skip to main content
10.1145/3170427.3170617acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
abstract

Moving Beyond a "one-size fits all": Exploring Individual Differences in Privacy

Published: 20 April 2018 Publication History

Abstract

As our lives become increasingly digitized, how people maintain and manage their networked privacy has become a formidable challenge for academics, practitioners, and policy-makers. A shift toward people-centered privacy initiatives has shown promise; yet many applications still adopt a "one-size fits all" approach, which fails to consider how individual differences in concerns, preferences, and behaviors shape how different people interact with and use technology. The main goal of this workshop is to highlight individual differences (e.g., age, culture, personal preference) that influence users' experiences and privacy-related outcomes. We will work towards best practices for research, design, and online privacy regulation policies that consider these differences.

References

[1]
Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company, Monterey, CA.
[2]
Louise Barkhuus. 2012. The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12), 367--376.
[3]
Michael Benisch, Patrick Gage Kelley, Norman Sadeh, and Lorrie Faith Cranor. 2011. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing 15, 7: 679--694.
[4]
Sunny Consolvo, Ian Smith, Terra Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location disclosure to social relations: why, when, & what people want to share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 81--90.
[5]
Lorrie Faith Cranor. 2012. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J. on Telecomm. & High Tech. L. 10: 273.
[6]
Cailing Dong, Hongxia Jin, and Bart P. Knijnenburg. 2015. Predicting Privacy Behavior on Online Social Networks. In Ninth International AAAI Conference on Web and Social Media.
[7]
Nicole B. Ellison, Charles Steinfield, and Cliff Lampe. 2011. Connection strategies: Social capital implications of Facebook-enabled communication practices. New Media & Society 13, 6: 873--892.
[8]
Joshua Fogel and Elham Nehmad. 2009. Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior 25, 1: 153--160.
[9]
Eszter Hargittai and Alice Marwick. 2016. "What Can I Really Do?" Explaining the Privacy Paradox with Online Apathy. International Journal of Communication 10: 21.
[10]
Mariea Grubbs Hoy and George Milne. 2010. Gender Differences in Privacy-Related Measures for Young Adult Facebook Users. Journal of Interactive Advertising 10, 2: 28--45.
[11]
Pamela Karr-Wisniewski, David Wilson, and Heather Richter-Lipford. 2011. A new social order: Mechanisms for social network site boundary regulation. In Americas Conference on Information Systems, AMCIS.
[12]
B. P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Dimensionality of information disclosure behavior. International Journal of Human-Computer Studies 71, 12: 1144--1162.
[13]
Yao Li, Alfred Kobsa, Bart P. Knijnenburg, and Nguyen M-H. Carolyn. 2017. Cross-Cultural Privacy Prediction. Proceedings on Privacy Enhancing Technologies 2017, 2: 113--132.
[14]
Eden Litt. 2012. Knock, Knock. Who's There? The Imagined Audience. Journal of Broadcasting & Electronic Media 56, 3: 330--345.
[15]
Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun (Aerin) Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 27--41.
[16]
Mary Madden. 2012. Privacy management on social media sites. Pew Internet & American Life Project, Pew Research Center, Washington, DC.
[17]
Barbara M. Newman and Philip R. Newman. 2017. Development through life: A psychosocial approach. Cengage Learning.
[18]
Helen Nissenbaum. 2004. Privacy as Contextual Integrity Symposium - Technology, Values, and the Justice System. Washington Law Review 79: 119--158.
[19]
Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press, Stanford, CA.
[20]
Patricia A. Norberg, Daniel R. Horne, and David A. Horne. 2007. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs 41, 1: 100--126.
[21]
Xinru Page and Marco Marabelli. 2017. Changes in Social Media Behavior During Life Periods of Uncertainty. In Eleventh International AAAI Conference on Web and Social Media.
[22]
Xinru Woo Page. 2014. Factors that Influence Adoption and Use of Location-Sharing Social Media. University of California, Irvine, Irvine, CA.
[23]
Ira S. Rubinstein and Nathaniel Good. 2013. Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents. Berkeley Technology Law Journal 28: 1333--1414.
[24]
N. Craig Smith, Daniel G. Goldstein, and Eric J. Johnson. 2013. Choice Without Awareness: Ethical and Policy Implications of Defaults. Journal of Public Policy & Marketing 32, 2: 159--172.
[25]
Daniel Solove. 2008. Understanding Privacy. Harvard University Press, Cambridge, MA.
[26]
Sarah Spiekermann, Jens Grossklags, and Bettina Berendt. 2001. E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior. In Proceedings of the 3rd ACM conference on Electronic Commerce, 38--47.
[27]
Cass R. Sunstein and Richard H. Thaler. 2003. Libertarian Paternalism Is Not an Oxymoron. The University of Chicago Law Review 70, 4: 1159--1202.
[28]
Zeynep Tufekci. 2008. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society 28, 1: 20--36.
[29]
Richard C. Turkington and Anita L. Allen. 2002. Privacy law: Cases and materials. West.
[30]
Jessica Vitak and Nicole B. Ellison. 2013. "There's a network out there you might as well tap": Exploring the benefits of and barriers to exchanging informational and support-based resources on Facebook. New Media & Society 15, 2: 243--259.
[31]
Jessica Vitak and Jinyoung Kim. 2014. "You Can't Block People Offline": Examining How Facebook's Affordances Shape the Disclosure Process. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '14), 461--474.
[32]
Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, and Lorrie Faith Cranor. 2011. "I regretted the minute I pressed share": a qualitative study of regrets on Facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security, 10:1--10:16.
[33]
Eric B. Weiser. 2015. # Me: Narcissism and its facets as predictors of selfie-posting frequency. Personality and Individual Differences 86: 477--481.
[34]
Daricia Wilkinson, Saadhika Sivakumar, David Cherry, Bart P. Knijnenburg, Elaine M. Raybourn, Pamela Wisniewski, and Henry Sloan. 2017. User-Tailored Privacy by Design. In Proceedings of the Usable Security Mini Conference 2017.
[35]
Pamela Wisniewski, A. K. M. Najmul Islam, Bart P. Knijnenburg, and Sameer Patil. 2015. Give Social Network Users the Privacy They Want. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 1427--1441.
[36]
Pamela J. Wisniewski, Bart P. Knijnenburg, and Heather Richter Lipford. 2016. Making Privacy Personal: Profiling Social Network Users to Inform Privacy Education and Nudging. International Journal of Human-Computer Studies.
[37]
Jierui Xie, Bart Piet Knijnenburg, and Hongxia Jin. 2014. Location Sharing Privacy Preference: Analysis and Personalized Recommendation. In Proceedings of the 19th International Conference on Intelligent User Interfaces (IUI '14), 189--198.
[38]
Mike Z. Yao, Ronald E. Rice, and Kier Wallis. 2007. Predicting user concerns about online privacy. Journal of the Association for Information Science and Technology 58, 5: 710--722.

Cited By

View all
  • (2024)AI-Assisted Decision-Making in Long-Term Care: Qualitative Study on Prerequisites for Responsible InnovationJMIR Nursing10.2196/559627(e55962)Online publication date: 25-Jul-2024
  • (2024)BubbleCam: Engaging Privacy in Remote Sighted AssistanceProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642030(1-16)Online publication date: 11-May-2024
  • (2023)Identifying Challenges and Opportunities for Intelligent Data-Driven Health Interfaces to Support Ongoing CareExtended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544549.3573798(1-7)Online publication date: 19-Apr-2023
  • Show More Cited By

Index Terms

  1. Moving Beyond a "one-size fits all": Exploring Individual Differences in Privacy

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI EA '18: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems
    April 2018
    3155 pages
    ISBN:9781450356213
    DOI:10.1145/3170427
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 April 2018

    Check for updates

    Author Tags

    1. design
    2. ethics
    3. information disclosure
    4. networked privacy
    5. privacy
    6. social interaction
    7. usability

    Qualifiers

    • Abstract

    Conference

    CHI '18
    Sponsor:

    Acceptance Rates

    CHI EA '18 Paper Acceptance Rate 1,208 of 3,955 submissions, 31%;
    Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)49
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)AI-Assisted Decision-Making in Long-Term Care: Qualitative Study on Prerequisites for Responsible InnovationJMIR Nursing10.2196/559627(e55962)Online publication date: 25-Jul-2024
    • (2024)BubbleCam: Engaging Privacy in Remote Sighted AssistanceProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642030(1-16)Online publication date: 11-May-2024
    • (2023)Identifying Challenges and Opportunities for Intelligent Data-Driven Health Interfaces to Support Ongoing CareExtended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544549.3573798(1-7)Online publication date: 19-Apr-2023
    • (2022)Hark: A Deep Learning System for Navigating Privacy Feedback at Scale2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833729(2469-2486)Online publication date: May-2022
    • (2022)Automated privacy negotiations with preference uncertaintyAutonomous Agents and Multi-Agent Systems10.1007/s10458-022-09579-136:2Online publication date: 1-Oct-2022
    • (2022)Privacy Theories and FrameworksModern Socio-Technical Perspectives on Privacy10.1007/978-3-030-82786-1_2(15-41)Online publication date: 9-Feb-2022
    • (2022)Cross-Cultural Privacy DifferencesModern Socio-Technical Perspectives on Privacy10.1007/978-3-030-82786-1_12(267-292)Online publication date: 9-Feb-2022
    • (2022)Introduction and OverviewModern Socio-Technical Perspectives on Privacy10.1007/978-3-030-82786-1_1(1-11)Online publication date: 9-Feb-2022
    • (2021)Individually Vulnerable, Collectively SafeProceedings of the ACM on Human-Computer Interaction10.1145/34492125:CSCW1(1-24)Online publication date: 22-Apr-2021
    • (2021)Effect of Adaptive Guidance and Visualization Literacy on Gaze Attentive Behaviors and Sequential Patterns on Magazine-Style Narrative VisualizationsACM Transactions on Interactive Intelligent Systems10.1145/344799211:3-4(1-46)Online publication date: 3-Sep-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media