skip to main content
10.1145/2858036.2858346acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Engineering Information Disclosure: Norm Shaping Designs

Published:07 May 2016Publication History

ABSTRACT

Nudging behaviors through user interface design is a practice that is well-studied in HCI research. Corporations often use this knowledge to modify online interfaces to influence user information disclosure. In this paper, we experimentally test the impact of a norm-shaping design patterns on information divulging behavior. We show that (1) a set of images, biased toward more revealing figures, change subjects' personal views of appropriate information to share; (2) that shifts in perceptions significantly increases the probability that a subject divulges personal information; and (3) that these shift also increases the probability that the subject advises others to do so. Our main contribution is empirically identifying a key mechanism by which norm-shaping designs can change beliefs and subsequent disclosure behaviors.

Skip Supplemental Material Section

Supplemental Material

References

  1. Alessandro Acquisti. 2004. Privacy in Electronic Commerce and the Economics of Immediate Gratification. In Proceedings of the 5th ACM Conference on Electronic Commerce (EC '04). ACM, NY, NY, USA, 21--29. DOI: http://dx.doi.org/10.1145/988772.988777 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509--514. DOI: http://dx.doi.org/10.1126/science.aaa1465Google ScholarGoogle Scholar
  3. Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy Enhancing Technologies. Springer, 36--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Alessandro Acquisti and Ralph Gross. 2009. Predicting Social Security numbers from public data. Proceedings of the National Academy of Sciences 106, 27 (2009), 10975--10980.Google ScholarGoogle ScholarCross RefCross Ref
  5. Alessandro Acquisti and Jens Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy 1 (2005), 26--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Alessandro Acquisti, Leslie K. John, and George Loewenstein. 2012. The impact of relative standards on the propensity to disclose. Journal of Marketing Research 49, 2 (2012), 160--174.Google ScholarGoogle ScholarCross RefCross Ref
  7. Eytan Adar, Desney S. Tan, and Jaime Teevan. 2013. Benevolent Deception in Human Computer Interaction. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). ACM, NY, NY, USA, 1863--1872. DOI: http://dx.doi.org/10.1145/2470654.2466246 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Solomon E. Asch. 1956. Studies of independence and conformity: A minority of one against a unanimous majority. Psychological Monographs: General and Applied 70, 9 (1956), 1--70.Google ScholarGoogle ScholarCross RefCross Ref
  9. Oriana Bandiera, Iwan Barankay, and Imran Rasul. 2005. Social Preferences and the Response to Incentives: Evidence from Personnel Data. The Quarterly Journal of Economics 120, 3 (2005), 917--962. DOI: http://dx.doi.org/10.1093/qje/120.3.917Google ScholarGoogle Scholar
  10. Nicholas Bardsley and Rupert Sausgruber. 2005. Conformity and reciprocity in public good provision. Journal of Economic Psychology 26, 5 (2005), 664--681.Google ScholarGoogle ScholarCross RefCross Ref
  11. danah boyd and Eszter Hargittai. 2010. Facebook privacy settings: Who cares? First Monday 15, 8 (2010). http://firstmonday.org/ojs/index.php/fm/article/view/3086Google ScholarGoogle Scholar
  12. Robert B. Cialdini, Raymond R. Reno, and Carl A. Kallgren. 1990. A focus theory of normative conduct: recycling the concept of norms to reduce littering in public places. Journal of Personality and Social Psychology 58, 6 (1990), 1015.Google ScholarGoogle ScholarCross RefCross Ref
  13. Gregory Conti and Edward Sobiesk. 2010. Malicious Interface Design: Exploiting the User. In Proceedings of the 19th International Conference on World Wide Web (WWW '10). ACM, NY, NY, USA, 271--280. DOI: http://dx.doi.org/10.1145/1772690.1772719 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Christian Crumlish and Erin Malone. 2009. Designing social interfaces: Principles, patterns, and practices for improving the user experience. " O'Reilly Media, Inc.".Google ScholarGoogle Scholar
  15. Bernhard Debatin, Jennette P. Lovejoy, Ann-Kathrin Horn, and Brittany N. Hughes. 2009. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication 15, 1 (2009), 83--108. DOI: http://dx.doi.org/10.1111/j.1083--6101.2009.01494.xGoogle ScholarGoogle ScholarCross RefCross Ref
  16. Morton Deutsch and Harold B. Gerard. 1955. A study of normative and informational social influences upon individual judgment. The Journal of Abnormal and Social Psychology 51, 3 (1955), 629.Google ScholarGoogle ScholarCross RefCross Ref
  17. Simon Gächter and Elke Renner. 2003. Leading by example in the presence of free rider incentives. Technical Report. University of St. Gallen.Google ScholarGoogle Scholar
  18. F. Maxwell Harper, Yan Chen, Joseph Konstan, and Sherry Xin Li. 2010. Social comparisons and contributions to online communities: A field experiment on movielens. The American economic review (2010), 1358--1398.Google ScholarGoogle Scholar
  19. Bart P. Knijnenburg and Alfred Kobsa. 2013. Helping Users with Information Disclosure Decisions: Potential for Adaptation. In Proceedings of the 2013 International Conference on Intelligent User Interfaces (IUI '13). ACM, NY, NY, USA, 407--416. DOI: http://dx.doi.org/10.1145/2449396.2449448 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Bart Piet Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Counteracting the negative effect of form auto-completion on the privacy calculus. (2013).Google ScholarGoogle Scholar
  21. Robert E. Kraut, Paul Resnick, and Sara Kiesler. 2012. Evidence-based social design: Mining the social sciences to build online communities. MIT Press.Google ScholarGoogle Scholar
  22. Erin Krupka, Steve Leider, and Ming Jiang. 2015. A meeting of the minds: informal agreements and social norms. Working paper. University of Michigan.Google ScholarGoogle Scholar
  23. Erin Krupka and Roberto A. Weber. 2009. The focusing and informational effects of norms on pro-social behavior. Journal of Economic Psychology 30, 3 (2009), 307--320.Google ScholarGoogle ScholarCross RefCross Ref
  24. Erin L. Krupka and Roberto A. Weber. 2013. Identifying social norms using coordination games: Why does dictator game sharing vary? Journal of the European Economic Association 11, 3 (2013), 495--524.Google ScholarGoogle ScholarCross RefCross Ref
  25. James E. Reinmuth and Michael D. Geurts. 1975. The collection of sensitive information using a two-stage, randomized response model. Journal of Marketing Research (1975), 402--407.Google ScholarGoogle Scholar
  26. Jen Shang and Rachel Croson. 2009. A Field Experiment in Charitable Contribution: The Impact of Social Information on the Voluntary Provision of Public Goods. The Economic Journal 119, 540 (2009), 1422--1439. DOI: http://dx.doi.org/10.1111/j.1468-0297.2009.02267.xGoogle ScholarGoogle ScholarCross RefCross Ref
  27. Sarah Spiekermann, Jens Grossklags, and Bettina Berendt. 2001. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In Proceedings of the 3rd ACM Conference on Electronic Commerce (EC '01). ACM, NY, NY, USA, 38--47. DOI: http://dx.doi.org/10.1145/501158.501163 Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Fred Stutzman and Jacob Kramer-Duffield. 2010. Friends Only: Examining a Privacy-enhancing Behavior in Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, NY, NY, USA, 1553--1562. DOI: http://dx.doi.org/10.1145/1753326.1753559 Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Fred Stutzman, Jessica Vitak, Nicole Ellison, Rebecca Gray, and Cliff Lampe. 2012. Privacy in Interaction: Exploring Disclosure and Social Capital in Facebook. In Proceedings of the International AAAI Conference on Web and Social Media. AAAI. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM12/paper/view/4666Google ScholarGoogle Scholar
  30. Abhay Sukumaran, Stephanie Vezich, Melanie McHugh, and Clifford Nass. 2011. Normative influences on thoughtful online participation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3401--3410. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Bob Tedeschi. 2012. E-commerce report; everybody talks about online privacy, but few do anything about it. (June 3 2012).Google ScholarGoogle Scholar
  32. Richard H. Thaler and Cass R. Sunstein. 2008. Nudge. Yale University Press.Google ScholarGoogle Scholar
  33. Roger Tourangeau and Ting Yan. 2007. Sensitive questions in surveys. Psychological bulletin 133, 5 (2007), 859.Google ScholarGoogle Scholar
  34. Janice Y. Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. 2011. The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research 22, 2 (2011), 254--268. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, and Norman Sadeh. 2014. A Field Trial of Privacy Nudges for Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, NY, NY, USA, 2367--2376. DOI: http://dx.doi.org/10.1145/2556288.2557413 Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, and Lorrie Faith Cranor. 2013. Privacy Nudges for Social Media: An Exploratory Facebook Study. In Proceedings of the 22Nd International Conference on World Wide Web Companion (WWW '13 Companion). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 763--770. http://dl.acm.org/citation.cfm?id=2487788.2488038 Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Rick Wash. 2010. Folk Models of Home Computer Security. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10). ACM, NY, NY, USA, Article 11, 16 pages. DOI: http://dx.doi.org/10.1145/1837110.1837125 Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. David B. Wiseman and Irwin P. Levin. 1996. Comparing risky decision making under conditions of real and hypothetical consequences. Organizational Behavior and Human Decision Processes 66, 3 (1996), 241--250.Google ScholarGoogle ScholarCross RefCross Ref
  39. Sean D. Young and Alexander H. Jordan. 2013. The influence of social networking photos on social norms and sexual health behaviors. Cyberpsychology, Behavior, and Social Networking 16, 4 (2013), 243--247.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Engineering Information Disclosure: Norm Shaping Designs

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems
      May 2016
      6108 pages
      ISBN:9781450333627
      DOI:10.1145/2858036

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 May 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '16 Paper Acceptance Rate565of2,435submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader