Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-m9kch Total loading time: 0 Render date: 2024-05-18T15:52:09.306Z Has data issue: false hasContentIssue false

10 - Privacy and Human Behavior in the Information Age*

from Part III - Ethical and Legal Reservations about Tracking Technologies

Published online by Cambridge University Press:  18 April 2018

Evan Selinger
Affiliation:
Rochester Institute of Technology, New York
Jules Polonetsky
Affiliation:
Future of Privacy Forum
Omer Tene
Affiliation:
International Association of Privacy Professionals
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Mayer-Schönberger, V., Delete: The Virtue of Forgetting in the Digital Age (Princeton Univ. Press, Princeton, 2011).CrossRefGoogle Scholar
Sweeney, L., Int. J. Uncert. Fuzziness Knowl. Based Syst. 10, 557570 (2002).CrossRefGoogle Scholar
McAfee, A., Brynjolfsson, E., Harv. Bus. Rev. 90, 6066, 68, 128 (2012).Google Scholar
Tatonetti, N. P., Ye, P. P., Daneshjou, R., Altman, R. B., Sci. Transl. Med. 4, 125ra31 (2012).CrossRefGoogle Scholar
Cohen, J. E., Stanford Law Rev. 52, 13731438 (2000).CrossRefGoogle Scholar
Crawford, K., Miltner, K., Gray, M. L., Int. J. Commun. 8, 16631672 (2014).Google Scholar
Posner, R. A., Am. Econ. Rev. 71, 405409 (1981).Google Scholar
Solove, D. J., Harv. Law Rev. 126, 18801903 (2013).Google Scholar
Solove, D. J., Univ. Penn. L. Rev. 154, 477564 (2006).CrossRefGoogle Scholar
Schoeman, F., Ed., Philosophical Dimensions of Privacy: An Anthology (Cambridge Univ. Press, New York, 1984).CrossRefGoogle Scholar
DePaulo, B. M., Wetzel, C., Weylin Sternglanz, R., Wilson, M. J. W., J. Soc. Issues 59, 391410 (2003).CrossRefGoogle Scholar
Margulis, S. T., J. Soc. Issues 59, 243261 (2003).Google Scholar
Goffman, E., Relations in Public: Microstudies of the Public Order (Harper & Row, New York, 1971).Google Scholar
Sundstrom, E., Altman, I., Hum. Ecol. 4, 4767 (1976).Google Scholar
Schwartz, B., Am. J. Sociol. 73, 741752 (1968).CrossRefGoogle Scholar
Laufer, R. S., Wolfe, M., J. Soc. Issues 33, 2242 (1977).CrossRefGoogle Scholar
Tsai, J. Y., Egelman, S., Cranor, L., Acquisti, A., Inf. Syst. Res. 22, 254268 (2011).CrossRefGoogle Scholar
Slovic, P., Am. Psychol. 50, 364371 (1995).CrossRefGoogle Scholar
Singer, E., Hippler, H., Schwarz, N., Int. J. Public Opin. Res. 4, 256268 (1992).CrossRefGoogle Scholar
Skotko, V. P., Langmeyer, D., Sociometry 40, 178182 (1977).CrossRefGoogle Scholar
A. Westin, Harris Louis & Associates, Harris-Equifax Consumer Privacy Survey (Tech. rep. 1991).Google Scholar
Culnan, M. J., Armstrong, P. K., Organ. Sci. 10, 104115 (1999).CrossRefGoogle Scholar
Smith, H. J., Milberg, S. J., Burke, S. J., Manage. Inf. Syst. Q. 20, 167196 (1996).CrossRefGoogle Scholar
Lubin, B., Harrison, R. L., Psychol. Rep. 15, 7778 (1964).CrossRefGoogle Scholar
Spiekermann, S., Grossklags, J., Berendt, B., E-Privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior (Third ACM Conference on Electronic Commerce, Tampa, 2001), pp. 3847.Google Scholar
Norberg, P. A., Horne, D. R., Horne, D. A., J. Consum. Aff. 41, 100126 (2007).CrossRefGoogle Scholar
Ajzen, I., Fishbein, M., Psychol. Bull. 84, 888918 (1977).CrossRefGoogle Scholar
Klopfer, P. H., Rubenstein, D. I., J. Soc. Issues 33, 5265 (1977).CrossRefGoogle Scholar
Acquisti, A., Gross, R., in Privacy Enhancing Technologies, Danezis, G., Golle, P. Eds. (Springer, New York, 2006), pp. 3658.CrossRefGoogle Scholar
Acquisti, A., Privacy in Electronic Commerce and the Economics of Immediate Gratification (Fifth ACM Conference on Electronic Commerce, New York, 2004), pp. 2129.Google Scholar
Hann, I., Hui, K., Lee, S. T., Png, I. P. L., J. Manage. Inf. Syst. 24, 1342 (2007).CrossRefGoogle Scholar
Acquisti, A., John, L. K., Loewenstein, G., J. Legal Stud. 42, 249274 (2013).CrossRefGoogle Scholar
Altman, I., Taylor, D., Social Penetration: The Development of Interpersonal Relationships (Holt, Rinehart & Winston, New York, 1973).Google Scholar
Frattaroli, J., Psychol. Bull. 132, 823865 (2006).Google Scholar
Pennebaker, J. W., Behav. Res. Ther. 31, 539548 (1993).CrossRefGoogle Scholar
Steinfield, C., Ellison, N. B., Lampe, C., J. Appl. Dev. Psychol. 29, 434445 (2008).CrossRefGoogle Scholar
Toma, C. L., Hancock, J. T., Pers. Soc. Psychol. Bull. 39, 321331 (2013).CrossRefGoogle Scholar
Tamir, D. I., Mitchell, J. P., Proc. Natl. Acad. Sci. U.S.A. 109, 80388043 (2012).CrossRefGoogle Scholar
Westin, A., Privacy and Freedom (Athenäum, New York, 1967).Google Scholar
Hoofnagle, C. J., Urban, J. M., Wake Forest Law Rev. 49, 261321 (2014).Google Scholar
Marx, G., Ethics Inf. Technol. 3, 157169 (2001).CrossRefGoogle Scholar
Thibaut, J. W., Kelley, H. H., The Social Psychology of Groups (Wiley, Oxford, 1959).Google Scholar
Nissenbaum, H., Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford Univ. Press, Redwood City, 2009).CrossRefGoogle Scholar
Boyd, d., It’s Complicated: The Social Lives of Networked Teens (Yale Univ. Press, New Haven, 2014).Google Scholar
Stutzman, F., Gross, R., Acquisti, A., J. Priv. Confidential. 4, 741 (2013).Google Scholar
Xu, H., Teo, H. H., Tan, B. C., Agarwal, R., J. Manage. Inf. Syst. 26, 135174 (2009).Google Scholar
John, L. K., Acquisti, A., Loewenstein, G., J. Consum. Res. 37, 858873 (2011).CrossRefGoogle Scholar
Altman, I., The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding (Cole, Monterey, 1975).Google Scholar
Chaikin, A. L., Derlega, V. J., Miller, S. J., J. Couns. Psychol. 23, 479481 (1976).CrossRefGoogle Scholar
Derlega, V. J., Chaikin, A. L., J. Soc. Issues 33, 102115 (1977).CrossRefGoogle Scholar
Acquisti, A., John, L. K., Loewenstein, G., J. Mark. Res. 49, 160174 (2012).CrossRefGoogle Scholar
Moon, Y., J. Consum. Res. 26, 323339 (2000).Google Scholar
Petronio, S., Boundaries of Privacy: Dialectics of Disclosure (SUNY Press, Albany, 2002).Google Scholar
Stutzman, F., Kramer-Duffield, J., Friends Only: Examining a Privacy-Enhancing Behavior in Facebook (SIGCHI Conference on Human Factors in Computing Systems, ACM, Atlanta, 2010), pp. 15531562.Google Scholar
Honess, T., Charman, E., Closed Circuit Television in Public Places: Its Acceptability and Perceived Effectiveness (Police Research Group, London, 1992).Google Scholar
Gagné, M., Deci, E. L., J. Organ. Behav. 26, 331362 (2005).CrossRefGoogle Scholar
Oulasvirta, A. et al., Long-Term Effects of Ubiquitous Surveillance in the Home (ACM Conference on Ubiquitous Computing, Pittsburgh, 2012), pp. 4150.Google Scholar
Palen, L., Dourish, P., Unpacking “Privacy” For a Networked World (SIGCHI Conference on Human Factors in Computing Systems, ACM, Fort Lauderdale, 2003), pp. 129136.Google Scholar
Tufekci, Z., Bull. Sci. Technol. Soc. 28, 2036 (2008).CrossRefGoogle Scholar
Bargh, J. A., McKenna, K. Y. A., Fitzsimons, G. M., J. Soc. Issues 58, 3348 (2002).CrossRefGoogle Scholar
Calo, R., Geo. Wash. L. Rev. 82, 9951304 (2014).Google Scholar
Johnson, E. J., Goldstein, D., Science 302, 13381339 (2003).CrossRefGoogle Scholar
McKenzie, C. R., Liersch, M. J., Finkelstein, S. R., Psychol. Sci. 17, 414420 (2006).Google Scholar
Gross, R., Acquisti, A., Information Revelation and Privacy in Online Social Networks (ACM Workshop–Privacy in the Electronic Society, New York, 2005), pp. 7180.Google Scholar
Johnson, E. J., Bellman, S., Lohse, G. L., Mark. Lett. 13, 515 (2002).CrossRefGoogle Scholar
Hartzog, W., Am. Univ. L. Rev. 60, 16351671 (2010).Google Scholar
Conti, G., Sobiesk, E., Malicious Interface Design: Exploiting the User (19th International Conference on World Wide Web, ACM, Raleigh, 2010), pp. 271280.Google Scholar
Goldfarb, A., Tucker, C., Mark. Sci. 30, 389404 (2011).CrossRefGoogle Scholar
White, T. B., Zahay, D. L., Thorbjørnsen, H., Shavitt, S., Mark. Lett. 19, 3950 (2008).Google Scholar
Smith, H. J., Dinev, T., Xu, H., Manage. Inf. Syst. Q. 35, 9891016 (2011).CrossRefGoogle Scholar
Brandimarte, L., Acquisti, A., Loewenstein, G., Soc. Psychol. Personal. Sci. 4, 340347 (2013).CrossRefGoogle Scholar
Jensen, C., Potts, C., Jensen, C., Int. J. Hum. Comput. Stud. 63, 203227 (2005).CrossRefGoogle Scholar
Jensen, C., Potts, C., Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices (SIGCHI Conference on Human factors in computing systems, ACM, Vienna, 2004), pp. 471478.Google Scholar
McDonald, A. M., Cranor, L. F., I/S: J. L. Policy Inf. Society. 4, 540565 (2008).Google Scholar
Wedekind, C., Milinski, M., Science 288, 850852 (2000).CrossRefGoogle Scholar
Rigdon, M., Ishii, K., Watabe, M., Kitayama, S., J. Econ. Psychol. 30, 358367 (2009).CrossRefGoogle Scholar
Kiesler, S., Siegel, J., McGuire, T. W., Am. Psychol. 39, 11231134 (1984).Google Scholar
Joinson, A. N., Eur. J. Soc. Psychol. 31, 177192 (2001).Google Scholar
Weisband, S., Kiesler, S., Self-Disclosure on Computer Forms: Meta-Analysis and Implications (SIGCHI Conference Conference on Human Factors in Computing Systems, ACM, Vancouver, 1996), pp. 310.Google Scholar
Tourangeau, R., Yan, T., Psychol. Bull. 133, 859883 (2007).Google Scholar
Postmes, T., Spears, R., Psychol. Bull. 123, 238259 (1998).CrossRefGoogle Scholar
Zhong, C. B., Bohns, V. K., Gino, F., Psychol. Sci. 21, 311314 (2010).CrossRefGoogle Scholar
Suler, J., Cyberpsychol. Behav. 7, 321326 (2004).Google Scholar
Shariff, A. F., Norenzayan, A., Psychol. Sci. 18, 803809 (2007).Google Scholar
Moore, B., Privacy: Studies in Social and Cultural History (Armonk, New York, 1984).Google Scholar
Records, Computers and the Rights of Citizens (Secretary’s Advisory Committee, US Dept. of Health, Education and Welfare, Washington, DC, 1973).Google Scholar
Hargittai, E., in Social Stratification, Grusky, D. Ed. (Westview, Boulder, 2008), pp. 936113.Google Scholar
Ariès, P., Duby, G. (Eds.), A History of Private Life: From Pagan Rome to Byzantium (Harvard Univ. Press, Cambridge, 1992).Google Scholar
Murphy, R. F., Am. Anthropol. 66, 12571274 (1964).Google Scholar
Westin, A., in Philosophical Dimensions of Privacy: An Anthology, Schoeman, F.D. Ed. (Cambridge Univ. Press, Cambridge, 1984), pp. 5674.Google Scholar
Altman, I., J. Soc. Issues 33, 6684 (1977).CrossRefGoogle Scholar
Hayat, M. A., Inf. Comm. Tech. L. 16, 137148 (2007).Google Scholar
Enkin, A., “Privacy,” www.torahmusings.com/2012/07/privacy (2014).Google Scholar
Rykwert, J., Soc. Res. (New York) 68, 2940 (2001).Google Scholar
Whitman, C. B., in Individualism and Holism: Studies in Confucian and Taoist Values, Munro, D. J., Ed. (Center for Chinese Studies, Univ. Michigan, Ann Arbor, 1985), pp. 85100.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×