1. bookVolume 2022 (2022): Edition 1 (January 2022)
Détails du magazine
Première parution
16 Apr 2015
4 fois par an
access type Accès libre

The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites

Publié en ligne: 20 Nov 2021
Volume & Edition: Volume 2022 (2022) - Edition 1 (January 2022)
Pages: 629 - 648
Reçu: 31 May 2021
Accepté: 16 Sep 2021
Détails du magazine
Première parution
16 Apr 2015
4 fois par an

Research finds that the users of Social Networking Sites (SNSs) often fail to comprehensively engage with the plethora of available privacy features— arguably due to their sheer number and the fact that they are often hidden from sight. As different users are likely interested in engaging with different subsets of privacy features, an SNS could improve privacy management practices by adapting its interface in a way that proactively assists, guides, or prompts users to engage with the subset of privacy features they are most likely to benefit from. Whereas recent work presents algorithmic implementations of such privacy adaptation methods, this study investigates the optimal user interface mechanism to present such adaptations. In particular, we tested three proposed “adaptation methods” (automation, suggestions, highlights) in an online between-subjects user experiment in which 406 participants used a carefully controlled SNS prototype. We systematically evaluate the effect of these adaptation methods on participants’ engagement with the privacy features, their tendency to set stricter settings (protection), and their subjective evaluation of the assigned adaptation method. We find that the automation of privacy features afforded users the most privacy protection, while giving privacy suggestions caused the highest level of engagement with the features and the highest subjective ratings (as long as awkward suggestions are avoided). We discuss the practical implications of these findings in the effectiveness of adaptations improving user awareness of, and engagement with, privacy features on social media.


[1] D. L. Hoffman and T. Novak, “Why do people use social media? empirical findings and a new theoretical framework for social media goal pursuit,” Empirical Findings and a New Theoretical Framework for Social Media Goal Pursuit (January 17, 2012), 2012.10.2139/ssrn.1989586 Search in Google Scholar

[2] P. Wisniewski, A. Islam, H. Richter Lipford, and D. C. Wilson, “Framing and measuring multi-dimensional interpersonal privacy preferences of social networking site users,” Communications of the Association for information systems, vol. 38, no. 1, p. 10, 2016.10.17705/1CAIS.03810 Search in Google Scholar

[3] Z. Tufekci, “Grooming, gossip, facebook and myspace: What can we learn about these sites from those who won’t assimilate?” Information, Communication & Society, vol. 11, no. 4, pp. 544–564, 2008.10.1080/13691180801999050 Search in Google Scholar

[4] P. J. Wisniewski, B. P. Knijnenburg, and H. R. Lipford, “Making privacy personal: Profiling social network users to inform privacy education and nudging,” International Journal of human-computer studies, vol. 98, pp. 95–108, 2017.10.1016/j.ijhcs.2016.09.006 Search in Google Scholar

[5] S. Hsu, K. Vaccaro, Y. Yue, A. Rickman, and K. Karahalios, “Awareness, navigation, and use of feed control settings online,” in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, pp. 1–13.10.1145/3313831.3376583 Search in Google Scholar

[6] A. Acquisti and R. Gross, “Imagined communities: Awareness, information sharing, and privacy on the facebook,” in International workshop on privacy enhancing technologies. Springer, 2006, pp. 36–58.10.1007/11957454_3 Search in Google Scholar

[7] C. Kahn and D. Ingram, “Three-quarters facebook users as active or more since privacy scandal: Reuters/ipsos poll,” May 2018. [Online]. Available: https://www.reuters.com/article/us-facebook-privacy-poll/three-quarters-facebook-users-as-active-or-more-since-privacy-scandal-reuters-ipsos-poll-idUSKBN1I7081 Search in Google Scholar

[8] M. Netter, M. Riesner, M. Weber, and G. Pernul, “Privacy settings in online social networks–preferences, perception, and reality,” in 2013 46th Hawaii International Conference on System Sciences. IEEE, 2013, pp. 3219–3228.10.1109/HICSS.2013.455 Search in Google Scholar

[9] J. Golbeck and M. L. Mauriello, “User perception of facebook app data access: A comparison of methods and privacy concerns,” Future Internet, vol. 8, no. 2, p. 9, 2016.10.3390/fi8020009 Search in Google Scholar

[10] P. Wisniewski, A. N. Islam, B. P. Knijnenburg, and S. Patil, “Give social network users the privacy they want,” in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015, pp. 1427–1441.10.1145/2675133.2675256 Search in Google Scholar

[11] A. Kitsiou, E. Tzortzaki, C. Kalloniatis, and S. Gritzalis, “Identifying privacy related requirements for the design of self-adaptive privacy protections schemes in social networks,” Future Internet, vol. 13, no. 2, p. 23, 2021.10.3390/fi13020023 Search in Google Scholar

[12] B. P. Knijnenburg, “Privacy? i can’t even! making a case for user-tailored privacy,” IEEE Security & Privacy, vol. 15, no. 4, pp. 62–67, 2017.10.1109/MSP.2017.3151331 Search in Google Scholar

[13] P. Bahirat, Y. He, A. Menon, and B. Knijnenburg, “A data-driven approach to developing iot privacy-setting interfaces,” in 23rd International Conference on Intelligent User Interfaces, 2018, pp. 165–176.10.1145/3172944.3172982 Search in Google Scholar

[14] B. Liu, M. S. Andersen, F. Schaub, H. Almuhimedi, S. A. Zhang, N. Sadeh, Y. Agarwal, and A. Acquisti, “Follow my recommendations: A personalized privacy assistant for mobile app permissions,” in Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 2016, pp. 27–41. Search in Google Scholar

[15] P. Wijesekera, A. Baokar, L. Tsai, J. Reardon, S. Egelman, D. Wagner, and K. Beznosov, “The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences,” in 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017, pp. 1077–1093.10.1109/SP.2017.51 Search in Google Scholar

[16] M. Namara, H. Sloan, P. Jaiswal, and B. P. Knijnenburg, “The potential for user-tailored privacy on facebook,” in 2018 IEEE Symposium on Privacy-Aware Computing (PAC). IEEE, 2018, pp. 31–42.10.1109/PAC.2018.00010 Search in Google Scholar

[17] Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, “Analyzing facebook privacy settings: user expectations vs. reality,” in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, 2011, pp. 61–70.10.1145/2068816.2068823 Search in Google Scholar

[18] R. Ravichandran, M. Benisch, P. G. Kelley, and N. M. Sadeh, “Capturing social networking privacy preferences,” in International symposium on privacy enhancing technologies symposium. Springer, 2009, pp. 1–18.10.1007/978-3-642-03168-7_1 Search in Google Scholar

[19] Y. He, P. Bahirat, B. P. Knijnenburg, and A. Menon, “A Data-Driven Approach to Designing for Privacy in Household IoT,” ACM Trans. Interact. Intell. Syst., vol. 10, no. 1, pp. 10:1–10:47, Sep. 2019. [Online]. Available: http://doi.acm.org/10.1145/324137810.1145/3241378 Search in Google Scholar

[20] J. Colnago, Y. Feng, T. Palanivel, S. Pearman, M. Ung, A. Acquisti, L. F. Cranor, and N. Sadeh, “Informing the design of a personalized privacy assistant for the internet of things,” in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, pp. 1–13.10.1145/3313831.3376389 Search in Google Scholar

[21] D. Wilkinson, S. Sivakumar, D. Cherry, B. P. Knijnenburg, E. M. Raybourn, P. Wisniewski, and H. Sloan, “User-tailored privacy by design,” in Proceedings of the Usable Security Mini Conference, 2017.10.14722/usec.2017.23007 Search in Google Scholar

[22] T. B. Sheridan and W. L. Verplank, “Human and computer control of undersea teleoperators,” Massachusetts Inst of Tech Cambridge Man-Machine Systems Lab, Tech. Rep., 1978.10.21236/ADA057655 Search in Google Scholar

[23] O. Pasternak, C. Veloutsou, and A. Morgan-Thomas, “Self-presentation, privacy and electronic word-of-mouth in social media,” Journal of Product & Brand Management, 2017.10.1108/JPBM-04-2016-1150 Search in Google Scholar

[24] O. L. Haimson, A. J. Carter, S. Corvite, B. Wheeler, L. Wang, T. Liu, and A. Lige, “The major life events taxonomy: Social readjustment, social media information sharing, and online network separation during times of life transition,” Journal of the Association for Information Science and Technology, 2021.10.1002/asi.24455 Search in Google Scholar

[25] X. Page, R. Ghaiumy Anaraky, B. P. Knijnenburg, and P. J. Wisniewski, “Pragmatic tool vs. relational hindrance: Exploring why some social media users avoid privacy features,” Proceedings of the ACM on Human-Computer Interaction, vol. 3, no. CSCW, pp. 1–23, 2019.10.1145/3359212 Search in Google Scholar

[26] Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. G. Leon, and L. F. Cranor, ““ i regretted the minute i pressed share” a qualitative study of regrets on facebook,” in Proceedings of the seventh symposium on usable privacy and security, 2011, pp. 1–16.10.1145/2078827.2078841 Search in Google Scholar

[27] B. Knijnenburg, E. Raybourn, D. Cherry, D. Wilkinson, S. Sivakumar, and H. Sloan, “Death to the privacy calculus?” Available at SSRN 2923806, 2017.10.2139/ssrn.2923806 Search in Google Scholar

[28] L. Warberg, A. Acquisti, and D. Sicker, “Can Privacy Nudges be Tailored to Individuals’ Decision Making and Personality Traits?” in Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, ser. WPES’19. New York, NY, USA: Association for Computing Machinery, Nov. 2019, pp. 175–197. [Online]. Available: https://doi.org/10.1145/3338498.335865610.1145/3338498.3358656 Search in Google Scholar

[29] E. Toch, J. Cranshaw, P. H. Drielsma, J. Y. Tsai, P. G. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh, “Empirical models of privacy in location sharing,” in Proceedings of the 12th ACM international conference on Ubiquitous computing, 2010, pp. 129–138.10.1145/1864349.1864364 Search in Google Scholar

[30] M. Benisch, P. G. Kelley, N. Sadeh, and L. F. Cranor, “Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs,” Personal and Ubiquitous Computing, vol. 15, no. 7, pp. 679–694, 2011.10.1007/s00779-010-0346-0 Search in Google Scholar

[31] O. R. Sanchez, I. Torre, Y. He, and B. P. Knijnenburg, “A recommendation approach for user privacy preferences in the fitness domain,” User Modeling and User-Adapted Interaction, Oct. 2019. [Online]. Available: https://doi.org/10.1007/s11257-019-09246-310.1007/s11257-019-09246-3 Search in Google Scholar

[32] L. Fang and K. LeFevre, “Privacy wizards for social networking sites,” in Proceedings of the 19th international conference on World wide web, 2010, pp. 351–360.10.1145/1772690.1772727 Search in Google Scholar

[33] Y. Wang, P. G. Leon, A. Acquisti, L. F. Cranor, A. Forget, and N. Sadeh, “A field trial of privacy nudges for facebook,” in Proceedings of the SIGCHI conference on human factors in computing systems, 2014, pp. 2367–2376.10.1145/2556288.2557413 Search in Google Scholar

[34] F. Schaub, B. Konings, M. Weber, and F. Kargl, “Towards context adaptive privacy decisions in ubiquitous computing,” in Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on. IEEE, 2012, pp. 407–410. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=619752110.1109/PerComW.2012.6197521 Search in Google Scholar

[35] T. B. Sheridan, “Human centered automation: oxymoron or common sense?” in 1995 IEEE International Conference on Systems, Man and Cybernetics. Intelligent Systems for the 21st Century, vol. 1. IEEE, 1995, pp. 823–828. Search in Google Scholar

[36] A. Acquisti, I. Adjerid, R. Balebako, L. Brandimarte, L. F. Cranor, S. Komanduri, P. G. Leon, N. Sadeh, F. Schaub, M. Sleeper et al., “Nudges for privacy and security: Understanding and assisting users’ choices online,” ACM Computing Surveys (CSUR), vol. 50, no. 3, pp. 1–41, 2017.10.1145/3054926 Search in Google Scholar

[37] I. Cachola, E. Holgate, D. Preoţiuc-Pietro, and J. J. Li, “Expressively vulgar: The socio-dynamics of vulgarity and its effects on sentiment analysis in social media,” in Proceedings of the 27th International Conference on Computational Linguistics, 2018, pp. 2927–2938. Search in Google Scholar

[38] E. M. Redmiles, S. Kross, and M. L. Mazurek, “How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples,” in 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019, pp. 1326–1343.10.1109/SP.2019.00014 Search in Google Scholar

[39] F. Y. Kung, N. Kwok, and D. J. Brown, “Are attention check questions a threat to scale validity?” Applied Psychology, vol. 67, no. 2, pp. 264–283, 2018.10.1111/apps.12108 Search in Google Scholar

[40] F. D. Davis, “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS quarterly, pp. 319–340, 1989.10.2307/249008 Search in Google Scholar

[41] B. P. Knijnenburg and A. Kobsa, “Making decisions about privacy: information disclosure in context-aware recommender systems,” ACM Transactions on Interactive Intelligent Systems (TiiS), vol. 3, no. 3, pp. 1–23, 2013.10.1145/2499670 Search in Google Scholar

[42] D. Thissen, L. Steinberg, and D. Kuang, “Quick and easy implementation of the benjamini-hochberg procedure for controlling the false positive rate in multiple comparisons,” Journal of educational and behavioral statistics, vol. 27, no. 1, pp. 77–83, 2002.10.3102/10769986027001077 Search in Google Scholar

[43] J. Watson, H. R. Lipford, and A. Besmer, “Mapping user preference to privacy default settings,” ACM Transactions on Computer-Human Interaction (TOCHI), vol. 22, no. 6, pp. 1–20, 2015.10.1145/2811257 Search in Google Scholar

[44] C. Cobb, L. Simko, T. Kohno, and A. Hiniker, “User experiences with online status indicators,” in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, pp. 1–12.10.1145/3313831.3376240 Search in Google Scholar

[45] M. Tschersich and R. Botha, “Exploring the impact of restrictive default privacy settings on the privacy calculus on social network sites,” in ECIS, 2014.10.1007/978-3-319-17016-9_6 Search in Google Scholar

[46] A. Vance, D. Eargle, J. L. Jenkins, C. B. Kirwan, and B. B. Anderson, “The fog of warnings: how non-essential notifications blur with security warnings,” in Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019), 2019. Search in Google Scholar

[47] S. S. Sundar, J. Kim, M. B. Rosson, and M. D. Molina, “Online privacy heuristics that predict information disclosure,” in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, pp. 1–12.10.1145/3313831.3376854 Search in Google Scholar

[48] H. Nissenbaum, “A contextual approach to privacy online,” Daedalus, vol. 140, no. 4, pp. 32–48, 2011.10.1162/DAED_a_00113 Search in Google Scholar

Articles recommandés par Trend MD

Planifiez votre conférence à distance avec Sciendo