skip to main content
10.1145/501158.501163acmconferencesArticle/Chapter ViewAbstractPublication PagesecConference Proceedingsconference-collections
Article

E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior

Published:14 October 2001Publication History

ABSTRACT

As electronic commerce environments become more and more interactive, privacy is a matter of increasing concern. Many surveys have investigated households' privacy attitudes and concerns, revealing a general desire among Internet users to protect their privacy. To complement these questionnaire-based studies, we conducted an experiment in which we compared self-reported privacy preferences of 171 participants with their actual disclosing behavior during an online shopping episode. Our results suggest that current approaches to protect online users' privacy, such as EU data protection regulation or P3P, may face difficulties to do so effectively. This is due to their underlying assumption that people are not only privacy conscious, but will also act accordingly. In our study, most individuals stated that privacy was important to them, with concern centering on the disclosure of different aspects of personal information. However, regardless of their specific privacy concerns, most participants did not live up to their self-reported privacy preferences. As participants were drawn into the sales dialogue with an anthropomorphic 3-D shopping bot, they answered a majority of questions, even if these were highly personal. Moreover, different privacy statements had no effect on the amount of information disclosed; in fact, the mentioning of EU regulation seemed to cause a feeling of 'false security'. The results suggest that people appreciate highly communicative EC environments and forget privacy concerns once they are 'inside the Web'.

References

  1. 1.Ackerman, M.S., L.F. Cranor and J. Reagle, "Privacy in E- Commerce: Examining User Scenarios and Privacy Preferences", in: Proceedings of the ACM Conference on Electronic Commerce EC'99, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Annacker, D., Spiekermann, S., Strobel, M., "E-privacy: A new search cost dimension in online environments", 14th Bled Conference of Electronic Commerce, June 2001, download: http://www.wiwi.hu-berlin. de/~sspiek/phdresearch.html]]Google ScholarGoogle Scholar
  3. 3.Ansari A., Essegaier, S., Kohli, R., "Internet Recommender Systems", in: Journal of Marketing Research", Vol. 37, August 2000, pp. 363-375.]]Google ScholarGoogle ScholarCross RefCross Ref
  4. 4.Berendt, B. (2000). "Web usage mining, site semantics, and the support of navigation". In: Workshop 'Web Mining for E-Commerce Challenges and Opportunities." KDD 2000, August 2000. Boston, MA. pp. 83-93.]]Google ScholarGoogle Scholar
  5. 5.B~umler, H., "Datenschutz im Internet", in: E-Privacy, ed. by Helmut B~umler, Wiesbaden, 2000, pp. 1-8]]Google ScholarGoogle Scholar
  6. 6.Berry, M., Linoff, G., "Data Mining Techniques for Marketing, Sales and Customer Support", Wiley, NY, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.Borking, J., "Erwartungen an die Datenschutz-beauftragten im Internet", in: E-Privacy, ed. by Helmut B~umler, Wiesbaden, 2000, pp. 280-290.]]Google ScholarGoogle Scholar
  8. 8.Brands, S., "Rethinking Public Key Infrastructure and Digital Certificates - Building in Privacy", Thesis, 1999, 2 nd edition: The MIT Press, August 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Cassell, J., "Embodied Conversational Interface Agents", in: Communications of the ACM, Vol. 43, No. 4, April 2000, pp. 70-78.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.Chang, A., Kannan, P., Whinston, A., "The Economics of Freebies in Exchange for Consumer Information on the Internet: An Exploratory Study", in: Int. Journal of Electronic Commerce, Vol. 4, No. 1, Fall 1999, pp. 85-101.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.Clau~, S., K~hntopp, M., "Identity Management and Its Support of Multilateral Systems", accepted for publication in the Special Issue on 'Electronic Business Systems' of Computer Networks; until publication available directly from [email protected].]]Google ScholarGoogle Scholar
  12. 12.Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data: http://europa.eu.int/comm/internal_market/en/media/dataprot /law/index.htm.]]Google ScholarGoogle Scholar
  13. 13.Hagel, J., Rayport, J., "The Coming Battle for Customer Information", in: Harvard Business Review, January-February 1997, pp.53-65.]]Google ScholarGoogle Scholar
  14. 14.H~uble, G., Trifts,V., "Consumer Decision Making in Online Shopping Environments: The Effects of Interactive Decision Aids", in: Marketing Science, April 2000.]]Google ScholarGoogle Scholar
  15. 15.K~hntopp, M., "Wie war noch gleich Ihr Name? - Schritte zu einem umfassenden Identit~tsmanagement", accepted at the conference VIS - Verl~ssliche IT-Systeme, Kiel, Germany, September 2001.]]Google ScholarGoogle Scholar
  16. 16.K~hntopp, M., Pfitzmann, A., "Datenschutz Next Generation"", in: E-Privacy, ed. by Helmut B~umler, Wiesbaden, 2000, pp. 316-322.]]Google ScholarGoogle Scholar
  17. 17.Moon, Y.: The Interface Project: http://www.people.hbs.edu/ymoon/Interface/home.html]]Google ScholarGoogle Scholar
  18. 18.Moon, Y., Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers, in: Journal of Consumer Research, Vol.27, No.4, March 2000.]]Google ScholarGoogle ScholarCross RefCross Ref
  19. 19.Pew Internet & American Life Project, Trust and Privacy Online: Why Americans Want to Rewrite the Rules, 2000-8- 20, http://pewinternet.org/reports/toc.asp?Report=19.]]Google ScholarGoogle Scholar
  20. 20.Pfitzmann, A., K~hntopp, M., "Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology", in: Designing Privacy Enhancing Technologies, Proceedings of WS on Design Issues in Anonymity and Unobservability, LNCS 2009, Heidelberg, 2001, revised version http://www.- koehntopp.de/marit/pub/anon/Anon_Terminology.pdf.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.Schaar, P., "Die Moglichkeiten der Datenschutzaufsichtsbeh~rden", in: E-Privacy, ed. by Helmut B~ umler, Wiesbaden, 2000, pp. 69-76.]]Google ScholarGoogle Scholar
  22. 22.Schafer J., Konstan, J., Riedl, J., "RS in E-Commerce", in: Proceedings of the ACM Conference on Electronic Commerce EC'99, 1999, pp. 158-166.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.Spiekermann, S., Corina, P., "Motivating Human-Agent Interaction : Transferring Insights from Behavioral Marketing to Agent Design", in: Proc. of the 3 rd International Conference on Telecommunications and Electronic Commerce, ICTEC3, 2000, pp. 387-402.]]Google ScholarGoogle Scholar
  24. 24.Spiliopoulou, M., "Web Usage Mining for Web Site Evaluation - Making a site better fit its users", in: Communications of the ACM, No. 8, Vol. 43, August 2000, pp. 127-134.]] Google ScholarGoogle Scholar
  25. 25.Urban, G., F. Sultan and W. Qualls, "Design and Evaluation of a Trust Based Advisor on the Internet", MIT, December 1999.]]Google ScholarGoogle Scholar
  26. 26.Wells, N. and Wolfers, J., "Finance with a Personalized Touch", in: Communications of the ACM, No. 8, Vol. 43, August 2000, pp. 31-34.]] Google ScholarGoogle Scholar
  27. 27.West P., D.Ariely, S.Bellman, E.Bradlow, J.Huber, E.Johnson, B.Kahn, J.Little and D.Schkade, "Agents to the Rescue?", HEC Invitational Choice Symposium, February 1999.]]Google ScholarGoogle Scholar
  28. 28.Westin, A., "Harris-Equifax Consumer Privacy Survey", Atlanta, GA: Equifax Inc. (1996).]]Google ScholarGoogle Scholar
  29. 29.Vulcan, N., "Economic Implications of Agent Technology and E-Commerce", in: The Economic Journal, February 1999, pp. 67-90.]]Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader