ABSTRACT
As electronic commerce environments become more and more interactive, privacy is a matter of increasing concern. Many surveys have investigated households' privacy attitudes and concerns, revealing a general desire among Internet users to protect their privacy. To complement these questionnaire-based studies, we conducted an experiment in which we compared self-reported privacy preferences of 171 participants with their actual disclosing behavior during an online shopping episode. Our results suggest that current approaches to protect online users' privacy, such as EU data protection regulation or P3P, may face difficulties to do so effectively. This is due to their underlying assumption that people are not only privacy conscious, but will also act accordingly. In our study, most individuals stated that privacy was important to them, with concern centering on the disclosure of different aspects of personal information. However, regardless of their specific privacy concerns, most participants did not live up to their self-reported privacy preferences. As participants were drawn into the sales dialogue with an anthropomorphic 3-D shopping bot, they answered a majority of questions, even if these were highly personal. Moreover, different privacy statements had no effect on the amount of information disclosed; in fact, the mentioning of EU regulation seemed to cause a feeling of 'false security'. The results suggest that people appreciate highly communicative EC environments and forget privacy concerns once they are 'inside the Web'.
- 1.Ackerman, M.S., L.F. Cranor and J. Reagle, "Privacy in E- Commerce: Examining User Scenarios and Privacy Preferences", in: Proceedings of the ACM Conference on Electronic Commerce EC'99, 1999.]] Google ScholarDigital Library
- 2.Annacker, D., Spiekermann, S., Strobel, M., "E-privacy: A new search cost dimension in online environments", 14th Bled Conference of Electronic Commerce, June 2001, download: http://www.wiwi.hu-berlin. de/~sspiek/phdresearch.html]]Google Scholar
- 3.Ansari A., Essegaier, S., Kohli, R., "Internet Recommender Systems", in: Journal of Marketing Research", Vol. 37, August 2000, pp. 363-375.]]Google ScholarCross Ref
- 4.Berendt, B. (2000). "Web usage mining, site semantics, and the support of navigation". In: Workshop 'Web Mining for E-Commerce Challenges and Opportunities." KDD 2000, August 2000. Boston, MA. pp. 83-93.]]Google Scholar
- 5.B~umler, H., "Datenschutz im Internet", in: E-Privacy, ed. by Helmut B~umler, Wiesbaden, 2000, pp. 1-8]]Google Scholar
- 6.Berry, M., Linoff, G., "Data Mining Techniques for Marketing, Sales and Customer Support", Wiley, NY, 1997.]] Google ScholarDigital Library
- 7.Borking, J., "Erwartungen an die Datenschutz-beauftragten im Internet", in: E-Privacy, ed. by Helmut B~umler, Wiesbaden, 2000, pp. 280-290.]]Google Scholar
- 8.Brands, S., "Rethinking Public Key Infrastructure and Digital Certificates - Building in Privacy", Thesis, 1999, 2 nd edition: The MIT Press, August 2000.]] Google ScholarDigital Library
- 9.Cassell, J., "Embodied Conversational Interface Agents", in: Communications of the ACM, Vol. 43, No. 4, April 2000, pp. 70-78.]] Google ScholarDigital Library
- 10.Chang, A., Kannan, P., Whinston, A., "The Economics of Freebies in Exchange for Consumer Information on the Internet: An Exploratory Study", in: Int. Journal of Electronic Commerce, Vol. 4, No. 1, Fall 1999, pp. 85-101.]] Google ScholarDigital Library
- 11.Clau~, S., K~hntopp, M., "Identity Management and Its Support of Multilateral Systems", accepted for publication in the Special Issue on 'Electronic Business Systems' of Computer Networks; until publication available directly from [email protected].]]Google Scholar
- 12.Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data: http://europa.eu.int/comm/internal_market/en/media/dataprot /law/index.htm.]]Google Scholar
- 13.Hagel, J., Rayport, J., "The Coming Battle for Customer Information", in: Harvard Business Review, January-February 1997, pp.53-65.]]Google Scholar
- 14.H~uble, G., Trifts,V., "Consumer Decision Making in Online Shopping Environments: The Effects of Interactive Decision Aids", in: Marketing Science, April 2000.]]Google Scholar
- 15.K~hntopp, M., "Wie war noch gleich Ihr Name? - Schritte zu einem umfassenden Identit~tsmanagement", accepted at the conference VIS - Verl~ssliche IT-Systeme, Kiel, Germany, September 2001.]]Google Scholar
- 16.K~hntopp, M., Pfitzmann, A., "Datenschutz Next Generation"", in: E-Privacy, ed. by Helmut B~umler, Wiesbaden, 2000, pp. 316-322.]]Google Scholar
- 17.Moon, Y.: The Interface Project: http://www.people.hbs.edu/ymoon/Interface/home.html]]Google Scholar
- 18.Moon, Y., Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers, in: Journal of Consumer Research, Vol.27, No.4, March 2000.]]Google ScholarCross Ref
- 19.Pew Internet & American Life Project, Trust and Privacy Online: Why Americans Want to Rewrite the Rules, 2000-8- 20, http://pewinternet.org/reports/toc.asp?Report=19.]]Google Scholar
- 20.Pfitzmann, A., K~hntopp, M., "Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology", in: Designing Privacy Enhancing Technologies, Proceedings of WS on Design Issues in Anonymity and Unobservability, LNCS 2009, Heidelberg, 2001, revised version http://www.- koehntopp.de/marit/pub/anon/Anon_Terminology.pdf.]] Google ScholarDigital Library
- 21.Schaar, P., "Die Moglichkeiten der Datenschutzaufsichtsbeh~rden", in: E-Privacy, ed. by Helmut B~ umler, Wiesbaden, 2000, pp. 69-76.]]Google Scholar
- 22.Schafer J., Konstan, J., Riedl, J., "RS in E-Commerce", in: Proceedings of the ACM Conference on Electronic Commerce EC'99, 1999, pp. 158-166.]] Google ScholarDigital Library
- 23.Spiekermann, S., Corina, P., "Motivating Human-Agent Interaction : Transferring Insights from Behavioral Marketing to Agent Design", in: Proc. of the 3 rd International Conference on Telecommunications and Electronic Commerce, ICTEC3, 2000, pp. 387-402.]]Google Scholar
- 24.Spiliopoulou, M., "Web Usage Mining for Web Site Evaluation - Making a site better fit its users", in: Communications of the ACM, No. 8, Vol. 43, August 2000, pp. 127-134.]] Google Scholar
- 25.Urban, G., F. Sultan and W. Qualls, "Design and Evaluation of a Trust Based Advisor on the Internet", MIT, December 1999.]]Google Scholar
- 26.Wells, N. and Wolfers, J., "Finance with a Personalized Touch", in: Communications of the ACM, No. 8, Vol. 43, August 2000, pp. 31-34.]] Google Scholar
- 27.West P., D.Ariely, S.Bellman, E.Bradlow, J.Huber, E.Johnson, B.Kahn, J.Little and D.Schkade, "Agents to the Rescue?", HEC Invitational Choice Symposium, February 1999.]]Google Scholar
- 28.Westin, A., "Harris-Equifax Consumer Privacy Survey", Atlanta, GA: Equifax Inc. (1996).]]Google Scholar
- 29.Vulcan, N., "Economic Implications of Agent Technology and E-Commerce", in: The Economic Journal, February 1999, pp. 67-90.]]Google ScholarCross Ref
Index Terms
- E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Recommendations
RFID and E-commerce Privacy Protection
ISCID '09: Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design - Volume 02The implementation of radio frequency identification (RFID) technology in E-commerce provides an intelligent and dynamic technical solution for all kinds of online transactions. RFID system relies on wireless transmission technology which may easily ...
Privacy Ontology Support for E-Commerce
Privacy is becoming increasingly important due to the advent of e-commerce. E-commerce applications frequently require customers to divulge many personal details about themselves that must be protected carefully in accordance with privacy principles and ...
Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection
The massive amount of sensitive survey data about individuals that agencies collect and share through the Internet is causing a great deal of privacy concerns. These concerns may discourage individuals from revealing their sensitive information. ...
Comments