Hostname: page-component-6766d58669-88psn Total loading time: 0 Render date: 2026-05-17T12:39:01.973Z Has data issue: false hasContentIssue false

An evolutionary approach to privacy and information-management psychology

Published online by Cambridge University Press:  07 May 2026

Sophie Elizabeth Klitgaard*
Affiliation:
Department of Anthropology, University of California, Los Angeles, CA, USA Center for Behavior, Evolution, and Culture, Department of Anthropology, University of California, Los Angeles, CA, USA
Daniel M. T. Fessler
Affiliation:
Department of Anthropology, University of California, Los Angeles, CA, USA Center for Behavior, Evolution, and Culture, Department of Anthropology, University of California, Los Angeles, CA, USA UCLA Bedari Kindness Institute, University of California, Los Angeles, CA, USA
*
Corresponding author: Sophie Elizabeth Klitgaard; Email: sklitgaard@ucla.edu

Abstract

Content of image described in text.

Current debates concerning the use of digital technology often focus on privacy, yet privacy attitudes and behaviour are remarkably under-theorized, and relatively little empirical research has investigated privacy beyond the realm of digital communications. Building on evolutionary scholarship on information exchange, we outline a theoretical model in which cultural concepts of privacy reflect the workings of evolved psychological mechanisms that aim to regulate others’ access to fitness-relevant information towards adaptive ends. Results of two initial U.S. vignette studies distributed via Prolific (n = 425, 120) support the core predictions of this model, suggesting that people may have implicit and unstated assumptions regarding how information spreads in social environments. Specifically, participants’ privacy evaluations were predicted by whether information was intentionally acquired, the extent to which information was transmitted, and an individual’s position in an information transfer event. Importantly, how information was acquired and the nature of its transmission constituted independent but interacting influences on privacy perceptions. Additionally, results suggest the location within shared social networks of the individual to whom information is transmitted is used as a proxy for the potential costs of dissemination.

Information

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BYCreative Common License - NCCreative Common License - SA
This is an Open Access article, distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike licence (http://creativecommons.org/licenses/by-nc-sa/4.0), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the same Creative Commons licence is used to distribute the re-used or adapted article and the original article is properly cited. The written permission of Cambridge University Press or the rights holder(s) must be obtained prior to any commercial use.
Copyright
© The Author(s), 2026. Published by Cambridge University Press.
Figure 0

Figure 1. Schematic representation of vignette conditions for Study 1.Figure 1 long description.

Notes: Participants were assigned one of nine base vignettes, each composed of a unique combination of the two between-subject variables, Manner of Acquisition, i.e., how Person B obtained the information that Person A possessed, and Position, i.e., whether the participant was asked to imagine themselves as Person A, Person B, or another individual not involved in the event (Person D). In addition to one of the nine possible base vignettes, each participant was shown four within-subject Information Transmission conditions.
Figure 1

Figure 2. Results of Study 1: interactions between Manner of Acquisition and Transmission across Position conditions.Figure 2 long description.

Notes: On the upper label of the X-axis, Person D/B/A represents the Position variable, indicating the point of view presented in the vignette. The lower labels on the X-axis demarcate the four within-subjects Information Transmission conditions. Manner of Acquisition is represented by line colour/type (Voluntarily Disclosed = solid blue, Overheard–No Intent = dashed red, Overheard–Intentional = dotted orange). Bars indicate 95% CI.
Figure 2

Table 1. Summary of fixed-effect tests from linear mixed-effects models for four dependent variablesTable 1 long description.

Figure 3

Table 2. Study 1 pairwise comparisons, main effect of positionTable 2 long description.

Figure 4

Table 3. Between-subjects conditions for Study 2Table 3 long description.

Figure 5

Table 4. Study 2 results of Tukey HSD post hoc tests, mean differences, and significance levelsTable 4 long description.

Figure 6

Figure 3. Results of Study 2: evaluative judgements of discomfort, wrongness, harmfulness, and violation of privacy across information transmission conditions.Figure 3 long description.

Supplementary material: File

Klitgaard and Fessler supplementary material 1

Klitgaard and Fessler supplementary material
Download Klitgaard and Fessler supplementary material 1(File)
File 39.2 KB
Supplementary material: File

Klitgaard and Fessler supplementary material 2

Klitgaard and Fessler supplementary material
Download Klitgaard and Fessler supplementary material 2(File)
File 14 KB
Supplementary material: File

Klitgaard and Fessler supplementary material 3

Klitgaard and Fessler supplementary material
Download Klitgaard and Fessler supplementary material 3(File)
File 2.8 MB