{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:53:55Z","timestamp":1776099235359,"version":"3.50.1"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T00:00:00Z","timestamp":1562284800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1464347"],"award-info":[{"award-number":["1464347"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2018,7,5]]},"abstract":"<jats:p>Privacy behaviors of individuals are often inconsistent with their stated attitudes, a phenomenon known as the \"privacy paradox.\" These inconsistencies may lead to troublesome or regrettable experiences. To help people address these privacy inconsistencies, we propose a personalized privacy notification approach that juxtaposes users' general privacy attitudes towards specific technologies and the potential privacy riskiness of particular instances of such technology, right when users make decisions about whether and\/or how to use the technology under consideration. Highlighting the privacy inconsistencies to users was designed to nudge them in making decisions in a way that aligns with their privacy attitudes.<\/jats:p>\n          <jats:p>To illustrate this approach, we chose the domain of mobile apps and designed a privacy discrepancy interface that highlights this discrepancy between users' general privacy attitudes towards mobile apps and the potential privacy riskiness of a particular app, nudging them to make app installation and\/or permission granting decisions reflecting their privacy attitudes. To evaluate this interface, we conducted an online experiment simulating the process of installing Android apps. We compared the privacy discrepancy approach with several existing privacy notification approaches. Our results suggest that the behaviors of participants who used the privacy discrepancy interface better reflected their privacy attitudes than the other approaches.<\/jats:p>","DOI":"10.1145\/3214271","type":"journal-article","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T15:19:10Z","timestamp":1530803950000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Addressing The Privacy Paradox through Personalized Privacy Notifications"],"prefix":"10.1145","volume":"2","author":[{"given":"Corey Brian","family":"Jackson","sequence":"first","affiliation":[{"name":"School of Information Studies, Syracuse University, Syracuse, NY, USA"}]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Studies, Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,7,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/988772.988777"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.163"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808119"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v067.i01"},{"key":"e_1_2_1_9_1","volume-title":"Information curators in an enterprise file-sharing service","author":"Choe Eun Kyoung","unstructured":"Eun Kyoung Choe, Jaeyeon Jung, Bongshin Lee, and Kristie Fisher. 2013. Nudging People Away from Privacy-Invasive Mobile Apps through Visual Framing. In Information curators in an enterprise file-sharing service. Springer Berlin Heidelberg, Berlin, Heidelberg, 74--91."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"e_1_2_1_11_1","volume-title":"Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J on Telecomm 8 High Tech L","author":"Cranor L F","year":"2012","unstructured":"L F Cranor. 2012. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J on Telecomm 8 High Tech L (2012)."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.021"},{"key":"e_1_2_1_14_1","volume-title":"I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns. ACM","author":"Felt Adrienne Porter","unstructured":"Adrienne Porter Felt, Serge Egelman, and David Wagner. 2012. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns. ACM, New York, New York, USA."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002168.2002175"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766506"},{"key":"e_1_2_1_17_1","volume-title":"A theory of cognitive dissonance","author":"Festinger Leon","unstructured":"Leon Festinger. 1957. A theory of cognitive dissonance. Stanford University Press."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.58"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_2_1_20_1","unstructured":"Corey Brian Jackson. 2016. Privacy Discrepancy. https:\/\/www.youtube.com\/watch?v=PcRngDsXVc4&t=121s"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.36.97"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11768012_2"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235838.3235856"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235895.3235899"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.84.4.444"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40343-9_15"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.11.004"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501163"},{"key":"e_1_2_1_35_1","volume-title":"Quantifying Permission-Creep in the Google Play Store. arXiv","author":"Taylor V F","year":"2016","unstructured":"V F Taylor and I Martinovic. 2016. Quantifying Permission-Creep in the Google Play Store. arXiv (2016). arXiv:related:Y-kixjgTwKMJ"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235924.3235937"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"key":"e_1_2_1_39_1","volume-title":"The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. In 2017 IEEE Symposium on Security and Privacy (SP. IEEE, 1077--1093","author":"Wijesekera Primal","year":"2017","unstructured":"Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, and Konstantin Beznosov. 2017. The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. In 2017 IEEE Symposium on Security and Privacy (SP. IEEE, 1077--1093."},{"key":"e_1_2_1_40_1","volume-title":"Thirty Third International Conference on Information Systems.","author":"Xu Heng","year":"2012","unstructured":"Heng Xu, Sumeet Gupta, Mary Beth Rosson, and John M Carroll. 2012. Measuring mobile users' concerns for information privacy. In Thirty Third International Conference on Information Systems."}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3214271","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3214271","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3214271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T15:06:47Z","timestamp":1755011207000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3214271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,5]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,7,5]]}},"alternative-id":["10.1145\/3214271"],"URL":"https:\/\/doi.org\/10.1145\/3214271","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,5]]},"assertion":[{"value":"2017-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}