CMU-HCII-15-105 Human-Computer Interaction Institute School of Computer Science, Carnegie Mellon University
Incognito Online: Why and How People Hide Their Information Ruogo Kang September 2015 Ph.D. Thesis
Understanding people's attempts to hide their information is important because there are many potential threats from different sources to their privacy online. Much prior research in information privacy focuses on how people manage their privacy in relation to organizations such as advertisers and companies; other work examines how people manage privacy in relation to other individuals. We still lack a comprehensive understanding of how people understand different privacy threats in their daily use of the Internet, and how they make decisions to protect their privacy from different sources of threat. The first part of this thesis explores the motivations and strategies of those who have tried to hide their identity online. I conducted two interview studies: one a study of people who have sought anonymity online, and the other of those who have used anonymous communication applications, such as Whisper, YikYak and Secret, on mobile phones. Participants' reasons for seeking anonymity ranged widely, from protecting family from unpleasant gossip (a threat to social privacy) to hiding from hackers or government surveillance (a threat to information privacy). Their personal background and experiences influenced how they identified sources of privacy threat and took action to hide from those threats. The second part of this dissertation examines various factors that influence people's intentions and decisions to protect their information and social privacy online. I conducted two surveys to examine how individuals' social orientation, past negative experiences, and technical knowledge shaped their perceptions of different privacy threats, and how those perceptions motivated their use of different strategies to hide from each kind of threat. Building on those surveys, I conducted a think-aloud interview study to understand, in depth, how technical knowledge of the Internet and computing affects people's perception of threat and their behaviors mitigating privacy threats online. Participants were asked to draw how they thought the Internet works and how their information passed over the Internet. I found that nontechnical participants lacked awareness of the complex structure and important entities in the Internet. Technical participants were more knowledgeable but they tended to be overconfident, leading them to potentially overlook or misplace some privacy threats to their personal information. Based on that study, I designed and conducted an online experiment to examine the effects of different visualizations of the Internet on people’s perceptions of privacy threat and their intentions and actions to protect their privacy. Participants' technical knowledge and awareness of personal information access (as informed by system interfaces) had mixed effects on their behavioral intentions. An increased awareness of sources of social privacy threat (measured as perceived access of other individuals to their data) led to an increased intention to take privacy protection actions, but this intention did not translate into actual disclosure behavior. I conclude with a discussion of the possible reasons why participants' behavior did not change, including a poor mapping of intention to behavior measures and contextual reasons for not protecting privacy. My findings across several studies showed that many people who use the Internet, at least sometimes, want to hide their identity, content, and interactions from threats to their information and social privacy. However, their concerns are not closely linked to their privacy protective actions. These findings suggest that a higher level of system transparency or more user education might not be effective in influencing people to take more secure online action. The findings suggest we need more research effort to improve policies and systems that can protect users' privacy and security online without undue reliance on their own behavior.
170 pages
Anind K. Dey, Head, Human-Computer Interaction Institute
| |
Return to:
SCS Technical Report Collection This page maintained by reports@cs.cmu.edu |