Measuring Privacy: An Empirical Test Using Context To Expose Confounding Variables

  title={Measuring Privacy: An Empirical Test Using Context To Expose Confounding Variables},
  author={Kirsten E. Martin and Helen Nissenbaum},
It is commonplace for those who support less restrictive privacy regulation on the collection and use of personal information to point out a paradox: in survey after survey, respondents express deep concern for privacy, oppose growing surveillance and data practices, and object to online tracking and behavioral advertising. Yet when confronted with actual choices involving the capture or exchange of information few people demonstrate restraint: we sign up for frequent flyer and frequent buyer… 

Figures and Tables from this paper

Secrets and Likes: The Drive for Privacy and the Difficulty of Achieving It in the Digital Age

Contrary to depictions of online sharing behaviors as careless, it is shown how consumers fundamentally care about online privacy, and evidence of numerous actions they take to protect it is presented.

Impact of Unmet Privacy Expectations Across Information, Time, and Space: Evidence from Four Countries

Globally, consumers and firms are negotiating rising privacy expectations. This article advances research by developing a multidimensional privacy measure that captures the idea of privacy as an

Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms

ABSTRACT: The oft-cited privacy paradox is the perceived disconnect between individuals’ stated privacy expectations, as captured in surveys, and consumer market behavior in going online: individuals

Employees’ privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose

Abstract The processing of employees’ personal data is dramatically increasing, yet there is a lack of tools that allow employees to manage their privacy. In order to develop these tools, one needs

Did the GDPR increase trust in data collectors? Evidence from observational and experimental data

The observational and experimental evidence does not support the hypothesis that the GDPR has positively affected trust, and the discussion of the underlying reasons are relevant for the wider research field of trust, privacy, and big data.

Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA

It is demonstrated that surveys based on the theory of contextual integrity provide a quantifiable and scalable method for measuring the conformity of specific regulatory provisions to privacy norms in the U.S. Children's Online Privacy Protection Act.

Assessing the Privacy of mHealth Apps for Self-Tracking: Heuristic Evaluation Approach

The majority of self-tracking services examined failed to provide users with full access to their own data, did not acquire sufficient consent for the use of the data, or inadequately extended controls over disclosures to third parties.

Mapping the Privacy Rationales

Why should we protect informational privacy? Scholars from various fields have explored this question and arrived at different answers. This chapter groups the rationales and aims of privacy and data

Designing for the Privacy Commons

This chapter frames privacy enforcement processes through the lens of governance and situated design of sociotechnical systems. It considers the challenges in formulating and designing privacy as



Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information

This research highlights consumer vulnerabilities in navigating increasingly complex privacy issues introduced by new information technologies and addresses underlying processes and rule out alternative explanations by eliciting subjective judgments of the sensitivity of inquiries.

On Notice: The Trouble with Notice and Consent

It is concluded that even an opt-in regime in online behavioral advertising would lack legitimacy, due to the confusing disconnect between the privacy policies of online publishers and the tracking and targeting third parties with whom they contract.

Privacy in Context - Technology, Policy, and the Integrity of Social Life

Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social context, be it workplace, health care, schools, or among family and friends.

Development of measures of online privacy concern and protection for use on the Internet

The authors conclude that these scales are reliable and valid instruments suitable for administration via the Internet, and present them for use in online privacy research.

Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model

The results of this study indicate that the second-order IUIPC factor, which consists of three first-order dimensions--namely, collection, control, and awareness--exhibited desirable psychometric properties in the context of online privacy.

Dimensions of Privacy Concern among Online Consumers

The Federal Trade Commission (FTC) is one of many organizations studying influences on consumer privacy online. The authors investigate these influences, taking into consideration the current body of

Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion

It is found that an individual's CFIP interacts with argument framing and issue involvement to affect attitudes toward the use of EHRs, and results suggest that attitude toward EHR use and CFIP directly influence opt-in behavioral intentions.

Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy online

It is suggested that the online environment is not conducive to rely on explicit agreements to respect privacy, and an alternative framework to manage and research privacy is suggested.

Privacy Indexes: A Survey of Westin's Studies

The methodology used each year to calculate the privacy indexes is reported on and some conclusions about which indexes can be used to infer privacy trends are drawn.

Secure and privacy preserving data processing support for active authentication

A rule based data sanitization scheme to detect and remove personally identifiable and other sensitive information from the collected data set and a data transmission scheme using the Extensible Messaging and Presence Protocol to guarantee privacy during transmission are developed.