Internet privacy concerns confirm the case for intervention
Communications of the ACM
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
The invisible future
Personalized hypermedia and international privacy
Communications of the ACM - The Adaptive Web
User Modeling and User-Adapted Interaction
Usability and privacy: a study of Kazaa P2P file-sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
'I didn't buy it for myself': privacy and Ecommerce personalization
Designing personalized user experiences in eCommerce
Impacts of user privacy preferences on personalized systems: a comparative study
Designing personalized user experiences in eCommerce
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Privacy in e-commerce: stated preferences vs. actual behavior
Communications of the ACM - Transforming China
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma
Information Technology and Management
RFID and the perception of control: the consumer's view
Communications of the ACM - Special issue: RFID
Privacy and HCI: methodologies for studying privacy issues
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
An empirical investigation of concerns of everyday tracking and recording technologies
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Information privacy in institutional and end-user tracking and recording technologies
Personal and Ubiquitous Computing
Understanding compliance to privacy guidelines using text-and video-based scenarios
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Evaluation of a pervasive awareness system designed for busy parents
Pervasive and Mobile Computing
Grounding Privacy in Mediated Communication
Computer Supported Cooperative Work
International Journal of Business Information Systems
Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems
ACM Transactions on Interactive Intelligent Systems (TiiS)
Proceedings of the Ninth Symposium on Usable Privacy and Security
Dimensionality of information disclosure behavior
International Journal of Human-Computer Studies
Hi-index | 0.00 |
This article presents an experimental study of privacy-related attitudes and behaviors regarding a music recommender service based on two types of user modeling: personality traits and musical preferences. Contrary to prior expectations and attitudes reported by participants, personality traits are frequently disclosed to the system and other users, indicating that embedded modeling of user personality does not represent an acceptance barrier. Discrepancies between privacy attitudes and behaviors have been reported before in the context of e-commerce applications, but the corresponding studies could not exclude several conflicting hypotheses, such as participants expressing attitudes outside the context of specific privacy dilemmas and contact with researchers, which may have mitigated perceived privacy risks. Arguably, these are fundamental problems in empirical investigations into privacy that apply to most published works relating to privacy and user modeling. Measures to control these factors in this study are discussed, and methodological suggestions for future research are presented.