skip to main content
10.1145/2818048.2819941acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article
Public Access

Examining American and Chinese Internet Users' Contextual Privacy Preferences of Behavioral Advertising

Published:27 February 2016Publication History

ABSTRACT

Online Behavioral Advertising (OBA), which involves tracking people's online behaviors, raises serious privacy concerns. We present results from a scenario-based online survey study on American and Chinese Internet users' privacy preferences of OBA. Since privacy is context-dependent, we investigated the effects of country (US vs. China), activity (e.g., online shopping vs. online banking), and platform (desktop/laptop vs. mobile app) on people's willingness to share their information for OBA. We found that American respondents were significantly less willing to share their data and had more specific concerns than their Chinese counterparts. We situate these differences in the broader historical, legal, and social scenes of these countries. We also found that respondents' OBA preferences varied significantly across different online activities, suggesting the potential of context-aware privacy tools for OBA. However, we did not find a significant effect of platform on people's OBA preferences. Lastly, we discuss design implications for privacy tools.

References

  1. Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, and Claudia Diaz. 2014. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). ACM, New York, NY, USA, 674–689. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Lalit Agarwal, Nisheeth Shrivastava, Sharad Jaiswal, and Saurabh Panjwani. 2013. Do not embarrass: re-examining user concerns for online tracking and advertising. In Proceedings of the Ninth Symposium on Usable Privacy and Security. ACM, 8–24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. 2012. Obliviad: Provably secure and practical online behavioral advertising. In 2012 IEEE Symposium on Security and Privacy (SP). IEEE, 257–271. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Louise Barkhuus. 2012. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 367–376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Howard Beales. 2010. The value of behavioral targeting. Network Advertising Initiative (2010).Google ScholarGoogle Scholar
  6. Steven Bellman, Eric J Johnson, Stephen J Kobrin, and Gerald L Lohse. 2004. International differences in information privacy concerns: A global survey of consumers. The Information Society 20, 5 (2004), 313–324.Google ScholarGoogle ScholarCross RefCross Ref
  7. Reinhardt A Botha, Steven M Furnell, and Nathan L Clarke. 2009. From desktop to mobile: Examining the security experience. Computers & Security 28, 3 (2009), 130–137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. California Legislature. 2013. AB-370 Consumers: internet privacy. (2013). https://leginfo.legislature.ca.gov/faces/ billNavClient.xhtml?bill_id=201320140AB370Google ScholarGoogle Scholar
  9. China Internet Network Information Center (CNNIC). 2014a. China Internet Development Report. (2014). http://www.cnnic.cn/hlwfzyj/hlwxzbg/hlwtjbg/ 201407/P020140721507223212132.pdfGoogle ScholarGoogle Scholar
  10. China Internet Network Information Center (CNNIC). 2014b. China Mobile Internet Survey Research Report. (2014). http://www.cnnic.cn/hlwfzyj/hlwxzbg/ ydhlwbg/201408/P020140826360212699278.pdfGoogle ScholarGoogle Scholar
  11. Jacob Cohen. 1960. A Coefficient of Agreement for Nominal Scales. Educational and Psychological Measurement 20, 1 (April 1960), 37–46.Google ScholarGoogle ScholarCross RefCross Ref
  12. Federal Trade Commission and others. 2009. FTC staff report: Self-regulatory principles for online behavioral advertising, 2009. Federal Trade Commission, Washington, DC (2009).Google ScholarGoogle Scholar
  13. Federal Trade Commission and others. 2012. Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers. (2012). https://www.ftc.gov/sites/default/files/ documents/reports/Google ScholarGoogle Scholar
  14. Paul Dourish. 2004. What We Talk About when We Talk About Context. Personal Ubiquitous Comput. 8, 1 (Feb. 2004), 19–30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Xianyi Gao, Yulong Yang, Huiqing Fu, Janne Lindqvist, and Yang Wang. 2014. Private Browsing: An Inquiry on Usability and Privacy Protection. In Proceedings of the 13th Workshop on Privacy in the Electronic Society (WPES '14). ACM, New York, NY, USA, 97–106. DOI:http://dx.doi.org/10.1145/2665943.2665953 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Geert H. Hofstede. 1984. Culture's consequences: international differences in work-related values. Sage Publications.Google ScholarGoogle Scholar
  17. Michael C. Grace, Wu Zhou, Xuxian Jiang, and Ahmad-Reza Sadeghi. 2012. Unsafe Exposure Analysis of Mobile In-app Advertisements. In Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC '12). ACM, New York, NY, USA, 101–112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Saikat Guha, Bin Cheng, and Paul Francis. 2010. Challenges in measuring online advertising systems. In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement. ACM, 81–87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Dehua He and Yaobin Lu. 2007. Consumers perceptions and acceptances towards mobile advertising: An empirical study in China. In International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 3775–3778.Google ScholarGoogle ScholarCross RefCross Ref
  20. Hsiu-Fang Hsieh and Sarah E. Shannon. 2005. Three Approaches to Qualitative Content Analysis. Qualitative Health Research 15, 9 (Nov. 2005), 1277–1288.Google ScholarGoogle ScholarCross RefCross Ref
  21. Jian Hu, Hua-Jun Zeng, Hua Li, Cheng Niu, and Zheng Chen. 2007. Demographic prediction based on user's browsing behavior. In Proceedings of the 16th international conference on World Wide Web. ACM, 151–160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Hu. 2000. Individual Privacy in Modernizing China. Ph.D. Dissertation. University of Colorado, Boulder.Google ScholarGoogle Scholar
  23. Naz Kaya and Margaret J Weber. 2003. Cross-cultural differences in the perception of crowding and privacy regulation: American and Turkish students. Journal of environmental psychology 23, 3 (2003), 301–309.Google ScholarGoogle ScholarCross RefCross Ref
  24. Patrick Gage Kelley, Michael Benisch, Lorrie Faith Cranor, and Norman Sadeh. 2011. When are users comfortable sharing locations with advertisers?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2449–2452. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Klaus Krippendorff. 2004. Reliability in Content Analysis: Some Common Misconceptions and Recommendations. Human Communication Research (July 2004), 411–433.Google ScholarGoogle ScholarCross RefCross Ref
  26. Rubén Daniel Ledesma and Pedro Valero-Mora. 2007. Determining the number of factors to retain in EFA: an easy to use computer program for carrying out parallel analysis. Practical Assessment, Research & Evaluation 12, 2 (2007), 1–11.Google ScholarGoogle Scholar
  27. Pedro Leon, Blase Ur, Richard Shay, Yang Wang, Rebecca Balebako, and Lorrie Cranor. 2012. Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 589–598. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, and Lorrie Faith Cranor. 2013. What matters to users?: factors that affect users' willingness to share information with online advertisers. In Proceedings of the Symposium on Usable Privacy and Security. ACM, 7–26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Jialiu Lin, Michael Benisch, Norman Sadeh, Jianwei Niu, Jason Hong, Banghui Lu, and Shaohui Guo. 2013. A Comparative Study of Location-sharing Privacy Preferences in the United States and China. Personal Ubiquitous Comput. 17, 4 (April 2013), 697–711. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I. Hong. 2014. Modeling Users Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. In Proceedings of Symposium On Usable Privacy and Security (SOUPS'14). 199–212. https://www.usenix.org/conference/soups2014/ proceedings/presentation/linGoogle ScholarGoogle Scholar
  31. Chia-Ling Eunice Liu, Rudolf R Sinkovics, Noemi Pezderka, and Parissa Haghirian. 2012. Determinants of consumer perceptions toward mobile advertising-a comparison between Japan and Austria. Journal of Interactive Marketing 26, 1 (2012), 21–32.Google ScholarGoogle ScholarCross RefCross Ref
  32. Kirsten E. Martin. 2012. Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract. Journal of Business Ethics 111, 4 (March 2012), 519–539.Google ScholarGoogle ScholarCross RefCross Ref
  33. J.R. Mayer and J.C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. In 2012 IEEE Symposium on Security and Privacy (SP). 413–427. DOI:http://dx.doi.org/10.1109/SP.2012.47 Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Aleecia McDonald and Lorrie Faith Cranor. 2010. Beliefs and behaviors: Internet users' understanding of behavioral advertising. Telecommunications Policy Research Conference (TPRC).Google ScholarGoogle Scholar
  35. Bonnie S. McDougall and Anders Hansson (Eds.). 2002. Chinese Concepts of Privacy. Vol. 55. Brill Academic Pub, Leiden Netherlands ; Boston.Google ScholarGoogle Scholar
  36. Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington law review 79, 1 (2004), 119–158.Google ScholarGoogle Scholar
  37. Helen Nissenbaum. 2011. A contextual approach to privacy online. Daedalus 140, 4 (2011), 32–48.Google ScholarGoogle ScholarCross RefCross Ref
  38. Eyal Peer, Gabriele Paolacci, Jesse Chandler, and Pam Mueller. 2012. Screening participants from previous studies on Amazon Mechanical Turk and Qualtrics. (2012). experimentalturk.files.wordpress.com/2012/02/ screening-amt-workers-on-qualtrics-5-2.pdfGoogle ScholarGoogle Scholar
  39. Dan Pelleg, Denis Savenkov, and Eugene Agichtein. 2013. Touch Screens for Touchy Issues: Analysis of Accessing Sensitive Information from Mobile Devices. In Proceedings of the Seventh International AAAI Conference on Weblogs and Social Media (ICWSM). 496–505.Google ScholarGoogle Scholar
  40. Sren Preibusch. 2015. Privacy behaviors after Snowden. Commun. ACM 58, 5 (April 2015), 48–55. DOI: http://dx.doi.org/10.1145/2663341 Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Emilee Rader. 2014. Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google. In Symposium on Usable Privacy and Security (SOUPS). 51–67.Google ScholarGoogle Scholar
  42. Florian Schaub, Bastian Konings, and Michael Weber. 2015. Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making. Pervasive Computing, IEEE 14, 1 (2015), 34–43.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Somini Sengupta. 2013. Protecting Your Privacy on the New Facebook. The New York Times (Feb. 2013). http://www.nytimes.com/2013/02/07/technology/ personaltech/ protecting-your-privacy-on-the-new-facebook. htmlGoogle ScholarGoogle Scholar
  44. Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge. 2007. Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS '07). ACM, 88–99. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Edith G Smit, Guda Van Noort, and Hilde AM Voorveld. 2014. Understanding online behavioural advertising: User knowledge, privacy concerns and online coping behaviour in europe. Computers in Human Behavior 32 (2014), 15–22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. H Jeff Smith, Tamara Dinev, and Heng Xu. 2011. Information privacy research: an interdisciplinary review. MIS quarterly 35, 4 (2011), 989–1016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. H Jeff Smith, Sandra J Milberg, and Sandra J Burke. 1996. Information privacy: measuring individuals' concerns about organizational practices. MIS quarterly (1996), 167–196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Daniel J Solove. 2006. A taxonomy of privacy. University of Pennsylvania law review (2006), 477–564.Google ScholarGoogle Scholar
  49. Zixue Tai. 2010. Casting the Ubiquitous Net of Information Control: Internet Surveillance in China from Golden Shield to Green Dam. International Journal of Advanced Pervasive and Ubiquitous Computing 2, 1 (2010), 53–70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Mohsen Tavakol and Reg Dennick. 2011. Making sense of Cronbach's alpha. International Journal of Medical Education 2 (June 2011), 53–55. DOI: http://dx.doi.org/10.5116/ijme.4dfb.8dfdGoogle ScholarGoogle ScholarCross RefCross Ref
  51. Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, and Solon Barocas. 2010. Adnostic: Privacy Preserving Targeted Advertising. In Network and Distributed System Security Symposium (NDSS'10).Google ScholarGoogle Scholar
  52. TRUSTe. 2011. Privay and online behavioral advertising. (2011). http://www.truste.com/adprivacy/Google ScholarGoogle Scholar
  53. Joseph Turow, Jennifer King, Chris Jay Hoofnagle, Amy Bleakley, and Michael Hennessy. 2009. Americans reject tailored advertising and three activities that enable it. Technical report, Annenberg School for Communications, University of Pennsylvania (2009). http://repository.upenn.edu/asc_papers/137/Google ScholarGoogle Scholar
  54. Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS'12). ACM, 4–19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Yang Wang, Gregory Norcie, and Lorrie Faith Cranor. 2011. Who is concerned about what? A study of American, Chinese and Indian users' privacy concerns on social network sites. In Trust and trustworthy computing. Springer, 146–153. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Ying Wang and Shaojing Sun. 2010. Examining the role of beliefs and attitudes in online advertising: A comparison between the USA and Romania. International Marketing Review 27, 1 (2010), 87–107.Google ScholarGoogle ScholarCross RefCross Ref
  57. Samuel D. Warren and Louis D. Brandeis. 1890. The Right to Privacy. Harvard Law Review 4, 5 (1890), 193–220.Google ScholarGoogle ScholarCross RefCross Ref
  58. Yue Jeff Zhang, Jim Q. Chen, and Kuang-Wei Wen. 2002. Characteristics of Internet Users and Their Privacy Concerns. Journal of Internet Commerce 1, 2 (March 2002), 1–16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Examining American and Chinese Internet Users' Contextual Privacy Preferences of Behavioral Advertising

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CSCW '16: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing
        February 2016
        1866 pages
        ISBN:9781450335928
        DOI:10.1145/2818048

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 February 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CSCW '16 Paper Acceptance Rate142of571submissions,25%Overall Acceptance Rate2,235of8,521submissions,26%

        Upcoming Conference

        CSCW '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader