Interpersonal Privacy Nudge for Promoting Privacy Protective Behaviors on Social Network Sites Haiyan Jia & Heng Xu College of Information Sciences and.

Slides:



Advertisements
Similar presentations
Developmentally Appropriate Practice
Advertisements

The Relationship between Facebook and Body Esteem Comparing College Women Greta Hau & Molly Crabb Advised by: Susan Wolfgram Ph.D. University of Wisconsin-Stout.
P RIVACY, T RUST, AND R EPUTATION Jose Miguel Such July 27th, 2011.
What is Diffusion? The process of communicating innovation through certain channels over time through members of a social system.
1 Disclosure and Privacy 10: Inter-Act, 13 th Edition 10: Inter-Act, 13 th Edition.
Chapter 7 Recap (Emotions)
SOCIOLOGY Chapter 1: The Sociological Point of View
Lesson 3. Six main perspectives characterize modern psychology: the biological, cognitive, psychodynamic, humanistic, behavioral and socio-cultural views.
© CSR Asia 2010 ISO Richard Welford CSR Asia
(c) 2006 by Pearson Education. All Rights Reserved. American Families Beirne-Smith et al. Mental Retardation, Seventh Edition Copyright ©2006 Pearson Education,
Reframing. When is Reframing Used To reduce defensiveness To reduce over-simplistic attributions To modify view of context and situation To overcome resistance.
PSY415 Psychology of the Self
Texas Association of School Psychologists Annual Conference Norma S. Guerra, PhD NCSP, LSSP.
Instagram: Uses and Gratification of Users
NAEYC Developmentally Appropriate Practice in Early Childhood Programs Serving Children from Birth through Age 8.
Top 5 Facebook Tips Mark Smith Rosemary Turner. What is Facebook? Users create a personalised profile for themselves and then add people as friends to.
Soo Young Rieh School of Information University of Michigan Information Ethics Roundtable Misinformation and Disinformation April 3-4, 2009 University.
Module B This multimedia product and its contents are protected under copyright law. The following are prohibited by law: any public performance or display,
Paper Title: “The influence of gender in the relation between Participatory Monitoring and Evaluation, and Citizen Empowerment” Conference Paper by: Kennedy.
Introduction to Psychology by Charles Stangor. Introduction to Psychology Psychology as a Science The Evolution of Psychology: History, Approaches, and.
ISO Richard Welford CSR Asia © CSR Asia 2011.
Advisor: 謝焸君 教授 Student: 賴千惠
“To give a better understanding of who I am” the role of personal profiles in online learning Karen Kear, Frances Chetwynd and Helen Jefferis The Open.
Gender INDEPENDENT T-TEST TABLE VariableMalesFemalestdfSig. IFL1.250 (.543) (.810) **0.000 COM1.850 (1.189) (1.488) **0.000.
LA Comprehensive Curriculum
The Self and Messages Relationship Development
+ Go Beyond ‘Just Recycling’ Routine: To Create a Sustainable Campus Ay ş egul Özbebek Tunç Introduction Sustainability and Sustainable Educational Areas.
DEVELOPMENTAL APPROACHES TO PEER ADVOCACY FOR COLLEGE SUCCESS A Connect2Complete webinar series With Mandy Savitz-Romer & Suzanne M. Bouffard August –
Chapter 8 Lecture/Recap.  “…personal information, shared intentionally, that another person would have trouble finding out without being told” (p.
Universal Adaptation of Avatar Technology and the Metaverse for Online Learning: A New Approach Michael Alden Roller Department of Computer Information.
Learners’ Attitudes and Perceptions of Online Instruction Presented by: Dr. Karen S. Ivers Dr. JoAnn Carter-Wells Dr. Joyce Lee California State University.
Chapter Six: Developing and Maintaining Relationships  What is Interpersonal Communication?  At least two people who are interdependent.  Allows for.
Prof. Chen, Rutgers University Social Network and Guanxi Research in China Chao C. Chen Rutgers University Dissertation Workshop, Guangzhou, July 2007.
Supporting Behavior in the Classroom
National Athlete Career and Education Program The Athlete Career and Education (ACE) Network is a nationwide program that assists elite athletes to achieve.
Tie Strength, Embeddedness & Social Influence: Evidence from a Large Scale Networked Experiment Sinan Aral, Dylan Walker Presented by: Mengqi Qiu(Mendy)
Professor Norah Jones Dr. Esyin Chew Social Software for Learning – The Institutional Policy of the University of Glamorgan ICHL 2012, China
Considering Causes in Forecasting for Ethical Decision-Making Cheryl Beeler University of Oklahoma 2009 Research Conference on Research Integrity Niagara.
Social analysis and collateral impact of pervasive technologies CNIT - TN.
Lecture 2: The Self in Human Communication Introduction to Communication.
D1 - 25/10/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
FacebookFacebook Use (And Abuse). Definitions* ORI—repeated, unwanted pursuit and invasion of one’s sense of physical or symbolic privacy by another person,
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
METACOGNITIVE STRATEGIES FOR THE SECONDARY SOCIAL STUDIES CLASSROOM BY: RODOLFO RAMIREZ Thinking about Thinking.
Introduction defining communication. communication let’s draw our map.
Chapter 10: Health Communication. How Do Patients & Providers Interact? Typical Patient-Provider Relational Types:  Machines-and-Mechanics  Children-Parents.
Youth Engagement Section DEAL.org Program. Communicating the Youth Perspective Use information gathered from youth to create better resources and strategies.
Theories of Health Behaviors Gero 302. Health Belief Model Has intuitive Logic and clearly stated central tenents Behind the HBM values and expectancy.
Acceptance of health services on mobile phones: A study of consumer perceptions.
Chapter 8 Lecture/Recap.  “…personal information, shared intentionally, that another person would have trouble finding out without being told” (p.
Office of Overseas Programming & Training Support (OPATS) Environment Community Engagement No. 1- Introduction to Behavior Change.
Chapter 8 Lecture/Recap.  “…personal information, shared intentionally, that another person would have trouble finding out without being told” (p.
How Social Media Changed The World Of Event Planning By Olivia Burke.
>>0 >>1 >> 2 >> 3 >> 4 >> Privacy and SNS in China Comundus-European Master of Arts in Media, Communication and Cultural Study Jin PENG the case of xiaonei.com.
Henry M. Sondheimer, MD Association of American Medical Colleges 7 August 2013 A Common Taxonomy of Competency Domains for the Health Professions and Competencies.
Copyright © Allyn & Bacon 2007 This multimedia product and its contents are protected under copyright law. The following are prohibited by law: any public.
The effects of workshop participation in scenario-planning workshops on propensity to collaborate Survey findings Lisa Rayle Master in City Planning Master.
1Chapter 7: Relationships. Each person in the relationship  has a separate identity  is able to give and receive honest and respectful feedback  assumes.
Contemporary Issues in Curriculum: Chapters 1-5
Follow Us/More Information
Curriculum and Emotions – Solving Problems and Managing Conflict
Relational Benefits and Costs in Social Media Brand Pages
Do you remember chapter 7?
MOIS 508 Spring 2006 Dr. Dina Rateb
Parent-Child Assistance Program (PCAP) 1991-present An intensive 3-year home visitation intervention for pregnant and parenting, alcohol/drug abusing.
Marina Carnevale Ozge Yucel- Aybat
Reciprocity and Cooperation
Paper Title: “The influence of gender in the relation between Participatory Monitoring and Evaluation, and Citizen Empowerment” Conference Paper by: Kennedy.
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
Children and Networks Suha Hajyahia Tareza Haddad.
Presentation transcript:

Interpersonal Privacy Nudge for Promoting Privacy Protective Behaviors on Social Network Sites Haiyan Jia & Heng Xu College of Information Sciences and Technology The Pennsylvania State University PIR 2015 | August 13,

INTERPERSONAL PRIVACY NUDGE Content Introduction Interpersonal Privacy Concerns on SNS Nudging toward Privacy-Protective Behaviors Conclusion 2

Privacy 1.0 vs. 2.0: From Personal to Interpersonal INTRODUCTION 3

Privacy 1.0: All about me INTERPERSONAL PRIVACY NUDGE 4

The rise of SNS: From me to we (a) Information owner shares a photo to friends;(b) A friend re-shares the information to public;(c) Information is displayed without owner’s consent. INTERPERSONAL PRIVACY NUDGE 5

Paradigm Shift in Privacy Research Current research mainly limited to individuals’ personal privacy o Use and interaction with the websites/service Growing need to conceptualize privacy as a social phenomenon (boyd, 2007; Lampinen et al., 2011; Xu, 2012) o Social interactions, social relationships, and social implications of information disclosure INTERPERSONAL PRIVACY NUDGE 6

Privacy 2.0: Consider we Xu, H. (2012). Reframing Privacy 2.0 in Online Social Network. U. Pa. J. Const. L., 14, INTERPERSONAL PRIVACY NUDGE 7

The Interpersonal Aspect of Privacy It is through interpersonal relationships that o Privacy information is being disclosed and disseminated o Reciprocal privacy considerations are formed INTERPERSONAL PRIVACY NUDGE 8

Research Objectives 1.Conceptualizing privacy as an interpersonal issue for social network sites 2.Theorizing interpersonal privacy concern as a key factor for privacy decision making 3.Proposing interpersonal privacy nudge as a mechanism for better privacy decisions on social network sites INTERPERSONAL PRIVACY NUDGE 9

Interpersonal Privacy Concerns on SNS MOTIVATION 10

Interpersonal Relationship as the Context for Privacy Perceptions Privacy perceptions are strongly tied to specific social situations (Laufer & Wolfe 1977) Privacy perceptions are shaped through the establishment and maintenance of interpersonal relationship INTERPERSONAL PRIVACY NUDGE 11

Interpersonal Relationship as the Context for Privacy Perceptions Privacy control: o Individuals can freely decide what and how much information to disclose o However, they often cannot control what others disclose about them INTERPERSONAL PRIVACY NUDGE 12

Interpersonal Privacy: The Photo Sharing Scenario (a) Information owner shares a photo to friends;(b) A friend re-shares the information to public;(c) Information is displayed without owner’s consent. INTERPERSONAL PRIVACY NUDGE 13

Interpersonal Relationship as the Context for Privacy Perceptions INTERPERSONAL PRIVACY NUDGE 14

Interpersonal Privacy Concern INTERPERSONAL PRIVACY NUDGE 15  Friend’s disclosure of my private information  My disclosure of friend’s private information

Nudging toward Privacy-Protecting Behaviors CONCEPTUAL FRAMEWORK 16

Privacy Concern Drives Privacy Behaviors Privacy concerns have great impact on individuals’ behavioral responses: o E.g., willingness to disclose information, engagement in online activities, etc. (Smith et al. 2011) Enhancing privacy concerns can encourage adoption of privacy- protective behaviors Privacy warnings, however, are often overlooked or ineffective (Egelman et al. 2008; LaRose & Rifon 2007) INTERPERSONAL PRIVACY NUDGE 17

“Privacy Nudge” Nudging has been used to shift economic decision-making in a predictable way without significantly changing other incentives (Thaler & Sunstein 2003 & 2008) Nudging as a subtler, less cognitively demanding approach toward personal privacy protective behaviors (Balebako et al. 2011; Wang et al. 2013) Heuristic cues to influence information disclosure decisions in complex privacy environment (John et al. 2011) INTERPERSONAL PRIVACY NUDGE 18

Interpersonal Privacy Concerns for Promoting Privacy-Protective Behaviors INTERPERSONAL PRIVACY NUDGE 19  Friend’s disclosure of my private information  My disclosure of friend’s private information

Purposes of Interpersonal Privacy Nudge 1.Remind users of the privacy rules that friends and themselves have established; 2.Prompt users to consider consequences of potential privacy conflicts; 3.Increase privacy concerns with enhanced awareness of possible privacy loss (for self and/or for others); 4.Shift users toward better privacy decision-making and adoption of privacy-protective behaviors INTERPERSONAL PRIVACY NUDGE 20

Interpersonal Privacy Rules on SNSs Control “how much control co-owners have over the co-owned private information” Access “how much others can know about the information” Boundary Extension “who else can know the information” (Child et al. 2009) INTERPERSONAL PRIVACY NUDGE 21

Interpersonal Privacy Impact on SNSs Impact Disclosure INTERPERSONAL PRIVACY NUDGE 22

Interpersonal Privacy Nudge for Social Network Sites STIMULUS DEVELOPMENT 23

The Photo Sharing Scenario INTERPERSONAL PRIVACY NUDGE 24

Potential Violation of Friend’s Privacy 1 NUDGE FOR 25

Potential Violation of Friend’s Access Rules Na Wang only posted 2 photos to her Timeline in the past 12 months. You are about to add this photo to Na Wang’s Timeline. Are you sure you want to proceed? CancelShare PhotoEdit Photo Privacy Setting INTERPERSONAL PRIVACY NUDGE 26

Potential Violation of One’s Own Privacy 2 NUDGE FOR 27

Potential Violation of One’s Own Access Rules This photo has you tagged in it and will also be posted to your Timeline. You only posted 2 photos of yourself in the past 12 months. You are about to add this photo to Na Wang’s Timeline. Are you sure you want to proceed? CancelShare PhotoEdit Photo Privacy Setting INTERPERSONAL PRIVACY NUDGE 28

Discussion and Future Work CONCLUSION 29

Interpersonal Privacy Nudge Conceptual Model INTERPERSONAL PRIVACY NUDGE 30 Interpersonal Privacy Rules Interpersonal Privacy Concern For self For others Interpersonal Privacy Protective Behaviors

Summary Individual approach to privacy perceptions and protection is insufficient Reconceptualizing SNS privacy as an interpersonal issue An effective strategy for promoting privacy-protective behaviors is through nudging users toward interpersonal privacy concerns INTERPERSONAL PRIVACY NUDGE 31

THANKS! Haiyan Jia Heng Xu College of Information Sciences and Technology | Penn State University INTERPERSONAL PRIVACY NUDGE FOR SOCIAL NETWORK SITES 32