ABSTRACT
This paper provides empirical evidence of a link between the Fear of Missing Out (FoMO) and reluctant privacy behaviours, to help explain a gap between users’ privacy attitudes and their behaviours online (also known as the Privacy Paradox). Using Grounded Theory, we interviewed 25 participants and created a high-level empirically-grounded theory of the relationship between FoMO and reluctant privacy behaviours. We identify three main dimensions in which users feel pressured to participate even when they have privacy concerns, to avoid missing out. We discuss the implications of these results on the design of technologies, and how they may indicate systemic dark design.
- Icek Ajzen. 1991. The theory of planned behavior. Organizational Behavior and Human Decision Processes 50, 2 (1991), 179 – 211. https://doi.org/10.1016/0749-5978(91)90020-TTheories of Cognitive Self-Regulation.Google ScholarCross Ref
- Susanne Barth and Menno D.T. de Jong. 2017. The privacy paradox - Investigating discrepancies between expressed privacy concerns and actual online behavior - A systematic literature review. Telematics and Informatics 34, 7 (2017), 1038 – 1058.Google ScholarDigital Library
- Diane Bartz. 2019. U.S. senators introduce social media bill to ban ‘dark patterns’ tricks. https://www.reuters.com/article/us-usa-tech/us-senators-introduce-social-media-bill-to-ban-dark-patterns-tricks-idUSKCN1RL25Q.Google Scholar
- K. Bednar and S. Spiekermann. 2018. Aware but not in control: A qualitative value analysis of the effects of new technologies. IFIP Advances in Information and Communication Technology, Vol. 537. 202–218 pages. www.scopus.comGoogle Scholar
- David Blackwell, Carrie Leaman, Rose Tramposch, Ciera Osborne, and Miriam Liss. 2017. Extraversion, neuroticism, attachment style and fear of missing out as predictors of social media use and addiction. Personality and Individual Differences 116 (2017), 69–72.Google ScholarCross Ref
- Rainer Böhme and Stefanie Pötzsch. 2012. Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data. In Financial Cryptography and Data Security, George Danezis (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1–15.Google Scholar
- Robert M Bond, Christopher J Fariss, Jason J Jones, Adam DI Kramer, Cameron Marlow, Jaime E Settle, and James H Fowler. 2012. A 61-million-person experiment in social influence and political mobilization. Nature 489, 7415 (2012), 295–298.Google Scholar
- Christoph Bösch, Benjamin Erb, Frank Kargl, Henning Kopp, and Stefan Pfattheicher. 2016. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. Proceedings on Privacy Enhancing Technologies 2016, 4(2016), 237 – 254. https://content.sciendo.com/view/journals/popets/2016/4/article-p237.xmlGoogle ScholarCross Ref
- Harry Brignull. [n.d.]. Dark Patterns Types of Dark Pattern. https://darkpatterns.org/types-of-dark-pattern.Google Scholar
- Sarah L Buglass, Jens F Binder, Lucy R Betts, and Jean DM Underwood. 2017. Motivators of online vulnerability: The impact of social network site use and FOMO. Computers in Human Behavior 66 (2017), 248–255.Google ScholarDigital Library
- Corina Cara 2019. Dark Patterns In The Media: A Systematic Review. Network Intelligence Studies 7, 14 (2019), 105–113.Google Scholar
- Elija Cassidy. 2016. Social networking sites and participatory reluctance: A case study of Gaydar, user resistance and interface rejection. New Media & Society 18, 11 (2016), 2613–2628. https://doi.org/10.1177/1461444815590341Google ScholarCross Ref
- Ann Cavoukian. 2011. Privacy by Design: The 7 Foundational Principles.Google Scholar
- Kathy Charmaz. 2014. Constructing grounded theory. Sage.Google Scholar
- Norwegian Consumer Council. 2018. Deceived By Design: How tech companies use dark patterns to discourage us from exercising our rights to privacy. (2018). https://fil.forbrukerradet.no/wp-content/uploads/2018/06/2018-06-27-deceived-by-design-final.pdfGoogle Scholar
- Edward Deci and Richard M Ryan. 1985. Intrinsic motivation and self-determination in human behavior. Springer Science & Business Media.Google Scholar
- Linda Di Geronimo, Larissa Braz, Enrico Fregnan, Fabio Palomba, and Alberto Bacchelli. 2020. UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and User Perception. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10.1145/3313831.3376600Google ScholarDigital Library
- Niall Docherty. 2020. Facebook’s Ideal User: Healthy Habits, Social Capital, and the Politics of Well-Being Online. Social Media+ Society 6, 2 (2020), 2056305120915606.Google Scholar
- Jon D. Elhai, Jason C. Levine, Ahmad M. Alghraibeh, Ali A. Alafnan, Ahmad A. Aldraiweesh, and Brian J. Hall. 2018. Fear of missing out: Testing relationships with negative affectivity, online social engagement, and problematic smartphone use. Computers in Human Behavior 89 (2018), 289 – 298. https://doi.org/10.1016/j.chb.2018.08.020Google ScholarDigital Library
- Facebook. [n.d.]. What names are allowed on Facebook?https://www.facebook.com/help/112146705538576.Google Scholar
- Ben Gilbert. 2018. The #DeleteFacebook movement has reached a fever pitch, as former Facebook insiders turn on the company. Business Insider (March 2018). https://www.businessinsider.com/deletefacebook-facebook-movement-2018-3Google Scholar
- Fritz Heider. 1958. The psychology of interpersonal relations. New York: John Wiley and Sons.Google Scholar
- E Tory Higgins. 1987. Self-discrepancy: a theory relating self and affect.Psychological review 94, 3 (1987), 319.Google Scholar
- JWT Intelligence. [n.d.]. Report, SXSW presentation spotlight how brands can leverage FOMO. http://www.jwtintelligence.com/wp-content/uploads/2012/03/F_JWT_FOMO-update_3.21.12.pdf. Retrieved from Internet Archive website: https://web.archive.org/.Google Scholar
- Herbert C Kelman. 1958. Compliance, identification, and internalization three processes of attitude change. Journal of conflict resolution 2, 1 (1958), 51–60.Google ScholarCross Ref
- Hanna Krasnova, Oliver Günther, Sarah Spiekermann, and Ksenia Koroleva. 2009. Privacy concerns and identity in online social networks. Identity in the Information Society 2, 1 (2009), 39–63.Google ScholarCross Ref
- Jamie Luguri and Lior Strahilevitz. 2019. Shining a light on dark patterns. U of Chicago, Public Law Working Paper719 (2019).Google Scholar
- Mike Masnick. 2019. Protocols, Not Platforms: A Technological Approach to Free Speech. Knight First Amendment Institute (August 2019). https://knightcolumbia.org/content/protocols-not-platforms-a-technological-approach-to-free-speechGoogle Scholar
- Thomas Mejtoft, Sarah Hale, and Ulrik Söderström. 2019. Design Friction. Association for Computing Machinery, New York, NY, USA, 41–44. https://doi.org/10.1145/3335082.3335106Google ScholarDigital Library
- Adam Mosseri. 2018. Bringing People Closer Together. https://about.fb.com/news/2018/01/news-feed-fyi-bringing-people-closer-together/.Google Scholar
- Samantha Murphy. 2013. Report: 56% of Social Media Users Suffer From FOMO. Mashable (Jul 2013). https://mashable.com/2013/07/09/fear-of-missing-out/83r7t4gHriq4Google Scholar
- Casey Newton. 2018. Google’s new focus on well-being started five years ago with this presentation. The Verge (May 2018). https://www.theverge.com/2018/5/10/17333574/google-android-p-update-tristan-harris-design-ethicsGoogle Scholar
- Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal. 2020. Dark Patterns after the GDPR: Scraping Consent Pop-Ups and Demonstrating Their Influence. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3313831.3376321Google ScholarDigital Library
- Susanna Paasonen. 2018. Affect, data, manipulation and price in social media. Distinktion: Journal of Social Theory 19, 2 (2018), 214–229. https://doi.org/10.1080/1600910X.2018.1475289Google ScholarCross Ref
- Zizi Papacharissi and Paige L. Gibson. 2011. Fifteen Minutes of Privacy: Privacy, Sociality, and Publicity on Social Network Sites. Springer Berlin Heidelberg, Berlin, Heidelberg, 75–89. https://doi.org/10.1007/978-3-642-21521-6_7Google ScholarCross Ref
- Andrew K. Przybylski, Kou Murayama, Cody R. DeHaan, and Valerie Gladwell. 2013. Motivational, emotional, and behavioral correlates of fear of missing out. Computers in Human Behavior 29, 4 (2013), 1841 – 1848. https://doi.org/10.1016/j.chb.2013.02.014Google ScholarCross Ref
- Yvonne Rogers, Paul Dourish, Patrick Olivier, Margot Brereton, and Jodi Forlizzi. 2020. The Dark Side of Interaction Design. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI EA ’20). Association for Computing Machinery, New York, NY, USA, 1–4. https://doi.org/10.1145/3334480.3381070Google ScholarDigital Library
- Victoria Sgarro. 2019. The tyranny of frictionless design. https://uxdesign.cc/the-tyranny-of-frictionless-design-1325ab14432cGoogle Scholar
- Irina Shklovski, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI ’14). Association for Computing Machinery, New York, NY, USA, 2347–2356. https://doi.org/10.1145/2556288.2557421Google ScholarDigital Library
- Statista. [n.d.]. Number of monthly active Facebook users worldwide as of 3rd quarter 2020. https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/.Google Scholar
- Katherine Strater and Heather Richter Lipford. 2008. Strategies and Struggles with Privacy in an Online Social Networking Community. In Proceedings of the 22Nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1 (Liverpool, United Kingdom) (BCS-HCI ’08). British Computer Society, Swinton, UK, UK, 111–119. http://dl.acm.org/citation.cfm?id=1531514.1531530Google ScholarDigital Library
- Zeynep Tufekci. 2008. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society 28, 1 (2008), 20–36. https://doi.org/10.1177/0270467607311484Google ScholarCross Ref
- Jeroen van Rest, Daniel Boonstra, Maarten Everts, Martin van Rijn, and Ron van Paassen. 2014. Designing Privacy-by-Design. In Privacy Technologies and Policy, Bart Preneel and Demosthenes Ikonomou (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 55–72.Google Scholar
- Fiona Westin and Sonia Chiasson. 2019. Opt out of Privacy or “Go Home”: Understanding Reluctant Privacy Behaviours through the FoMO-Centric Design Paradigm. In Proceedings of the New Security Paradigms Workshop (San Carlos, Costa Rica) (NSPW ’19). Association for Computing Machinery, New York, NY, USA, 57–67. https://doi.org/10.1145/3368860.3368865Google ScholarDigital Library
- Claire A Wolniewicz, Mojisola F Tiamiyu, Justin W Weeks, and Jon D Elhai. 2018. Problematic smartphone use and relations with negative affect, fear of missing out, and fear of negative and positive evaluation. Psychiatry research 262(2018), 618–623.Google Scholar
- Shoshana Zuboff. 2019. The age of surveillance capitalism: The fight for a human future at the new frontier of power. Profile Books.Google Scholar
Index Terms
- “It’s So Difficult to Sever that Connection”: The Role of FoMO in Users’ Reluctant Privacy Behaviours
Recommendations
Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm
NSPW '19: Proceedings of the New Security Paradigms WorkshopThis paper explores how the design of online technology influences social factors and manipulates users' online privacy behaviours. In short, users reveal information and participate in online activities even when reluctant due to the influence of dark ...
Privacy perception and protection on Chinese social media: a case study of WeChat
In this study, the under-examined area of privacy perception and protection on Chinese social media is investigated. The prevalence of digital technology shapes the social, political and cultural aspects of the lives of urban young adults. The ...
Privacy attitudes and privacy behaviour
Do people really care about their privacy? Surveys show that privacy is a primary concern for citizens in the digital age. On the other hand, individuals reveal personal information for relatively small rewards, often just for drawing the attention of ...
Comments