Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-9pm4c Total loading time: 0 Render date: 2024-04-29T18:33:35.925Z Has data issue: false hasContentIssue false

23 - The Consumer Psychology of Online Privacy

Insights and Opportunities from Behavioral Decision Theory

from Part III - Societal Structures

Published online by Cambridge University Press:  05 October 2015

Michael I. Norton
Affiliation:
Harvard Business School, Harvard University
Derek D. Rucker
Affiliation:
Kellogg School of Management, Northwestern University
Cait Lamberton
Affiliation:
Katz Graduate School of Business, University of Pittsburgh
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. Paper presented at the Proceedings of the ACM Conference on Electronic Commerce (EC’04).Google Scholar
Acquisti, Adjerid, & Brandimarte, L. (2013). Gone in 60 seconds: The limits of privacy, transparency, and control. IEEE, 13, 7274.Google Scholar
Acquisti, A., & Gross, R. (2009). Predicting social security numbers from public data. Proceedings of the National Academy of Sciences, 106(27), 1097510980.CrossRefGoogle ScholarPubMed
Acquisti, A., John, L. K., & Loewenstein, G. (2012). The impact of relative standards on the propensity to disclose. Journal of Marketing Research, April, 160–174.Google Scholar
Acquisti, A., John, L. K., & Loewenstein, G. (2013). What is privacy worth? Journal of Legal Studies, 42(2), 249274.Google Scholar
Acquisti, A., & Varian, H. (2002). Conditioning prices on purchase history. Marketing Science, 24(3), 367381.Google Scholar
Adjerid, I., Acquisti, A., Brandimarte, L., & Loewenstein, G. (2013). Sleights of Privacy: Framing, disclosures, and the limits of transparency. In Proceedings of the Ninth Symposium on Usable Privacy and Security, 9. New York: Association for Computing Machinery.Google Scholar
Alter, A. L., & Oppenheimer, D. M. (2009). Suppressing secrecy through metacognitive ease: Cognitive fluency encourages self-disclosure. Psychological Science, 20(11), 14141420.Google Scholar
Altman, I. (1975). The Environment and Social Behavior. Monterey, CA: Brooks/Cole.Google Scholar
Angwin, J. (2014). Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance. New York: Henry Holt, Times Books.Google Scholar
Ariely, D., Loewenstein, G., & Prelec, D. (2003). Coherent arbitrariness: Stable demand curves without stable preferences. Quarterly Journal of Economics, 118, 73106.Google Scholar
Armor, D. A., & Taylor, C. R. (2002). When predictions fail: The dilemma of unrealistic optimism. In Gilovich, T., Griffin, D., & Kahneman, D. (eds.), Heuristics and Biases: The Psychology of Intuitive Judgment. Cambridge: Cambridge University Press.Google Scholar
Asch, S. E. (1956). Studies of independence and conformity: A minority of one against a unanimous majority. Psychological Monographs, 70(9), 118.CrossRefGoogle Scholar
Asch, S. E. (1959). A perspective on social psychology. In Koch, S. (ed.), Psychology: A Study of Science (vol. 3, pp. 363383). New York: McGraw-Hill.Google Scholar
Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 1828.Google Scholar
Bankston, K. (2009). Facebook’s new privacy changes: The good, the bad, and the ugly. Retrieved from www.eff.org/deeplinks/2009/12/Facebooks-new-privacy-changes-good-bad-and-ugly.Google Scholar
BBCNews (2004). Passwords revealed by sweet deal. Retrieved from http://news.bbc.co.uk/2/hi/technology/3639679.stm.Google Scholar
BBCNews (2009). Facebook faces criticism on privacy change. Retrieved from http://news.bbc.co.uk/2/hi/technology/8405334.stm.Google Scholar
Berscheid, E. (1977). Privacy: A hidden variable in experimental social psychology. Journal of Social Issues, 33(3), 85101.CrossRefGoogle Scholar
Bicchieri, C. (2006). The Grammar of Society: The Nature and Dynamics of Social Norms. Cambridge: Cambridge University Press.Google Scholar
Brandimarte, L., Acquisti, A., & Gino, F. (n.d.). Baring out with iron hands: Can disclosing make us harsher? Working Paper.Google Scholar
Brandimarte, L., Acquisti, A., & Loewenstein, G. (2012). Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science (August), 340–347.Google Scholar
Brandimarte, L., Vosgerau, J., & Acquisti, A. (n.d.). Neither forgiven nor forgotten – moral acts depreciate over time, immoral acts do not. Working Paper.Google Scholar
Brickman, P., Coates, D., & Janoff-Bulman, R. (1978). Lottery winners and accident victims: Is happiness relative? Journal of Personality and Social Psychology, 36(8), 917927.Google Scholar
Brunk, B. D. (2002). Understanding the privacy space. First Monday, 7.Google Scholar
Calo, R. (2010). People can be so fake: A new dimension to privacy and technology scholarship. Penn State Law Review, 114(3), 809855.Google Scholar
Chellappa, R., & Sin, R. (2002). Personalization versus Privacy: New Exchange Relationships on the Web. Los Angeles: Marshall School of Business, University of Southern California.Google Scholar
Cialdini, R. B., Vincent, J. E., Lewis, S. K., Catalan, J., Wheeler, D., & Darby, B. L. (1975). Reciprocal concessions procedure for inducing compliance: The door-in the face technique. Journal of Personality and Social Psychology, 31, 206215.Google Scholar
Clark, A. S. (2006). Employers look at Facebook, too: Companies turn to online profiles to see what applicants are really like. Retrieved from www.cbsnews.com/stories/2006/06/20/eveningnews/main1734920.shtml.Google Scholar
Collins, N. L., & Miller, L. C. (1994). Self-disclosure and liking: A meta-analytic review. Psychological Bulletin, 116(3), 457475.Google Scholar
ConsumersUnion.org. (2008). Americans extremely concerned about Internet privacy. Retrieved from www.consumersunion.org/pub/core_telecom_and_utilities/006189.html.Google Scholar
Conway, L. (2008). Virgin Atlantic sacks 13 staff for calling its flyers “chavs.” The Independent, November 1. Retrieved from www.independent.co.uk/news/uk/home-news/virgin-atlantic-sacks-13-staff-for-calling-its-flyers-chavs-982192.html.Google Scholar
Cooper, H. (2010). Administration to seek balance in airport screening. Retrieved from www.nytimes.com/2010/11/23/us/23tsa.html.Google Scholar
Cozby, P. C. (1972). Self-disclosure, reciprocity, and liking. Sociometry, 35(1), 151160.Google Scholar
Cranor, L. (2002). Web Privacy with P3P. Sebastopol, CA: O’Reilly & Associates.Google Scholar
Cryder, C. E., Loewenstein, G., & Scheines, R. The donor is in the details. Organizational Behavior and Human Decision Processes, 120(1), 1523.Google Scholar
Culnan, M. J., Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104115.CrossRefGoogle Scholar
DellaVigna, S., & Malmendier, U. (2006). Paying not to go to the gym. American Economic Review, 96(3), 694719.Google Scholar
Denham, E. (2009). Report of Findings into the Complaint Filed by the Canadian Internet Policy and Public Interest Clinic (CIPPIC) against Facebook Inc. under the Personal Information Protection and Electronic Documents Act. Ottawa: Privacy Commissioner of Canada.Google Scholar
Devenow, A., & Welch, I. (1996). Rational herding in financial economics. European Economic Review, 40, 603615.Google Scholar
Duhigg, C. (2012). How companies learn your secrets. New York Times Magazine, February 16. Retrieved from www.nytimes.com/2012/02/19/magazine/shopping-habits.html.Google Scholar
Duval, S., & Wicklund, R. A. (1972). A Theory of Objective Self-Awareness. New York: Academic Press.Google Scholar
Epley, N., & Dunning, D. (2000). Feeling “holier than thou”: Are self-serving assessments produced by errors in self- or social prediction? Journal of Personality and Social Psychology, 79(6), 861875.Google Scholar
Evangelista, B. (2010). Canada’s privacy commissioner launches new Facebook probe. sfgate. Retrieved from www.sfgate.com/cgi-bin/blogs/techchron/detail?entry_id=56175.Google Scholar
Federal Trade Commission (2000). Privacy Online: Fair Information Practices in the Electronic Marketplace. Washington, DC: Federal Trade Commission.Google Scholar
Federal Trade Commission (2006). The Identity Theft Report. Washington, DC: Federal Trade Commission.Google Scholar
Federal Trade Commission (2012). Protecting Consumer Privacy in an Era of Rapid Change. Retrieved from ftc.gov/os/2012/03/120326privacy report.pdf.Google Scholar
Fehr, E., & Gaechter, S. (2002). Altruistic punishment in humans. Nature, 415, 137140.Google Scholar
Fischhoff, B. (1982). Debiasing. In Kahneman, D., Slovic, P. & Tversky, A. (eds.), Judgment under Uncertainty: Heuristics and Biases (pp. 422444). Cambridge: Cambridge University Press.Google Scholar
Fox, C. R., & Tversky, A. (1995). Ambiguity aversion and comparative ignorance. Quarterly Journal of Economics, 110(3), 585603.Google Scholar
Frederick, S., & Loewenstein, G. (1999). Hedonic adaptation. In Kahneman, D. & Diener, E. (eds.), Well-being: The Foundations of Hedonic Psychology (pp. 302329). New York: Russell Sage Foundation.Google Scholar
Frederick, S., O’Donoghue, T., & Loewenstein, G. (2002). Time discounting and time preference: A critical review. Journal of Economic Literature, 40(2), 351.Google Scholar
Freedman, Jonathan L., & Fraser, Scott C. (1966). Compliance without pressure: The foot-in the door technique. Journal of Personality and Social Psychology, 4(2), 195202.CrossRefGoogle ScholarPubMed
Frey, J. H. (1986). An experiment with a confidentiality reminder in a telephone survey. Public Opinion Quarterly, 50, 267269.CrossRefGoogle Scholar
Gilbert, F. (2008). Beacons, bugs, and pixel tags: Do you comply with the FTC behavioral marketing principles and foreign law requirements? Journal of Internet Law, 11(11), 310.Google Scholar
Goldfarb, A., & Tucker, C. (2011a). Shifts in privacy concerns. Available at SSRN: http://ssrn.com/abstract=1976321 or http://dx.doi.org/10.2139/ssrn.1976321.Google Scholar
Goldfarb, A., & Tucker, C. (2011b). Privacy regulation and online advertising. Management Science, 57(1), 5771.Google Scholar
Goldfarb, A., & Tucker, C. (2011c). Online display advertising: Targeting and obtrusiveness. Marketing Science, 30, 389404.Google Scholar
Grasz, J. (2009). 45% employers use Facebook-Twitter to screen job candidates. Oregon Business Report (August). Retrieved from http://oregonbusinessreport.com/2009/08/45-employers-use-Facebook-twitter-to-screen-job-candidates/.Google Scholar
Grice, Paul (1975). Logic and conversation. In Cole, P. & Morgan, J. (eds.), Syntax and Semantics (vol. 3: Speech Acts, pp. 41–58). New York: Academic Press.Google Scholar
Grimmelmann, J. (2009). Saving Facebook. Iowa Law Review, 94, 11371206.Google Scholar
Hann, I.-H., Hui, K.-L., Lee, T. S., & Png, I. P. L. (2002a). The value of online privacy: Evidence from the USA and Singapore. Paper presented at the Twenty-Third International Conference on Information Systems, Barcelona.Google Scholar
Hann, I.-H., Hui, K.-L., Lee, T. S., & Png, I. P. L. (2002b). Online information privacy: Measuring the cost-benefit trade-off. Paper presented at the Twenty-Third International Conference on Information Systems, Barcelona.Google Scholar
Henslin, J. M. (1967). Craps and magic. American Journal of Sociology, 73(3), 316330.Google Scholar
Herrnstein, R. J., & Prelec, D. (1991). Melioration: A theory of distributed choice. Journal of Economic Perspectives, 5(3), 137156.Google Scholar
Hill, K. (2012). How Target figured out a teen girl was pregnant before her father did. Forbes.com, February 16. Retrieved from www.forbes.com/sites/kashmirhill/2012/02/16/howtarget-figured-out-a-teen-girl-was-pregnant-before-her-father-did/.Google Scholar
Hsee, C., Loewenstein, G., Blount, S., & Bazerman, M. (1999). Preference reversals between joint and separate evaluations: A review and theoretical analysis. Psychological Bulletin, 125(5), 576590.Google Scholar
Ivory, M. Y., & Hearst, M. A. (2002a). Improving web site design. IEEE Internet Computing, 6(2, Special Issue on Usability and the Web), 5663.Google Scholar
Ivory, M. Y., & Hearst, M. A. (2002b). Statistical profiles of highly rated web sites. Paper presented at the Conference on Human Factors in Computing Systems, Minneapolis.Google Scholar
Ivory, M. Y., Sinha, R. R., & Hearst, M. A. (2001). Empirically validated web page design metrics. Paper presented at the Conference on Human Factors in Computing Systems, Seattle.Google Scholar
Jenni, K. E., & Loewenstein, G. (1997). Explaining the “identifiable victim effect.” Journal of Risk and Uncertainty, 14, 235257.Google Scholar
Jesdanun, A. (2006). Facebook offers new privacy options. Associated Press.Google Scholar
John, L. K., Acquisti, A., & Loewenstein, G. (2008). Inconsistent preferences for privacy. Paper presented at Behavioral Decision Research in Management Conference, Rady School of Management, University of California, San Diego.Google Scholar
John, L. K., Acquisti, A., & Loewenstein, G. (2011). Strangers on a plane: Context-dependent willingness to divulge sensitive information, Journal of Consumer Research, 37, 858873.Google Scholar
John, L. K., Loewenstein, G., Acquisti, A., & Vosgerau, J. (n.d.). The Psychology of randomized response techniques and why they backfire. Working Paper.Google Scholar
John, L. K., Loewenstein, G., & Rick, S. (2014). Cheating more for less: Upward social comparisons motivate the poorly compensated to cheat. Organizational Behavior and Human Decision Processes, 123, 101109.Google Scholar
Jourard, S. N. (1959). Self-disclosure and other-cathexis. Journal of Abnormal and Social Psychology, 59, 428431.Google Scholar
Jourard, S. N. (1966). Some psychological aspects of privacy. Law and Contemporary Problems, 31(2), 307318.Google Scholar
Jupiter Research. (2002). Seventy percent of US consumers worry about online privacy, but few take protective action. Retrieved from www.prnewswire.com/news-releases/70-of-us-consumers-worry-about-online-privacy-but-few-take-protective-action-reports-jupiter-media-metrix-77697202.html.Google Scholar
Kahneman, D., Knetsch, J., & Thaler, R. (1986). Fairness as a constraint on profit seeking: Entitlements in the market. American Economic Review, 76(4), 728741.Google Scholar
Kahneman, D., Knetsch, J., & Thaler, R. (1990). Experimental test of the endowment effect and the Coase Theorem. Journal of Political Economy, 98(6), 13251348.Google Scholar
Kahneman, D., & Lovallo, D. (1999). Timid choices and bold forecasts: A cognitive perspective on risk taking. Management Science, 39(1), 1731.Google Scholar
Kahneman, D., & Miller, D. T. (1986). Norm theory: Comparing reality to its alternatives. Psychological Review, 93, 136153.Google Scholar
Kahneman, D., & Tversky, A. (1979). Prospect theory: An analysis of decision making under risk. Econometrica, 47, 263291.Google Scholar
Laibson, D. (1997). Golden eggs and hyperbolic discounting. Quarterly Journal of Economics, 112(2), 443478.Google Scholar
Lambrecht, A., & Tucker, C. (2013). When does retargeting work? Information specificity in online advertising. Journal of Marketing Research, 50(5), 561576.Google Scholar
Langer, E. (1975). The illusion of control. Journal of Personality and Social Psychology, 32(2), 328.Google Scholar
Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 2224.Google Scholar
Lerner, J. S., Kassam, K., Li, Y., & Valdesolo, P. (2015). Emotion and decision making. Annual Review of Psychology, 66, 799823.Google Scholar
Lewis, A. (2003). Please, tell us more. Wall Street Journal. Retrieved from www.wsj.com/articles/SB10001424127887324123004579057350800192892.Google Scholar
Liberman, N., & Trope, Y. (2003). Temporal construal theory of intertemporal judgment and decision. In Loewenstein, G., Read, D., & Baumeister, R. (eds.), Time and Choice: Economic and Psychological Perspectives on Intertemporal Choice. New York: Sage.Google Scholar
Lichtenstein, S., & Slovic, P. (2006). The Construction of Preference. New York: Cambridge University Press.Google Scholar
Loewenstein, G., & Elster, J. (eds.). (1992). Choice over Time. New York: Russell Sage Foundation.Google Scholar
Loewenstein, G., John, L. K., & Volpp, K. (2013). Protecting people from themselves: Using decision errors to help people help themselves (and others). In Shafir, E. (ed.), The Behavioral Foundations of Public Policy (pp. 361379). Princeton, NJ, and Oxford: Princeton University Press.Google Scholar
Loewenstein, G., & O’Donoghue, T. (2005). Animal Spirits: Affective and Deliberative Processes in Economic Behavior. Pittsburgh, PA: Carnegie Mellon University.Google Scholar
Loewenstein, G., O’Donoghue, T., & Rabin, M. (2003). Projection bias in predicting future utility. Quarterly Journal of Economics, 118(4), 12091248.Google Scholar
Loewenstein, G., & Prelec, D. (1993). Preferences for sequences of outcomes. Psychological Review, 100(1), 91108.Google Scholar
Loewenstein, G., Thompson, L., & Bazerman, M. H. (1989). Social utility and decision making in interpersonal contexts. Journal of Personality and Social Psychology, 57, 426441.Google Scholar
Lohr, S. (2010). Library of Congress will save tweets. New York Times, April 15, B2.Google Scholar
Mallon, H. W. (2014). Hiding in plain sight: Privacy on the Internet. Retrieved from http://helenwmallon.com/hiding-in-plain-sight-privacy-on-the-internet/.Google Scholar
Margulis, S. T. (2003). On the status and contribution of Westin’s and Altman’s theories of privacy. Journal of Social Issues, 59(2), 411429.Google Scholar
Marthews, Alex, & Tucker, Catherine. (2014). Government surveillance and Internet search behavior. Available at SSRN: http://ssrn.com/abstract=2412564.Google Scholar
Mayer-Schoenberger, V. (2011). Delete: The Virtue of Forgetting in the Digital Age. Princeton, NJ: Princeton University Press.Google Scholar
McDonald, A. D., & Cranor, L. F. (2008). The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society, 4(22), 543568.Google Scholar
Mikulincer, M., & Nachson, O. (1991). Attachment styles and patterns of self-disclosure. Journal of Personality and Social Psychology, 61(2), 321331.CrossRefGoogle Scholar
Moult, J. (2009). Woman “sacked” on Facebook for complaining about her boss after forgetting she had added him as a friend. Mail Online, August 14. Retrieved from www.dailymail.co.uk/news/article-1206491/Woman-sacked-Facebook-boss-insult-forgetting-added-friend.html.Google Scholar
Nisbett, R. E., & Ross, L. (1980). Human Inference: Strategies and Shortcomings of Social Judgment. New Jersey: Prentice Hall.Google Scholar
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119157.Google Scholar
Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100126.Google Scholar
Nussbaum, Emily (2007). Say everything. New York Magazine, February 12. Retrieved from http://nymag.com/news/features/27341/.Google Scholar
O’Connell, H. (2009). What does Facebook’s privacy transition mean for you? Retrieved from http://dotrights.org/what-does-Facebooks-privacy-transition-mean-you.Google Scholar
O’Donoghue, T., & Rabin, M. (1999). Doing it now or later. American Economic Review, 89(1), 103124.Google Scholar
O’Donoghue, T., & Rabin, M. (2001). Choice and Procrastination. Quarterly Journal of Economics, 116(1), 121160.Google Scholar
Organization for Economic Cooperation and Development (1980). OECD guidelines on the protection of privacy and transborder flows of personal data, 23. Retrieved from www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm#memorandum.Google Scholar
Parr, B. (2006). Students against Facebook News Feed (official petition to Facebook). Retrieved from www.Facebook.com/group.php?gid=2208288769.Google Scholar
Peer, E., Acquisti, A., & Loewenstein, G. (n.d.). The impact of reversibility on the decision to disclose personal information. Working Paper.Google Scholar
Pennebaker, J. (1984). Confiding in others and illness rate among spouses of suicide and accidental-death victims. Journal of Abnormal Psychology, 93(4), 473476.Google Scholar
Pennebaker, J. W., Kiecolt-Glaser, J. K., & Glaser, R. (1988). Disclosure of traumas and immune function: Health implications for psychotherapy. Journal of Consulting and Clinical Psychology, 56(2), 239245.Google Scholar
Png, I. P. L. (2007). On the Value of Privacy from Telemarketing: Evidence from the “Do Not Call” Registry. Singapore: National University of Singapore.Google Scholar
Rabin, M., & O’Donoghue, T. (2000). The economics of immediate gratification. Journal of Behavioral Decision Making, 13, 233250.Google Scholar
Read, D., Loewenstein, G., & Rabin, M. (1999). Choice bracketing. Journal of Risk and Uncertainty, 19(1–3), 171197.Google Scholar
Reis, H. T., & Shaver, P. (1988). Intimacy as an interpersonal process. In Duck, S. (ed.), Handbook of Personal Relationships (pp. 367389). Chichester, England: Wiley.Google Scholar
Riis, J., Loewenstein, G., Baron, J., Jepson, C., Fagerlin, A., & Ubel, P. (2005). Ignorance of hedonic adaptation to hemodialysis: A study using ecological momentary assessment. Journal of Experimental Psychology: General, 134(1), 39.Google Scholar
Romanosky, S., & Acquisti, A. (2009). Privacy costs and personal data protection: Economic and legal perspectives. Berkeley Technology Law Journal, 24(3), 10611101.Google Scholar
Romanosky, S., Sharp, R., & Acquisti, A. (2010). Data breaches and identity theft: When is mandatory disclosure optimal? Presentation for the Ninth Workshop on the Economics of Information Security (WEIS), June 7, Arlington, VA.Google Scholar
Rosen, J. (2010). The web means the end of forgetting. New York Times Magazine, July 21. Retrieved from www.nytimes.com/2010/07/25/magazine/25privacyt2.html?pagewanted=all&_r=0.Google Scholar
Schelling, T. C. (1968). The life you save may be your own. In Chase, S. (ed.), Problems in Public Expenditure Analysis (pp. 113146). Washington, DC: Brookings Institute.Google Scholar
Sedikides, C., Campbell, W. K., Reeder, G. D., & Elliot, A. J. (1999). The relationship closeness induction task. Representative Research in Social Psychology, 23, 14.Google Scholar
Singer, E., Hippler, H.-J., & Schwarz, N. (1992). Confidentiality assurances in surveys: Reassurance or threat? International Journal of Public Opinion Research, 4, 256268.Google Scholar
Singer, E., von Thurn, D. R., & Miller, E. R. (1995). Confidentiality assurances and response: A quantitative review of the experimental literature. Public Opinion Quarterly, 59, 6677.Google Scholar
Slovic, P. (1995). The construction of preference. American Psychologist, 50(5), 364371.Google Scholar
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly, 20(2), 167196.Google Scholar
Smyth, J. M. (1998). Written emotional expression: Effect sizes, outcome types, and moderating variables. Journal of Consulting and Clinical Psychology, 66, 174184.Google Scholar
Solove, D. (2007). The Future of Reputation: Gossip, Rumor, and Privacy on the Internet. New Haven, CT: Yale University Press.Google Scholar
Spera, S. P., Buhrfeind, E. D., & Pennebaker, J. W. (1994). Expressive writing and coping with job loss. Academy of Management Journal, 37, 722733.Google Scholar
Spiekermann, S., Grossklags, J., & Berendt, B. (2001). E-privacy in 2nd generation E commerce: Privacy preferences versus actual behavior. Paper presented at the Conference on Electronic Commerce, Association for Computing Machinery, Tampa, FL.Google Scholar
Stalder, F. (2002). The failure of privacy enhancing technologies (PETs) and the voiding of privacy. Sociological Research Online, 7(2). Retrieved from www.socresonline.org.uk/7/2/stalder.html.Google Scholar
Tamir, D. I., & Mitchell, J. P. (2012). Disclosing information about the self is intrinsically rewarding. Proceedings of the National Academy of Sciences, 109(21), 80388043.Google Scholar
Tanner, A., (2014). What Stays in Vegas: The World of Personal Data – Lifeblood of Big Business – and the End of Privacy as We Know It. New York: PublicAffairs.Google Scholar
Tate, R. (2009). Facebook’s great betrayal. Retrieved from http://gawker.com/5426176/Facebooksgreat-betrayal.Google Scholar
Thaler, R. (2009). Civility check has been here all along. Retrieved from http://nudges.wordpress.com/a-civility-check-has-been-here-all-along/.Google Scholar
Thaler, R., & Benartzi, S. (2004). Save more tomorrow: Using behavioral economics to increase employee saving. Journal of Political Economy, 112(1), S164S187.Google Scholar
Tourangeau, R., & Yan, T. (2007). Sensitive questions in surveys. Psychological Bulletin, 133(5), 859883.Google Scholar
Tsai, J. Y., Engelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254268.Google Scholar
Tucker, C. (2014). Social networks, personalized advertising, and privacy controls. NET Institute Working Paper No. 10–07; MIT Sloan Research Paper No. 4851–10. Available at SSRN: http://ssrn.com/abstract=1694319.Google Scholar
Tufecki, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology, & Society, 28(1), 2036.Google Scholar
Tversky, A., & Kahneman, D. (1974). The framing of decisions and the psychology of choice. Science, 211(4481), 453458.Google Scholar
Tversky, A., & Kahneman, D. (1991). Loss aversion in riskless choice: A reference dependent model. Quarterly Journal of Economics, 106(4), 10391061.Google Scholar
Tversky, A., Slovic, P., & Kahneman, D. (1990). The causes of preference reversal. American Economic Review, 80(1), 204217.Google Scholar
Tybout, Alice M., Sternthal, Brian, & Calder, Bobby J. (1983). Information availability as a determinant of multiple request effectiveness. Journal of Marketing Research, 20(August), 280290.Google Scholar
Van Baaren, R., Horgan, T., Chartrand, T. L., & Dijkmans, M. (2004). The forest, the trees, and the chameleon: Context dependency and nonconscious mimicry. Journal of Personality and Social Psychology, 86, 453459.Google Scholar
Volpp, K., John, L., Troxel, A. B., Norton, L., Fassbender, J., & Loewenstein, G. (2008). Financial incentive-based approaches for weight loss: A randomized trial. Journal of the American Medical Association, 300(22), 26312637.Google Scholar
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193220.Google Scholar
Wathieu, L., & Friedman, A. 2009. An empirical approach to understanding privacy concerns. ESMT Working Paper 09–001, ESMT European School of Management and Technology, Berlin.Google Scholar
Wawro, A. (2008). ToneCheck email plugin is like spellcheck for your emotions. PC World Communications. Retrieved from http://tech.ca.msn.com/pcworld-article.aspx?cp-documentid=27941607.Google Scholar
Weinstein, N. (1980). Unrealistic optimism about future life events. Journal of Personality and Social Psychology, 39(5), 806820.Google Scholar
Westin, A. F. (1991). Harris-Equifax Consumer Privacy Survey 1991. Atlanta, GA: Equifax, Inc.Google Scholar
White, T. B., Zahay, D. L., Thorbjorsen, H., & Shavitt, S. (2008). Getting too personal: Reactance to highly personalized email solicitations. Marketing Letters, 19, 3950.Google Scholar
Whitten, A., & Tygar, J. D. (2005). Why Johnny can’t encrypt: A usability evaluation of PGP 5.0. In Cranor, L. & Simson, G. (eds.), Security and Usability: Designing Secure Systems that People Can Use (pp. 679702). Sebastopol, CA: O’Reilly and Associates.Google Scholar
Whitty, M. T., & Joinson, A. N. (2009). Truth, Lies, and Trust on the Internet. New York: Routledge.Google Scholar
Zuckerberg, M. (2006). An open letter from Mark Zuckerberg. Retrieved from http://blog.Facebook.com/blog.php?post=2208562130.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×