The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-Aug. (2013 vol.11)
pp: 72-74
Alessandro Acquisti , Carnegie Mellon University
Idris Adjerid , Carnegie Mellon University
Laura Brandimarte , Carnegie Mellon University
ABSTRACT
Even simpler or more usable privacy controls and notices might not improve users' decision-making regarding sharing of personal information. Control might paradoxically increase riskier disclosure by soothing privacy concerns. Transparency might be easily muted, and its effect arbitrarily controlled, through simple framing or misdirections.
INDEX TERMS
Privacy, Computer security, Security, Privacy, Decision making, Online services, transparency, online security, computer security, online privacy, computer privacy, privacy settings
CITATION
Alessandro Acquisti, Idris Adjerid, Laura Brandimarte, "Gone in 15 Seconds: The Limits of Privacy Transparency and Control", IEEE Security & Privacy, vol.11, no. 4, pp. 72-74, July-Aug. 2013, doi:10.1109/MSP.2013.86
REFERENCES
1. Protecting Consumer Privacy in an Era of Rapid Change, US Federal Trade Commission, 2012; www.ftc.gov/os/2012/03120326privacyreport.pdf .
2. R. Santalesa, “What's Next for the FTC's Proposed Privacy Framework?,” Information Law Group, 2011; www.infolawgroup.com/2011/03/articles/data-privacy-law-or-regulation whats-next-for-the-ftcs-proposed-privacy-framework .
3. R. Reitman, “FTC Final Privacy Report Draws a Map to Meaningful Privacy Protection in the Online World,” Electronic Frontier Foundation, 26 Mar. 2012; www.eff.org/deeplinks/2012/03ftc-final-privacy-report-draws-map-meaningful-privacy-protection-online-world .
4. B. Schwartz, The Paradox of Choice: Why More Is Less, HarperCollins, 2004.
5. J.S. Downs, G. Loewenstein, and J. Wisdom, “The Psychology of Food Consumption: Strategies for Promoting Healthier Food Choices,” Am. Economic Rev., vol. 99, no. 2, 2009, pp. 1-10.
6. Y. Wang et al., “I Regretted the Minute I Pressed Share: A Qualitative Study of Regrets on Facebook,” Proc. 7th Symp. Usable Privacy and Security (Soups 11), ACM, 2011, article 10.
7. A. McDonald and L. Cranor, “The Cost of Reading Privacy Policies,” I/S: A J. of Law and Policy for the Information Society, vol. 4, no. 3, 2009, pp. 543-568.
8. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Org. for Economic Cooperation and Development, 23 Sept. 1980.
9. A. Wakefield and J. Fleming, The Sage International Dictionary of Policing, Sage Publications, 2009.
10. L. Brandimarte, A. Acquisti, and G. Loewenstein, “Misplaced Confidences: Privacy and the Control Paradox,” Social Psychological and Personality Science, vol. 4, no. 3, 2013, pp. 340-347; http://spp.sagepub.com/content/early/2012/ 08/081948550612455931.full.pdf.
11. P.G. Kelley et al., “A ‘Nutrition Label’ for Privacy,” Proc. 5th Symp. Usable Privacy and Security (Soups 09), ACM, 2009, article 4; http://cups.cs.cmu.edu/soups/2009/proceedings a4-kelley.pdf.
12. D. Kahneman and A. Tversky, “Prospect Theory: An Analysis of Decision under Risk,” Econometrica, vol. 47, no. 2, 1979, pp. 263-291.
13. H.A. Simon, “A Behavioral Model of Rational Choice,” Q. J. Economics, vol. 69, no. 1, 1955, pp. 99-118.
14. I. Adjerid et al., “Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency,” to be published in Proc. 9th Symp. Usable Privacy and Security (SOUPS 13), ACM, 2013.
15. A. Acquisti, “Nudging Privacy: The Behavioral Economics of Personal Information,” IEEE Security & Privacy, vol. 7, no. 6, 2009, pp. 82-85.
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool