Skip to main content

Cars, Condoms, and Facebook

  • Conference paper
  • First Online:
Information Security

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7807))

Abstract

Participation on Online Social Networks (OSNs) inherently requires information sharing and thus exposes individuals to privacy risks. Risk mitigation then has been encouraged through adoption of usable privacy controls. Apparently stronger privacy enhancing technologies (PETs) decrease both risk and perceptions of risk. As a result individuals feel safer and may respond by in fact accepting more risk. Such perverse results have been observed offline. Risk perception offline has been understood to be a function of characteristics of the risks involved rather than as a calculus grounded only in the probability of the risk and the magnitude of harm. In this work we use nine characteristics of risk from a classic and proven offline model of perceived risk to conduct a survey based evaluation of perceptions of privacy risks on Facebook. We find that these dimensions of risk provide a statistically significant explanation of perceived risk of information sharing on Facebook.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Age is not considered as the standard deviation for this variable is \({\approx }0\).

References

  1. Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 3(1), 26–33 (2005)

    Article  Google Scholar 

  2. Adams, J.: Cars, cholera, and cows, vol. 335, pp. 1–49. CATO Institute (1999)

    Google Scholar 

  3. Barnes, S.B.: A privacy paradox: Social networking in the united states. First Monday 11(9) (2006)

    Google Scholar 

  4. Brandimarte, L., Acquisti, A., Loewenstein, G.: Misplaced confidences: privacy and the control paradox. Soc. Psychol. Pers. Sci. 4, 340–347 (2012)

    Article  Google Scholar 

  5. Caine, K., Kisselburgh, L.G., Lareau, L.: Audience visualization influences disclosures in online social networks. In: Extended Abstracts on Human Factors in Computing Systems, CHI 2011, pp. 1663–1668. ACM (2011)

    Google Scholar 

  6. Cassell, M., Halperin, D., Shelton, J., Stanton, D.: Risk compensation: the achilles’ heel of innovations in HIV prevention? Br. Med. J. 332(7541), 605–607 (2006)

    Article  Google Scholar 

  7. Christofides, E., Muise, A., Desmarais, S.: Hey mom, whats on your facebook? Comparing facebook disclosure and privacy in adolescents and adults. Soc. Psychol. Pers. Sci. 3(1), 48–54 (2012)

    Article  Google Scholar 

  8. Farahmand, F., Spafford, E.H.: Understanding insiders: an analysis of risk-taking behavior. Inf. Syst. Front. 15, 5–15 (2013)

    Article  Google Scholar 

  9. Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S., Combs, B.: How is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sci. 9(2), 127–152 (1978)

    Article  Google Scholar 

  10. Garg, V., Camp, L.J.: End user perception of online risk under uncertainty. In: 45th Hawaii International Conference on System Science, pp. 3278–3287. IEEE (2012)

    Google Scholar 

  11. Garg, V., Nilizadeh, S.: Craigslist scams and community composition: investigating online fraud victimization. In: International Workshop on Cyber Crime. IEEE (2013)

    Google Scholar 

  12. Grossklags, J., Acquisti, A.: When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. In: Workshop on the Economics of Information Security (2007)

    Google Scholar 

  13. Hingson, R., McGovern, T., Howland, J., Heeren, T., Winter, M., Zakocs, R.: Reducing alcohol-impaired driving in Massachusetts: the saving lives program. Am. J. Public Health 86(6), 791–797 (1996)

    Article  Google Scholar 

  14. Hoy, M.G., Milne, G.: Gender differences in privacy-related measures for young adult facebook users. J. Interact. Advertising 10(2), 28–45 (2010)

    Article  Google Scholar 

  15. Lipford, H.R., Besmer, A., Watson, J.: Understanding privacy settings in facebook with an audience view. In: Proceedings of the 1st Conference on Usability, Psychology, and Security, UPSEC 2008, pp. 2:1–2:8. USENIX Association, Berkeley (2008)

    Google Scholar 

  16. Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet Users’ Information Privacy Concerns (IUIPC): the construct, the scale, and a causal model. Info. Sys. Res. 15, 336–355 (2004)

    Article  Google Scholar 

  17. Malin, B., Sweeney, L.: Re-identification of dna through an automated linkage process. In: Proceedings of the AMIA Symposium, p. 423. American Medical Informatics Association (2001)

    Google Scholar 

  18. Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law & Politics, Stanford (2010)

    Google Scholar 

  19. Norcie, G., Caine, K., Camp, L.J.: Eliminating stop-points in the installation and use of anonymity systems: a usability evaluation of the tor browser bundle. In: HotPETS (2012)

    Google Scholar 

  20. Patil, S., Kapadia, A.: Are you exposed?: Conveying information exposure. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work Companion, pp. 191–194. ACM (2012)

    Google Scholar 

  21. Preibusch, S., Krol, K., Beresford, A.: The privacy economics of voluntary over-disclosure in web forms. In: 11th Annual Workshop on the Economics of Information Security, WEIS (2012)

    Google Scholar 

  22. Slovic, P., Fischhoff, B., Lichtenstein, S.: Why study risk perception. Risk Anal. 2(2), 83–93 (1982)

    Article  Google Scholar 

  23. Solove, D.: Nothing to Hide: The False Tradeoff Between Privacy and Security. Yale University Press, New Haven (2011)

    Google Scholar 

  24. Tversky, A., Kahneman, D.: Judgment under uncertainty: heuristics and biases. Science 185(4157), 1124 (1974)

    Article  Google Scholar 

  25. Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P., Cranor, L.: I regretted the minute i pressed share: a qualitative study of regrets on facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10. ACM (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vaibhav Garg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Garg, V., Jean Camp, L. (2015). Cars, Condoms, and Facebook. In: Desmedt, Y. (eds) Information Security. Lecture Notes in Computer Science(), vol 7807. Springer, Cham. https://doi.org/10.1007/978-3-319-27659-5_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27659-5_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27658-8

  • Online ISBN: 978-3-319-27659-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics