Harnessing Soft Logic to Represent the Privacy Paradox
Abstract
:1. Introduction
2. Literature Review
3. The Concept of Soft Logic
3.1. Soft Logic Basics
3.2. Axioms of Soft Numbers
3.3. Formal Definition of a Soft Number
3.4. Basic Arithmetic of Soft Numbers
3.5. Advanced Mathematical Operations of Soft Numbers
4. Representing the Privacy Paradox Using Soft Logic
4.1. The Privacy Paradox Space
- Privacy Concern: The magnitude of the user’s care/anxiety/awareness of privacy, e.g., users of e-commerce transactions who claim that they will not disclose personal information, even for a significant discount.
- Privacy Behavior: The amount of privacy preservation actually reflected in user’s behavior, e.g., a user of e-commerce transactions discloses personal information, and the seller gains user’s trust even when a minor discount is offered.
- Technological Literacy: The ability of the user to manage technology efficiently, in this case to control online activities, e.g., understanding the privacy-setting mechanism on Facebook, and the consequences of each action.
4.2. Applying Soft Logic to the Privacy Paradox
- The is the baseline and expresses as the rational component of the number.
- The unexplained deviation from privacy concern () is the “soft” component of the number.
- The unexplained deviation from privacy concern () is the “soft” component of the number.
- The explained deviation from privacy concern () is the rational component of the number.
4.3. Privacy Paradox: Distribution of Soft Numbers
5. Empirical Study
5.1. Design
- Using secure web sites when purchasing goods with an e-commerce transaction. A screenshot depicting this scenario was shown to the participants.
- Publishing a post on Facebook online social network about a car accident that an individual experienced.
- Consent to provide personal information in response to a national survey. A screenshot depicting this scenario was shown to the participants.
- An offer to receive a significant discount on purchasing electronics in return for providing the email address. A screenshot depicting this scenario was shown to the participants.
- Browsing a web site by clicking a URL that was provided as a winning message of free cinema tickets.
- The importance of keeping the antivirus updated and genuine.
- Reading the privacy notice when installing a new application on a smartphone.
5.2. Participants
5.3. Results
5.4. Representation with Soft Logic
6. Discussion
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Shepherd, J. What is the digital era? In Social and Economic Transformation in the Digital Era; IGI Global: Hershey, PA, USA, 2004; pp. 1–18. [Google Scholar]
- ITU. New ITU Statistics Show More than Half the World Is Now Using the Internet. eTrade for all. 2018. Available online: https://etradeforall.org/news/new-itu-statistics-show-more-than-half-the-world-is-now-using-the-internet/ (accessed on 9 June 2022).
- Dwivedi, Y.K.; Rana, N.P.; Jeyaraj, A.; Clement, M.; Williams, M.D. Re-examining the unified theory of acceptance and use of technology (UTAUT): Towards a revised theoretical model. Inf. Syst. Front. 2019, 21, 719–734. [Google Scholar] [CrossRef] [Green Version]
- Jones, B. Understanding eCommerce Consumer Privacy from the Behavioral Marketers’ Viewpoint. 2019. Available online: https://www.proquest.com/dissertations-theses/understanding-ecommerce-consumer-privacy/docview/2323168353/se-2?accountid=14765 (accessed on 9 June 2022).
- Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 2017, 4, 120–1258. [Google Scholar] [CrossRef]
- Lomotey, R.K.; Sofranko, K.; Orji, R. Enhancing privacy in wearable IoT through a provenance architecture. Multimodal Technol. Interact. 2018, 2, 18. [Google Scholar] [CrossRef] [Green Version]
- Bellekens, X.; Seeam, A.; Hamilton, A.W.; Seeam, P.; Nieradzinska, K. Pervasive eHealth Services a Security and Privacy Risk Awareness Survey; IEEE: Piscataway, NJ, USA, 2016. [Google Scholar]
- Price, W.N.; Cohen, I.G. Privacy in the age of medical big data. Nat. Med. 2019, 25, 37–43. [Google Scholar] [CrossRef] [PubMed]
- Regan, P.M. Privacy as a common good in the digital world. Inf. Commun. Soc. 2002, 5, 382–405. [Google Scholar] [CrossRef]
- Mokrosinska, D. Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy. Law Philos. 2018, 37, 117–143. [Google Scholar] [CrossRef] [Green Version]
- Li, H.; Yu, L.; He, W. The impact of GDPR on global technology development. J. Glob. Inf. Technol. Manag. 2019, 22, 1–6. [Google Scholar] [CrossRef] [Green Version]
- Moore, W.; Frye, S. Review of HIPAA, part 1: History, protected health information, and privacy and security rules. J. Nucl. Med. Technol. 2019, 47, 269–272. [Google Scholar] [CrossRef]
- Correia, J.; Compeau, D. Information privacy awareness (IPA): A review of the use, definition and measurement of IPA. In Proceedings of the 50th Hawaii International Conference on System Sciences, Hilton Waikoloa Village, HI, USA, 4–7 January 2017. [Google Scholar]
- Wagner, C.; Trenz, M.; Veit, D. How do Habit and Privacy Awareness Shape Privacy Decisions? Association for Information Systems: Atlanta, GA, USA, 2020. [Google Scholar]
- Anic, I.D.; Budak, J.; Rajh, E.; Recher, V.; Skare, V.; Skrinjaric, B. Extended model of online privacy concern: What drives consumers’ decisions? Online Inf. Rev. 2019, 43, 799–817. [Google Scholar] [CrossRef]
- IGI Global. What is Privacy Concern. 2021. Available online: https://www.igi-global.com/dictionary/privacy-concern/40729 (accessed on 9 June 2022).
- Sheehan, K.B.; Hoy, M.G. Dimensions of privacy concern among online consumers. J. Public Policy Mark. 2000, 19, 62–73. [Google Scholar] [CrossRef]
- Enaizan, O.; Alwi, N.; Zaizi, N. Privacy and Security Concern for Electronic Medical Record Acceptance and Use: State of the Art. J. Adv. Sci. Eng. Res. 2017, 7, 23–34. [Google Scholar]
- Lin, S.-W.; Liu, Y.-C. The effects of motivations, trust, and privacy concern in social networking. Serv. Bus. 2012, 6, 411–424. [Google Scholar] [CrossRef]
- Aljifri, H.; Navarro, D.S. Search engines and privacy. Comput. Secur. 2004, 23, 379–388. [Google Scholar] [CrossRef]
- Xu, H.; Gupta, S.; Rosson, M.B.; Carroll, J.M. Measuring Mobile Users’ Concerns for Information Privacy; Citeseer: Princeton, NJ, USA, 2012. [Google Scholar]
- Cohen, I.G.; Gostin, L.O.; Weitzner, D.J. Digital smartphone tracking for COVID-19: Public health and civil liberties in tension. Jama 2020, 323, 2371–2372. [Google Scholar] [CrossRef]
- Acquisti, A.; Brandimarte, L.; Loewenstein, G. Privacy and human behavior in the age of information. Science 2015, 347, 509–514. [Google Scholar] [CrossRef]
- Read, K.; van der Schyff, K. Modelling the intended use of Facebook privacy settings. South Afr. J. Inf. Manag. 2020, 22, 1–9. [Google Scholar] [CrossRef]
- Tay, S.W.; Teh, P.S.; Payne, S.J. Reasoning about privacy in mobile application install decisions: Risk perception and framing. Int. J. Hum. Comput. Stud. 2021, 145, 102517. [Google Scholar] [CrossRef]
- Yu, L.; Li, H.; He, W.; Wang, F.-K.; Jiao, S. A meta-analysis to explore privacy cognition and information disclosure of internet users. Int. J. Inf. Manag. 2020, 51, 102015. [Google Scholar] [CrossRef]
- Emami-Naeini, P.; Dheenadhayalan, J.; Agarwal, Y.; Cranor, L.F. Which Privacy and Security Attributes Most Impact Consumers’ Risk Perception and Willingness to Purchase IoT Devices? IEEE: Piscataway, NJ, USA, 2021; pp. 1937–1954. [Google Scholar]
- The Privacy Issue. Decoding the Privacy Paradox. 2021. Available online: https://theprivacyissue.com/privacy-and-society/decoding-privacy-paradox (accessed on May 2022).
- Barnes, S.B. A privacy paradox: Social networking in the United States. First Monday 2006, 11. [Google Scholar] [CrossRef]
- Norberg, P.A.; Horne, D.R.; Horne, D.A. The privacy paradox: Personal information disclosure intentions versus behaviors. J. Consum. Aff. 2007, 41, 100–126. [Google Scholar] [CrossRef]
- Gerber, N.; Gerber, P.; Volkamer, M. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 2018, 77, 226–261. [Google Scholar] [CrossRef]
- Chen, L.; Huang, Y.; Ouyang, S.; Xiong, W. The Data Privacy Paradox and Digital Demand; National Bureau of Economic Research (NBER): Cambridge, MA, USA, 2011. [Google Scholar]
- Zhu, M.; Wu, C.; Huang, S.; Zheng, K.; Young, S.D.; Yan, X.; Yuan, Q. Privacy paradox in mHealth applications: An integrated elaboration likelihood model incorporating privacy calculus and privacy fatigue. Telemat. Inform. 2021, 61, 101601. [Google Scholar] [CrossRef]
- Kang, H.; Jung, E.H. The smart wearables-privacy paradox: A cluster analysis of smartwatch users. Behav. Inf. Technol. 2020, 40, 1755–1768. [Google Scholar] [CrossRef]
- Shiau, W.-L.; Wang, X.; Zheng, F.; Tsang, Y.P. Cognition and emotion in the information systems field: A review of twenty-four years of literature. Enterp. Inf. Syst. 2022, 16, 1992675. [Google Scholar] [CrossRef]
- Min, J.; Kim, B. How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost. J. Assoc. Inf. Sci. Technol. 2015, 66, 839–857. [Google Scholar] [CrossRef]
- Kokolakis, S. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Comput. Secur. 2017, 64, 122–134. [Google Scholar] [CrossRef]
- Mohammed, Z.A.; Tejay, G.P. Examining the privacy paradox through individuals’ neural disposition in e-commerce: An exploratory neuroimaging study. Comput. Secur. 2021, 104, 102201. [Google Scholar] [CrossRef]
- Stones, R. Structuration Theory; Macmillan International Higher Education: London, UK, 2005. [Google Scholar]
- Zafeiropoulou, A.M.; Millard, D.E.; Webber, C.; O’Hara, K. Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions? In Proceedings of the 5th Annual ACM Web Science Conference, Paris, France, 2–4 May 2013; pp. 463–472. [Google Scholar]
- Hargittai, E.; Marwick, A. What can I really do?” Explaining the privacy paradox with online apathy. Int. J. Commun. 2016, 10, 21. [Google Scholar]
- Barth, S.; de Jong, M.D.; Junger, M.; Hartel, P.H.; Roppelt, J.C. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telemat. Inform. 2019, 41, 55–69. [Google Scholar] [CrossRef]
- Marvin, C. Constructed and reconstructed discourse: Inscription and talk in the history of literacy. Commun. Res. 1984, 11, 563–594. [Google Scholar] [CrossRef] [Green Version]
- International Technology and Engineering Educators Association. Standards for Technological Literacy: Content for the Study of Technology; ITEEA: Reston, VA, USA, 2000. [Google Scholar]
- Harley, D.A.; Kurniawan, S.H.; Fitzpatrick, G.; Vetere, F. Age matters: Bridging the generation gap through technology-mediated interaction. In CHI’09 Extended Abstracts on Human Factors in Computing Systems; ACM: Birmingham, UK, 2009; pp. 4799–4802. [Google Scholar] [CrossRef]
- Furnell, S.; Moore, L. Security literacy: The missing link in today’s online society? Comput. Fraud. Secur. 2014, 5, 12–18. [Google Scholar] [CrossRef]
- Desimpelaere, L.; Hudders, L.; Van de Sompel, D. Knowledge as a strategy for privacy protection: How a privacy literacy training affects children’s online disclosure behaviour. In Computers in Human Behavior; Elsevier: Amsterdam, The Netherlands, 2020. [Google Scholar]
- Dincelli, E.; Goel, S. Can privacy and security be friends? a cultural framework to differentiate security and privacy behaviors on online social networks. In Proceedings of the 50th Hawaii International Conference on System Sciences, Hilton Waikoloa Village, HI, USA, 4–7 January 2017. [Google Scholar]
- Weinberger, M.; Bouhnik, D.; Zhitomirsky-Geffet, M. Factors affecting students’ privacy paradox and privacy protection behavior. Open Inf. Sci. 2017, 1, 3–20. [Google Scholar] [CrossRef]
- Baek, Y.M. Solving the privacy paradox: A counter-argument experimental approach. Comput. Hum. Behav. 2014, 38, 33–42. [Google Scholar] [CrossRef]
- Arpetti, J.; Delmastro, M. The privacy paradox: A challenge to decision theory? J. Ind. Bus. Econ. 2021, 48, 505–525. [Google Scholar] [CrossRef]
- Hallam, C.; Zanella, G. Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Comput. Hum. Behav. 2017, 68, 217–227. [Google Scholar] [CrossRef]
- Davazdahemami, B.; Hammer, B.; Luse, A.; Kalgotra, P. The role of parallelism in resolving the privacy paradox of information disclosure in social networks. In Proceedings of the Thirty Ninth International Conference on Information Systems, San Francisco, CA, USA, 13–16 December 2018. [Google Scholar]
- Madarasz, K.; Pycia, M. Towards a Resolution of the Privacy Paradox; SSRN: Rochester, NY, USA, 2020. [Google Scholar]
- Bilal, A.; Wingreen, S.; Sharma, R. Virtue ethics as a solution to the privacy paradox and trust in emerging technologies. In Proceedings of the 2020 the 3rd International Conference on Information Science and System, Cambridge, 19–22 March 2020; pp. 224–228. [Google Scholar]
- Aivazpour, Z.; Rao, V.S. Information Disclosure and Privacy Paradox: The Role of Impulsivity. ACM SIGMIS Database DATABASE Adv. Inf. Syst. 2020, 51, 14–36. [Google Scholar] [CrossRef]
- Li, H.; Luo, X.R.; Zhang, J.; Xu, H. Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors. Inf. Manag. 2017, 54, 1012–1022. [Google Scholar] [CrossRef]
- Mantilla, E.; Robles-Flores, J.A. The Role of Risk Aversion in the Privacy Paradox on Internet Users; Esan University: Lima, Peru, 2021. [Google Scholar]
- Idberg, L.; Orfanidou, S.; Karppinen, O. Privacy for sale!: An exploratory study of personalization privacy paradox in consumers’ response to personalized advertisements on social networking sites. Diva-Portal 2021, 71. Available online: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105022 (accessed on 9 June 2022).
- Razzano, G. Understanding the Theory of Collective Rights: Redefining the Privacy Paradox. Africaportal. 2021. Available online: https://www.africaportal.org/publications/understanding-theory-collective-rights-redefining-privacy-paradox/ (accessed on 9 June 2022).
- Ichihashi, S. Dynamic privacy choices. In Proceedings of the the 21st ACM Conference on Economics and Computation, Virtual Event, Hungary, 13–17 July 2020; pp. 539–540. [Google Scholar]
- Alshmemri, M.; Shahwan-Akl, L.; Maude, P. Herzberg’s two-factor theory. Life Sci. J. 2017, 14, 12–16. [Google Scholar]
- Lee, A.-R. Investigating the Personalization--Privacy Paradox in Internet of Things (IoT) Based on Dual-Factor Theory: Moderating Effects of Type of IoT Service and User Value. Sustainability 2021, 13, 10679. [Google Scholar] [CrossRef]
- Snyman, D.P.; Kruger, H.; Kearney, W.D. I shall, we shall, and all others will: Paradoxical information security behaviour. Inf. Comput. Secur. 2018, 26, 290–305. [Google Scholar] [CrossRef]
- Liao, G.; Su, Y.; Ziani, J.; Wierman, A.; Huang, J. The Privacy Paradox and Optimal Bias-Variance Trade-offs in Data Acquisition. ACM SIGMETRICS Perform. Eval. Rev. 2022, 49, 6–8. [Google Scholar] [CrossRef]
- Wirth, J.; Maier, C.; Laumer, S.; Weitzel, T. Laziness as an explanation for the privacy paradox: A longitudinal empirical investigation. Internet Res. 2021, 32, 24–54. [Google Scholar] [CrossRef]
- Choi, H.; Park, J.; Jung, Y. The role of privacy fatigue in online privacy behavior. Comput. Hum. Behav. 2018, 81, 42–51. [Google Scholar] [CrossRef]
- Hou, Z.; Qingyan, F. The Privacy Paradox on Social Networking Sites: A Quantitative Model Based on Privacy Calculus and An Experimental Study On Users’ Behavior of Balancing Perceived Benefit and Risk. Data Anal. Knowl. Discov. 2021, 1. [Google Scholar]
- Stouffer, C. The Privacy Paradox: How Much Privacy Are We Willing to Give Up Online? 2021. Available online: https://us.norton.com/internetsecurity-privacy-how-much-privacy-we-give-up.html (accessed on April 2022).
- Gimpel, H.; Kleindienst, D.; Waldmann, D. The disclosure of private data: Measuring the privacy paradox in digital services. Electron. Mark. 2018, 28, 475–490. [Google Scholar] [CrossRef]
- Dascal, M. Leibniz’s Two-Pronged Dialectic. In Leibniz: What Kind of Rationalist? Epistemology, and the Unity of Science; Springer: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
- Jesseph, D.M. Leibniz on the foundations of the calculus: The question of the reality of infinitesimal magnitudes. Perspect. Sci. 1998, 6, 6–40. [Google Scholar] [CrossRef]
- Clifford, W. Preliminary Sketch of Bi-quaternions. Proc. Lond. Math. Soc. 1873, 4, 381–395. [Google Scholar]
- Griffiths, P.; Harris, J. Principles of Algebraic Geometry; John Wiley & Sons: Hoboken, NJ, USA, 2014. [Google Scholar]
- Barker, M.-J.; Iantaffi, A. Life Isn’t Binary; Jessica Kingsley Publishers: London, UK, 2019. [Google Scholar]
- Priest, G. Paraconsistent logic. In Handbook of Philosophical Logic; Springer: Berlin/Heidelberg, Germany, 2002; pp. 287–393. [Google Scholar]
- Starostin, E.; Van Der Heijden, G. The shape of a Möbius strip. Nat. Mater. 2007, 6, 563–567. [Google Scholar] [CrossRef]
- Belk, R.W. Extended self in a digital world. J. Consum. Res. Oxf. Univ. Press 2013, 40, 477–500. [Google Scholar] [CrossRef] [Green Version]
- Klein, M.; Maimon, O. Fundamentals of Soft Logic. New Math. Nat. Comput. 2021, 17, 703–737. [Google Scholar] [CrossRef]
- Álvarez, M.J.; Ferragut, A.; Jarque, X. A survey on the blow up technique. Int. J. Bifurc. Chaos 2011, 21, 3103–3118. [Google Scholar] [CrossRef] [Green Version]
- Bateson, G.; Jackson, D.D.; Haley, J.; Weakland, J. Toward a theory of schizophrenia. Behav. Sci. 1956, 1, 251–264. [Google Scholar] [CrossRef]
- Paolacci, G.; Chandler, J.; Ipeirotis, P.G. Running experiments on Amazon Mechanical Turk. Judgm. Decis. Mak. 2010, 5, 411–419. [Google Scholar]
- Burleigh, T. What Is Fair Payment on MTurk? 2019. Available online: https://tylerburleigh.com/blog/what-is-fair-payment-on-mturk/ (accessed on May 2022).
- Solove, D.J. The myth of the privacy paradox. Georg. Wash. Law Rev. 2021, 89, 1–51. [Google Scholar] [CrossRef]
- Dinev, T.; Hart, P. Internet privacy, social awareness, and Internet technical literacy. An exploratory investigation. BLED 2004 Proc. 2004, 24. [Google Scholar]
- Maita, I.; Saide, S.; Putri, Y.G.; Megawati, M.; Munzir, M.R. Information system and behavioural intention: Evaluating the user behaviour of financial information system in the developing country of Indonesia. Technol. Anal. Strateg. Manag. 2022, 34, 594–607. [Google Scholar] [CrossRef]
- Van Blarkom, G.; Borking, J.J.; Olk, J.E. Handbook of Privacy and Privacy-Enhancing Technologies—The case of Intelligent Software Agents; PISA Consortium: The Hague, The Netherlands, 2003. [Google Scholar]
- Stange, K.C. The paradox of the parts and the whole in understanding and improving general practice. Int. J. Qual. Health Care 2002, 14, 267–268. [Google Scholar] [CrossRef] [Green Version]
- Fox, E.M. The efficiency paradox. NYU Law Econ. Res. Pap. 2008, 77. [Google Scholar]
- Mossman, K.L. The Complexity Paradox: The More Answers We Find, the More Questions We Have; OXFORD University Press: Oxford, UK, 2014. [Google Scholar]
- Williams, J.J. Kant on the original synthesis of understanding and sensibility. Br. J. Hist. Philos. 2018, 26, 66–86. [Google Scholar] [CrossRef]
- Fivel, O.; Klein, M.; Maimon, O. Decision Trees with Soft Numbers. Int. J. Circuits Syst. Signal Process. 2021, 15. [Google Scholar] [CrossRef]
- Hirschprung, R.S.; Toch, E.; Maimon, O. Simplifying data disclosure configurations in a cloud computing environment. ACM Trans. Intell. Syst. Technol. (TIST) 2015, 6, 1–26. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hirschprung, R.S.; Klein, M.; Maimon, O. Harnessing Soft Logic to Represent the Privacy Paradox. Informatics 2022, 9, 54. https://doi.org/10.3390/informatics9030054
Hirschprung RS, Klein M, Maimon O. Harnessing Soft Logic to Represent the Privacy Paradox. Informatics. 2022; 9(3):54. https://doi.org/10.3390/informatics9030054
Chicago/Turabian StyleHirschprung, Ron S., Moshe Klein, and Oded Maimon. 2022. "Harnessing Soft Logic to Represent the Privacy Paradox" Informatics 9, no. 3: 54. https://doi.org/10.3390/informatics9030054
APA StyleHirschprung, R. S., Klein, M., & Maimon, O. (2022). Harnessing Soft Logic to Represent the Privacy Paradox. Informatics, 9(3), 54. https://doi.org/10.3390/informatics9030054