{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:24:46Z","timestamp":1776115486389,"version":"3.50.1"},"reference-count":90,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-15-2-0277"],"award-info":[{"award-number":["FA8750-15-2-0277"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2018,11]]},"abstract":"<jats:p>As increasingly many Internet-of-Things (IoT) devices collect personal data, users face more privacy decisions. Personal privacy assistants can provide social cues and help users make informed decisions by presenting information about how others have decided in similar cases. To better understand which social cues are relevant and whose recommendations users are more likely to follow, we presented 1000 online participants with nine IoT data-collection scenarios. Some participants were told the percentage of experts or friends who allowed data collection in each scenario, while other participants were provided no social cue. At the conclusion of each scenario, participants were asked whether they would allow the described data collection. Our results help explain under what circumstances users are more or less likely to be swayed by the reported behavior of others in similar scenarios. For example, our results indicate that when friends denied data collection, our participants were more influenced than when friends allowed data collection. On the other hand, participants were more influenced by experts when they allowed data collection. We also observed that influence could get stronger or wear off when participants were exposed to a sequence of scenarios. For example, when experts and friends repeatedly allowed data collection in scenarios with clear risk or denied it in scenarios with clear benefits, participants were less likely to be influenced by them in subsequent scenarios.<\/jats:p>","DOI":"10.1145\/3274317","type":"journal-article","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T21:21:27Z","timestamp":1541107287000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios"],"prefix":"10.1145","volume":"2","author":[{"given":"Pardis","family":"Emami Naeini","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Martin","family":"Degeling","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Lujo","family":"Bauer","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Richard","family":"Chow","sequence":"additional","affiliation":[{"name":"Intel Corporation, Santa Clara, CA, USA"}]},{"given":"Lorrie Faith","family":"Cranor","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Mohammad Reza","family":"Haghighat","sequence":"additional","affiliation":[{"name":"Intel Corporation, Santa Clara, CA, USA"}]},{"given":"Heather","family":"Patterson","sequence":"additional","affiliation":[{"name":"Intel Corporation, Santa Clara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094428114547952"},{"key":"e_1_2_1_2_1","volume-title":"Advances in experimental social psychology.","author":"Allen Vernon L","unstructured":"Vernon L Allen. 1965. Situational factors In conformity1. In Advances in experimental social psychology. Vol. 2. Elsevier, 133--175."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(71)90054-0"},{"key":"e_1_2_1_4_1","volume-title":"Studies of independence and conformity: I. A minority of one against a unanimous majority. Psychological monographs: General and applied 70, 9","author":"Asch Solomon E","year":"1956","unstructured":"Solomon E Asch. 1956. Studies of independence and conformity: I. A minority of one against a unanimous majority. Psychological monographs: General and applied 70, 9 (1956), 1."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820012"},{"key":"e_1_2_1_6_1","volume-title":"Thinking and deciding","author":"Baron Jonathan","unstructured":"Jonathan Baron. 2000. Thinking and deciding. Cambridge University Press."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.71.5.915"},{"key":"e_1_2_1_8_1","volume-title":"The use of vignettes in qualitative research. Social research update 25, 9","author":"Barter Christine","year":"1999","unstructured":"Christine Barter and Emma Renold. 1999. The use of vignettes in qualitative research. Social research update 25, 9 (1999), 1--6."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37157-8_4"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0346-0"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837120"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1086\/261849"},{"key":"e_1_2_1_13_1","volume-title":"Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on psychological science 6, 1","author":"Buhrmester Michael","year":"2011","unstructured":"Michael Buhrmester, Tracy Kwang, and Samuel D Gosling. 2011. Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on psychological science 6, 1 (2011), 3--5."},{"key":"e_1_2_1_14_1","volume-title":"Social capital","author":"Burt Ronald S","unstructured":"Ronald S Burt. 2017. Structural holes versus network closure as social capital. In Social capital. Routledge, 31--56."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/601161"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.4251118"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.142015"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/07350015.1986.10509492"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0041274"},{"key":"e_1_2_1_20_1","volume-title":"Uninformed individuals promote democratic consensus in animal groups. science 334, 6062","author":"Couzin Iain D","year":"2011","unstructured":"Iain D Couzin, Christos C Ioannou, G\u00fcven Demirel, Thilo Gross, Colin J Torney, Andrew Hartnett, Larissa Conradt, Simon A Levin, and Naomi E Leonard. 2011. Uninformed individuals promote democratic consensus in animal groups. science 334, 6062 (2011), 1578--1580."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2007.25275511"},{"key":"e_1_2_1_22_1","unstructured":"Anupam Das Martin Degeling Daniel Smullen and Norman Sadeh. 2018. Personalized Privacy Assistants for the Internet of Things. (2018)."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675225"},{"key":"e_1_2_1_24_1","unstructured":"Thomas H Davenport. 2013. Analytics in Healthcare and the Life Sciences: Strategies Implementation Methods and Best Practices. Pearson Education."},{"key":"e_1_2_1_25_1","volume-title":"A study of normative and informational social influences upon individual judgment. The journal of abnormal and social psychology 51, 3","author":"Deutsch Morton","year":"1955","unstructured":"Morton Deutsch and Harold B Gerard. 1955. A study of normative and informational social influences upon individual judgment. The journal of abnormal and social psychology 51, 3 (1955), 629."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073011"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.142"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858214"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235924.3235956"},{"key":"e_1_2_1_30_1","volume-title":"A theory of social comparison processes. Human relations 7, 2","author":"Festinger Leon","year":"1954","unstructured":"Leon Festinger. 1954. A theory of social comparison processes. Human relations 7, 2 (1954), 117--140."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240411"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/bdm.539"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572539"},{"key":"e_1_2_1_34_1","volume-title":"Communities and Technologies","author":"Goecks Jeremy","year":"2005","unstructured":"Jeremy Goecks and Elizabeth D Mynatt. 2005. Supporting privacy management via community experience and expertise. In Communities and Technologies 2005. Springer, 397--417."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/bdm.1753"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1997.2697"},{"key":"e_1_2_1_37_1","unstructured":"Chip Heath Richard P Larrick and Joshua Klayman. 1998. Cognitive repairs: How organizational practices can compensate for individual shortcomings. In Review of Organizational Behavior. Citeseer."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/rssa.12221"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0034662"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722146"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0074620"},{"key":"e_1_2_1_42_1","volume-title":"Using expertise and experience for giving and taking advice. The routines of decision making","author":"Jungermann Helmut","year":"2005","unstructured":"Helmut Jungermann and Katrin Fischer. 2005. Using expertise and experience for giving and taking advice. The routines of decision making (2005), 157--173."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214504000000269"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235838.3235842"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/002200275800200106"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_13"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151331"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/937956.937959"},{"key":"e_1_2_1_49_1","unstructured":"Ponnurangam Kumaraguru and Lorrie Cranor. 2005. Privacy indexes : a survey of Westin's studies. Institute for Software Research (Jan. 2005). http:\/\/repository.cmu.edu\/isr\/856"},{"key":"e_1_2_1_50_1","first-page":"1","article-title":"The Measurement of Observer Agreement for Categorical Data","volume":"33","author":"Richard Landis J.","year":"1977","unstructured":"J. Richard Landis and Gary G. Koch. 1977. The Measurement of Observer Agreement for Categorical Data. Biometrics 33, 1 (March 1977), 159.","journal-title":"Biometrics"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/647988.741491"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1050.0459"},{"key":"e_1_2_1_53_1","volume-title":"The psychology of social impact. American psychologist 36, 4","author":"Latan\u00e9 Bibb","year":"1981","unstructured":"Bibb Latan\u00e9. 1981. The psychology of social impact. American psychologist 36, 4 (1981), 343."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765952"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845392"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2017.7917874"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2017.7917874"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2016.23006"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235895.3235899"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2015.01171"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1008636108"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/15534510500291662"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.53.1.41"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X980100020301"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1090.1031"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.113"},{"key":"e_1_2_1_68_1","volume-title":"Effects of social influence on the wisdom of crowds. arXiv preprint arXiv:1204.3463","author":"Mavrodiev Pavlin","year":"2012","unstructured":"Pavlin Mavrodiev, Claudio J Tessone, and Frank Schweitzer. 2012. Effects of social influence on the wisdom of crowds. arXiv preprint arXiv:1204.3463 (2012)."},{"key":"e_1_2_1_69_1","volume-title":"Quantifying the effects of social influence. Scientific reports 3","author":"Mavrodiev Pavlin","year":"2013","unstructured":"Pavlin Mavrodiev, Claudio J Tessone, and Frank Schweitzer. 2013. Quantifying the effects of social influence. Scientific reports 3 (2013), 1360."},{"key":"e_1_2_1_70_1","volume-title":"Investigating the Value of Privacy within the Internet of Things. In GLOBECOM 2017--2017 IEEE Global Communications Conference. IEEE, 1--6.","author":"Mayle Alex","year":"2017","unstructured":"Alex Mayle, Neda Hajiakhoond Bidoki, Sina Masnadi, Ladislau Boeloeni, and Damla Turgut. 2017. Investigating the Value of Privacy within the Internet of Things. In GLOBECOM 2017--2017 IEEE Global Communications Conference. IEEE, 1--6."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998323"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0049748"},{"key":"e_1_2_1_73_1","volume-title":"2014 Twelfth Annual International Conference on Privacy, Security and Trust. 102--111","author":"Morton A.","unstructured":"A. Morton and M. A. Sasse. 2014. Desperately seeking assurances: Segmenting users by their information-seeking preferences. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust. 102--111."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-8765.2009.01028.x"},{"key":"e_1_2_1_75_1","volume-title":"Confirmation bias: A ubiquitous phenomenon in many guises. Review of general psychology 2, 2","author":"Nickerson Raymond S","year":"1998","unstructured":"Raymond S Nickerson. 1998. Confirmation bias: A ubiquitous phenomenon in many guises. Review of general psychology 2, 2 (1998), 175."},{"key":"e_1_2_1_76_1","first-page":"119","article-title":"Privacy as Contextual Integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review 79 (2004), 119. http:\/\/nyu.edu\/ projects\/nissenbaum\/papers\/washingtonlawreview.pdf","journal-title":"Washington Law Review"},{"key":"e_1_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Gabriele Paolacci Jesse Chandler and Panagiotis G Ipeirotis. 2010. Running experiments on amazon mechanical turk. (2010).","DOI":"10.1017\/S1930297500002205"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958885"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_2_1_80_1","volume-title":"Who are the Turkers? Worker Demographics in Amazon Mechanical Turk. (01","author":"Ross Joel","year":"2009","unstructured":"Joel Ross, Andrew Zaldivar, Lilly Irani, and Bill Tomlinson. 2009. Who are the Turkers? Worker Demographics in Amazon Mechanical Turk. (01 2009)."},{"key":"e_1_2_1_81_1","volume-title":"A study of some social factors in perception","author":"Sherif Muzafer","year":"1935","unstructured":"Muzafer Sherif. 1935. A study of some social factors in perception. Archives of Psychology (Columbia University) (1935)."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2010.05.003"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12182"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","unstructured":"James Surowiecki. 2005. The wisdom of crowds. Anchor.","DOI":"10.5555\/1095645"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.evolhumbehav.2008.07.003"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1068-3"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03214411"},{"key":"e_1_2_1_88_1","volume-title":"Advice taking in decision making: Egocentric discounting and reputation formation. Organizational behavior and human decision processes 83, 2","author":"Yaniv Ilan","year":"2000","unstructured":"Ilan Yaniv and Eli Kleinberger. 2000. Advice taking in decision making: Egocentric discounting and reputation formation. Organizational behavior and human decision processes 83, 2 (2000), 260--281."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662241111176353"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274317","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274317","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:07Z","timestamp":1750207447000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":90,"journal-issue":{"issue":"CSCW","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.1145\/3274317"],"URL":"https:\/\/doi.org\/10.1145\/3274317","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]},"assertion":[{"value":"2018-11-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}