1. The document examines how adding and removing location sharing options affects user preferences. It studies four options: nothing, city, city block, and exact location.
2. The researchers hypothesize that removing the "city" option will either cause users to choose more private options proportionally, or to shift more towards the more revealing "block" option, depending on how close "city" is perceived to the other options.
3. A user study found that when "city" was removed, the share of users choosing "block" increased significantly, suggesting "city" is perceived closer to "block" than "nothing." Adding an "exact" option caused proportional increases across options, suggesting equal perceived distances.
Turbocharge your journalism by employing online tools and resources for better and faster backgrounding of people and organizations. Social media can be used as powerful reporting tools, whether you're facing a big breaking news story or an enterprise project. This session explains how to use social media platforms and complementary websites to locate diverse expert and real people sources, listen to your community and identify news stories, verify user-generated content, crowdsource using Google Forms and call-outs, and create a social dossier on a person in the news. Trainer P. Kim Bui is the director of audience innovation at the Arizona Republic.
Information Disclosure Profiles for Segmentation and RecommendationBart Knijnenburg
油
The document discusses moving beyond a one-size-fits-all approach to privacy by developing privacy profiles based on different tendencies to disclose types of information. These profiles can be used to provide tailored privacy recommendations and defaults by predicting a user's disclosure behaviors based on their profile, type of information, and recipient. The goal is to support individual privacy preferences while reducing the complexity of privacy controls.
This document presents research on profiling Facebook users' privacy behaviors. A survey was conducted with over 300 Facebook users to understand their use of various privacy features and settings. Statistical analysis identified 14 distinct privacy behavior factors. Further analysis classified users into 6 privacy behavior profiles, ranging from "Privacy Maximizers" to "Privacy Minimalists". The profiles differed in their use of features like friend lists, untagging posts, and restricting profile access. The research aims to better understand how to personalize privacy tools based on users' tendencies.
Counteracting the negative effect of form auto-completion on the privacy calc...Bart Knijnenburg
油
This document discusses how form auto-completion tools can negatively impact users' privacy calculus by making it too easy to disclose information without weighing risks and benefits. The researchers propose two new tools - Remove FormFiller and Add FormFiller - that allow users to manually remove or add filled fields, hypothesizing this will reinstate the privacy calculus. They conducted an experiment where participants used an auto-completion tool on forms for different websites (a blog, job site, health insurer). Results showed perceived risk was lower and relevance higher when the type of information matched the website purpose, supporting the role of purpose-specificity in disclosure decisions.
Simplifying Privacy Decisions: Towards Interactive and Adaptive SolutionsBart Knijnenburg
油
The document discusses approaches to simplifying privacy decisions through interactive and adaptive solutions. It first examines how transparency and control approaches have limitations due to bounded rationality, information overload, and choice overload. It then discusses privacy nudging and persuasion approaches using defaults, justifications, and framing to influence decisions. However, these approaches can also reduce user satisfaction and autonomy. The document proposes an adaptive privacy procedure to provide contextualized nudges based on a dynamic understanding of user concerns.
The document discusses both the promises and perils of big data. It outlines how big data can enable powerful personalized recommendations through techniques like matrix factorization but also how overfitting and a lack of domain knowledge can limit solutions. It emphasizes the need for user experiments to evaluate recommendations and the importance of balancing privacy concerns with personalization through transparency and adaptive defaults.
Helping Users with Information Disclosure Decisions: Potential for Adaptation...Bart Knijnenburg
油
The document describes an experiment that tested different types of justifications for personal information disclosure requests from mobile apps. The experiment tested different justification types (no justification, usefulness for the user, number of others disclosing, usefulness for others, explanation), disclosure request order (context data first vs demographics first), and measured their impact on disclosure rates, perceived value of disclosure, perceived privacy threat, trust in the company, and satisfaction with the system. The results showed that no justification led to the highest disclosure rates, and justifications were perceived as generally helpful except for number of others. The justification of usefulness for others led to higher perceived privacy threat and lower trust in the company.
The document discusses moving beyond transparency and control as the primary ways to address privacy concerns. It proposes a Privacy Adaptation Procedure that uses adaptive nudges based on contextualizing individual privacy preferences. These nudges would take into account the type of information, user characteristics, context, and other factors to determine the optimal default settings and justifications for different individuals in different situations. Examples show how nudges could be tailored depending on privacy profiles, gender, disclosure tendencies, and other variables.
The document discusses human centered software design (HCSD) and its benefits. It promotes incorporating human-centered design (HCD) methods into traditional software engineering processes. These methods include interviews, personas, scenarios, storyboards and user testing. When done effectively through iterative design and testing with users, HCSD can lead to increased traffic, sales, user happiness and productivity. The document uses examples from various companies and from a student project at UC Irvine to show how HCSD works in practice.
Inspectability and Control in Social RecommendersBart Knijnenburg
油
1. The study examined how providing users with inspectability and control over recommendations in a social recommender system impacts user experience.
2. The results showed that giving users inspectability through a full graph interface increased understandability and perceived control compared to a list interface. It also improved users' recognition of known recommendations.
3. Allowing users to control recommendations at the item level led to higher novelty through fewer known recommendations, while control at the friend level increased accuracy.
4. Overall, the findings suggest that social recommenders should provide users with inspectability and control through a simple interface to improve the user experience.
Tutorial on Conducting User Experiments in Recommender SystemsBart Knijnenburg
油
The document provides an introduction to user experiments for evaluating recommender systems. It discusses developing a theoretical framework for user-centric evaluation with four key aspects: 1) measuring how system algorithms and interactions influence user experience and behavior, 2) considering subjective user perceptions and experiences in addition to objective behaviors, 3) accounting for personal and situational characteristics that may impact results, and 4) linking objective system aspects to subjective experience to understand how system aspects affect user experience. The goal is to scientifically evaluate recommender systems from the user perspective using this comprehensive framework.
Privacy in Mobile Personalized Systems - The Effect of Disclosure JustificationsBart Knijnenburg
油
Paper Presentation at the Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM) at the Symposium On Usable Privacy and Security (SOUPS) 2012
Paper can be found here: http://appanalysis.org/u-prism/soups12_mobile-final11.pdf
Full journal paper (under review): http://bit.ly/TiiSprivacy
Explaining the User Experience of Recommender Systems with User ExperimentsBart Knijnenburg
油
A talk I gave at the Netflix offices on July 2nd, 2012.
Please do not use any of the slides or their contents without my explicit permission (bart@usabart.nl for inquiries).
Using latent features diversification to reduce choice difficulty in recommen...Bart Knijnenburg
油
The document summarizes research on how to reduce choice difficulty in recommendation lists by using latent feature diversification. It finds that choice difficulty increases with larger, more uniform recommendation sets that provide fewer tradeoffs between options. The study manipulates diversity in personalized movie recommendations while keeping attractiveness constant, finding that medium diversity leads to the highest perceived diversity and attractiveness while reducing choice difficulty compared to low or high diversity sets. Structural equation modeling confirms diversity positively impacts perceived attractiveness and diversity but has a U-shaped relationship with choice difficulty.
Recommendations and Feedback - The user-experience of a recommender systemBart Knijnenburg
油
The document summarizes research on evaluating the user experience of recommender systems. It presents hypotheses about how personalized recommendations versus random recommendations affect user perception, choice satisfaction, and feedback behavior. An experiment tested the hypotheses using a video recommender system and found that personalized recommendations increased perceived quality and choice satisfaction, which in turn increased feedback intentions. Privacy concerns decreased feedback intentions while trust in technology reduced privacy concerns. The summarizes lessons learned and discusses areas for future work such as confirming results in other systems and incorporating additional influences.
Digital Tools with AI for e-Content Development.pptxDr. Sarita Anand
油
This ppt is useful for not only for B.Ed., M.Ed., M.A. (Education) or any other PG level students or Ph.D. scholars but also for the school, college and university teachers who are interested to prepare an e-content with AI for their students and others.
APM event hosted by the South Wales and West of England Network (SWWE Network)
Speaker: Aalok Sonawala
The SWWE Regional Network were very pleased to welcome Aalok Sonawala, Head of PMO, National Programmes, Rider Levett Bucknall on 26 February, to BAWA for our first face to face event of 2025. Aalok is a member of APMs Thames Valley Regional Network and also speaks to members of APMs PMO Interest Network, which aims to facilitate collaboration and learning, offer unbiased advice and guidance.
Tonight, Aalok planned to discuss the importance of a PMO within project-based organisations, the different types of PMO and their key elements, PMO governance and centres of excellence.
PMOs within an organisation can be centralised, hub and spoke with a central PMO with satellite PMOs globally, or embedded within projects. The appropriate structure will be determined by the specific business needs of the organisation. The PMO sits above PM delivery and the supply chain delivery teams.
For further information about the event please click here.
How to Configure Restaurants in Odoo 17 Point of SaleCeline George
油
Odoo, a versatile and integrated business management software, excels with its robust Point of Sale (POS) module. This guide delves into the intricacies of configuring restaurants in Odoo 17 POS, unlocking numerous possibilities for streamlined operations and enhanced customer experiences.
Chapter 3. Social Responsibility and Ethics in Strategic Management.pptxRommel Regala
油
This course provides students with a comprehensive understanding of strategic management principles, frameworks, and applications in business. It explores strategic planning, environmental analysis, corporate governance, business ethics, and sustainability. The course integrates Sustainable Development Goals (SDGs) to enhance global and ethical perspectives in decision-making.
How to Modify Existing Web Pages in Odoo 18Celine George
油
In this slide, well discuss on how to modify existing web pages in Odoo 18. Web pages in Odoo 18 can also gather user data through user-friendly forms, encourage interaction through engaging features.
Prelims of Kaun TALHA : a Travel, Architecture, Lifestyle, Heritage and Activism quiz, organized by Conquiztadors, the Quiz society of Sri Venkateswara College under their annual quizzing fest El Dorado 2025.
Helping Users with Information Disclosure Decisions: Potential for Adaptation...Bart Knijnenburg
油
The document describes an experiment that tested different types of justifications for personal information disclosure requests from mobile apps. The experiment tested different justification types (no justification, usefulness for the user, number of others disclosing, usefulness for others, explanation), disclosure request order (context data first vs demographics first), and measured their impact on disclosure rates, perceived value of disclosure, perceived privacy threat, trust in the company, and satisfaction with the system. The results showed that no justification led to the highest disclosure rates, and justifications were perceived as generally helpful except for number of others. The justification of usefulness for others led to higher perceived privacy threat and lower trust in the company.
The document discusses moving beyond transparency and control as the primary ways to address privacy concerns. It proposes a Privacy Adaptation Procedure that uses adaptive nudges based on contextualizing individual privacy preferences. These nudges would take into account the type of information, user characteristics, context, and other factors to determine the optimal default settings and justifications for different individuals in different situations. Examples show how nudges could be tailored depending on privacy profiles, gender, disclosure tendencies, and other variables.
The document discusses human centered software design (HCSD) and its benefits. It promotes incorporating human-centered design (HCD) methods into traditional software engineering processes. These methods include interviews, personas, scenarios, storyboards and user testing. When done effectively through iterative design and testing with users, HCSD can lead to increased traffic, sales, user happiness and productivity. The document uses examples from various companies and from a student project at UC Irvine to show how HCSD works in practice.
Inspectability and Control in Social RecommendersBart Knijnenburg
油
1. The study examined how providing users with inspectability and control over recommendations in a social recommender system impacts user experience.
2. The results showed that giving users inspectability through a full graph interface increased understandability and perceived control compared to a list interface. It also improved users' recognition of known recommendations.
3. Allowing users to control recommendations at the item level led to higher novelty through fewer known recommendations, while control at the friend level increased accuracy.
4. Overall, the findings suggest that social recommenders should provide users with inspectability and control through a simple interface to improve the user experience.
Tutorial on Conducting User Experiments in Recommender SystemsBart Knijnenburg
油
The document provides an introduction to user experiments for evaluating recommender systems. It discusses developing a theoretical framework for user-centric evaluation with four key aspects: 1) measuring how system algorithms and interactions influence user experience and behavior, 2) considering subjective user perceptions and experiences in addition to objective behaviors, 3) accounting for personal and situational characteristics that may impact results, and 4) linking objective system aspects to subjective experience to understand how system aspects affect user experience. The goal is to scientifically evaluate recommender systems from the user perspective using this comprehensive framework.
Privacy in Mobile Personalized Systems - The Effect of Disclosure JustificationsBart Knijnenburg
油
Paper Presentation at the Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM) at the Symposium On Usable Privacy and Security (SOUPS) 2012
Paper can be found here: http://appanalysis.org/u-prism/soups12_mobile-final11.pdf
Full journal paper (under review): http://bit.ly/TiiSprivacy
Explaining the User Experience of Recommender Systems with User ExperimentsBart Knijnenburg
油
A talk I gave at the Netflix offices on July 2nd, 2012.
Please do not use any of the slides or their contents without my explicit permission (bart@usabart.nl for inquiries).
Using latent features diversification to reduce choice difficulty in recommen...Bart Knijnenburg
油
The document summarizes research on how to reduce choice difficulty in recommendation lists by using latent feature diversification. It finds that choice difficulty increases with larger, more uniform recommendation sets that provide fewer tradeoffs between options. The study manipulates diversity in personalized movie recommendations while keeping attractiveness constant, finding that medium diversity leads to the highest perceived diversity and attractiveness while reducing choice difficulty compared to low or high diversity sets. Structural equation modeling confirms diversity positively impacts perceived attractiveness and diversity but has a U-shaped relationship with choice difficulty.
Recommendations and Feedback - The user-experience of a recommender systemBart Knijnenburg
油
The document summarizes research on evaluating the user experience of recommender systems. It presents hypotheses about how personalized recommendations versus random recommendations affect user perception, choice satisfaction, and feedback behavior. An experiment tested the hypotheses using a video recommender system and found that personalized recommendations increased perceived quality and choice satisfaction, which in turn increased feedback intentions. Privacy concerns decreased feedback intentions while trust in technology reduced privacy concerns. The summarizes lessons learned and discusses areas for future work such as confirming results in other systems and incorporating additional influences.
Digital Tools with AI for e-Content Development.pptxDr. Sarita Anand
油
This ppt is useful for not only for B.Ed., M.Ed., M.A. (Education) or any other PG level students or Ph.D. scholars but also for the school, college and university teachers who are interested to prepare an e-content with AI for their students and others.
APM event hosted by the South Wales and West of England Network (SWWE Network)
Speaker: Aalok Sonawala
The SWWE Regional Network were very pleased to welcome Aalok Sonawala, Head of PMO, National Programmes, Rider Levett Bucknall on 26 February, to BAWA for our first face to face event of 2025. Aalok is a member of APMs Thames Valley Regional Network and also speaks to members of APMs PMO Interest Network, which aims to facilitate collaboration and learning, offer unbiased advice and guidance.
Tonight, Aalok planned to discuss the importance of a PMO within project-based organisations, the different types of PMO and their key elements, PMO governance and centres of excellence.
PMOs within an organisation can be centralised, hub and spoke with a central PMO with satellite PMOs globally, or embedded within projects. The appropriate structure will be determined by the specific business needs of the organisation. The PMO sits above PM delivery and the supply chain delivery teams.
For further information about the event please click here.
How to Configure Restaurants in Odoo 17 Point of SaleCeline George
油
Odoo, a versatile and integrated business management software, excels with its robust Point of Sale (POS) module. This guide delves into the intricacies of configuring restaurants in Odoo 17 POS, unlocking numerous possibilities for streamlined operations and enhanced customer experiences.
Chapter 3. Social Responsibility and Ethics in Strategic Management.pptxRommel Regala
油
This course provides students with a comprehensive understanding of strategic management principles, frameworks, and applications in business. It explores strategic planning, environmental analysis, corporate governance, business ethics, and sustainability. The course integrates Sustainable Development Goals (SDGs) to enhance global and ethical perspectives in decision-making.
How to Modify Existing Web Pages in Odoo 18Celine George
油
In this slide, well discuss on how to modify existing web pages in Odoo 18. Web pages in Odoo 18 can also gather user data through user-friendly forms, encourage interaction through engaging features.
Prelims of Kaun TALHA : a Travel, Architecture, Lifestyle, Heritage and Activism quiz, organized by Conquiztadors, the Quiz society of Sri Venkateswara College under their annual quizzing fest El Dorado 2025.
Information Technology for class X CBSE skill SubjectVEENAKSHI PATHAK
油
These questions are based on cbse booklet for 10th class information technology subject code 402. these questions are sufficient for exam for first lesion. This subject give benefit to students and good marks. if any student weak in one main subject it can replace with these marks.
Research & Research Methods: Basic Concepts and Types.pptxDr. Sarita Anand
油
This ppt has been made for the students pursuing PG in social science and humanities like M.Ed., M.A. (Education), Ph.D. Scholars. It will be also beneficial for the teachers and other faculty members interested in research and teaching research concepts.
Blind spots in AI and Formulation Science, IFPAC 2025.pdfAjaz Hussain
油
The intersection of AI and pharmaceutical formulation science highlights significant blind spotssystemic gaps in pharmaceutical development, regulatory oversight, quality assurance, and the ethical use of AIthat could jeopardize patient safety and undermine public trust. To move forward effectively, we must address these normalized blind spots, which may arise from outdated assumptions, errors, gaps in previous knowledge, and biases in language or regulatory inertia. This is essential to ensure that AI and formulation science are developed as tools for patient-centered and ethical healthcare.
Prelims of Rass MELAI : a Music, Entertainment, Literature, Arts and Internet Culture Quiz organized by Conquiztadors, the Quiz society of Sri Venkateswara College under their annual quizzing fest El Dorado 2025.
Computer Application in Business (commerce)Sudar Sudar
油
The main objectives
1. To introduce the concept of computer and its various parts. 2. To explain the concept of data base management system and Management information system.
3. To provide insight about networking and basics of internet
Recall various terms of computer and its part
Understand the meaning of software, operating system, programming language and its features
Comparing Data Vs Information and its management system Understanding about various concepts of management information system
Explain about networking and elements based on internet
1. Recall the various concepts relating to computer and its various parts
2 Understand the meaning of softwares, operating system etc
3 Understanding the meaning and utility of database management system
4 Evaluate the various aspects of management information system
5 Generating more ideas regarding the use of internet for business purpose
CRITICAL THINKING AND NURSING JUDGEMENT.pptxPoojaSen20
油
Preference-based Location Sharing: Are More Privacy Options Really Better?
1. Preference-based Location Sharing
Are More Privacy Options Really Better?
Bart P. Knijnenburg
Department of Informatics, UC Irvine
Alfred Kobsa
Department of Informatics, UC Irvine
Hongxia Jin
Samsung R&D Research Center
2. INFORMATION AND COMPUTER SCIENCES
Outline
Should sharing pro鍖les be simple or complex?
What happens when you add/remove sharing options?
Users choose based of their perception of the options
A method for designing better sharing options
3. INFORMATION AND COMPUTER SCIENCES
Pro鍖le-based location sharing
Figure 5 Locaccino privacy settings page
We address in detail the topic of privacy policies, presenting the necessary formalism in
section 3.1.2.
Who Can Locate Me
This page is intended to provide privacy awareness to the user, in the sense that the
5. INFORMATION AND COMPUTER SCIENCES
Locaccino
researchers:
-Users will
otherwise err on
the safe side
Decision scientists:
-Depends on
perception of
the options
6. (part 2/3)
Preferences for sharing your
location with friends
Use the demo phone on the right to set your sharing preferences for
different people at different times.
Note that there are several pages of preferences, and on some pages
you may have to scroll down.
On the different pages you will find settings for sharing with:
Your friends
Your colleagues
Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Steven,
Frank
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Continue
7. (part 2/3)
aring your
ds
t your sharing preferences for
references, and on some pages
tings for sharing with:
Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Steven,
Frank
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Continue
(part 2/3)
aring your
ds
t your sharing preferences for
references, and on some pages
tings for sharing with:
Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Steven,
Frank
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Continue
(part 2/3)
aring your
ds
t your sharing preferences for
references, and on some pages
tings for sharing with:
Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Steven,
Frank
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Continue
8. Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
ages Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
9. Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
ages Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
ages Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
?
?
1.
removing
the City
option
10. Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
ages Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
? ?2.
introducing
the Exact
option
11. INFORMATION AND COMPUTER SCIENCES
Without Exact (E) With Exact (+E)
Without
City (C)
With
City (+C)
Main manipulation
g preferences for
and on some pages
ring with:
Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
r
es Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
es Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Steven
Frank
During work hrs: Outside work hrs:
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Steven
Frank
During work hrs:
nothing
Outside work hrs:
nothing
and on some pages
ring with:
Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas,
Frank
During work hrs:
ring with:
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas,
Frank
During work hrs:
nothing
g preferences for
and on some pages
ring with:
Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
g preferences for
and on some pages
ring with:
Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
g preferences for
and on some pages
ring with:
Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
g preferences for
and on some pages
ring with:
Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
12. INFORMATION AND COMPUTER SCIENCES
Plotting the privacy calculus
We believe that people
choose based on their
perception of the options
How do people perceive
these options?
Privacy calculus:
Trade-off between
privacy and bene鍖t
E
B
N
privacy -->
bene鍖ts-->
C
13. INFORMATION AND COMPUTER SCIENCES
Plotting the privacy calculus
For each recipient, rate
privacy and bene鍖t (-3 to 3):
I do not want [recipient] to
know where I am (Privacy)
My location could be useful
for [recipient] (Bene鍖t)
- For apps/coupons: I could
bene鍖t from [recipient]
Plot the average Privacy and
Bene鍖t of each option on a
plane
E
B
N
privacy -->
bene鍖ts-->
C
14. INFORMATION AND COMPUTER SCIENCES
Plotting the privacy calculus
For each recipient, rate
privacy and bene鍖t (-3 to 3):
I do not want [recipient] to
know where I am (Privacy)
My location could be useful
for [recipient] (Bene鍖t)
- For apps/coupons: I could
bene鍖t from [recipient]
Plot the average Privacy and
Bene鍖t of each option on a
plane
E
B
N
privacy -->
bene鍖ts-->
C
15. INFORMATION AND COMPUTER SCIENCES
Plotting the privacy calculus
For each recipient, rate
privacy and bene鍖t (-3 to 3):
I do not want [recipient] to
know where I am (Privacy)
My location could be useful
for [recipient] (Bene鍖t)
- For apps/coupons: I could
bene鍖t from [recipient]
Plot the average Privacy and
Bene鍖t of each option on a
plane
E
B
N
privacy -->
bene鍖ts-->
C
16. INFORMATION AND COMPUTER SCIENCES
Plotting the privacy calculus
For each recipient, rate
privacy and bene鍖t (-3 to 3):
I do not want [recipient] to
know where I am (Privacy)
My location could be useful
for [recipient] (Bene鍖t)
- For apps/coupons: I could
bene鍖t from [recipient]
Plot the average Privacy and
Bene鍖t of each option on a
plane
E
B
N
privacy -->
bene鍖ts-->
C
High privacy, low bene鍖t
17. INFORMATION AND COMPUTER SCIENCES
Plotting the privacy calculus
For each recipient, rate
privacy and bene鍖t (-3 to 3):
I do not want [recipient] to
know where I am (Privacy)
My location could be useful
for [recipient] (Bene鍖t)
- For apps/coupons: I could
bene鍖t from [recipient]
Plot the average Privacy and
Bene鍖t of each option on a
plane
E
B
N
privacy -->
bene鍖ts-->
C
Low privacy, high bene鍖t
18. Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
ages Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
ages Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
?
?
1.
removing
the City
option
19. INFORMATION AND COMPUTER SCIENCES
Decision theory hypotheses:
Three situations:
1. City is subjectively distinct
from Nothing and Block:
-Luces Choice Axiom
holds
-The ratio N : B+E will stay
the same
Users will prefer both sides
proportionally when City is
removed
E
B
N
privacy -->
bene鍖ts-->
C
privacy -->
20. INFORMATION AND COMPUTER SCIENCES
Decision theory hypotheses:
2. City is subjectively closer
to Nothing than to Block:
-Tverskys Substitution
Effect holds
-C is a substitute for N
-When we remove C,
N will increase more
than B+E
Users will err on the safe side
E
B
N
privacy -->
bene鍖ts-->
C
21. INFORMATION AND COMPUTER SCIENCES
Decision theory hypotheses:
3. City is subjectively closer
to Block than to Nothing:
-Tverskys Substitution
Effect holds
-C is a substitute for B
-When we remove C,
B will increase more
than N
Users will prefer the more
revealing side
E
B
N
privacy -->
bene鍖ts-->
C
23. Without Exact (E) With exact (+E)
Withoutcity(C)Withcity(+C)
48.8
51.2Bene鍖t-->
Privacy -->
41.0
29.7
29.3
Bene鍖t-->
Privacy -->
40.432.6
26.9
Bene鍖t-->
Privacy -->
26.7
29.9
18.6
24.8
Bene鍖t-->
Privacy -->
Exact
Block
City
Nothing
Results
Size:
percentage
of people
choosing
this option
24. Results
W
Without Exact (E) With exact (+E)
Withoutcity(C)Withcity(+C)
Privacy --> Privacy -->
48.8
51.2Bene鍖t-->
Privacy -->
41.0
29.7
29.3
Bene鍖t-->
Privacy -->
40.432.6
26.9
Bene鍖t-->
Privacy -->
26.7
29.9
18.6
24.8
Bene鍖t-->
Privacy -->
Position:
perception
in terms of
privacy and
bene鍖t
25. Results
Without Exact (E) With exact (+E)
Withoutcity(C)Withcity(+C)
48.8
51.2Bene鍖t-->
Privacy -->
41.0
29.7
29.3
Bene鍖t-->
Privacy -->
40.432.6
26.9
Bene鍖t-->
Privacy -->
26.7
29.9
18.6
24.8
Bene鍖t-->
Privacy -->
Exact
Block
City
Nothing
left vs.
right:
comparison
of without
vs. with
Exact
26. Results
Without Exact (E) With exact (+E)
Withoutcity(C)Withcity(+C)
48.8
51.2Bene鍖t-->
Privacy -->
41.0
29.7
29.3
Bene鍖t-->
Privacy -->
40.432.6
26.9
Bene鍖t-->
Privacy -->
26.7
29.9
18.6
24.8
Bene鍖t-->
Privacy -->
Exact
Block
City
Nothing
bottom
vs. top:
comparison
of with vs.
without
City
27. Without Exact (E) With exact (+E)
Withoutcity(C)Withcity(+C)
48.8
51.2Bene鍖t-->
Privacy -->
41.0
29.7
29.3
Bene鍖t-->
Privacy -->
40.432.6
26.9
Bene鍖t-->
Privacy -->
26.7
29.9
18.6
24.8
Bene鍖t-->
Privacy -->
Results
City is closer to Block
(0.45pts) than to Nothing
(2.25pts)
Substitution effect!
Only the share of Block
differs signi鍖cantly
between C and +C
(24.2pp)
Exact
Block
City
Nothing
28. Without Exact (E) With exact (+E)
Withoutcity(C)Withcity(+C)
48.8
51.2Bene鍖t-->
Privacy -->
41.0
29.7
29.3
Bene鍖t-->
Privacy -->
40.432.6
26.9
Bene鍖t-->
Privacy -->
26.7
29.9
18.6
24.8
Bene鍖t-->
Privacy -->
Results
Distance from City to
Nothing and Block is more
equal
Luces choice axiom!
Both Nothing (14.3pp)
and Block (9.1pp) differ
between C and +C
Effect on Nothing is
larger, because City is
somewhat closer to
Nothing
Without Exact (E) With exact (+E)
Withoutcity(C)y(+C)
48.8
51.2
Bene鍖t-->
Privacy -->
41.0
29.7
29.3
Bene鍖t-->
Privacy -->
40.432.6
26.9
Bene鍖t-->
26.7
29.9
18.6
24.8
Bene鍖t-->
Exact
Block
City
Nothing
29. Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
ages Best friends
John, Dave, Ethan
During work hrs:
nothing
city
city block
exact location
Outside work hrs:
nothing
city
city block
exact location
Other friends
Ben, Robert, Thomas, Mike, Paul, Stev
Frank
During work hrs: Outside work hrs:
? ?2.
introducing
the Exact
option
30. INFORMATION AND COMPUTER SCIENCES
Decision theory hypotheses:
Two situations:
1. Exact is subjectively close
to Block:
-Tverskys Substitution
Effect holds
-E is a substitute for B
Only B will decrease when
E is introduced
E
B
N
privacy -->
bene鍖ts-->
C
31. INFORMATION AND COMPUTER SCIENCES
Decision theory hypotheses:
2. Exact is more distant:
-Simonsons Compromise
Effect holds
-B is no longer an extreme,
but a compromise
-B attracts some from C
and N
-Still some Substitution of
B to E
In sum: Sharing increases
across the board
B
N
privacy -->
bene鍖ts-->
C
E
32. INFORMATION AND COMPUTER SCIENCES
W
Without Exact (E) With exact (+E)
Withoutcity(C)Withcity(+C)
Privacy --> Privacy -->
48.8
51.2Bene鍖t-->
Privacy -->
41.0
29.7
29.3
Bene鍖t-->
Privacy -->
40.432.6
26.9
Bene鍖t-->
Privacy -->
26.7
29.9
18.6
24.8
Bene鍖t-->
Privacy -->
Results
Exact is subjectively close
to Block
Substitution effect!
the availability of Exact
mainly affects the share of
Block (21.5pp)
Without Exact (E) With exact (+E)
Withoutcity(C)Withcity(+C)
48.8
51.2
Bene鍖t-->
Privacy -->
41.0
29.7
29.3
Bene鍖t-->
Privacy -->
40.432.6
26.9
Bene鍖t-->
Privacy -->
26.7
29.9
18.6
24.8
Bene鍖t-->
Privacy -->
Exact
Block
City
Nothing
33. INFORMATION AND COMPUTER SCIENCES
W
Without Exact (E) With exact (+E)
Withoutcity(C)Withcity(+C)
Privacy --> Privacy -->
48.8
51.2Bene鍖t-->
Privacy -->
41.0
29.7
29.3
Bene鍖t-->
Privacy -->
40.432.6
26.9
Bene鍖t-->
Privacy -->
26.7
29.9
18.6
24.8
Bene鍖t-->
Privacy -->
Results
Exact is further away
from Block
Compromise effect!
Block is only reduced by
8.3pp, as it regains some
share from Nothing
(reduced by 13.7pp)
Without Exact (E) With exact (+E)
Withoutcity(C)
48.8
51.2
Bene鍖t-->
Privacy -->
41.0
29.7
29.3
Bene鍖t-->
Privacy -->
Exact
Block
City
Nothing
34. INFORMATION AND COMPUTER SCIENCES
Two conclusions
1. With fewer options, users do not just err on the safe side
Instead, they deliberately choose the subjectively closest
remaining option
2. An extreme option does not just increase sharing among
those who already share a lot
Instead, it increases sharing across the board
35. INFORMATION AND COMPUTER SCIENCES
Applying these results
Problem: when designing the optimal set of options, users
choice depends on the available options
Problem for user tests!
Combinatorial explosion of the experimental conditions
More efficient approach:
-Ask a sample of users about the perceived Privacy and
Bene鍖t of the options
-Map them on a plane
36. INFORMATION AND COMPUTER SCIENCES
Applying these results
Bene鍖t-->
Privacy -->
6. Introduce to increase overall sharing
2. Remove one redundant option
1. Remove this dominated option
3. Introduce an option to
close this gap
4. If desired, remove the left option
to increase the right option
5. If desired, replace this option
with one that is perceptually close
37. INFORMATION AND COMPUTER SCIENCES
Take-home message
Do you want to design an optimal list of
(location-sharing) options?
Measure the subjective perceptions of
the options, and apply decision theories
to decide which are best!
Paper draft: http://bit.ly/chi2013privacy
More papers: www.usabart.nl
Follow me on Twitter: @usabart
38. INFORMATION AND COMPUTER SCIENCES
Guide for questions:
1. With fewer options, users do not just err on the safe side
Instead, they deliberately choose the subjectively closest
remaining option
2. An extreme option does not just increase sharing among
those who already share a lot
Instead, it increases sharing across the board
3. If you want to design the optimal set of options, measure
the perception of the options
And apply decision theories to argue which are best