ABSTRACT
In this day and age of identity theft, are we likely to trust machines more than humans for handling our personal information? We answer this question by invoking the concept of "machine heuristic," which is a rule of thumb that machines are more secure and trustworthy than humans. In an experiment (N = 160) that involved making airline reservations, users were more likely to reveal their credit card information to a machine agent than a human agent. We demonstrate that cues on the interface trigger the machine heuristic by showing that those with higher cognitive accessibility of the heuristic (i.e., stronger prior belief in the rule of thumb) were more likely than those with lower accessibility to disclose to a machine, but they did not differ in their disclosure to a human. These findings have implications for design of interface cues conveying machine vs. human sources of our online interactions.
- Alessandro Acquisti, Laura Brandimarte, and George Loewenstein (2015). Privacy and human behavior in the age of information. Science, 509--514.Google Scholar
- Alessandro Acquisti., Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson (2017). Nudges for privacy and security: understanding and assisting users' choices online, ACM Computing Surveys (CSUR) 50 (3), Article No. 44. Google ScholarDigital Library
- Alison Adam (2005). Delegating and distributing morality: Can we inscribe privacy protection in a machine? Ethics and Information Technology, 7(4), 233--242. Google ScholarDigital Library
- Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, J. Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal (2015). Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI' 15), 787--796. Google ScholarDigital Library
- Saraswathi Bellur and S. Shyam Sundar (2014). How can we tell when a heuristic has been used? Design and analysis strategies for capturing the operation of heuristics. Communication Methods and Measures, 8(2), 116--137.Google ScholarCross Ref
- Lars Bergkvist and John R. Rossiter (2007). The predictive validity of multiple-item versus single-item measures of the same constructs. Journal of Marketing Research, 44(2), 175--184. https://www.jstor.org/stable/30162466Google ScholarCross Ref
- Erika Chin, Adrienne Porter Felt, Vyas Sekar, and David Wagner (2012). Measuring user confidence in smartphone security and privacy. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12), 1--16. Google ScholarDigital Library
- Tamara Dinev and Paul Hart (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61- 80. Google ScholarDigital Library
- Susan T. Fiske and Shelley E. Taylor (1991). Social cognition. New York, NY: McGraw-Hill.Google Scholar
- Erving Goffman (1967). Interaction ritual: Essays on face-to-face behavior. New York: Anchor Books.Google Scholar
- Tory E. Higgins, John A. Bargh, and Wendy J. Lombardi (1985). Nature of priming effects on categorization. Journal of Experimental Psychology: Learning, Memory, and Cognition, 11(1), 59--69.Google ScholarCross Ref
- Kevin Anthony Hoff and Masooda Bashir (2015). Trust in automation: Integrating empirical evidence on factors that influence trust. Human Factors, 57(3), 407--434.Google ScholarCross Ref
- Leslie K. John, Alessandro Acquisti, and George Loewenstein (2011). Strangers on a plane: context-dependent willingness to divulge sensitive information. Journal of Consumer Research, 37(5), 858--873.Google ScholarCross Ref
- Vincent Lanaria (2016). Snapchat updates terms of service and privacy policy as chat 2.0 rolls out. Tech Times. Retrieved from http://www.techtimes.com/articles/145613/20160330/snapchatupdates-terms-of-service-and-privacy-policy-as-chat-2-0-rollsout.htmGoogle Scholar
- Charles Layton, Philip J. Smith, and C. Elaine McCoy (1994). Design of a cooperative problem-solving system for en-route flight planning: An empirical evaluation. Human Factors, 36(1), 94--119.Google ScholarCross Ref
- Gale M. Lucas, Jonathan Gratch, Aisha King, and Louis-Philippe Morency (2014). It's only a computer: Virtual humans increase willingness to disclose. Computers in Human Behavior, 37, 94--100. Google ScholarDigital Library
- Sampada Sameer Marathe, S. Shyam Sundar, Marije Nije Bijvank, Henriette van Vugt, and Jolanda Veldhuis (2007). Who are these power users anyway? Building a psychological profile. Paper presented at the 57th annual conference of the International Communication Association, San Francisco, CA.Google Scholar
- Kathleen L. Mosier, Linda J. Skitka, Mark D. Burdick, and Susan T. Heers (1996). Automation bias, accountability, and verification behaviors. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 40(4), 204--208.Google ScholarCross Ref
- Patricia A. Norberg, Daniel R. Horne, and David A. Horne (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100--127.Google ScholarCross Ref
- Jonathan A. Obar and Anne Oeldorf-Hirsch (2018). The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society, 7(3), 1--20. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2757465Google ScholarCross Ref
- Raja Parasuraman and Dietrich H. Manzey (2010). Complacency and bias in human use of automation: An attentional integration. Human Factors, 52(3), 381--410.Google ScholarCross Ref
- Matthew D. Pickard, Catherine A. Roster, and Yixing Chen (2016). Revealing sensitive information in personal interviews. Computers in Human Behavior, 65, 23--30. Google ScholarDigital Library
- Scott Ruoti, Nathan Kim, Ben Burgon, Timoth van der Horst, and Kent Seamons (2013). Confused Johnny: when automatic encryption leads to confusion and mistakes. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13), 119. Google ScholarDigital Library
- Pan Shi, Heng Xu, and Yunan Chen, (2013). Using contextual integrity to examine interpersonal-information boundary on social network sites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 35--38. Google ScholarDigital Library
- S. Shyam Sundar (2008). The MAIN model: A heuristic approach to understanding technology effects on credibility. In M. J. Metzger and A. J. Flanagin (Eds.), Digital media, youth, and credibility (pp. 72--100). Cambridge, MA: The MIT Press.Google Scholar
- S. Shyam Sundar, Hyunjin Kang, Mu Wu, Eun Go, and Bo Zhang (2013). Unlocking the privacy paradox: Do cognitive heuristics hold the key? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 811--816. Google ScholarDigital Library
- S. Shyam Sundar, Silvia Knobloch-Westerwick, and Matthias R. Hastall (2007). News cues: Information scent and cognitive heuristics. Journal of the American Society for Information Science and Technology, 58(3), 366--378. Google ScholarDigital Library
- S. Shyam Sundar and Sampada Sameer Marathe (2010). Personalization versus customization: The importance of agency, privacy, and power usage. Human Communication Research, 36(3), 298--322.Google ScholarCross Ref
- Amos Tversky and Daniel Kahneman (1974). Judgment under uncertainty: Heuristics and biases. Science, 185(4157), 1124--1131.Google ScholarCross Ref
- Jennifer M. Urban and Chris Jay Hoofnagle (2014). The Privacy Pragmatic as Privacy Vulnerable. SOUPS'14 Workshop on Privacy Personas and Segmentation (PPS). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2514381Google Scholar
- Paul A. Van Lange, Mark Van Vugt, Ree M. Meertens, and Rob A. Ruiter (1998). A social dilemma analysis of commuting preferences: The roles of social value orientation and trust. Journal of Applied Social Psychology, 28(9), 796--820.Google ScholarCross Ref
- Bo Zhang, Mu Wu, Hyunjin Kang, Eun Go, and S. Shyam Sundar (2014). Effects of security warnings and instant gratification cues on attitudes toward mobile websites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 111--114. Google ScholarDigital Library
Index Terms
- Machine Heuristic: When We Trust Computers More than Humans with Our Personal Information
Recommendations
Online Privacy Heuristics that Predict Information Disclosure
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing SystemsOnline users' attitudes toward privacy are context-dependent. Studies show that contextual cues are quite influential in motivating users to disclose personal information. Increasingly, these cues are embedded in the interface, but the mechanisms of ...
Testing the machine heuristic: robots and suspicion in news broadcasts
HRI '19: Proceedings of the 14th ACM/IEEE International Conference on Human-Robot InteractionThe purpose of this study was to test the strength of the machine heuristic; specifically when suspicion is primed in a message receiver concerning the veracity of information from a robot delivering news. Results demonstrate that low suspicion led to ...
Reading Machine-Written News: Effect of Machine Heuristic and Novelty on Hostile Media Perception
Human-Computer Interaction. Theories, Methods, and Human IssuesAbstractThe use of artificial intelligence (AI) in news production has been increasing these days. Its inanimate nature might bring opportunities to suppress hostile media effect by reducing readers’ emotional involvement. This study conducted an online ...
Comments