skip to main content
10.1145/3411764.3445104acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Honorable Mention

“It’s So Difficult to Sever that Connection”: The Role of FoMO in Users’ Reluctant Privacy Behaviours

Published:07 May 2021Publication History

ABSTRACT

This paper provides empirical evidence of a link between the Fear of Missing Out (FoMO) and reluctant privacy behaviours, to help explain a gap between users’ privacy attitudes and their behaviours online (also known as the Privacy Paradox). Using Grounded Theory, we interviewed 25 participants and created a high-level empirically-grounded theory of the relationship between FoMO and reluctant privacy behaviours. We identify three main dimensions in which users feel pressured to participate even when they have privacy concerns, to avoid missing out. We discuss the implications of these results on the design of technologies, and how they may indicate systemic dark design.

References

  1. Icek Ajzen. 1991. The theory of planned behavior. Organizational Behavior and Human Decision Processes 50, 2 (1991), 179 – 211. https://doi.org/10.1016/0749-5978(91)90020-TTheories of Cognitive Self-Regulation.Google ScholarGoogle ScholarCross RefCross Ref
  2. Susanne Barth and Menno D.T. de Jong. 2017. The privacy paradox - Investigating discrepancies between expressed privacy concerns and actual online behavior - A systematic literature review. Telematics and Informatics 34, 7 (2017), 1038 – 1058.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Diane Bartz. 2019. U.S. senators introduce social media bill to ban ‘dark patterns’ tricks. https://www.reuters.com/article/us-usa-tech/us-senators-introduce-social-media-bill-to-ban-dark-patterns-tricks-idUSKCN1RL25Q.Google ScholarGoogle Scholar
  4. K. Bednar and S. Spiekermann. 2018. Aware but not in control: A qualitative value analysis of the effects of new technologies. IFIP Advances in Information and Communication Technology, Vol. 537. 202–218 pages. www.scopus.comGoogle ScholarGoogle Scholar
  5. David Blackwell, Carrie Leaman, Rose Tramposch, Ciera Osborne, and Miriam Liss. 2017. Extraversion, neuroticism, attachment style and fear of missing out as predictors of social media use and addiction. Personality and Individual Differences 116 (2017), 69–72.Google ScholarGoogle ScholarCross RefCross Ref
  6. Rainer Böhme and Stefanie Pötzsch. 2012. Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data. In Financial Cryptography and Data Security, George Danezis (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1–15.Google ScholarGoogle Scholar
  7. Robert M Bond, Christopher J Fariss, Jason J Jones, Adam DI Kramer, Cameron Marlow, Jaime E Settle, and James H Fowler. 2012. A 61-million-person experiment in social influence and political mobilization. Nature 489, 7415 (2012), 295–298.Google ScholarGoogle Scholar
  8. Christoph Bösch, Benjamin Erb, Frank Kargl, Henning Kopp, and Stefan Pfattheicher. 2016. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. Proceedings on Privacy Enhancing Technologies 2016, 4(2016), 237 – 254. https://content.sciendo.com/view/journals/popets/2016/4/article-p237.xmlGoogle ScholarGoogle ScholarCross RefCross Ref
  9. Harry Brignull. [n.d.]. Dark Patterns Types of Dark Pattern. https://darkpatterns.org/types-of-dark-pattern.Google ScholarGoogle Scholar
  10. Sarah L Buglass, Jens F Binder, Lucy R Betts, and Jean DM Underwood. 2017. Motivators of online vulnerability: The impact of social network site use and FOMO. Computers in Human Behavior 66 (2017), 248–255.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Corina Cara 2019. Dark Patterns In The Media: A Systematic Review. Network Intelligence Studies 7, 14 (2019), 105–113.Google ScholarGoogle Scholar
  12. Elija Cassidy. 2016. Social networking sites and participatory reluctance: A case study of Gaydar, user resistance and interface rejection. New Media & Society 18, 11 (2016), 2613–2628. https://doi.org/10.1177/1461444815590341Google ScholarGoogle ScholarCross RefCross Ref
  13. Ann Cavoukian. 2011. Privacy by Design: The 7 Foundational Principles.Google ScholarGoogle Scholar
  14. Kathy Charmaz. 2014. Constructing grounded theory. Sage.Google ScholarGoogle Scholar
  15. Norwegian Consumer Council. 2018. Deceived By Design: How tech companies use dark patterns to discourage us from exercising our rights to privacy. (2018). https://fil.forbrukerradet.no/wp-content/uploads/2018/06/2018-06-27-deceived-by-design-final.pdfGoogle ScholarGoogle Scholar
  16. Edward Deci and Richard M Ryan. 1985. Intrinsic motivation and self-determination in human behavior. Springer Science & Business Media.Google ScholarGoogle Scholar
  17. Linda Di Geronimo, Larissa Braz, Enrico Fregnan, Fabio Palomba, and Alberto Bacchelli. 2020. UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and User Perception. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10.1145/3313831.3376600Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Niall Docherty. 2020. Facebook’s Ideal User: Healthy Habits, Social Capital, and the Politics of Well-Being Online. Social Media+ Society 6, 2 (2020), 2056305120915606.Google ScholarGoogle Scholar
  19. Jon D. Elhai, Jason C. Levine, Ahmad M. Alghraibeh, Ali A. Alafnan, Ahmad A. Aldraiweesh, and Brian J. Hall. 2018. Fear of missing out: Testing relationships with negative affectivity, online social engagement, and problematic smartphone use. Computers in Human Behavior 89 (2018), 289 – 298. https://doi.org/10.1016/j.chb.2018.08.020Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Facebook. [n.d.]. What names are allowed on Facebook?https://www.facebook.com/help/112146705538576.Google ScholarGoogle Scholar
  21. Ben Gilbert. 2018. The #DeleteFacebook movement has reached a fever pitch, as former Facebook insiders turn on the company. Business Insider (March 2018). https://www.businessinsider.com/deletefacebook-facebook-movement-2018-3Google ScholarGoogle Scholar
  22. Fritz Heider. 1958. The psychology of interpersonal relations. New York: John Wiley and Sons.Google ScholarGoogle Scholar
  23. E Tory Higgins. 1987. Self-discrepancy: a theory relating self and affect.Psychological review 94, 3 (1987), 319.Google ScholarGoogle Scholar
  24. JWT Intelligence. [n.d.]. Report, SXSW presentation spotlight how brands can leverage FOMO. http://www.jwtintelligence.com/wp-content/uploads/2012/03/F_JWT_FOMO-update_3.21.12.pdf. Retrieved from Internet Archive website: https://web.archive.org/.Google ScholarGoogle Scholar
  25. Herbert C Kelman. 1958. Compliance, identification, and internalization three processes of attitude change. Journal of conflict resolution 2, 1 (1958), 51–60.Google ScholarGoogle ScholarCross RefCross Ref
  26. Hanna Krasnova, Oliver Günther, Sarah Spiekermann, and Ksenia Koroleva. 2009. Privacy concerns and identity in online social networks. Identity in the Information Society 2, 1 (2009), 39–63.Google ScholarGoogle ScholarCross RefCross Ref
  27. Jamie Luguri and Lior Strahilevitz. 2019. Shining a light on dark patterns. U of Chicago, Public Law Working Paper719 (2019).Google ScholarGoogle Scholar
  28. Mike Masnick. 2019. Protocols, Not Platforms: A Technological Approach to Free Speech. Knight First Amendment Institute (August 2019). https://knightcolumbia.org/content/protocols-not-platforms-a-technological-approach-to-free-speechGoogle ScholarGoogle Scholar
  29. Thomas Mejtoft, Sarah Hale, and Ulrik Söderström. 2019. Design Friction. Association for Computing Machinery, New York, NY, USA, 41–44. https://doi.org/10.1145/3335082.3335106Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Adam Mosseri. 2018. Bringing People Closer Together. https://about.fb.com/news/2018/01/news-feed-fyi-bringing-people-closer-together/.Google ScholarGoogle Scholar
  31. Samantha Murphy. 2013. Report: 56% of Social Media Users Suffer From FOMO. Mashable (Jul 2013). https://mashable.com/2013/07/09/fear-of-missing-out/83r7t4gHriq4Google ScholarGoogle Scholar
  32. Casey Newton. 2018. Google’s new focus on well-being started five years ago with this presentation. The Verge (May 2018). https://www.theverge.com/2018/5/10/17333574/google-android-p-update-tristan-harris-design-ethicsGoogle ScholarGoogle Scholar
  33. Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal. 2020. Dark Patterns after the GDPR: Scraping Consent Pop-Ups and Demonstrating Their Influence. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3313831.3376321Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Susanna Paasonen. 2018. Affect, data, manipulation and price in social media. Distinktion: Journal of Social Theory 19, 2 (2018), 214–229. https://doi.org/10.1080/1600910X.2018.1475289Google ScholarGoogle ScholarCross RefCross Ref
  35. Zizi Papacharissi and Paige L. Gibson. 2011. Fifteen Minutes of Privacy: Privacy, Sociality, and Publicity on Social Network Sites. Springer Berlin Heidelberg, Berlin, Heidelberg, 75–89. https://doi.org/10.1007/978-3-642-21521-6_7Google ScholarGoogle ScholarCross RefCross Ref
  36. Andrew K. Przybylski, Kou Murayama, Cody R. DeHaan, and Valerie Gladwell. 2013. Motivational, emotional, and behavioral correlates of fear of missing out. Computers in Human Behavior 29, 4 (2013), 1841 – 1848. https://doi.org/10.1016/j.chb.2013.02.014Google ScholarGoogle ScholarCross RefCross Ref
  37. Yvonne Rogers, Paul Dourish, Patrick Olivier, Margot Brereton, and Jodi Forlizzi. 2020. The Dark Side of Interaction Design. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI EA ’20). Association for Computing Machinery, New York, NY, USA, 1–4. https://doi.org/10.1145/3334480.3381070Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Victoria Sgarro. 2019. The tyranny of frictionless design. https://uxdesign.cc/the-tyranny-of-frictionless-design-1325ab14432cGoogle ScholarGoogle Scholar
  39. Irina Shklovski, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI ’14). Association for Computing Machinery, New York, NY, USA, 2347–2356. https://doi.org/10.1145/2556288.2557421Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Statista. [n.d.]. Number of monthly active Facebook users worldwide as of 3rd quarter 2020. https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/.Google ScholarGoogle Scholar
  41. Katherine Strater and Heather Richter Lipford. 2008. Strategies and Struggles with Privacy in an Online Social Networking Community. In Proceedings of the 22Nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1 (Liverpool, United Kingdom) (BCS-HCI ’08). British Computer Society, Swinton, UK, UK, 111–119. http://dl.acm.org/citation.cfm?id=1531514.1531530Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Zeynep Tufekci. 2008. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society 28, 1 (2008), 20–36. https://doi.org/10.1177/0270467607311484Google ScholarGoogle ScholarCross RefCross Ref
  43. Jeroen van Rest, Daniel Boonstra, Maarten Everts, Martin van Rijn, and Ron van Paassen. 2014. Designing Privacy-by-Design. In Privacy Technologies and Policy, Bart Preneel and Demosthenes Ikonomou (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 55–72.Google ScholarGoogle Scholar
  44. Fiona Westin and Sonia Chiasson. 2019. Opt out of Privacy or “Go Home”: Understanding Reluctant Privacy Behaviours through the FoMO-Centric Design Paradigm. In Proceedings of the New Security Paradigms Workshop (San Carlos, Costa Rica) (NSPW ’19). Association for Computing Machinery, New York, NY, USA, 57–67. https://doi.org/10.1145/3368860.3368865Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Claire A Wolniewicz, Mojisola F Tiamiyu, Justin W Weeks, and Jon D Elhai. 2018. Problematic smartphone use and relations with negative affect, fear of missing out, and fear of negative and positive evaluation. Psychiatry research 262(2018), 618–623.Google ScholarGoogle Scholar
  46. Shoshana Zuboff. 2019. The age of surveillance capitalism: The fight for a human future at the new frontier of power. Profile Books.Google ScholarGoogle Scholar

Index Terms

  1. “It’s So Difficult to Sever that Connection”: The Role of FoMO in Users’ Reluctant Privacy Behaviours
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
      May 2021
      10862 pages
      ISBN:9781450380966
      DOI:10.1145/3411764

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 May 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format