as the salience of the other individuals involved. We hence designed our IPN with the aim to increase both users’ RE and their RC. Our nudge design is in alignment with prior research on users’ preferences regarding the design of privacy nudges by employing a default mechanism (i.e., allowing access is by default not possible without opting in) along with color (red font), framing (warning sign), and privacy-related information (Schöbel et al., 2020). These design choices are also in agreement with the design principles for effective privacy nudging provided by (Barev et al., 2020).

In both the treatment and the control group, participants were asked how they would like to proceed with the Instagram prompt. After having selected one of two options, they were asked to shortly state why they chose the respective option in a free-text field. They were then redirected to our post-experimental questionnaire, where we recorded our mediation constructs, control variables, and socio-demographic information. Lastly, participants had the option to give feedback on the experiment on a voluntary basis, were debriefed, and informed that they finished the study.

Measured variables

Measurement of the dependent variable

In our experiment, participants chose between the following two options on how to proceed with the Instagram prompt: (1) “Press ‘Allow Access’ to sync my contacts” for the control group and “Check the box ‘I confirm that I have my contacts’ consent to share this data’ and press ‘Allow Access’ to sync my contacts” for the treatment group, respectively; (2) “Press ‘Don’t Allow Access’ and not sync my contacts” for both groups. We measured our dependent variable, that is, participants’ disclosure of others’ information (DOI) by capturing if they chose to “Allow Access” (which we counted as “1”) or “Don’t Allow Access” (which we counted as “0”).

Scale development for RE, RC, and RS

To measure our three mediation constructs RE, RC, and RS, we developed a measurement instrument based on the 3R Interdependent Privacy Protection Framework. In line with previous literature on scale development (e.g., MacKenzie et al., 2011; Moore & Benbasat, 1991), we started the process with a conceptual definition of the constructs, which was provided in detail by Kamleitner and Mitchell (2019). We then created a list of eight candidate items per construct that we thought to be suitable to represent the respective construct. Next, we asked six experienced researchers of the field of information systems to sort our items into the three constructs (RE, RC, RS), and to give feedback on the understandability of each item. This allowed us to assess the content validity of the items, to confirm the clustering into constructs, and to refine our wording. In a pretest experiment with 50 participants, we then evaluated the reliability of our items using Cronbach’s Alpha (Cronbach, 1951). Based on the pretest results, we again refined our measurement instrument and finally chose 4 items per construct to use in our experiment (see Table 4 in the Appendix).

Control variables

In addition to the constructs presented in our research model, we measured several alternative drivers of users’ disclosure of others’ information as controls in our experiment. Drawing on previous literature on users’ information disclosure (e.g., Dinev & Hart 2006; Krasnova et al., 2012), we measured participants’ general privacy concerns (Pavlou et al., 2007; Smith et al., 1996) towards Instagram. Furthermore, we collected information on subjects’ Instagram use, as well as sociodemographic information (i.e., gender, age, education, and nationality). Lastly, we measured users’ normative beliefs towards disclosing others’ information online (Primack et al., 2008). For a full list of all items used in our questionnaire, please refer to Table 4 in the Appendix.

Data collection and sample

In line with previous research, we recruited 349 participants via Prolific, a platform for recruiting subjects for social and economic science experiments (Palan & Schitter, 2018). All participants were EU citizens and were pre-screened as Instagram users by Prolific. Subjects were payed $0.53 (USD) for their participation. We excluded 19 participants because they failed to answer our attention check correctly (11 participants) or finished the study in less than half of the average completion time (8 participants), resulting in our final sample of 330 participants. Of the subjects in our study, 174 identified as females, 154 as males, and 2 as other. Participants exhibited an average age of 29.4 years, with 57% being younger than 25 years and 4% being older than 44 years. Our sample included 20 nationalities of the EU, with 95% of participants stating that they used Instagram at least several times a week, and 82% using it every day.

Serial mediation analysis

In our data analysis, we employ a serial mediation model with our three mediators RE, RC, and RS. In contrast to parallel mediation, where two or more mediators are hypothesized to explain the effect of an independent variable on a dependent variable while the mediators themselves do not causally influence one another, serial mediation describes two or more mediators that are linked together in a causal chain (Hayes, 2018). In our research model, we investigate the direct and indirect effects of our IPN on users’ DOI while modeling a process in which the IPN increases RE and RC (the latter both directly and indirectly through RE), RC in turn feeds into RS, concluding with DOI as the final consequence. We hence empirically test Kamleitner and Mitchell (2019)’s 3R framework, who have postulated that RE is causally prior to RC, which is causally prior to RS. The serial mediation approach is most fitting to explore research contexts where temporally ordered stages are central to theorizing (e.g., Casciano & Massey 2012; Valentine et al., 2014).

Results

Measurement validation

To confirm the random assignment of participants across our two experimental conditions (IPN absent vs. present), we performed a series of one-way ANOVAs for all control variables. There were no significant differences in gender (F = 0.005; p > .1), age (F = 1.82; p > .1), education (F = 1.70; p > .1), nationality (F = 1.59; p > .05), privacy concerns (F = 0.94; p > .1), normative beliefs (F = 1.22; p > .1) or Instagram use (F = 0.32; p > .1) among the two experimental conditions. It is therefore reasonable to conclude that the random assignment of participants to our conditions was successful, and that the participants’ demographics and relevant controls did not confound the effects of our experimental manipulations. We assessed our item scales for reliability using Cronbach’s alpha (Cronbach, 1951), which yielded values greater than 0.88 for all constructs (see Table 4 in the Appendix).

Direct effect of the interdependent privacy salience nudge on users’ Disclosure of others’ information

Of the 330 participants, 13.3% chose to disclose others’ information by synchronizing their contacts with Instagram. A significant two-proportion Z test revealed that participants’ choice varied across the two experimental conditions (χ2 = 8.25; p < .01), see Fig. 4: In the control group (IPN absent), 18.7% of participants chose to disclose others’ information, whereas among participants who received the treatment (IPN present), only 7.9% chose to do so.

Fig. 4
figure 4

Disclosure of others’ information across experimental groups; N = 330

In order to test our hypothesis H1, we conducted a binary logistic regression on our dependent variable DOI without and with control variables (see Table 1). We examined the main effects of the IPN and any potential effect of the controls on participants’ DOI. The results of our regression analysis demonstrate a significant negative effect (B = − 0.98; p < .05; Exp(B) = 0.38) of the IPN on participants’ DOI. Participants that were confronted with an interdependent privacy salience nudge were hence 62% less likely to disclose others’ information than when the nudge was absent, supporting H1.

Table 1 Logistic regression analysis on participants’ disclosure of others’ information (DOI)

Serial mediation analysis through the lens of the 3R framework

Our remaining hypotheses focus on the explanatory mechanism through which the formation of users’ decision to DOI takes place. In H2a and H2b, we hypothesized that the introduction of an IPN will increase users’ RE as well as RC. In H3, we then argued that the IPN influences users’ DOI negatively through a three-stage mediation via RE, RC and subsequently RS. To evaluate our hypotheses, we performed a serial multiple mediaton analysis using Hayes’ (2018) PROCESS macro (version 3.5). We applied model 6 and entered RE, RC and RS as potential mediators between the independent and dependent variable while controlling for all direct and indirect paths. Additionally, we controlled the dependent variable as well as all mediators for participants’ socio-demographics. Furthermore, we controlled the dependent variable as well as RE and RC for participants’ privacy concerns, and, drawing on Kamleitner and Mitchell (2019), RS for participants’ normative beliefs. We estimated our model using a bootstrapping approach based on 10,000 samples and 95% bias-corrected confidence intervals for the indirect effects. Figure 5 illustrates all direct effects as well as the explained variance of each constructs in our model. For a detailed stepwise presentation of all mediation effects, please refer to Table 4 in the Appendix.

The model revealed a positive and statistically significant direct effect of the IPN on participants’ RE (B = 3.97; p < .01). Furthermore, we found a positive and statistically significant direct effect of the IPN on participants’ RC (B = 0.400; p < .05). This corroborates our hypotheses H2a and H2b, and implicitly confirms that our experimental treatment worked as intended.

Fig. 5
figure 5

Results from the serial multiple mediation analysis for the effect of an IPN on users’ DOI through the 3R model. Note: The first coefficient on a given path represents the direct effect without the mediators in the model; the second represents the direct effect when the mediators are included in the model. *** p < .001; ** p < .01; * p < .05; n.s. not significant; N =330

In addition, Table 2 sheds further light on the indirect effects of RE, RC and RS on participants’ DOI. We found evidence of three significant mediation paths, indicated by estimates of effect sizes that did not include zero in the given confidence interval. Path (1) demonstrates a significant indirect effect of the IPN on DOI through RE alone (effect size = –0.170; CI = [–0.4325, –0.0119], which has not been theorized in our research model. Path (6) consists of two significant specific indirect effects, namely through RC and RS as mediators (effect size = –0.084; CI = [–0.2247, –0.0004]. Furthermore, the direct effect of RC on DOI in our model is statistically insignificant (p > .05), suggesting a complete mediation through RS. Lastly, path (7) reveals a significant indirect effect of all three mediators RE, RC and RS (effect size = –0.059; CI = [–0.1619, –0.0023], hence supporting our hypothesis H3. As the direct effect of IPN on DOI (B = –0.98; p < .01) became insignificant after entering RE, RC and RS as mediators (B = 0.475; p > .1), this represents a full mediation through the 3R mechanisms (Hayes, 2018).

Table 2 Results from the serial multiple mediation analysis (indirect effects of IPN on participants’ DOI through RE, RC, and RS)

Post-hoc analysis of qualitative results

After the participants of our experiment had decided how they would like to proceed with the Instagram prompt (by choosing either “Allow Access” or “Don’t Allow Access”), we asked them to shortly state why they decided the way they did. This provided us with qualitative free-text answers and hence richer insights into participants’ motives. Drawing on literature on the analysis of qualitative data (Mayring, 2014), we chose an inductive approach and coded all answers into categories that illustrated a reflection of the data material. Some statements were sorted into more than one category, and some statements were too imprecise and therefore not sorted into any category. Table 3 gives an overview of participants’ motives with exemplary statements.

Table 3 Overview of participants’ free-text statements

As for participants who disclosed others’ personal information by allowing Instagram access to their contacts, the most stated reason was the wish to gain more followers without much effort. For example, one participant stated: “Because it helps to find people from my contacts without having to ask them for their username.” Others seemed to have potential privacy concerns in mind, but found Instagram to be “safe enough to be trusted”, or the prompt to be “relatively trustworthy”.

Participants who chose to not allow Instagram access to their contacts stated several motives not to do so. While around one third stated that they “just don’t need that feature” or have “no interest in it”, privacy protection seemed to play a role in several ways. On the one hand, 146 participants stated that they had concerns regarding their own privacy towards Instagram (e.g., “I don’t know how safe my privacy is with Facebook”, or “I value my privacy more than having followers”). On the other hand, several participants expressed the wish to protect their privacy towards their contacts by stating, for example, that they “don’t want every contact on [their] phone to see or find [their] Instagram account”, or that they “rather keep [their] Instagram private”. Lastly, and most interesting to our research, 41 participants (control group: 8, treatment group: 33) stated that they chose to not allow Instagram access to their address book due to their respect for their contacts’ privacy rights. Participants’ motives reflected our construct RS, for example, “I have no right […] to share personal data of my contacts […]” or “I don’t want to compromise my contacts’ private info”, which at the same time implicates their RE and RC. The qualitative results hence further confirm our theoretical model.

Discussion

The disclosure of our own personal information through others increasingly threatens our privacy, specifically in the context of online platforms. Leading privacy researchers have hence called for a more versatile, multilevel understanding of privacy that acknowledges the complexity of sophisticated digital environments in order to be able to explore concepts such as, for example, interdependent privacy (e.g., Bélanger & James 2020; Cao et al., 2018; Lowry, Dinev, et al., 2017). Whereas prior works on interdependent privacy have yielded important insights into the phenomenon of interdependent privacy, what has been missing is a deeper understanding of why and how users decide to either protect or violate others’ privacy when interacting with online platforms, as well as an investigation of effective remedies. Our study revealed that an additional step of decision control in the form of an interdependent privacy salience nudge can decrease the likelihood that a user discloses others’ information by 62%. Moreover, our results indicate a serial mediation through users’ RE, RC, and RS when forming the decision to disclose others’ personal data. Our study holds important implications for the emerging field of research on interdependent privacy in both theory and practice, which we will elaborate on in the following.

Contributions to interdependent privacy literature

We believe that our study contributes to interdependent privacy research in three particular ways. Our first contribution lies in the investigation of the interdependent privacy nudge itself. To our knowledge, this is one of the first works to explore the efficacy of an interdependent privacy salience nudge in a user study. Our interdependent privacy salience nudge was designed to increase the salience of the data and the data transfer as well as the salience of potential co-owners of the data. To do so, we implemented an opt-in mechanism, framing, as well as transparent privacy-related information as nudging mechanisms in alignment with prior literature (Kamleitner & Mitchell, 2019; Schöbel et al., 2020). Our experimental results show that the implementation of our nudge yielded a 62% decrease in participants’ disclosure of others’ personal information. This suggests a need for more transparent and salient communication of interdependent privacy implications on online platforms.

A second, broader contribution of this study relates to the theoretical mechanisms through which our interdependent privacy salience nudge decreases individuals’ disclosure behavior. Manipulating the salience of the data transfer and the salience of the other, our data indicates that users’ protection of others’ privacy rights unfolds through a complete serial mediation of three consecutive stages as theorized by Kamleitner and Mitchell (2019). Our results hence empirically validate the 3R framework. However, while Kamleitner and Mitchell (2019) have proposed RE, RC, and RS to be three consecutive and hierarchically dependent steps, we found that the interdependent privacy salience nudge directly increases both RE and RC, and that there is a significant mediation path IPN → RC → RS → DOI. These findings deviate from the 3R framework, in that RC can be increased without relying on RE as a prerequisite. Our results advance our understanding of how interventions, such as our IPN, can act as effective remedies against interdependent privacy violations.

Our third contribution is of methodological nature and lies in the development and validation of a measurement instrument to capture users’ RE, RC, and RS when disclosing others’ information. Our measurement instrument allows to zoom into the micro-level processes of users’ decision-making and might be useful for future studies in this field.

Implications for practice

Our findings suggest implications for both policy-makers and online platform user interface designers. Current regulations, such as the European Union GDPR, do not sufficiently consider interdependent privacy infringements (Kamleitner & Mitchell, 2019; Symeonidis et al., 2018). This presents a loophole for online platform providers to intrude individuals’ privacy rights through their peers. While online platforms ask the user for their consent (e.g., “Allow Access”) when sharing others’ information, the numerous data subjects that are involved in the data transfer are neither notified nor given the possibility to opt out. As demonstrated in our vignette scenario, around one fifth of Instagram users would give Instagram access to their address book in a real-world scenario, hence disclosing potentially hundreds of names, phone numbers, email addresses, and the like. Our results reveal useful insights for regulators, as they show the potential of providing users with design elements that increase the salience of the data transfer and the salience of the other. While, in a privacy-wise ideal world, users would not be allowed to share others’ personal data without each of their co-owners’ consent, this is not feasible in today’s interconnected environment. However, we show that enabling users to make an informed decision about the disclosure of others’ personal information can reduce interdependent privacy violations significantly. The significant indirect effect path (IPN → RE → DOI) reveals that social online platforms have potential for improvement in transparently communicating their practices for data collection and usage in general, since users seem to not be aware of the fact that data as a good is being transferred to the platform when, e.g., synchronizing contacts, let alone that this data belongs to other individuals. The introduction of the GDPR, which demands for mandatory opt-in mechanisms when giving access to one’s own information, has proven to improve the transparency and visual representation of organizations’ privacy policies (Linden et al., 2020). We argue that a future refinement of the GDPR should include mandatory and informative opt-in mechanisms when disclosing others’ data, and hope that our work can inform future policy-making.

As for online platform providers, prior research has demonstrated that users’ privacy concerns impact their choice of and behavior on online platforms (Gal-Or et al., 2018; Liu et al., 2021; Tsai et al., 2011) to the point where businesses might be able to leverage privacy protection as a selling point. The evaluation of our interdependent privacy salience nudge can serve as a starting point for the design of user interfaces where users can make informed decisions regarding interdependent privacy.

Limitations and directions for future research

Despite the aforementioned theoretical and practical contributions of this research, our study is subject to several limitations, which open up a series of exciting venues for future research. Whereas our interdependent privacy salience nudge can serve as a starting point, we acknowledge that a more detailed evaluation of the individual nudging mechanisms (e.g., the default mechanism, the warning sign, or privacy-related information) is vital for the design of real-world interdependent privacy interventions. Prior research revealed that user-oriented information security and privacy interventions face issues such as information overload and habituation (Reeder et al., 2018; Vance et al., 2018), which have to be carefully navigated when aiming to support both individual and interdependent privacy decisions.

Our second limitation is of methodological nature. It has been argued that a research design where mediators are measured (such as the one chosen in our study) as opposed to manipulated, is problematic to justify causality (Pirlott & MacKinnon, 2016). Since participants self-select to levels of the mediating variables, they are not randomly distributed across mediator levels, and the relationship between the mediators and the dependent variable can be correlational. Our ability to infer that our three mediators indeed caused DOI is hence limited, and our measurement of DOI might be subject to alternative explanations.

Furthermore, scholars might wish to extend our study by assessing the formation of our mediating variable RS in more detail. Kamleitner & Mitchell (2019) have suggested social norms and self-interest as important forces influencing RS, which has not been covered in our study. RS might also be subject to cultural factors: We conducted our study drawing on a sample of EU citizens, hence in countries with relatively similar cultural backgrounds. However, prior research has demonstrated the intercultural dynamics of privacy calculus on social networking sites (Krasnova et al., 2012). Accordingly, we encourage future research to further explore interdependent privacy protection across cultures.

Lastly, even though we designed our vignette experiment with the goal to represent a realistic scenario by employing an actual Instagram prompt as well as a sample of real-world Instagram users, our study relied on hypothetical and cross-sectional observations, and hence did not allow us to investigate users while they were actually deciding on interdependent privacy protection. To further strengthen the validity of our findings, we invite future research to apply complementary research methods, such as randomized field experiments.

Conclusions

This work investigates the formation of users’ interdependent privacy decisions, and how such decisions can be supported by design elements such as an interdependent privacy salience nudge. We empirically validate Kamleitner and Mitchell (2019)’s 3R Framework of Interdependent Privacy Protection by revealing a serial mediation effect of our interdependent privacy salience nudge on users’ disclosure of others’ information through their realization of the data transfer (RE), recognition of other’s ownership (RC) as well as respect for others’ rights (RS). This answers our research question RQ1, and sheds light on the steps that individuals have to take in order to be able to behave in an interdependent privacy-protecting manner. Addressing RQ2, we show that an interdependent privacy salience nudge employing an opt-in mechanism, framing, and transparent privacy-related information can support interdependent privacy protection on online platforms, with participants in the treatment group being 62% less likely to disclose others’ personal information. This effect is reflected in users’ qualitative statements, with participants expressing that “it does not seem right to share other peoples’ data without their consent”. Our study represents a starting point for future research on how to design usable and effective interventions for privacy protection in interdependent contexts.