skip to main content
10.1145/3290605.3300768acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Machine Heuristic: When We Trust Computers More than Humans with Our Personal Information

Published:02 May 2019Publication History

ABSTRACT

In this day and age of identity theft, are we likely to trust machines more than humans for handling our personal information? We answer this question by invoking the concept of "machine heuristic," which is a rule of thumb that machines are more secure and trustworthy than humans. In an experiment (N = 160) that involved making airline reservations, users were more likely to reveal their credit card information to a machine agent than a human agent. We demonstrate that cues on the interface trigger the machine heuristic by showing that those with higher cognitive accessibility of the heuristic (i.e., stronger prior belief in the rule of thumb) were more likely than those with lower accessibility to disclose to a machine, but they did not differ in their disclosure to a human. These findings have implications for design of interface cues conveying machine vs. human sources of our online interactions.

References

  1. Alessandro Acquisti, Laura Brandimarte, and George Loewenstein (2015). Privacy and human behavior in the age of information. Science, 509--514.Google ScholarGoogle Scholar
  2. Alessandro Acquisti., Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson (2017). Nudges for privacy and security: understanding and assisting users' choices online, ACM Computing Surveys (CSUR) 50 (3), Article No. 44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alison Adam (2005). Delegating and distributing morality: Can we inscribe privacy protection in a machine? Ethics and Information Technology, 7(4), 233--242. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, J. Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal (2015). Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI' 15), 787--796. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Saraswathi Bellur and S. Shyam Sundar (2014). How can we tell when a heuristic has been used? Design and analysis strategies for capturing the operation of heuristics. Communication Methods and Measures, 8(2), 116--137.Google ScholarGoogle ScholarCross RefCross Ref
  6. Lars Bergkvist and John R. Rossiter (2007). The predictive validity of multiple-item versus single-item measures of the same constructs. Journal of Marketing Research, 44(2), 175--184. https://www.jstor.org/stable/30162466Google ScholarGoogle ScholarCross RefCross Ref
  7. Erika Chin, Adrienne Porter Felt, Vyas Sekar, and David Wagner (2012). Measuring user confidence in smartphone security and privacy. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12), 1--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Tamara Dinev and Paul Hart (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61- 80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Susan T. Fiske and Shelley E. Taylor (1991). Social cognition. New York, NY: McGraw-Hill.Google ScholarGoogle Scholar
  10. Erving Goffman (1967). Interaction ritual: Essays on face-to-face behavior. New York: Anchor Books.Google ScholarGoogle Scholar
  11. Tory E. Higgins, John A. Bargh, and Wendy J. Lombardi (1985). Nature of priming effects on categorization. Journal of Experimental Psychology: Learning, Memory, and Cognition, 11(1), 59--69.Google ScholarGoogle ScholarCross RefCross Ref
  12. Kevin Anthony Hoff and Masooda Bashir (2015). Trust in automation: Integrating empirical evidence on factors that influence trust. Human Factors, 57(3), 407--434.Google ScholarGoogle ScholarCross RefCross Ref
  13. Leslie K. John, Alessandro Acquisti, and George Loewenstein (2011). Strangers on a plane: context-dependent willingness to divulge sensitive information. Journal of Consumer Research, 37(5), 858--873.Google ScholarGoogle ScholarCross RefCross Ref
  14. Vincent Lanaria (2016). Snapchat updates terms of service and privacy policy as chat 2.0 rolls out. Tech Times. Retrieved from http://www.techtimes.com/articles/145613/20160330/snapchatupdates-terms-of-service-and-privacy-policy-as-chat-2-0-rollsout.htmGoogle ScholarGoogle Scholar
  15. Charles Layton, Philip J. Smith, and C. Elaine McCoy (1994). Design of a cooperative problem-solving system for en-route flight planning: An empirical evaluation. Human Factors, 36(1), 94--119.Google ScholarGoogle ScholarCross RefCross Ref
  16. Gale M. Lucas, Jonathan Gratch, Aisha King, and Louis-Philippe Morency (2014). It's only a computer: Virtual humans increase willingness to disclose. Computers in Human Behavior, 37, 94--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Sampada Sameer Marathe, S. Shyam Sundar, Marije Nije Bijvank, Henriette van Vugt, and Jolanda Veldhuis (2007). Who are these power users anyway? Building a psychological profile. Paper presented at the 57th annual conference of the International Communication Association, San Francisco, CA.Google ScholarGoogle Scholar
  18. Kathleen L. Mosier, Linda J. Skitka, Mark D. Burdick, and Susan T. Heers (1996). Automation bias, accountability, and verification behaviors. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 40(4), 204--208.Google ScholarGoogle ScholarCross RefCross Ref
  19. Patricia A. Norberg, Daniel R. Horne, and David A. Horne (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100--127.Google ScholarGoogle ScholarCross RefCross Ref
  20. Jonathan A. Obar and Anne Oeldorf-Hirsch (2018). The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society, 7(3), 1--20. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2757465Google ScholarGoogle ScholarCross RefCross Ref
  21. Raja Parasuraman and Dietrich H. Manzey (2010). Complacency and bias in human use of automation: An attentional integration. Human Factors, 52(3), 381--410.Google ScholarGoogle ScholarCross RefCross Ref
  22. Matthew D. Pickard, Catherine A. Roster, and Yixing Chen (2016). Revealing sensitive information in personal interviews. Computers in Human Behavior, 65, 23--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Scott Ruoti, Nathan Kim, Ben Burgon, Timoth van der Horst, and Kent Seamons (2013). Confused Johnny: when automatic encryption leads to confusion and mistakes. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13), 119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Pan Shi, Heng Xu, and Yunan Chen, (2013). Using contextual integrity to examine interpersonal-information boundary on social network sites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 35--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Shyam Sundar (2008). The MAIN model: A heuristic approach to understanding technology effects on credibility. In M. J. Metzger and A. J. Flanagin (Eds.), Digital media, youth, and credibility (pp. 72--100). Cambridge, MA: The MIT Press.Google ScholarGoogle Scholar
  26. S. Shyam Sundar, Hyunjin Kang, Mu Wu, Eun Go, and Bo Zhang (2013). Unlocking the privacy paradox: Do cognitive heuristics hold the key? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 811--816. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. Shyam Sundar, Silvia Knobloch-Westerwick, and Matthias R. Hastall (2007). News cues: Information scent and cognitive heuristics. Journal of the American Society for Information Science and Technology, 58(3), 366--378. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. S. Shyam Sundar and Sampada Sameer Marathe (2010). Personalization versus customization: The importance of agency, privacy, and power usage. Human Communication Research, 36(3), 298--322.Google ScholarGoogle ScholarCross RefCross Ref
  29. Amos Tversky and Daniel Kahneman (1974). Judgment under uncertainty: Heuristics and biases. Science, 185(4157), 1124--1131.Google ScholarGoogle ScholarCross RefCross Ref
  30. Jennifer M. Urban and Chris Jay Hoofnagle (2014). The Privacy Pragmatic as Privacy Vulnerable. SOUPS'14 Workshop on Privacy Personas and Segmentation (PPS). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2514381Google ScholarGoogle Scholar
  31. Paul A. Van Lange, Mark Van Vugt, Ree M. Meertens, and Rob A. Ruiter (1998). A social dilemma analysis of commuting preferences: The roles of social value orientation and trust. Journal of Applied Social Psychology, 28(9), 796--820.Google ScholarGoogle ScholarCross RefCross Ref
  32. Bo Zhang, Mu Wu, Hyunjin Kang, Eun Go, and S. Shyam Sundar (2014). Effects of security warnings and instant gratification cues on attitudes toward mobile websites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 111--114. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Machine Heuristic: When We Trust Computers More than Humans with Our Personal Information

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
        May 2019
        9077 pages
        ISBN:9781450359702
        DOI:10.1145/3290605

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 May 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CHI '19 Paper Acceptance Rate703of2,958submissions,24%Overall Acceptance Rate6,199of26,314submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format