Alessandro Acquisti Heinz College/CyLab Carnegie Mellon University K. U. Leuven - Interdisciplinary Privacy Course 2010 June 2010 Privacy, Nudges, and.

Slides:



Advertisements
Similar presentations
Robin L. Donaldson May 5, 2010 Prospectus Defense Florida State University College of Communication and Information.
Advertisements

CMU has been said to be the “most wired campus in the US” for two years in a row. What kind of impact does such a infrastructure has on the daily academic.
Basic Research Methods CSE EST ISE 323 Spring 2012 Tony Scarlatos.
EFRIM BORITZ WON GYUN NO R. P. SUNDARRAJ The Effect of Involvement and Privacy Policy Disclosure on Individuals’ Privacy Behaviour DISCUSSANT COMMENTS.
Research in Psychology Chapter Two
Social Networks: Facebook “Facebook Grows Up” by Steven Levy “Information Revelation and Privacy in Online Social Networks (The Facebook Case)” by Ralph.
Graphical Results Results The Effect of Virtual Worlds on Adolescents' Real World Lives Using an upper-division undergraduate social science course, students.
The Cycle of Science Research question about the real world Research question about the real world Theory Interpretation Statistical analyses Statistical.
Investigating the Reaction of Relatively Unsophisticated Investors To Audit Assurance on Firm-Released News Announcements J. E. Hunton – Bentley College.
Alessandro Acquisti Heinz College & CyLab Carnegie Mellon University TRUST Autumn 2009 Conference The economics (and behavioral economics) of privacy.
AGEC 608 Lecture 14, p. 1 AGEC 608: Lecture 14 Objective: Provide overview of contingent valuation method (CVM) and review strengths and weaknesses of.
Information Seeking Behavior of Scientists Brad Hemminger School of Information and Library Science University of North Carolina at Chapel.
Punishing Unacceptable Behavior Janhavi Nilekani and Sarah Ong.
Privacy and Rationality: Theory and Evidence Alessandro Acquisti Heinz School, Carnegie Mellon University
Chapter 2 – Tools of Positive Analysis
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
Research Methods in Psychology Pertemuan 3 s.d 4 Matakuliah: L0014/Psikologi Umum Tahun: 2007.
Formulating the research design
Perceptions of Behavioral Advertising among CMU Community Ashwini Rao April 21, 2014.
Review for Final Exam Some important themes from Chapters 9-11 Final exam covers these chapters, but implicitly tests the entire course, because we use.
Chapter 2 Research Methods. The Scientific Approach: A Search for Laws Empiricism: testing hypothesis Basic assumption: events are governed by some lawful.
Experiments and Observational Studies.  A study at a high school in California compared academic performance of music students with that of non-music.
Survey Experiments. Defined Uses a survey question as its measurement device Manipulates the content, order, format, or other characteristics of the survey.
#72 Privacy concerns and information disclosure: An illusion of control hypothesis Laura Brandimarte, Alessandro Acquisti, Goerge Loewenstein, Linda Babcock.
Chapter 2: The Research Enterprise in Psychology
Chapter 2: The Research Enterprise in Psychology
Chapter 2 Research Methods. The Scientific Approach: A Search for Laws Empiricism: testing hypothesis Basic assumption: events are governed by some lawful.
The Role of Expectations for Future Family Obligations in Career Choice for Men and Women Emily Cooper, Ashley Vacha, and Amanda Albert  Faculty Mentor:
Moderation & Mediation
Intimate Relationships © 2010, W. W. Norton & Company, Inc. Thomas N. Bradbury Benjamin R. Karney Tools for Studying Intimate Relationships Chapter 2.
1 Chapter 11: Survey Research Summary page 343 Asking Questions Obtaining Answers Multi-item Scales Response Biases Questionnaire Design Questionnaire.
Comparing Two Population Means
Using Transactional Information to Predict Link Strength in Online Social Networks Indika Kahanda and Jennifer Neville Purdue University.
The Research Enterprise in Psychology. The Scientific Method: Terminology Operational definitions are used to clarify precisely what is meant by each.
Copyright © 2010 Allyn & Bacon This multimedia product and its contents are protected under copyright law. The following are prohibited by law: any public.
Chapter 2 The Research Enterprise in Psychology. Table of Contents The Scientific Approach: A Search for Laws Basic assumption: events are governed by.
Research PHE 498. Define Research Research can be considered as systematic inquiry: A process that needs to be followed systematically to derive conclusions.
Direct Teacher: Professor Ng Reporter: Cindy Pineapple 1 Summarized from :
Research Methods in Psychology Descriptive Methods Naturalistic observation Intensive individual case study Surveys/questionnaires/interviews Correlational.
HAOMING LIU JINLI ZENG KENAN ERTUNC GENETIC ABILITY AND INTERGENERATIONAL EARNINGS MOBILITY 1.
Introductory Topics PSY Scientific Method.
Human Subjects Protections Research Ethics. Basic Assumptions about How Research Should be Conducted Subjects should be protected from harm. Subjects.
Chapter 1 Getting Started 1.1 What is Statistics?.
Privacy concerns and information disclosure: An illusion of control hypothesis Laura Brandimarte and Alessandro Acquisti – Carnegie Mellon University Motivation.
Spectators of Finnish baseball: comparing women’s and men’s games Seppo Suominen.
Research Methods In Psychology Mrs. Andrews. Psychology… The scientific study of behavior and mental processes.
 Athletes and Energy Drinks: Reported Risk- Taking and Consequences from the Combined Use of Alcohol and Energy Drinks By: Manny Ozoa, Jaclyn Medel and.
1 Interaction of hypertext forms and global versus sequential learning styles. Dünser, A., Jirasco, M. (2005). Interaction of hypertext forms and global.
I. Research Strategies Module 02. A. Research Methodology Method of asking questions then drawing logical supported conclusions Researchers need to be.
Acknowledgments We thank Dr. Yu, Dr. Bateman, and Professor Szabo for allowing us to conduct this study during their class time. We especially thank the.
The Practice of Statistics, 5th Edition Starnes, Tabor, Yates, Moore Bedford Freeman Worth Publishers CHAPTER 4 Designing Studies 4.2Experiments.
Chapter 2 The Research Enterprise in Psychology. Table of Contents The Scientific Approach: A Search for Laws Basic assumption: events are governed by.
Misplaced Confidences: Privacy and the Control Paradox L. Brandimarte, A. Acquisti, and G. Loewenstein,"Misplaced Confidences: Privacy and the control.
Regression Analysis: Part 2 Inference Dummies / Interactions Multicollinearity / Heteroscedasticity Residual Analysis / Outliers.
Psychology As Science Psychologists use the “scientific method” Steps to the scientific method: - make observations - ask question - develop hypothesis.
Public Finance and Public Policy Jonathan Gruber Third Edition Copyright © 2010 Worth Publishers 1 of 24 Copyright © 2010 Worth Publishers.
Sociology. Sociology is a science because it uses the same techniques as other sciences Explaining social phenomena is what sociological theory is all.
Chapter 2: The Research Enterprise in Psychology.
>>0 >>1 >> 2 >> 3 >> 4 >> Privacy and SNS in China Comundus-European Master of Arts in Media, Communication and Cultural Study Jin PENG the case of xiaonei.com.
Conducting surveys and designing questionnaires. Aims Provide students with an understanding of the purposes of survey work Overview the stages involved.
8 Experimental Research Design.
Attachment style and condom use across and within dating relationships
Information Seeking Behavior of Scientists
Experimental Design.
Experimental Design.
Statistical Reasoning December 8, 2015 Chapter 6.2
Alessandro Acquisti Heinz College Carnegie Mellon University
Methods of Psychological Research
Chapter 4: Designing Studies
Trust and Authority System
Presentation transcript:

Alessandro Acquisti Heinz College/CyLab Carnegie Mellon University K. U. Leuven - Interdisciplinary Privacy Course 2010 June 2010 Privacy, Nudges, and the Illusion of Control

1. From the economics to the behavioral economics of privacy 2. The illusion of control hypothesis 3. Soft paternalism and privacy nudges

1. From the economics to the behavioral economics of privacy 2. The illusion of control hypothesis 3. Soft paternalism and privacy nudges

 Protection & revelation of personal data flows involve tangible and intangible trade-offs for the data subject as well as the potential data holder  However….

The need for a behavioral economics of privacy  The privacy paradox: privacy attitudes/behavior dichotomy  Hurdles which hamper (privacy) decision making 1. Incomplete information 2. Bounded rationality 3. Psychological/behavioral biases

The need for a behavioral economics of privacy  Hence, the need for a behavioral, experimental economics of privacy (as well as information security)  I.e., applying theory and methodologies from BE and BDR to the understanding of how people (and organizations) make decisions about the security or privacy of their data ... and how cognitive and behavioral biases (negatively) affect those decisions  … in order to inform policy and technology design

 Randomized experiments  Randomly assigning subjects to different treatments (experimental conditions)  For instance, different versions of a survey  Numerous unobservable factors impact privacy concerns and privacy behavior  However: with large enough sample and proper randomization, underlying distributions of traits (including privacy preferences, concerns, and other factors which influence the former) are similar across conditions  Furthermore: control econometrically for other observable traits; avoid confounding effects  Testing for statistically significant differences in behavior (eg, propensity to answer questions) as function of treatment  Although we cannot interpret micro motivations (e.g., infer who is lying or why a subject is/is not answering), we can compare aggregate behaviors

 Hyperbolic discounting in privacy decision making (ACM EC 04)  Herding effects in information revelation (SJDM 2009)  Over-confidence, optimism bias in online social networks (WPES 05)  Confidentiality assurances inhibit information disclosure (SJDM 07)  Individuals more likely to disclose sensitive information to unprofessional sites than professional sites (SJDM 2007)  Endowment effects in privacy valuations (WISE 2009)  […]

 Mall patrons asked to participated in a study. Offered compensation in the form of gift card(s)  We manipulated trade-offs between privacy protection and value of cards  Endowed with either:  $10 Anonymous gift card. “Your name will not be linked to the transactions completed with the card, and its usage will not be tracked by the researchers.”  $12 Trackable, identified gift card. “Your name will be linked to the transactions completed with the card, and its usage will be tracked by the researchers.”  Then, asked whether they’d like to switch cards  From $10 Anonymous to $12 Trackable (WTA)  From $12 Trackable to $10 Anonymous (WTP)

WTP vs. WTA: Results χ2(3) = 30.66, p <

1. From the economics to the behavioral economics of privacy 2. The illusion of control hypothesis (joint work with Laura Brandimarte and George Loewenstein) 3. Soft paternalism and privacy nudges

 Giving users more control over disclosure and publication of personal information paradoxically causes them to disclose more sensitive information and expose themselves to heightened privacy risks  Conjecture: Individuals may confound control over publication of private information with control over access/use of that information by others  Even though arguably threats to privacy derive from access to/use of available information by others!  Why? Because the act of publication is more salient than later access/use by others The Illusion of control in information disclosure (or: the privacy control paradox)

 Privacy as control  Westin, Samarjiva, Culnan, Solove, …  Normative vs. Positive interpretation The Illusion of control in information disclosure (or: the privacy control paradox)

 Hypotheses:  Higher perceived control on publication will trigger higher willingness to reveal, even when the objective risks associated with accessibility/usage do not change, or in fact increase  Lower perceived control on publication will trigger lower willingness to reveal, even when the objective risks associated with accessibility/usage do not change, or in fact decrease  Illusion of control  Henslin (1967), Langer (1975)

 Study 1: Reducing (perceived) control over publication of personal information ▪ Mediated vs. unmediated publication  Study 2: Reducing (perceived) control over publication of personal information ▪ Certainty vs. probability of publication  Study 3: Increasing (perceived) control over publication of personal information ▪ Explicit vs. implicit control

 Design  Subjects: CMU students recruited on campus, March 2008  Completed online survey  Justification for the survey: creation of CMU networking website  Questions focused on students’ life on and off campus ▪ Multiple choice, Yes/No, Rating and open-end questions ▪ Included quasi-identifiers + privacy intrusive and non-intrusive questions ▪ As rated by 31 subjects independently in a pre-study

 Examples of highly intrusive questions  address  Home address  Have you ever cheated for homework/projects/exams (e.g. copy, plagiarize)?  Examples of moderately intrusive questions  Date of birth  Do you have a girlfriend/boyfriend?  Have you ever had troubles with your roommates?  Examples of non intrusive questions  Do you do any sport on campus?  Which courses are you taking at the moment?  How would you rate the quality of the education you are receiving?

 Manipulation: Profile automatically created vs. profile created by researcher (less control)  Control group “No question/field is required. With the answers you provide, a profile will be automatically created for you, with no intervention by the researcher, and published on a new CMU networking website, which will only be accessible by members of the CMU community, starting from the end of April. The data will not be used in any other way.”  Treatment group “No question/field is required. The answers you provide will be collected by the researcher, who will create a profile for you and publish it on a new CMU networking website, which will only be accessible by members of the CMU community, starting from the end of April. The data will not be used in any other way.”

 Dependent variables  Response rate (whether subject answered or not)  Admission rate (whether subject admitted to some behaviors)  Explanatory variables  Treatment  Intrusiveness  Demographics (age, gender)

 Hypothesis: Loss of control over publication should decrease willingness to disclose private information, and especially so for the most sensitive questions  It is not the publication of private information per se that disturbs people, but the fact that someone else will publish it for them  Confounding factors

 Participants: 29 subjects in control condition, 32 subjects in treatment condition – 30 males (17 in control condition), 28 females (15 in control condition), 3 missing – Average age: 21.8 in control group, 21 in treatment group (difference not significant)

Figure 1: Percentage of subjects answering each question in control and treatment condition

Table 1. RE Probit coefficients of panel regression of response rate on treatment with dummy for most intrusive questions, interaction and demographics * indicates significance at 10% level; ** indicates significance at 5% level CoeffP-value Treatment -.37*.08 Intrusive -.43**.00 Treat_Int Age Male N= 61Prob > χ 2 =.000

 Treatment has hypothesized effect on  4 of the questions that were rated as highly intrusive ( , cheating at school, others cheating, informing instructor)  1 moderately intrusive question (girlfriend)  Treatment did not push subjects to admit more:  The percentage of subjects answering “No” to questions about sensitive behaviors didn’t change significantly (10% level) between the control and the treatment conditions  However, possible confounding factor: trust in researcher

 Design  Similar to Study 1

 Manipulation: Profile automatically published vs. profile published with 50% probability (less control)  Control group “The information you provide will appear on a profile that will be automatically created for you. The profile will be published on a new CMU networking website, which will only be accessible by members of the CMU community, starting at the end of this semester. The data will not be used in any other way. NO QUESTION/FIELD REQUIRES AN ANSWER.”  Treatment group “The information you provide will appear on a profile that will be automatically created for you. Half of the profiles created for the participants will be randomly picked to be published on a new CMU networking website, which will only be accessible by members of the CMU community, starting at the end of this semester. The data will not be used in any other way. NO QUESTION/FIELD REQUIRES AN ANSWER.”

Figure 2: Percentage of subjects answering each question in control and treatment condition

RE Probit coefficients of panel regression of response rate on treatment with dummy for most intrusive questions, interaction and demographics * indicates significance at 10% level, ** indicates significance at 5% level; *** indicates significance at 1% level Table 2. CoeffP-value Treatment -.25**.05 Intrusive -.64**.00 Treat_Int -.67**.00 Age Male.20*.10 N= 132Prob > χ 2 =.000

 Possible confounding factors  Study 2 took care of one of the possible confounding factor in Study 1. However…  Subjects may reveal less because they care less, since the probability of publication is lower ▪ If that were the case, we should observe an effect on those types of questions that required effort (program, courses). No such effect

 Design  Subjects: CMU students recruited on campus, March 2010  Completed online survey  Justification for the survey: study on ethical behaviors  Ten Yes/No questions that focused on sensitive behaviors (e.g. drug use, stealing) ▪ Included demographics + privacy intrusive and non-intrusive questions ▪ As rated by 49 subjects independently in a pre-study

Manipulations – Condition 1 (only implicit control) “All answers are voluntary. By answering a question, you agree to give the researchers permission to publish your answer.” – Condition 2 (high explicit control) “All answers are voluntary. In order to give the researchers permission to publish your answer to a question, you will be asked to check the corresponding box in the following page.” – Condition 3 (medium control) “All answers are voluntary. In order to give the researchers permission to publish your answers to the questions, you will be asked to check a box in the following page.” – Condition 4 (same as Condition 2, but the default is that answers will be published) “All answers are voluntary. In order to prevent the researchers from publishing your answer to a question, you will be asked to check the corresponding box in the following page.” – Condition 5 (some control + extra demographics) “All answers are voluntary. In order to give the researchers permission to publish your answers to the questions, you will be asked to check a box in the following page. Please notice that the answers to the demographic questions that you provided in the previous page will NOT be published without your explicit agreement: you will be asked permission to publish those answers separately.”

Table 3. RE Probit coefficients of panel regression of response rate on treatment with dummy for most intrusive questions, interaction and demographics * indicates significance at 10% level; ** indicates significance at 5% level Comparing conditions: 1 and 21 and 31 and 41 and 5 Treatment 1.51** (.000) 1.92** (.000) 1.52** (.000).91** (.000) Intrusive -.85** (.000) -.85** (.000) -.85** (.000) -.84** (.000) Treat_Int.59* (.071) -1.21** (.002).44 (.177) -.08 (.741) Age.01 (.753).03 (.521).003 (.942).05 (.158) Male.10 (.653) -.11 (.593) -.08 (.684) -.03 (.861) N Prob > χ

 The coefficient on Treatment is always positive and significant: providing subjects with control over information publication increases their willingness to answer a question (results are similar if we only consider answers that subjects were willing to publish)  The coefficient on the interaction is only significant when comparing condition 1 with condition 2  The negative coefficient on the interaction in condition 3 may be due to the very nature of the treatment: makes publication of very sensitive information more salient, but does not allow the prohibition of the publication of specific questions  Adding a dummy variable for the provision of an address, which should have made subjects feel more identifiable, doesn’t affect our results

 Our results suggest the following:  Control over publication leads to more revelation of private info  This effect is stronger for privacy intrusive questions

 People seem to care more for control over publication of private information than for control over access and use of that information  When someone other tha n themselves is responsible for the publication, or when the publication itself becomes uncertain – which reduces the probability of access/use by others – people refrain from disclosing  Results call into questions OSNs’ arguments that privacy is protected by providing more control to members  Giving more control to users over information publication seems to generate higher willingness to disclose sensitive information

1. From the economics to the behavioral economics of privacy 2. The illusion of control hypothesis 3. Soft paternalism and privacy nudges

 Our research highlights cognitive and behavioral biases that make it difficult for users to make the “right” privacy (and security) decision  However, those results can also used for “soft,” or asymmetric, paternalistic solutions:  Designing systems to “nudge” individuals, by anticipating – or even exploiting - the very fallacies and biases that research has uncovered; tweaking with their incentives, without diminish user’s freedom (IEEE S&P 2009)

 Consider online social networks users who post dates of birth online  Imagine that a study shows some risks associated with revealing DOBs (e.g., SSN predictions)  Strong paternalistic solution: ban public provision of dates of birth in online profiles  “Usability” solution : design a system to make it intuitive/ easy to change DOB visibility settings  Soft paternalistic solution?

 Saliency of information  Provide context to aid the user’s decision - such as visually representing how many other users (or types of users) may be able to access that information  Default settings  By default, DOBs not visible, unless settings are modified by user  Hyperbolic discounting  Predict and show immediately SSN based on information provided  … and so forth

For more info  Google: economics privacy  Visit: privacy.htmhttp:// privacy.htm 

Backup Slides

Experimental condition Number of subjects Average age % Male Average response rate (%) Subjects providing (%) Subjects answering all questions Subjects publishing all questions Subjects publishing no question (15.1%) (75.0%)10 (27.8%) (37.5%)32 (100%) (74.3%)19 (54.3%)0 (0%) (39.4%)33 (100%)- Total (49.1%)94 (69.1%) Descriptive statistics and qualitative results