skip to main content
10.1145/3290605.3300768acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Machine Heuristic: When We Trust Computers More than Humans with Our Personal Information

Published: 02 May 2019 Publication History

Abstract

In this day and age of identity theft, are we likely to trust machines more than humans for handling our personal information? We answer this question by invoking the concept of "machine heuristic," which is a rule of thumb that machines are more secure and trustworthy than humans. In an experiment (N = 160) that involved making airline reservations, users were more likely to reveal their credit card information to a machine agent than a human agent. We demonstrate that cues on the interface trigger the machine heuristic by showing that those with higher cognitive accessibility of the heuristic (i.e., stronger prior belief in the rule of thumb) were more likely than those with lower accessibility to disclose to a machine, but they did not differ in their disclosure to a human. These findings have implications for design of interface cues conveying machine vs. human sources of our online interactions.

References

[1]
Alessandro Acquisti, Laura Brandimarte, and George Loewenstein (2015). Privacy and human behavior in the age of information. Science, 509--514.
[2]
Alessandro Acquisti., Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson (2017). Nudges for privacy and security: understanding and assisting users' choices online, ACM Computing Surveys (CSUR) 50 (3), Article No. 44.
[3]
Alison Adam (2005). Delegating and distributing morality: Can we inscribe privacy protection in a machine? Ethics and Information Technology, 7(4), 233--242.
[4]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, J. Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal (2015). Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI' 15), 787--796.
[5]
Saraswathi Bellur and S. Shyam Sundar (2014). How can we tell when a heuristic has been used? Design and analysis strategies for capturing the operation of heuristics. Communication Methods and Measures, 8(2), 116--137.
[6]
Lars Bergkvist and John R. Rossiter (2007). The predictive validity of multiple-item versus single-item measures of the same constructs. Journal of Marketing Research, 44(2), 175--184. https://www.jstor.org/stable/30162466
[7]
Erika Chin, Adrienne Porter Felt, Vyas Sekar, and David Wagner (2012). Measuring user confidence in smartphone security and privacy. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12), 1--16.
[8]
Tamara Dinev and Paul Hart (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61- 80.
[9]
Susan T. Fiske and Shelley E. Taylor (1991). Social cognition. New York, NY: McGraw-Hill.
[10]
Erving Goffman (1967). Interaction ritual: Essays on face-to-face behavior. New York: Anchor Books.
[11]
Tory E. Higgins, John A. Bargh, and Wendy J. Lombardi (1985). Nature of priming effects on categorization. Journal of Experimental Psychology: Learning, Memory, and Cognition, 11(1), 59--69.
[12]
Kevin Anthony Hoff and Masooda Bashir (2015). Trust in automation: Integrating empirical evidence on factors that influence trust. Human Factors, 57(3), 407--434.
[13]
Leslie K. John, Alessandro Acquisti, and George Loewenstein (2011). Strangers on a plane: context-dependent willingness to divulge sensitive information. Journal of Consumer Research, 37(5), 858--873.
[14]
Vincent Lanaria (2016). Snapchat updates terms of service and privacy policy as chat 2.0 rolls out. Tech Times. Retrieved from http://www.techtimes.com/articles/145613/20160330/snapchatupdates-terms-of-service-and-privacy-policy-as-chat-2-0-rollsout.htm
[15]
Charles Layton, Philip J. Smith, and C. Elaine McCoy (1994). Design of a cooperative problem-solving system for en-route flight planning: An empirical evaluation. Human Factors, 36(1), 94--119.
[16]
Gale M. Lucas, Jonathan Gratch, Aisha King, and Louis-Philippe Morency (2014). It's only a computer: Virtual humans increase willingness to disclose. Computers in Human Behavior, 37, 94--100.
[17]
Sampada Sameer Marathe, S. Shyam Sundar, Marije Nije Bijvank, Henriette van Vugt, and Jolanda Veldhuis (2007). Who are these power users anyway? Building a psychological profile. Paper presented at the 57th annual conference of the International Communication Association, San Francisco, CA.
[18]
Kathleen L. Mosier, Linda J. Skitka, Mark D. Burdick, and Susan T. Heers (1996). Automation bias, accountability, and verification behaviors. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 40(4), 204--208.
[19]
Patricia A. Norberg, Daniel R. Horne, and David A. Horne (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100--127.
[20]
Jonathan A. Obar and Anne Oeldorf-Hirsch (2018). The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society, 7(3), 1--20. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2757465
[21]
Raja Parasuraman and Dietrich H. Manzey (2010). Complacency and bias in human use of automation: An attentional integration. Human Factors, 52(3), 381--410.
[22]
Matthew D. Pickard, Catherine A. Roster, and Yixing Chen (2016). Revealing sensitive information in personal interviews. Computers in Human Behavior, 65, 23--30.
[23]
Scott Ruoti, Nathan Kim, Ben Burgon, Timoth van der Horst, and Kent Seamons (2013). Confused Johnny: when automatic encryption leads to confusion and mistakes. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13), 119.
[24]
Pan Shi, Heng Xu, and Yunan Chen, (2013). Using contextual integrity to examine interpersonal-information boundary on social network sites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 35--38.
[25]
S. Shyam Sundar (2008). The MAIN model: A heuristic approach to understanding technology effects on credibility. In M. J. Metzger and A. J. Flanagin (Eds.), Digital media, youth, and credibility (pp. 72--100). Cambridge, MA: The MIT Press.
[26]
S. Shyam Sundar, Hyunjin Kang, Mu Wu, Eun Go, and Bo Zhang (2013). Unlocking the privacy paradox: Do cognitive heuristics hold the key? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 811--816.
[27]
S. Shyam Sundar, Silvia Knobloch-Westerwick, and Matthias R. Hastall (2007). News cues: Information scent and cognitive heuristics. Journal of the American Society for Information Science and Technology, 58(3), 366--378.
[28]
S. Shyam Sundar and Sampada Sameer Marathe (2010). Personalization versus customization: The importance of agency, privacy, and power usage. Human Communication Research, 36(3), 298--322.
[29]
Amos Tversky and Daniel Kahneman (1974). Judgment under uncertainty: Heuristics and biases. Science, 185(4157), 1124--1131.
[30]
Jennifer M. Urban and Chris Jay Hoofnagle (2014). The Privacy Pragmatic as Privacy Vulnerable. SOUPS'14 Workshop on Privacy Personas and Segmentation (PPS). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2514381
[31]
Paul A. Van Lange, Mark Van Vugt, Ree M. Meertens, and Rob A. Ruiter (1998). A social dilemma analysis of commuting preferences: The roles of social value orientation and trust. Journal of Applied Social Psychology, 28(9), 796--820.
[32]
Bo Zhang, Mu Wu, Hyunjin Kang, Eun Go, and S. Shyam Sundar (2014). Effects of security warnings and instant gratification cues on attitudes toward mobile websites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 111--114.

Cited By

View all
  • (2025)Effects of Message Interactivity, Information Accuracy, and Attractiveness on Information Sharing Intention in Generative AIJournal of Digital Contents Society10.9728/dcs.2025.26.1.12326:1(123-133)Online publication date: 31-Jan-2025
  • (2025)AI and human generation of classroom content: adult learners’ perceptionsCommunication Education10.1080/03634523.2025.2466502(1-14)Online publication date: 20-Feb-2025
  • (2025)Perceptions of discriminatory decisions of artificial intelligenceInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2024.103387194:COnline publication date: 1-Feb-2025
  • Show More Cited By

Index Terms

  1. Machine Heuristic: When We Trust Computers More than Humans with Our Personal Information

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
      May 2019
      9077 pages
      ISBN:9781450359702
      DOI:10.1145/3290605
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 May 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. automation bias
      2. cognitive heuristics
      3. machine heuristic
      4. main model
      5. secure and trustworthy computing
      6. virtual agent

      Qualifiers

      • Research-article

      Funding Sources

      • U. S. National Science Foundation

      Conference

      CHI '19
      Sponsor:

      Acceptance Rates

      CHI '19 Paper Acceptance Rate 703 of 2,958 submissions, 24%;
      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1,374
      • Downloads (Last 6 weeks)195
      Reflects downloads up to 01 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Effects of Message Interactivity, Information Accuracy, and Attractiveness on Information Sharing Intention in Generative AIJournal of Digital Contents Society10.9728/dcs.2025.26.1.12326:1(123-133)Online publication date: 31-Jan-2025
      • (2025)AI and human generation of classroom content: adult learners’ perceptionsCommunication Education10.1080/03634523.2025.2466502(1-14)Online publication date: 20-Feb-2025
      • (2025)Perceptions of discriminatory decisions of artificial intelligenceInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2024.103387194:COnline publication date: 1-Feb-2025
      • (2024)Digital Partnerships: Understanding Delegation and Interaction With Virtual AgentsNavigating the Metaverse - A Comprehensive Guide to the Future of Digital Interaction [Working Title]10.5772/intechopen.1006301Online publication date: 13-Aug-2024
      • (2024)Journalistic interventions matter: Understanding how Americans perceive fact-checking labelsHarvard Kennedy School Misinformation Review10.37016/mr-2020-138Online publication date: 11-Apr-2024
      • (2024)Exploring Consumer Acceptance of AI-Generated Advertisements: From the Perspectives of Perceived Eeriness and Perceived IntelligenceJournal of Theoretical and Applied Electronic Commerce Research10.3390/jtaer1903010819:3(2218-2238)Online publication date: 3-Sep-2024
      • (2024)Data Descriptor for “Understanding and Perception of Automated Text Generation among the Public: Two Surveys with Representative Samples in Germany”Data10.3390/data91001169:10(116)Online publication date: 11-Oct-2024
      • (2024)Understanding and Perception of Automated Text Generation among the Public: Two Surveys with Representative Samples in GermanyBehavioral Sciences10.3390/bs1405035314:5(353)Online publication date: 23-Apr-2024
      • (2024)External and Internal Attribution in Human-Agent Interaction: Insights from Neuroscience and Virtual RealityHuman-Machine Communication10.30658/hmc.8.68(119-139)Online publication date: 2024
      • (2024)Leveraging Chatbots to Combat Health Misinformation for Older Adults: Participatory Design StudyJMIR Formative Research10.2196/607128(e60712)Online publication date: 11-Oct-2024
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media