<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Big Data</journal-id>
<journal-title>Frontiers in Big Data</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Big Data</abbrev-journal-title>
<issn pub-type="epub">2624-909X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fdata.2020.00007</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Big Data</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Types of Privacy Expectations</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Rao</surname> <given-names>Ashwini</given-names></name>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/790604/overview"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Pfeffer</surname> <given-names>Juergen</given-names></name>
<xref ref-type="corresp" rid="c002"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/417308/overview"/>
</contrib>
</contrib-group>
<aff><institution>Technical University of Munich</institution>, <addr-line>Munich</addr-line>, <country>Germany</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Surya Nepal, Data61 (CSIRO), Australia</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Federica Paci, University of Verona, Italy; Nicola Zannone, Eindhoven University of Technology, Netherlands</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Ashwini Rao <email>ashwini.rao&#x00040;gmail.com</email></corresp>
<corresp id="c002">Juergen Pfeffer <email>juergen.pfeffer&#x00040;tum.de</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Cybersecurity and Privacy, a section of the journal Frontiers in Big Data</p></fn></author-notes>
<pub-date pub-type="epub">
<day>25</day>
<month>02</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="collection">
<year>2020</year>
</pub-date>
<volume>3</volume>
<elocation-id>7</elocation-id>
<history>
<date date-type="received">
<day>08</day>
<month>09</month>
<year>2020</year>
</date>
<date date-type="accepted">
<day>04</day>
<month>02</month>
<year>2020</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2020 Rao and Pfeffer.</copyright-statement>
<copyright-year>2020</copyright-year>
<copyright-holder>Rao and Pfeffer</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract><p>Understanding user privacy expectations is important and challenging. General Data Protection Regulation (GDPR) for instance requires companies to assess user privacy expectations. Existing privacy literature has largely considered privacy expectation as a single-level construct. We show that it is a multi-level construct and people have distinct types of privacy expectations. Furthermore, the types represent distinct levels of user privacy, and, hence, there can be an ordering among the types. Inspired by expectations-related theory in non-privacy literature, we propose a conceptual model of privacy expectation with four distinct types &#x02013; Desired, Predicted, Deserved and Minimum. We validate our proposed model using an empirical within-subjects study that examines the effect of privacy expectation types on participant ratings of privacy expectation in a scenario involving collection of health-related browsing activity by a bank. Results from a stratified random sample (<italic>N</italic> = 1,249), representative of United States online population (&#x000B1;2.8%), confirm that people have distinct types of privacy expectations. About one third of the population rates the Predicted and Minimum expectation types differently, and differences are more pronounced between younger (18&#x02013;29 years) and older (60&#x0002B; years) population. Therefore, studies measuring privacy expectations must explicitly account for different types of privacy expectations.</p></abstract>
<kwd-group>
<kwd>data privacy</kwd>
<kwd>expectation</kwd>
<kwd>regulation</kwd>
<kwd>usability</kwd>
<kwd>empirical</kwd>
<kwd>user study</kwd>
</kwd-group>
<counts>
<fig-count count="0"/>
<table-count count="4"/>
<equation-count count="0"/>
<ref-count count="50"/>
<page-count count="14"/>
<word-count count="11435"/>
</counts>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<title>1. Introduction</title>
<p>Internet, mobile applications and Internet-of-Things technologies have enabled collection and use of unprecedented amount of user data. Companies collect, share and combine large amount of user data including sensitive data related to personal health, income and religion (Rao et al., <xref ref-type="bibr" rid="B38">2014</xref>). Such data practices often violate users&#x00027; privacy expectations regarding products and services (Lin et al., <xref ref-type="bibr" rid="B18">2012</xref>; Martin and Shilton, <xref ref-type="bibr" rid="B23">2016b</xref>; Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>). For instance, 90% of the participants in a study did not expect banks to collect users&#x00027; health information although banks do so (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>). Even participants who were customers of the banks that collected users&#x00027; health information did not expect it (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>). Expectations influence decision making (Hogarth, <xref ref-type="bibr" rid="B14">1987</xref>), and mismatches in expectations can adversely impact privacy decision making.</p>
<p>In order to improve consumer data privacy, regulatory agencies have sought to understand user privacy expectations (Council of The European Union, <xref ref-type="bibr" rid="B9">2016</xref>; The U.S. Federal Trade Commission, <xref ref-type="bibr" rid="B44">2019</xref>). The European Union General Data Protection Regulation (GDPR), which came into effect in 2018, emphasizes that companies should consider and carefully assess user privacy expectations.</p>
<disp-quote><p>&#x0201C;taking into consideration the <bold>reasonable expectations</bold> of data subjects&#x0201D; (Council of The European Union, <xref ref-type="bibr" rid="B9">2016</xref>)</p>
<p>&#x0201C;[&#x02026;] careful assessment including whether a data subject can <bold>reasonably expect</bold> at the time and in the context of the collection of the personal data that processing for that purpose may take place&#x0201D; (Council of The European Union, <xref ref-type="bibr" rid="B9">2016</xref>).</p></disp-quote>
<p>Hence, complying with and enforcing GDPR depends on the ability to understand user privacy expectations, which requires accurately eliciting and measuring privacy expectations.</p>
<p>Empirical studies that measure privacy expectations (Lin et al., <xref ref-type="bibr" rid="B18">2012</xref>; Martin and Shilton, <xref ref-type="bibr" rid="B22">2016a</xref>,<xref ref-type="bibr" rid="B23">b</xref>) have largely considered privacy expectation as a single-level construct. Theoretical work on the conceptual definition of privacy expectation (Altman, <xref ref-type="bibr" rid="B1">1975</xref>; Nissenbaum, <xref ref-type="bibr" rid="B29">2009</xref>; Lin et al., <xref ref-type="bibr" rid="B18">2012</xref>; Martin, <xref ref-type="bibr" rid="B21">2016</xref>) has also largely considered privacy expectation as a single-level construct. In general, the privacy domain does not treat privacy expectation as a multi-level construct with different types of privacy expectations (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>).</p>
<p>In contrast to the privacy domain, Consumer Satisfaction/Dissatisfaction (CS/D) and service quality domains treat expectation as a multi-level construct (Miller, <xref ref-type="bibr" rid="B26">1977</xref>; Gilly et al., <xref ref-type="bibr" rid="B12">1983</xref>; Zeithaml et al., <xref ref-type="bibr" rid="B50">1993</xref>). CS/D literature supports four types of <bold>consumer expectations</bold>: <italic>Ideal, Expected, Deserved</italic>, and <italic>Minimum tolerable</italic> (Miller, <xref ref-type="bibr" rid="B26">1977</xref>; Gilly et al., <xref ref-type="bibr" rid="B12">1983</xref>). Service quality literature supports three types of <bold>service expectations</bold>: <italic>Desired, Adequate</italic>, and <italic>Predicted</italic> (Zeithaml et al., <xref ref-type="bibr" rid="B50">1993</xref>). In these domains, expectations are considered as standards against which product performance and service quality are judged. Different types of expectations are different standards for customer assessment of satisfaction and quality. Distinguishing between types of expectations is important for measuring customer satisfaction and service quality.</p>
<p>Inspired by the work in Consumer Satisfaction/Dissatisfaction and service quality domains, in this work, we propose a conceptual model for privacy expectation as a multi-level construct. We use empirical evidence to show that people have distinct types of privacy expectations. The empirical evidence refutes the existing notion that privacy expectation is a single-level construct. This result has an important implication for measuring privacy expectations: studies have to explicitly identify and elicit the type of privacy expectation that is relevant for the study. Simply asking what users expect without differentiating between expectation types can lead to ambiguity. We summarize our <bold>main contributions</bold> as follows:</p>
<list list-type="bullet">
<list-item><p>We propose a conceptual model that treats privacy expectation as a multi-level construct. The model proposes four <bold>types</bold> of privacy expectations: <italic>Desired, Predicted, Deserved</italic> and <italic>Minimum</italic>. The types represent distinct levels of user privacy, and, hence, there can be an <bold>ordering</bold> among the types. The conceptual model is a contribution to privacy theory.</p></list-item>
<list-item><p>We design and implement an empirical study for measuring the four types of privacy expectations. The study tests the validity of the conceptual model. It can inform the design of future studies for measuring privacy expectations accurately. Results from the study support the conceptual model.</p></list-item>
</list>
</sec>
<sec id="s2">
<title>2. Scope of the Work</title>
<p>In this work we address theoretical and empirical questions related to privacy expectations of users. We focus on expectations related to <italic>informational privacy</italic> or <italic>data privacy</italic> and not on other conceptualizations of privacy such as privacy as a right to intimate decisions about one&#x00027;s body or sexuality. Informational privacy (Westin, <xref ref-type="bibr" rid="B47">2003</xref>) is related to collection, use, sharing, retention etc. of users&#x00027; data by products and services. Products and services generally describe their data practices in a privacy policy. If products and services collect data regarding a person&#x00027;s sexuality or intimate decisions, then such data practices fall under the scope of informational privacy.</p>
<p>We do not focus on legal doctrines such as <italic>right to privacy</italic> or <italic>expectations of privacy</italic> as defined in the law. Legal doctrines and laws related to privacy vary widely across the world. It is beyond the scope of our work to explain how they may be related to this work. The results from our work, however, could be used to understand whether privacy laws and doctrines are grounded in users&#x00027; expectations related to informational privacy.</p>
</sec>
<sec id="s3">
<title>3. Background</title>
<p>Social research methods use a two-phase approach consisting of an induction phase followed by a deduction phase to formulate and validate a conceptual model (Martin, <xref ref-type="bibr" rid="B20">2007</xref>). The induction phase goes from one or more specific observations to a more general theory regarding a conceptual model. The deduction phase generates hypotheses based on the general theory and uses empirical evidence to validate the conceptual model. In this section, we discuss the context and observations that helped us formulate a conceptual model for privacy expectation presented in section 5. We discuss the empirical study we used to validate the conceptual model in section 6.</p>
<sec>
<title>3.1. Expectation-Related Theory in Privacy Literature</title>
<p>In a prior empirical study related to privacy expectations (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>), we had asked the participants &#x0201C;Do you <bold>expect</bold> the website to ask for your consent for sharing your information?&#x0201D; In an in-person interview, one participant had replied as follows:</p>
<disp-quote><p>&#x0201C;I think the expect question is a little hard to answer because I am thinking whether you are asking me what I think should be done or what I perceive how they are doing it now.&#x0201D;</p></disp-quote>
<p>The participant differentiated between two types of privacy expectations: <bold>expected desire</bold> of how things should be and <bold>expected thinking</bold> of how things are. Furthermore, the participant suggested that we should clarify the type of privacy expectation.</p>
<disp-quote><p>&#x0201C;I think it is helpful if you make it clear otherwise you will get different answers and you don&#x00027;t know what they are answering to because some people might answer the question what they think it should be done, some people might answer the question as what it is, some people might not distinguish those [&#x02026;]&#x0201D;</p></disp-quote>
<p>The observation from the study suggested that people might have different types of privacy expectations and simply asking them what they expect could lead to different interpretations. We reviewed whether existing privacy literature treated privacy expectation as a multi-level construct, and we did not find that to be the case. Existing privacy theories considered privacy expectation as a single-level construct with one type. We summarize privacy literature related to privacy expectation in section 4.</p>
</sec>
<sec>
<title>3.2. Expectation-Related Theory in Non-privacy Literature</title>
<p>In contrast to the privacy domain, Consumer Satisfaction/Dissatisfaction (CS/D) and service quality domains treat expectation as a multi-level construct (Miller, <xref ref-type="bibr" rid="B26">1977</xref>; Gilly et al., <xref ref-type="bibr" rid="B12">1983</xref>; Zeithaml et al., <xref ref-type="bibr" rid="B50">1993</xref>). CS/D literature supports four types of <bold>consumer expectations</bold>: <italic>Ideal, Expected, Deserved</italic> and <italic>Minimum tolerable</italic> (Miller, <xref ref-type="bibr" rid="B26">1977</xref>; Gilly et al., <xref ref-type="bibr" rid="B12">1983</xref>). Service quality literature supports three types of <bold>service expectations</bold>: <italic>Desired, Adequate</italic> and <italic>Predicted</italic> (Zeithaml et al., <xref ref-type="bibr" rid="B50">1993</xref>). Consumer expectations and privacy expectations have conceptual similarities. Hence, we base our conceptual model for privacy expectation on the theories from the CS/D domain.</p>
<p>In the CS/D domain, consumer expectations are considered &#x0201C;an influence on, if not determinant of, levels of satisfaction or dissatisfaction.&#x0201D; (Gilly et al., <xref ref-type="bibr" rid="B12">1983</xref>) Models of satisfaction consider two determinants of satisfaction: expected performance of a product and evaluation of its perceived actual performance (Miller, <xref ref-type="bibr" rid="B26">1977</xref>). If the perceived actual performance is greater or equal to the expected performance consumers are satisfied otherwise dissatisfied. Miller extended this basic model of satisfaction to include <bold>types</bold> of expectations consumers might use as comparison standards for performance evaluation (Miller, <xref ref-type="bibr" rid="B26">1977</xref>). As per Gilly et al.,</p>
<disp-quote><p>&#x0201C;Miller contends that simply asking the consumer what he or she &#x02018;expects&#x00027; can result in different interpretations by different consumers&#x0201D; (Gilly et al., <xref ref-type="bibr" rid="B12">1983</xref>).</p></disp-quote>
<p>Miller conceptually recognized four types of consumer expectation types: <italic>Ideal, Expected, Deserved</italic>, and <italic>Minimum Tolerable</italic> (Miller, <xref ref-type="bibr" rid="B26">1977</xref>). The <italic>Ideal</italic> represents a wished-for level that reflects what consumers feel performance <bold>can be</bold>. The <italic>Expected</italic> reflects what consumers think performance <bold>will be</bold>. It represents an objective calculation of probabilities and does not have an affective dimension. The <italic>Deserved</italic> has an affective dimension and represents what consumers feel performance <bold>should be</bold>. Lastly, the <italic>Minimum Tolerable</italic> represents what consumers feel the lowest performance <bold>must be</bold>. It is a better than nothing option.</p>
<p>Miller suggested an ordering among the types with Ideal at the highest level and Minimum Tolerable at the lowest. He contended that the Deserved would be higher than the Expected if consumer investment in terms of time, effort, money etc. is high. Empirical work by Gilly et al. found partial support for the types and ordering among them (Gilly et al., <xref ref-type="bibr" rid="B12">1983</xref>).</p>
<p>Miller contends that consumer expectations probably vary among consumers based on experiences, demographics, psychographics etc., and they can vary within a consumer temporally based on recent experience, situation etc. (Miller, <xref ref-type="bibr" rid="B26">1977</xref>). Privacy expectations can also vary among people based on demographic characteristics, privacy concern, privacy knowledge, geographic location etc, and they can vary within a person based on context, recent experience etc. (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>).</p>
</sec>
</sec>
<sec id="s4">
<title>4. Related Work</title>
<sec>
<title>4.1. Theoretical Work on Privacy Expectation</title>
<p>Theoretical work on conceptualization of privacy expectation has largely considered it as a single-level construct (Altman, <xref ref-type="bibr" rid="B1">1975</xref>; Nissenbaum, <xref ref-type="bibr" rid="B29">2009</xref>; Lin et al., <xref ref-type="bibr" rid="B18">2012</xref>; Martin, <xref ref-type="bibr" rid="B21">2016</xref>) We discuss the conceptualizations below.</p>
<sec>
<title>4.1.1. Privacy as Boundary Regulation Process</title>
<p>Altman considers <italic>desired privacy</italic> and <italic>achieved privacy</italic> as two important aspects of privacy (Altman, <xref ref-type="bibr" rid="B1">1975</xref>). He describes the desired level as a subjective ideal internal state at any given moment. If the achieved level of privacy, as perceived by an individual or group, matches the desired level, then satisfaction results, otherwise the individual or group is unsatisfied. Altman&#x00027;s work primarily focuses on physical interaction, and Palen and Dourish extend Altman&#x00027;s theory to a world with information technology (Palen and Dourish, <xref ref-type="bibr" rid="B32">2003</xref>). They discuss how technology can disrupt privacy management by violating personal desires and social expectations of the social settings in which the technology is present.</p>
</sec>
<sec>
<title>4.1.2. Privacy as Contextual Integrity</title>
<p>In Nissenbaum&#x00027;s <italic>privacy as contextual integrity theory</italic>, privacy expectations are obligatory norms (Nissenbaum, <xref ref-type="bibr" rid="B29">2009</xref>, pp. 138&#x02013;139), which vary by context and govern the flow of information in terms of who, what and how (Nissenbaum, <xref ref-type="bibr" rid="B29">2009</xref>). Martin&#x00027;s <italic>privacy as social contract theory</italic> extends privacy as contextual integrity theory (Martin, <xref ref-type="bibr" rid="B21">2016</xref>) and views privacy expectations as social contracts that are mutually beneficial, sustainable and unstated agreements within a context. In both the theories, meeting privacy expectations requires respecting obligatory norms.</p>
</sec>
<sec>
<title>4.1.3. Privacy as Expectations</title>
<p>Lin et al. propose the concept of <italic>privacy as expectations</italic> (Lin et al., <xref ref-type="bibr" rid="B18">2012</xref>). They study privacy expectations in a mobile context and define it as &#x0201C;people&#x00027;s mental models of what they think an app does and does not do.&#x0201D;</p>
</sec>
<sec>
<title>4.1.4. Privacy Expectations as Likelihood</title>
<p>In our previous work, we proposed the concept of <italic>privacy expectations as likelihood</italic> (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>). We used questions such as &#x0201C;What is the likelihood that [website name] would collect your information&#x0201D; to elicit expectations (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>). We distinguished between two types of privacy expectations: expectations as likelihood and expectations as desires. We argued that in the privacy context most work had focused on expectations in the desired sense or preferences, or had not clarified the meaning of expectation. In this work, we build upon our prior work. We propose a conceptual model for privacy expectation with four distinct types and support the model with empirical evidence.</p>
</sec>
</sec>
<sec>
<title>4.2. Empirical Studies on Privacy Expectation</title>
<p>Prior empirical studies related to privacy expectation have also considered privacy expectation as a single-level construct. In this work, we treat privacy expectation as a multi-level construct with four types and design an empirical study to measure them explicitly. Prior empirical studies can be classified into two categories.</p>
<p>The first category consists of studies that explicitly measure privacy expectation, but treat it as a single-level construct (Earp et al., <xref ref-type="bibr" rid="B11">2005</xref>; Gomez et al., <xref ref-type="bibr" rid="B13">2009</xref>; Milne and Bahl, <xref ref-type="bibr" rid="B27">2010</xref>; Liu et al., <xref ref-type="bibr" rid="B19">2011</xref>; Lin et al., <xref ref-type="bibr" rid="B18">2012</xref>; Wijesekera et al., <xref ref-type="bibr" rid="B48">2015</xref>; Martin and Shilton, <xref ref-type="bibr" rid="B22">2016a</xref>,<xref ref-type="bibr" rid="B23">b</xref>; Micinski et al., <xref ref-type="bibr" rid="B25">2017</xref>; Naeini et al., <xref ref-type="bibr" rid="B28">2017</xref>; Senarath and Arachchilage, <xref ref-type="bibr" rid="B40">2018</xref>). These studies explicitly specify the phrase &#x0201C;privacy expectation&#x0201D; in the study. While eliciting privacy expectations, they have largely focused on expectations in the desired sense (Milne and Bahl, <xref ref-type="bibr" rid="B27">2010</xref>) or have not clarified the meaning of expectation (Earp et al., <xref ref-type="bibr" rid="B11">2005</xref>; Gomez et al., <xref ref-type="bibr" rid="B13">2009</xref>; Liu et al., <xref ref-type="bibr" rid="B19">2011</xref>; Lin et al., <xref ref-type="bibr" rid="B18">2012</xref>; Wijesekera et al., <xref ref-type="bibr" rid="B48">2015</xref>; Martin and Shilton, <xref ref-type="bibr" rid="B22">2016a</xref>,<xref ref-type="bibr" rid="B23">b</xref>; Naeini et al., <xref ref-type="bibr" rid="B28">2017</xref>).</p>
<p>The second category consists of studies that do not explicitly measure privacy expectation. These studies do not explicitly specify &#x0201C;privacy expectation&#x0201D; in the study. Some of the studies elicit users&#x00027; privacy preferences (Olson et al., <xref ref-type="bibr" rid="B31">2005</xref>; Leon et al., <xref ref-type="bibr" rid="B16">2013</xref>; Wang et al., <xref ref-type="bibr" rid="B46">2016</xref>; Naeini et al., <xref ref-type="bibr" rid="B28">2017</xref>). By measuring preferences, they may be implicitly measuring privacy expectation in the desired sense. Studies can also measure another privacy-related construct such as privacy concern (Smith et al., <xref ref-type="bibr" rid="B41">1996</xref>; Phelps et al., <xref ref-type="bibr" rid="B34">2000</xref>; Kumaraguru and Cranor, <xref ref-type="bibr" rid="B15">2005</xref>), privacy attitude (Kumaraguru and Cranor, <xref ref-type="bibr" rid="B15">2005</xref>) or privacy behavior (Pedersen, <xref ref-type="bibr" rid="B33">1999</xref>; Berendt et al., <xref ref-type="bibr" rid="B4">2005</xref>; Norberg et al., <xref ref-type="bibr" rid="B30">2007</xref>), but not explicitly privacy expectation.</p>
</sec>
</sec>
<sec id="s5">
<title>5. Conceptual Model of Privacy Expectation</title>
<p>We propose a conceptual model for <italic>privacy expectation</italic> inspired by the work on <italic>consumer expectation</italic> in Consumer Satisfaction/Dissatisfaction domain (Miller, <xref ref-type="bibr" rid="B26">1977</xref>; Gilly et al., <xref ref-type="bibr" rid="B12">1983</xref>) and <italic>service expectation</italic> in service quality domain (Zeithaml et al., <xref ref-type="bibr" rid="B50">1993</xref>). Both domains treat expectation as a multi-level construct with different types. Each type of expectation is considered a <italic>standard of evaluation</italic>. For example, consumers can evaluate products by comparing actual product performance against Ideal, Expected, Deserved or Minimum Tolerable type of consumer expectation.</p>
<p>We propose a conceptual model for <italic>privacy expectation</italic> with four types: <italic>Desired, Predicted, Deserved</italic> and <italic>Minimum</italic>. By considering multiple types of privacy expectations, we treat privacy expectation as a multi-level construct. Each type of privacy expectation is a standard of evaluation against which people evaluate what they expect in a privacy context. When asked &#x0201C;What do you expect[&#x02026;],&#x0201D; people can use any of these standards to evaluate what they expect in the scenario. <xref ref-type="table" rid="T1">Table 1</xref> summarizes the four types of privacy expectations.</p>
<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Summary of conceptual model of privacy expectation types.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>Type</bold></th>
<th valign="top" align="left"><bold>Keywords</bold></th>
<th valign="top" align="left"><bold>Description</bold></th>
<th valign="top" align="left"><bold>Critical<xref ref-type="table-fn" rid="TN1"><sup>a</sup></xref></bold></th>
<th valign="top" align="left"><bold>Privacy level</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Desired</td>
<td valign="top" align="left">ideal, want</td>
<td valign="top" align="left">what people ideally <bold>want</bold> to happen</td>
<td/>
<td valign="top" align="left">Highest</td>
</tr>
<tr>
<td valign="top" align="left">Predicted</td>
<td valign="top" align="left">think, will</td>
<td valign="top" align="left">what people <bold>think</bold> will happen</td>
<td valign="top" align="left">Knowledge</td>
<td/>
</tr>
<tr>
<td valign="top" align="left">Deserved</td>
<td valign="top" align="left">deserve, feel, should</td>
<td valign="top" align="left">what people <bold>feel</bold> should or ought to happen</td>
<td valign="top" align="left">Investment</td>
<td/>
</tr>
<tr>
<td valign="top" align="left">Minimum</td>
<td valign="top" align="left">tolerate, must</td>
<td valign="top" align="left">what people would <bold>tolerate</bold> if something must happen</td>
<td valign="top" align="left">Essentiality</td>
<td valign="top" align="left">Lowest</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="TN1"><label>a</label><p><italic>Critical determinant of Type, Knowledge of privacy practices and Investment in effort, time, money etc</italic>.</p></fn>
<p><italic>Bold values indicate important results discussed in the article</italic>.</p>
</table-wrap-foot>
</table-wrap>
<p>As discussed earlier, existing privacy theories generally consider privacy expectation as a single-level construct. Each privacy theory considers only one type of privacy expectation, which acts as a single standard of evaluation. However, there are differences in how each privacy theory conceptualizes privacy expectation. Below, we discuss the four proposed privacy expectation types and how they relate to existing conceptualizations of privacy expectation.</p>
<sec>
<title>5.1. Desired Type</title>
<p>The <italic>Desired</italic> type is what people ideally want to happen. It is similar to the desired level of privacy used as the standard of evaluation in Altman&#x00027;s privacy theory (Altman, <xref ref-type="bibr" rid="B1">1975</xref>). The desired level of privacy as per Altman is an ideal internal state at any moment, and people evaluate achieved level of privacy against the desired level of privacy.</p>
</sec>
<sec>
<title>5.2. Predicted Type</title>
<p>The <italic>Predicted</italic> type is what people think will happen. Here &#x0201C;will&#x0201D; indicates a definite future action or likely prediction. The Predicted type is similar to the <italic>privacy as expectations</italic> concept proposed by Lin et al. because their standard of evaluation is what people think a mobile app does or does not do (Lin et al., <xref ref-type="bibr" rid="B18">2012</xref>). In our earlier work, we defined the concept of <italic>privacy expectations as likelihood</italic> as a measure of what users expect will likely happen (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>). Hence, the Predicted type is also related to it. Accurately predicting website data practices may require knowledge of privacy practices. For example, a user who understands how IP address works may have different expectation about collection of location information than a user who does not. Our study on privacy expectations as likelihood found that a user&#x00027;s privacy knowledge impacted user expectations. For example, privacy knowledge impacted if a user expected the collection of health information in a particular scenario. Hence, we hypothesize that privacy knowledge will impact the Predicted type more than the other three types.</p>
</sec>
<sec>
<title>5.3. Deserved Type</title>
<p>Compared to other types, the Deserved type has an affective dimension that focuses on feelings. We consider that it is critically determined by evaluation of &#x0201C;investment and rewards&#x0201D; in a scenario. Therefore, the <italic>Deserved</italic> type is what people feel should or ought to happen given their investment. Here investment can be in terms of time, effort, money, loyalty etc. When investment is high, people can feel that they deserve a reward. For example, if people paid for a website service for a long time, they may feel that they deserve a reward such as 1 month of free service a year. On the contrary, when investment is low, people may feel that they do not deserve a reward. They may even feel that they deserve a penalty. For example, if they are not paying for a website service, they may feel they deserve to view unwanted advertisements, which could be perceived as a penalty. In a data economy, users can avail &#x0201C;free&#x0201D; services in exchange for their personal data, and companies can monetize the data via advertisements and other revenue models (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>). Hence, in the privacy context, the penalty may be a decrease in privacy (Dinev and Hart, <xref ref-type="bibr" rid="B10">2006</xref>).</p>
<p>The Deserved type is related to the standard of evaluation in Nissenbaum&#x00027;s <italic>privacy as contextual integrity</italic> theory and Martin&#x00027;s <italic>privacy as social contract</italic> theory. In Nissenbaum&#x00027;s theory, the standard of evaluation is based on context-relative informational norms (Nissenbaum, <xref ref-type="bibr" rid="B29">2009</xref>). Nissenbaum considers norms that are obligatory (Nissenbaum, <xref ref-type="bibr" rid="B29">2009</xref>, pp. 138&#x02013;139). She attributes four key elements to norms including &#x0201C;[&#x02026;] (a) a prescriptive &#x0201C;ought element&#x0201D;; (b) a norm subject upon whom the obligation expressed in the norm falls [&#x02026;].&#x0201D; Martin considers that individuals make decisions about sharing and use with obligations in mind (Martin, <xref ref-type="bibr" rid="B21">2016</xref>). Because the Deserved type focuses on what people feel ought to happen, it is obligatory in the sense considered by Nissenbaum and Martin.</p>
<p>Martin considers that people use a rule-utilitarian approach that analyzes costs and benefits to develop norms (Martin, <xref ref-type="bibr" rid="B24">2013</xref>). The cost may or may not be a decrease in privacy. Instead of &#x0201C;cost and benefit,&#x0201D; we prefer to use &#x0201C;investment and reward/penalty&#x0201D; in order to emphasize the affective dimension of the Deserved type. We hypothesize that investment and reward/penalty will impact the Deserved type more than other privacy expectation types.</p>
</sec>
<sec>
<title>5.4. Minimum Type</title>
<p>The <italic>Minimum</italic> type is what people would tolerate if something must happen; something is essential to fulfill a need and there is not much choice. Here &#x0201C;must&#x0201D; indicates a stronger obligation than &#x0201C;should&#x0201D; or &#x0201C;ought.&#x0201D; The Minimum type is critically determined by a lack of options from which people can choose based on desires or investment-reward analysis. For example, people may not generally tolerate collection of health information on a job website, but they may do so if it is required to apply for a specific job. The Minimum type is not strongly related to any standard of evaluation in existing privacy theories. Hence, it is our contribution to privacy theory.</p>
</sec>
<sec>
<title>5.5. Ordering of Privacy Expectation Types</title>
<p>We hypothesize that there can be an ordering among the privacy expectation types. Different types of privacy expectations can represent different levels of user privacy. If people were to assign a score to each type, there could be an ordering among the scores. Given that the Desired type is the most ideal type, it would have the highest score. In contrast, the Minimum type is something that is just tolerated, and, hence, would have the lowest score. We hypothesize that the scores for Predicted and Deserved would be between the scores for Desired and Minimum. The Deserved score could be higher than the Predicted score if &#x0201C;investment&#x0201D; is high, otherwise its score would be lower than the Predicted score.</p>
</sec>
</sec>
<sec id="s6">
<title>6. Empirical Study</title>
<p>We designed an empirical study to test our proposed conceptual model for privacy expectation types. We use the study to provide evidence that contradicts the prevailing assumption that privacy expectation is a single-level construct. It supports our claim that privacy expectation is a multi-level construct. The empirical study tested the following hypotheses:</p>
<list list-type="bullet">
<list-item><p>Are there statistically significant differences among Desired, Predicted, Deserved and Minimum privacy expectation types?</p></list-item>
<list-item><p>Is there a statistically significant difference between the orderings <italic>Desired</italic>&#x0003E;<italic>Predicted</italic>&#x0003E;<italic>Deserved</italic>&#x0003E;<italic>Minimum</italic> and <italic>Desired</italic>&#x0003E;<italic>Deserved</italic>&#x0003E;<italic>Predicted</italic>&#x0003E;<italic>Minimum</italic>?</p></list-item>
<list-item><p>Is the impact of knowledge significantly more on the Predicted type?</p></list-item>
<list-item><p>Is the impact of investment significantly more on the Deserved type?</p></list-item>
</list>
<p>We use a contradictory evidence approach. In this approach, a single piece of evidence that contradicts the existing assumption is sufficient. For instance, existence of a single black swan is sufficient to contradict the assumption that all swans are white. We use results from a single realistic scenario as contradictory evidence. To make the evidence stronger, we selected an extreme or deviant case scenario that was unlikely to support a multi-level conceptualization of privacy expectation.</p>
<sec>
<title>6.1. Sample and Procedure</title>
<p>We conducted the study as per the institutional guidelines for human-subject research and adhered to the basic principles of ethical research. We ran the study in August 2017 with an initial sample consisting of 1,437 adults (18&#x0002B; years) selected from a United States online survey panel (SurveyMonkey, <xref ref-type="bibr" rid="B42">2019</xref>). The sample consists of US adults with access to the Internet and is age and gender balanced as per US census. It is a stratified random sample, which reduces self-selection bias. A total of 1249 participants completed the survey (completion rate 86.91%). The final sample consisting of participants who completed the survey (<italic>N</italic>=1,249) is representative of the US online population with a margin of error of &#x000B1;2.8%.</p>
<p>Participants selected from the online survey panel were invited to take a self-administered questionnaire that elicited their privacy expectations regarding a realistic privacy-sensitive scenario involving collection of health-related browsing activity by a bank. We received informed consent at the beginning of the survey. Participants completed the survey to donate $.50 to their preferred charity and enter a sweepstakes to win a $100 gift card (odds of winning 1/60,000). On average, panelists can take two surveys per week (SurveyMonkey, <xref ref-type="bibr" rid="B42">2019</xref>). There were no repeat participants in our survey, which reduced the impact of learning effects.</p>
</sec>
<sec>
<title>6.2. Variables</title>
<p>The independent variable in our study is the privacy expectation type with four levels: Desired, Predicted, Deserved and Minimum. The dependent variable is the participant&#x00027;s privacy expectation rating for a given expectation type. Participants expressed their privacy expectations by rating their level of agreement or disagreement to four statements corresponding to the four expectation types. We used a within-subjects (repeated-measures) design where each participant rated all expectation types. We manipulated the independent variable by varying the description of four statements. To reduce order effects, we reversed the expectation questions for half of the participants.</p>
</sec>
<sec>
<title>6.3. Study Scenario</title>
<p>As discussed earlier, we use a contradictory evidence approach. Although privacy is contextual and expectations may vary in different scenarios, evidence from one ecologically valid scenario is sufficient to support our main hypothesis: &#x0201C;do distinct types of privacy expectations exist?&#x0201D; To this end, we choose a realistic scenario. Furthermore, to provide strong evidence for our main hypothesis, we use an extreme or deviant case scenario where our main hypothesis is likely to fail. Generally, differences found in an extreme or deviant case scenario are likely to be amplified in an average case scenario.</p>
<p>To ensure that the results from the study are meaningful, we chose a scenario based on reality. Banks in the United States can collect health information from users (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>; PNC Bank, <xref ref-type="bibr" rid="B35">2017</xref>; Bank of America, <xref ref-type="bibr" rid="B3">2019</xref>). For instance, Bank of America, the second largest commercial bank in the United States (The Federal Reserve, <xref ref-type="bibr" rid="B43">2019</xref>) collects protected health information from users (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>; Bank of America, <xref ref-type="bibr" rid="B3">2019</xref>). Banks can collect health-related browsing activities of users from health websites using tracking mechanisms (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>; PNC Bank, <xref ref-type="bibr" rid="B35">2017</xref>; Bank of America, <xref ref-type="bibr" rid="B3">2019</xref>). For example, PNC Bank, the sixth largest commercial bank in the United States (The Federal Reserve, <xref ref-type="bibr" rid="B43">2019</xref>) can collect health-related browsing activities of users (PNC Bank, <xref ref-type="bibr" rid="B35">2017</xref>). Ghostery (ghostery.com), a tool to identify trackers showed several trackers on popular health websites such as WebMD (71), MedlinePlus (4), and MedicineNet (16). Tracking mechanisms can allow banks to uniquely identify users e.g., by name and postal address (Rao et al., <xref ref-type="bibr" rid="B38">2014</xref>).</p>
<p>The study elicited users&#x00027; privacy expectations regarding a realistic scenario involving collection of health-related browsing activity by a bank. In addition to being realistic, this was an extreme or deviant case scenario that was unlikely to support our main hypothesis, and the four privacy expectation types would not be significantly different. For example, given the sensitive nature of health-related information, it was unlikely that users would desire collection of health-related information by banks (Desired expectation). Our prior study showed that people did not predict collection of health-related information by banks (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>). Hence, users were unlikely to predict collection of health-related information by banks (Predicted expectation). Therefore, Desired and Predicted expectations would not be different.</p>
<p>To elicit privacy expectations regarding a data practice, empirical studies decompose the data practice into five components: <italic>action, data, source, target</italic> and <italic>purpose</italic> (Lin et al., <xref ref-type="bibr" rid="B18">2012</xref>; Martin and Shilton, <xref ref-type="bibr" rid="B22">2016a</xref>,<xref ref-type="bibr" rid="B23">b</xref>). We decomposed the banking data practice as follows. The <italic>action</italic> was <italic>collection</italic>. The <italic>data</italic> was <italic>health-related browsing activity</italic>. We defined it as browsing activities on websites such as WebMD, MedlinePlus or MedicineNet that people might use/visit to find information on health conditions, symptoms or treatments. The <italic>source</italic> of the data was the <italic>participant</italic>, and the <italic>target</italic> was a <italic>bank</italic>. The <italic>purpose</italic> of data collection was specified as &#x0201C;<italic>to identify financial needs and provide relevant service</italic>.&#x0201D; To ensure realism, the wording was based on the privacy policy of PNC Bank (PNC Bank, <xref ref-type="bibr" rid="B35">2017</xref>), the sixth largest commercial bank in the United States (The Federal Reserve, <xref ref-type="bibr" rid="B43">2019</xref>).</p>
</sec>
<sec>
<title>6.4. Questionnaire Design</title>
<p>As per survey best practices, the survey wording was iteratively improved based on the feedback from Cognitive Interviews (Willis, <xref ref-type="bibr" rid="B49">2004</xref>) and pilot studies. During the Cognitive Interviews (<italic>N</italic> = 5), we asked the participants to the express in their own words what they understood from each question. We wanted to ensure that the wording conveyed what we wanted to measure. At the end of the first (<italic>N</italic> = 130) and the second (<italic>N</italic> = 60) pilot studies, we asked the participants if they had difficulty answering any question, and if yes, what about the question made it difficult to answer. Participants were also given the option of suggesting improvements to the questions. Overall feedback suggested that the target group interpreted the questions in the way we intended and was able to understand the differences among the four privacy expectation types. The complete survey questionnaire is available in the <xref ref-type="supplementary-material" rid="SM1">Supplementary Material</xref>.</p>
<p>We did not use attention check questions as per advice from recent research on survey methodology (Berinsky et al., <xref ref-type="bibr" rid="B5">2014</xref>; Clifford and Jerit, <xref ref-type="bibr" rid="B7">2015</xref>; Anduiza and Galais, <xref ref-type="bibr" rid="B2">2017</xref>). Such questions may increase Social Desirability Bias (Clifford and Jerit, <xref ref-type="bibr" rid="B7">2015</xref>), which is an important issue for surveys related to privacy. Discarding responses based on attention check questions can introduce demographic bias related to gender, age and education (Berinsky et al., <xref ref-type="bibr" rid="B5">2014</xref>; Clifford and Jerit, <xref ref-type="bibr" rid="B7">2015</xref>; Anduiza and Galais, <xref ref-type="bibr" rid="B2">2017</xref>), which can impact nationally representative surveys. Lastly, our pilot results indicated that the median completion time was short &#x0007E;3min, which reduces the decline in attention due to satisfying behavior.</p>
<sec>
<title>6.4.1. Survey Introduction</title>
<p>To reduce the impact of demand characteristics, we informed the participants that the purpose of the survey was to understand their opinions regarding websites. Asking for opinions also reduces the threat of knowledge questions and decreases guessing (Bradburn et al., <xref ref-type="bibr" rid="B6">2004</xref>, pp. 203-205). To further reduce guessing, we told them that they should answer the questions as accurately as possible, but it was OK to say &#x0201C;Don&#x00027;t know.&#x0201D; We did not mention &#x0201C;privacy&#x0201D; to avoid priming effects. To reduce social desirability bias, participants were assured that their answers were anonymous, and that we did not collect any personally identifiable information including IP address. We told the participants that their answers were important to us, and they could take their time reading and answering the questions.</p>
</sec>
<sec>
<title>6.4.2. Pre-questionnaire</title>
<p>To provide context regarding our study scenario, we asked participants about their usage of health-information and banking websites. We also measured their &#x0201C;investment&#x0201D; to test the hypothesis whether investment impacted the Deserved type significantly more than other types.</p>
<p>To reduce order effects, the two blocks related to health (2 questions) and banking (3 questions) were shown in random order. Questions were worded to reduce social desirability bias e.g., &#x0201C;Some people use [&#x02026;] Other people do not[&#x02026;].&#x0201D; Answer options included &#x0201C;Don&#x00027;t know/ Not sure&#x0201D; and &#x0201C;Decline to answer.&#x0201D;</p>
<p>The health block had two closed-ended questions. First asked whether participants had used websites such as WebMD, MedlinePlus or MedicineNet to find information on health conditions, symptoms or treatments. Second asked them to think about their last visit and tell us whether they recalled the information they were trying to find.</p>
<p>The banking block had three closed-ended questions. First question asked if participants had used websites to check Checking/Savings account balance. Second question asked whether they currently had a Checking/Savings account. Third question asked the approximate year in which they opened their account. We considered the number of years since opening the account as a measure of &#x0201C;investment&#x0201D; that could impact the Deserved type.</p>
</sec>
<sec>
<title>6.4.3. Main Questionnaire</title>
<p>We instructed the participants to imagine a scenario where they were a customer of a bank, and they had a Checking/ Savings account with the bank. Each participant rated four Likert-type items one each for Desired, Predicted, Deserved and Minimum privacy expectation types. Ratings were used as the dependent variable to analyze the impact of the independent variable, privacy expectation type. For the rating task, participants were instructed.</p>
<disp-quote><p>&#x0201C;In this scenario, tell us how much you <bold>agree or disagree</bold> with the statements below. Use a scale from 0 to 10, with 0 indicating strongly disagree and 10 indicating strongly agree.&#x0201D;</p></disp-quote>
<p>To distinguish neutral from undecided, the scale included a &#x0201C;Don&#x00027;t know/ Not sure&#x0201D; option. Explicitly including a &#x0201C;Don&#x00027;t know&#x0201D; option is important for determining level of knowledge (Bradburn et al., <xref ref-type="bibr" rid="B6">2004</xref>, pp. 203&#x02013;205). A &#x0201C;Don&#x00027;t know&#x0201D; option reduces guessing and indicates that &#x0201C;Don&#x00027;t know&#x0201D; answers are expected and acceptable (Bradburn et al., <xref ref-type="bibr" rid="B6">2004</xref>, pp. 203&#x02013;205). We hypothesized that knowledge impacts the Predicted type significantly more than the other types, and a &#x0201C;Don&#x00027;t know&#x0201D; option allowed us to test that hypothesis. Because of the privacy-sensitive scenario, the scale also included a &#x0201C;Decline to answer&#x0201D; option.</p>
<p>Prior empirical studies (Martin and Shilton, <xref ref-type="bibr" rid="B22">2016a</xref>,<xref ref-type="bibr" rid="B23">b</xref>) have used a similar rating scale to measure and compare user privacy expectations for multiple items. By measuring level of agreement, we can compare users&#x00027; rating for four expectation-related items. An 11-point scale measures finer differences among four expectation types. It allows participants to distinguish among four items with a probability (&#x0007E;54%) greater than chance (50%). Smaller scales have a probability less than chance e.g., 9-point (&#x0007E;46%), 7-point (&#x0007E;35%) and 5-point (&#x0007E;19%). Likert-type item data measured on a 11-point scale is closer to interval level of scaling (Leung, <xref ref-type="bibr" rid="B17">2011</xref>), which can be used with more powerful statistical tests.</p>
<p>We empirically elicited four types of privacy expectations similar to how Gilly et al. empirically elicited four types of consumer expectations (Gilly et al., <xref ref-type="bibr" rid="B12">1983</xref>). Participants rated how much they <bold>agree or disagree</bold> with the four statements given below. The statements used keywords identified in the conceptual model (<xref ref-type="table" rid="T1">Table 1</xref>) to capture the impact of four privacy expectation types: <bold>want</bold> for Desired, <bold>think&#x02026;will</bold> for Predicted, <bold>deserve</bold> for Deserved and <bold>tolerate&#x02026;must</bold> for Minimum.</p>
<disp-quote><p>&#x0201C;I <bold>want</bold> my bank to collect my health-related browsing activity to identify my financial needs and provide service relevant to me.&#x0201D;</p>
<p>&#x0201C;I <bold>think</bold> my bank <bold>will</bold> collect my health-related browsing activity to identify my financial needs and provide service relevant to me.&#x0201D;</p>
<p>&#x0201C;I <bold>deserve</bold> that my bank collect my health-related browsing activity to identify my financial needs and provide service relevant to me.&#x0201D;</p>
<p>&#x0201C;I would <bold>tolerate</bold> if my bank <bold>must</bold> collect my health-related browsing activity to identify my financial needs and provide service relevant to me.&#x0201D;</p></disp-quote>
<p>Stating both sides of the attitude scale (<bold>agree or disagree</bold>) and a repeated-measures design reduced the impact of acquiescence bias. Each statement was a positive affirmative statement without double-negatives. It ensured that higher scores corresponded to higher levels of agreement to collection of data. We stated the purpose of collection as &#x0201C;to identify my financial needs and provide service relevant to me.&#x0201D; As discussed earlier, the purpose was carefully chosen to ensure realism. Instructions for the rating task provided a definition for &#x0201C;health-related browsing activity.&#x0201D;</p>
</sec>
<sec>
<title>6.4.4. Post-questionnaire</title>
<p>We asked demographic questions at the end of the survey. We asked a question regarding the highest education level completed. We received information about gender (male, female), age range (18&#x02013;29, 30&#x02013;44, 45&#x02013;59, 60&#x0002B;), household income and US location for each participant from the survey panel. We asked two open-ended questions soliciting participant feedback. They could explain if they had difficulty in answering questions and tell us about issues that they thought were important for the study.</p>
</sec>
</sec>
</sec>
<sec sec-type="results" id="s7">
<title>7. Results</title>
<p>We analyzed all completed survey responses (<italic>N</italic> &#x0003D; 1, 249). The median time to complete the survey was 3 min and 8 s. <xref ref-type="table" rid="T2">Table 2</xref> lists participant demographics gender, age range, highest education level, household income, and US geographical region. For analysis, we set the level of significance &#x003B1; &#x0003D; 0.05. We adjusted &#x003B1; for pairwise comparisons using Bonferroni correction. For example, we set &#x003B1; &#x0003D; 0.008 for comparisons between four expectation types.</p>
<table-wrap position="float" id="T2">
<label>Table 2</label>
<caption><p>Participant demographics (<italic>N</italic> &#x0003D; 1, 249).</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left"><bold>Gender</bold></th>
<th valign="top" align="center"><bold><italic>N</italic></bold></th>
<th valign="top" align="center"><bold>%</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left"><bold>Female</bold></td>
<td valign="top" align="center">672</td>
<td valign="top" align="center">53.80%</td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td valign="top" align="left"><bold>Male</bold></td>
<td valign="top" align="center">577</td>
<td valign="top" align="center">46.20%</td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td valign="top" align="left"><bold>Age range (years)</bold></td>
<td valign="top" align="center"><italic>N</italic></td>
<td valign="top" align="center">%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>18&#x02013;29</bold></td>
<td valign="top" align="center">231</td>
<td valign="top" align="center">18.49%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>30&#x02013;44</bold></td>
<td valign="top" align="center">338</td>
<td valign="top" align="center">27.06%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>45&#x02013;59</bold></td>
<td valign="top" align="center">229</td>
<td valign="top" align="center">18.33%</td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td valign="top" align="left"><bold>60&#x0002B;</bold></td>
<td valign="top" align="center">451</td>
<td valign="top" align="center">36.11%</td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td valign="top" align="left"><bold>Education</bold></td>
<td valign="top" align="center"><italic>N</italic></td>
<td valign="top" align="center">%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Grade 1-8/ no formal school</bold></td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">0.40%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Grade 9-11/ 12 no diploma</bold></td>
<td valign="top" align="center">29</td>
<td valign="top" align="center">2.32%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Grade 12 with diploma</bold></td>
<td valign="top" align="center">128</td>
<td valign="top" align="center">10.25%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Some college, no degree</bold></td>
<td valign="top" align="center">256</td>
<td valign="top" align="center">20.50%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Two-year college degree</bold></td>
<td valign="top" align="center">113</td>
<td valign="top" align="center">9.05%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Four-year college degree</bold></td>
<td valign="top" align="center">308</td>
<td valign="top" align="center">24.66%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Some postgraduate school</bold></td>
<td valign="top" align="center">102</td>
<td valign="top" align="center">8.17%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Postgraduate degree</bold></td>
<td valign="top" align="center">291</td>
<td valign="top" align="center">23.30%</td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td valign="top" align="left"><bold>Decline to answer</bold></td>
<td valign="top" align="center">17</td>
<td valign="top" align="center">1.36%</td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td valign="top" align="left"><bold>Household income</bold></td>
<td valign="top" align="center"><italic>N</italic></td>
<td valign="top" align="center">%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>$0 to $9,999</bold></td>
<td valign="top" align="center">92</td>
<td valign="top" align="center">7.37%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>$10,000 to $24,999</bold></td>
<td valign="top" align="center">133</td>
<td valign="top" align="center">10.65%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>$25,000 to $49,999</bold></td>
<td valign="top" align="center">231</td>
<td valign="top" align="center">18.49%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>$50,000 to $74,999</bold></td>
<td valign="top" align="center">164</td>
<td valign="top" align="center">13.13%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>$75,000 to $99,999</bold></td>
<td valign="top" align="center">137</td>
<td valign="top" align="center">10.97%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>$100,000 to $124,999</bold></td>
<td valign="top" align="center">120</td>
<td valign="top" align="center">9.61%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>$125,000 to $149,999</bold></td>
<td valign="top" align="center">59</td>
<td valign="top" align="center">4.72%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>$150,000 to $174,999</bold></td>
<td valign="top" align="center">32</td>
<td valign="top" align="center">2.56%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>$175,000 to $199,999</bold></td>
<td valign="top" align="center">26</td>
<td valign="top" align="center">2.08%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>$200,000 and up</bold></td>
<td valign="top" align="center">61</td>
<td valign="top" align="center">4.88%</td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td valign="top" align="left"><bold>Decline to answer</bold></td>
<td valign="top" align="center">194</td>
<td valign="top" align="center">15.53%</td>
</tr>
<tr style="border-bottom: thin solid #000000;">
<td valign="top" align="left"><bold>US region</bold></td>
<td valign="top" align="center"><italic>N</italic></td>
<td valign="top" align="center">%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>East North Central</bold></td>
<td valign="top" align="center">186</td>
<td valign="top" align="center">14.89%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>East South Central</bold></td>
<td valign="top" align="center">63</td>
<td valign="top" align="center">5.04%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Middle Atlantic</bold></td>
<td valign="top" align="center">151</td>
<td valign="top" align="center">12.09%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Mountain</bold></td>
<td valign="top" align="center">111</td>
<td valign="top" align="center">8.89%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>New England</bold></td>
<td valign="top" align="center">71</td>
<td valign="top" align="center">5.68%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Pacific</bold></td>
<td valign="top" align="center">222</td>
<td valign="top" align="center">17.77%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>South Atlantic</bold></td>
<td valign="top" align="center">226</td>
<td valign="top" align="center">18.09%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>West North Central</bold></td>
<td valign="top" align="center">98</td>
<td valign="top" align="center">7.85%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>West South Central</bold></td>
<td valign="top" align="center">109</td>
<td valign="top" align="center">8.73%</td>
</tr>
<tr>
<td valign="top" align="left"><bold>Decline to answer</bold></td>
<td valign="top" align="center">12</td>
<td valign="top" align="center">0.96%</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec>
<title>7.1. Multiple Privacy Expectation Types Exist</title>
<p>Empirical results support the hypothesis that privacy expectation is a multi-level construct. People can have multiple types of privacy expectations.</p>
<sec>
<title>7.1.1. Privacy Expectation Types</title>
<p>To examine participants&#x00027; ratings for the four expectation types, we considered numerical (0-strongly disagree to 10-strongly agree) (<italic>n</italic> &#x0003D; 1, 038), but not &#x0201C;Don&#x00027;t know&#x0201D; or &#x0201C;Decline to answer&#x0201D; responses. We treated the ratings, measured on a fine grained 11-point scale, as interval data. <xref ref-type="table" rid="T3">Table 3</xref> lists mean, SD, minimum, quantiles and maximum of the ratings for four expectation types and their six pairwise comparisons. The median ratings for all expectation types are 0. At least 50% of the participants strongly disagreed to collection of health-related browsing activity by a bank; these participants did not desire it (Desired), predict it will happen (Predicted), feel they deserved it (Deserved), or tolerate it under any circumstances (Minimum). Ratings for Desired and Deserved are 0 even at the 75<italic>th</italic> quantile. However, at the 75<italic>th</italic> quantile, ratings for Predicted and Minimum are &#x02265;1 indicating that participants disagree to a lesser extent. At the 90<italic>th</italic> quantile, about 10% of the participants somewhat agree (&#x02265;5) that banks will collect health-related browsing activity data, and they tolerate such collection under some circumstances. Even at the 90<italic>th</italic> quantile, participants disagree (&#x02265;3) that they desire or deserve such collection.</p>
<table-wrap position="float" id="T3">
<label>Table 3</label>
<caption><p>Participant ratings of privacy expectation types (<italic>n</italic> = 1,038).</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>Type</bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold>Mean</bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold><italic>SD</italic></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold>Min</bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold><italic>Q</italic></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold><italic>Q</italic></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold><italic>Q</italic></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold><italic>Q</italic></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold><italic>Q</italic></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold>Med</bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold><italic>Q</italic></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold><italic>Q</italic></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold><italic>Q</italic></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold><italic>Q</italic></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold><italic>Q</italic></bold></th>
<th valign="top" align="center" style="border-bottom: thin solid #000000;"><bold>Max</bold></th>
</tr>
<tr>
<th/>
<th/>
<th/>
<th/>
<th valign="top" align="center"><bold>5%</bold></th>
<th valign="top" align="center"><bold>10%</bold></th>
<th valign="top" align="center"><bold>15%</bold></th>
<th valign="top" align="center"><bold>20%</bold></th>
<th valign="top" align="center"><bold>25%</bold></th>
<th/>
<th valign="top" align="center"><bold>75%</bold></th>
<th valign="top" align="center"><bold>80%</bold></th>
<th valign="top" align="center"><bold>85%</bold></th>
<th valign="top" align="center"><bold>90%</bold></th>
<th valign="top" align="center"><bold>95%</bold></th>
<th/>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Predicted</td>
<td valign="top" align="center">1.48</td>
<td valign="top" align="center">2.58</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center" style="background-color:#7f8184">2</td>
<td valign="top" align="center" style="background-color:#7f8184">3</td>
<td valign="top" align="center" style="background-color:#7f8184">5</td>
<td valign="top" align="center" style="background-color:#7f8184">6</td>
<td valign="top" align="center" style="background-color:#7f8184">8</td>
<td valign="top" align="center">10</td>
</tr>
<tr>
<td valign="top" align="left">Minimum</td>
<td valign="top" align="center">1.13</td>
<td valign="top" align="center">2.36</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center" style="background-color:#a9abae">1</td>
<td valign="top" align="center" style="background-color:#a9abae">2</td>
<td valign="top" align="center" style="background-color:#a9abae">3</td>
<td valign="top" align="center" style="background-color:#a9abae">5</td>
<td valign="top" align="center" style="background-color:#a9abae">7</td>
<td valign="top" align="center">10</td>
</tr>
<tr>
<td valign="top" align="left">Deserved</td>
<td valign="top" align="center">0.91</td>
<td valign="top" align="center">2.15</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center" style="background-color:#c8c9cb">0</td>
<td valign="top" align="center" style="background-color:#c8c9cb">1</td>
<td valign="top" align="center" style="background-color:#c8c9cb">2</td>
<td valign="top" align="center" style="background-color:#c8c9cb">3.1</td>
<td valign="top" align="center" style="background-color:#c8c9cb">6</td>
<td valign="top" align="center">10</td>
</tr>
<tr>
<td valign="top" align="left">Desired</td>
<td valign="top" align="center">0.84</td>
<td valign="top" align="center">2.12</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center" style="background-color:#f0f0f1">0</td>
<td valign="top" align="center" style="background-color:#f0f0f1">1</td>
<td valign="top" align="center" style="background-color:#f0f0f1">2</td>
<td valign="top" align="center" style="background-color:#f0f0f1">3</td>
<td valign="top" align="center" style="background-color:#f0f0f1">6</td>
<td valign="top" align="center">10</td>
</tr>
<tr>
<td valign="top" align="left">P-Di</td>
<td valign="top" align="center">0.64</td>
<td valign="top" align="center">2.14</td>
<td valign="top" align="center">-10</td>
<td valign="top" align="center">-1</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">10</td>
</tr>
<tr>
<td valign="top" align="left">P-De</td>
<td valign="top" align="center">0.58</td>
<td valign="top" align="center">2.17</td>
<td valign="top" align="center">-10</td>
<td valign="top" align="center">-1</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">10</td>
</tr>
<tr>
<td valign="top" align="left">P-M</td>
<td valign="top" align="center">0.35</td>
<td valign="top" align="center">2.45</td>
<td valign="top" align="center">-10</td>
<td valign="top" align="center">-3</td>
<td valign="top" align="center">-1</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0.2</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">10</td>
</tr>
<tr>
<td valign="top" align="left">M-Di</td>
<td valign="top" align="center">0.29</td>
<td valign="top" align="center">1.69</td>
<td valign="top" align="center">-10</td>
<td valign="top" align="center">-1</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">10</td>
</tr>
<tr>
<td valign="top" align="left">M-De</td>
<td valign="top" align="center">0.22</td>
<td valign="top" align="center">1.54</td>
<td valign="top" align="center">-10</td>
<td valign="top" align="center">-1</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">10</td>
</tr>
<tr>
<td valign="top" align="left">De-Di</td>
<td valign="top" align="center">0.07</td>
<td valign="top" align="center">1.29</td>
<td valign="top" align="center">-10</td>
<td valign="top" align="center">-1</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">10</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><italic>The gray shades indicate important results discussed in the article</italic>.</p>
</table-wrap-foot>
</table-wrap>
<p>As seen from <xref ref-type="table" rid="T3">Table 3</xref>, the mean values of the ratings for the four expectation types are different: Predicted (1.48), Minimum (1.13), Deserved (0.91), and Desired (0.84). However, the distribution of ratings is not normal, and mean values may not accurately estimate significance. Hence, we compare rank ordering of the ratings by using nonparametric tests that treat rankings as ordinal data. Friedman test for measuring differences between related observations (Conover, <xref ref-type="bibr" rid="B8">1999</xref>), indicated a significant overall difference among the expectation types <italic>F</italic><sub>(3)</sub> &#x0003D; 53.4264; <italic>p</italic> &#x0003C; 0.00001. Pairwise comparisons of expectation types showed significant differences <italic>p</italic> &#x0003C; 0.00003 within all pairs except one: (Desired, Deserved). The pairs (Predicted, Desired), (Predicted, Deserved), (Predicted, Minimum), (Minimum, Desired), and (Minimum, Deserved) were significantly different. This result supports the hypothesis that people have different types of privacy expectations.</p>
<p>The overall difference between Desired and Deserved types is not significant. There is strong positive correlation (Spearman &#x003C1; &#x0003D; 0.81, <italic>p</italic> &#x0003C; 0.0001) between them. This indicates that people who have higher desire for collection of health information feel more strongly that they deserve such collection. Results may be different in other scenarios. In a less privacy-sensitive scenario, we may find negative correlation. For example, when watching movies for free, people may have low desire for ads, but feel strongly that they deserve ads. Interaction between context sensitivity and the Deserved type needs further investigation.</p>
</sec>
<sec>
<title>7.1.2. Population Estimates</title>
<p>Using Binomial interval estimation, we computed interval estimates for <italic>p</italic>, the proportion of the population that would give different scores for two different privacy expectation types. We assume that our sample (<italic>n</italic> &#x0003D; 1, 038) is representative of the population. We computed 99.2% confidence intervals for pairs of privacy expectation types using the Wilson score. Between 19% to 26% of the population rates Desired and Minimum differently indicating that, even in a privacy-sensitive scenario, the desired level of privacy can differ from the minimum tolerable level of privacy. The largest proportion of the population, 29% to 36%, rates Predicted and Minimum differently. The smallest proportion, 13% to 19%, rates Deserved and Desired differently.</p>
</sec>
</sec>
<sec>
<title>7.2. Privacy Expectation Types Can Be Ordered</title>
<p>We hypothesized that there may be a statistically significant difference between the two orderings of expectation types <italic>Desired</italic> &#x0003E; <italic>Predicted</italic> &#x0003E; <italic>Deserved</italic> &#x0003E; <italic>Minimum</italic> and <italic>Desired</italic> &#x0003E; <italic>Deserved</italic> &#x0003E; <italic>Predicted</italic> &#x0003E; <italic>Minimum</italic>. In our study, higher ratings indicate higher agreement to collection of health-related browsing activities. Hence, higher ratings indicate lower privacy expectations. Therefore, to test the significance of ordering, we analyze the reversed versions <italic>Desired</italic> &#x0003C; <italic>Deserved</italic> &#x0003C; <italic>Predicted</italic> &#x0003C; <italic>Minimum</italic> and <italic>Desired</italic> &#x0003C; <italic>Predicted</italic> &#x0003C; <italic>Deserved</italic> &#x0003C; <italic>Minimum</italic>. Page test for ordered alternatives (Conover, <xref ref-type="bibr" rid="B8">1999</xref>) is significant for <italic>Desired</italic> &#x0003C; <italic>Deserved</italic> &#x0003C; <italic>Predicted</italic> &#x0003C; <italic>Minimum</italic> (<italic>T</italic> &#x0003D; 5.37; <italic>p</italic> &#x0003C; 0.001), but not for <italic>Desired</italic> &#x0003C; <italic>Predicted</italic> &#x0003C; <italic>Deserved</italic> &#x0003C; <italic>Minimum</italic> (<italic>T</italic> &#x0003D; 1.77; <italic>p</italic> &#x0003C; 0.039) at Bonferroni adjusted &#x003B1; &#x0003D; 0.025. This supports our hypothesis that privacy expectation types can be ordered. The Desired level of privacy is higher than the Minimum level of privacy. This indicates that a person can ideally wish for a higher level of privacy and yet tolerate a lower level of privacy when essential.</p>
</sec>
<sec>
<title>7.3. Knowledge Impacts the Predicted Type</title>
<p>We hypothesized that knowledge may impact the Predicted type more than the other types. The proportion of &#x0201C;Don&#x00027;t know/ Not sure&#x0201D; responses is significantly higher for the Predicted type. People seem to believe that they need knowledge to express their Predicted privacy expectation. Hence, knowledge does impact the Predicted type more than the other types.</p>
<p>We analyzed the frequencies of &#x0201C;Know (0&#x02013;10)," &#x0201C;Don&#x00027;t know/Not sure&#x0201D; and &#x0201C;Decline to answer&#x0201D; responses for the four expectation types (<xref ref-type="table" rid="T4">Table 4</xref>). The number of responses that contain &#x0201C;Decline to answer&#x0201D; is small and similar among the four expectation types (20, 1.60%; 21, 1.68%; 26, 2.08%; 20, 1.60%). However, the number of &#x0201C;Don&#x00027;t know&#x0201D; responses is higher for Predicted (151, 12.09%) compared to Desired (52, 4.16%), Deserved (67, 5.36%) and Minimum (49, 3.92%) expectation types. We removed &#x0201C;Decline to answer&#x0201D; responses from our analysis.</p>
<table-wrap position="float" id="T4">
<label>Table 4</label>
<caption><p>Responses for privacy expectation types (<italic>N</italic> &#x0003D; 1, 249).</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>Type</bold></th>
<th valign="top" align="center"><bold>Know (0&#x02013;10)</bold></th>
<th valign="top" align="center"><bold>Don&#x00027;t know</bold></th>
<th valign="top" align="center"><bold>Decline to answer</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Desired</td>
<td valign="top" align="center">1,177 (94.24%)</td>
<td valign="top" align="center">52 (4.16%)</td>
<td valign="top" align="center">20 (1.60%)</td>
</tr>
<tr>
<td valign="top" align="left">Predicted</td>
<td valign="top" align="center"><bold>1,077 (86.23%)</bold></td>
<td valign="top" align="center"><bold>151 (12.09%)</bold></td>
<td valign="top" align="center">21 (1.68%)</td>
</tr>
<tr>
<td valign="top" align="left">Deserved</td>
<td valign="top" align="center">1,156 (92.55%)</td>
<td valign="top" align="center">67 (5.36%)</td>
<td valign="top" align="center">26 (2.08%)</td>
</tr>
<tr>
<td valign="top" align="left">Minimum</td>
<td valign="top" align="center">1,180 (94.48%)</td>
<td valign="top" align="center">49 (3.92%)</td>
<td valign="top" align="center">20 (1.60%)</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><italic>Bold values indicate important results discussed in the article</italic>.</p>
</table-wrap-foot>
</table-wrap>
<p>We compared frequencies of &#x0201C;Don&#x00027;t know&#x0201D; with &#x0201C;Know&#x0201D; responses for the four expectation types by considering the responses as dichotomous nominal values. Cochran&#x00027;s Q test for related observations (Conover, <xref ref-type="bibr" rid="B8">1999</xref>) indicated a significant overall difference in the frequency of &#x0201C;Don&#x00027;t know&#x0201D; responses among the expectation types <italic>Q</italic><sub>(3)</sub> &#x0003D; 177.27; <italic>p</italic> &#x0003C; 0.001. Pairwise comparisons between expectation types indicated that the frequency of &#x0201C;Don&#x00027;t know&#x0201D; responses was significantly different for the Predicted expectation type compared to Desired <italic>Q</italic>(1) &#x0003D; 80.03; <italic>p</italic> &#x0003C; 0.001, Deserved <italic>Q</italic><sub>(1)</sub> &#x0003D; 59.11; <italic>p</italic> &#x0003C; 0.001 and Minimum <italic>Q</italic><sub>(1)</sub> &#x0003D; 87.19; <italic>p</italic> &#x0003C; 0.001 types. This supports the hypothesis that knowledge impacts the Predicted type more than other types.</p>
</sec>
<sec>
<title>7.4. Investment Impacts the Desired Type</title>
<p>We hypothesized that evaluation of &#x0201C;investment and reward&#x0201D; in a scenario would critically impact the Deserved type. We used the duration that participants have had their banking account as an indication of their investment. Results partially support this claim. Investment impacts whether people feel that they deserve a data privacy practice or not.</p>
<p>Spearman pairwise rank correlations showed significant (<italic>p</italic> &#x0003C; 0.0001) weak negative correlations between investment and ratings of all expectation types: Minimum (&#x003C1; &#x0003D; &#x02212;0.20), Deserved (&#x003C1; &#x0003D; &#x02212;0.19), Desired (&#x003C1; &#x0003D; &#x02212;0.19) and Predicted (&#x003C1; &#x0003D; &#x02212;0.18). However, investment has significant moderate correlation with age (&#x003C1; &#x0003D; 0.54). To control for the impact of age, we analyzed the impact of investment on each age group.</p>
<p>In the 18&#x02013;29 age group, there is significant weak to moderate negative correlation (&#x003C1; &#x0003D; &#x02212;0.28, <italic>p</italic> &#x0003D; 0.0016) between investment and the Deserved type. However, there is no significant correlation between investment and other expectation types. Among other age groups, 30&#x02013;44, 45&#x02013;59, and 60&#x0002B;, there is no significant correlation between investment and any expectation type. This implies that only in the 18&#x02013;29 age range, low investment significantly increases the feeling that one deserves collection of data, and high investment significantly decreases the feeling that one deserves collection of data. This partially supports the hypothesis that investment impacts the Deserved type more than other types.</p>
</sec>
<sec>
<title>7.5. Privacy Expectation Types Vary by Groups</title>
<p>Analysis (<italic>n</italic> &#x0003D; 1, 038) shows that people in different groups may rate a privacy expectation type differently. We analyzed groups based on demographics (gender, age range, household income and education level) and experience (prior use of websites and duration of bank account). Based on the number of levels of demographic and experience attributes, we set Bonferroni adjusted &#x003B1; &#x0003D; 0.002. For pairwise comparisons, &#x003B1; value was further divided by the number of comparisons. There was no significant difference in scores based on prior use of health and banking websites.</p>
<sec>
<title>7.5.1. Gender</title>
<p>The survey panel categorized participants into male or female categories. Gender does not seem to influence expectations about data privacy practices. Mann-Whitney test found no significant differences in scores by gender for the four privacy expectation types.</p>
</sec>
<sec>
<title>7.5.2. Age</title>
<p>The study categorized participants into four age ranges: 18&#x02013;29, 30&#x02013;44, 45&#x02013;59, and 60&#x0002B;. Results show that age influences expectations about data privacy practices. Kruskal-Wallis Rank Sum test indicated significant overall difference in scores by age range: Minimum &#x003C7;2<sub>(3)</sub> &#x0003D; 83.40, <italic>p</italic> &#x0003C; 0.0001; Deserved &#x003C7;2<sub>(3)</sub> &#x0003D; 49.64, <italic>p</italic> &#x0003C; 0.0001; Desired &#x003C7;2<sub>(3)</sub> &#x0003D; 45.68, <italic>p</italic> &#x0003C; 0.0001; and Predicted &#x003C7;2<sub>(3)</sub> &#x0003D; 36.72, <italic>p</italic> &#x0003C; 0.0001. Hence, the four age groups have differences in privacy expectation types. Spearman pairwise rank correlations showed significant (<italic>p</italic> &#x0003C; 0.0001) weak negative correlations between age range and scores of all expectation types: Minimum (&#x003C1; &#x0003D; &#x02212;0.25), Deserved (&#x003C1; &#x0003D; &#x02212;0.21), Desired (&#x003C1; &#x0003D; &#x02212;0.19), and Predicted (&#x003C1; &#x0003D; &#x02212;0.19). This indicates that as age increases, people agree less to collection of health-related browsing activities.</p>
<p>Younger people desire, predict, feel that they deserve, and tolerate data privacy practices differently than older people. Pairwise comparisons using Wilcoxon test showed significant differences by expectation type and age range. For the Minimum type, expectations were different (<italic>p</italic> &#x0003C; 0.0001) between 18&#x02013;29 vs. 30&#x02013;44, 18&#x02013;29 vs. 45&#x02013;59, and 18&#x02013;29 vs. 60&#x0002B;. The minimum tolerable expectations of the 18&#x02013;29 age range is significantly different compared to all other age ranges. Both for the Deserved type and the Desired type, expectations were different (<italic>p</italic> &#x0003C; 0.0003) between 18&#x02013;29 vs. 45&#x02013;59, 18&#x02013;29 vs. 60&#x0002B; and 30&#x02013;44 vs. 60&#x0002B;. The desired and deserved expectations of 18&#x02013;29 year old were not significantly different than 30&#x02013;44 year old. Lastly, for the Predicted type, expectations were different (<italic>p</italic> &#x0003C; 0.0001) between 18&#x02013;29 vs. 60&#x0002B; and 30&#x02013;44 vs. 60&#x0002B;. Note that 18&#x02013;29 and 60&#x0002B; age ranges have significant differences in all types of privacy expectations.</p>
</sec>
<sec>
<title>7.5.3. Education Level</title>
<p>Spearman pairwise rank correlations showed significant (<italic>p</italic> &#x0003C; 0.0003) weak negative correlations between education level and Minimum (&#x003C1; &#x0003D; &#x02212;0.13), Deserved (&#x003C1; &#x0003D; &#x02212;0.12), Desired (&#x003C1; &#x0003D; &#x02212;0.11) types. Hence, people with lower level of education seem to have a stronger desire and higher tolerance for collection of health data than people with higher level of education. They also feel more strongly that they deserve such collection. There was no significant correlation between education level and the Predicted type. Hence, level of education does not seem to impact whether people predict such collection.</p>
</sec>
<sec>
<title>7.5.4. Household Income</title>
<p>The impact of household income is similar to that of education level. Spearman pairwise rank correlations showed significant (<italic>p</italic> &#x0003C; 0.00014) weak negative correlations between household income and Minimum (&#x003C1; &#x0003D; &#x02212;0.23), Deserved (&#x003C1; &#x0003D; &#x02212;0.21), Desired (&#x003C1; &#x0003D; &#x02212;0.19) types, but not the Predicted type. Hence, household income impacts how much people desire, tolerate and feel that they deserve collection of health data. However, it does not seem to impact whether people predict such collection.</p>
</sec>
</sec>
</sec>
<sec id="s8">
<title>8. Limitations</title>
<p>In this section, we discuss the limitations of our work. We discuss in particular threats to validity and summarize how we mitigated them in our study.</p>
<sec>
<title>8.1. Construct Validity</title>
<p>We used Cognitive Interviewing process (Willis, <xref ref-type="bibr" rid="B49">2004</xref>) to ensure that the study questionnaire measured what we intended it to measure. The questionnaire wording was iteratively improved based on the feedback from Cognitive Interviews (<italic>N</italic> = 5). We also improved the wording based on open-ended feedback from participants in two pilot studies (<italic>N</italic> = 130 and <italic>N</italic> = 60). Overall feedback indicated that the target group was able to understand the questionnaire and differentiate among the four privacy expectation types. This reduced the threat to construct validity.</p>
<p>As with all models, the proposed conceptual model for privacy expectation types may neither be exhaustive nor complete. The listed types may not exhaustively capture all possible types. Furthermore, the model may not completely characterize all the types represented. However, five decades of research on expectation types in non-privacy domains has identified a maximum of four types, and existing privacy theory has identified only three types. This gives a certain level of confidence regarding the number of possible privacy expectation types. Nevertheless future research may discover other types.</p>
</sec>
<sec>
<title>8.2. Ecological Validity</title>
<p>To ensure meaningful results, we selected a scenario based on reality. Top 10 banks in the United States, e.g., Bank of America and PNC Bank, collect health information from users (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>; PNC Bank, <xref ref-type="bibr" rid="B35">2017</xref>; Bank of America, <xref ref-type="bibr" rid="B3">2019</xref>). However, users are predominantly not aware of such practices (Rao et al., <xref ref-type="bibr" rid="B39">2016</xref>). We conducted an online study to elicit user expectations. Although, the study captures how users generally interact with online services, it may be beneficial to supplement the study with in-lab studies conducted under more controlled conditions.</p>
</sec>
<sec>
<title>8.3. Internal Validity</title>
<p>We followed several best practices in our study design to address internal validity of the results. We used a within-subjects (repeated-measures) design to remove variance due to differences between subjects and address factors such as participant stress and background that are not easy to control. Following guidelines from related studies (Gilly et al., <xref ref-type="bibr" rid="B12">1983</xref>; Martin and Shilton, <xref ref-type="bibr" rid="B22">2016a</xref>,<xref ref-type="bibr" rid="B23">b</xref>), we used partial counterbalancing to control for order effects and maximize experimental power. A larger sample size and complete counterbalancing could further control for order effects without reducing experimental power.</p>
<p>In section 6, we discuss how we address learning effects, completion rate, impact of demand characteristics, priming effects, social desirability bias, threat of knowledge questions and acquiescence bias. To address history threat, it would be beneficial to conduct further longitudinal studies.</p>
</sec>
<sec>
<title>8.4. External Validity</title>
<p>Our sample (<italic>N</italic> = 1,249) consists of United States adults with access to the Internet. The stratified random sample is balanced on age and gender and is representative of the US online population (&#x000B1;2.8%). A stratified random sample reduces self-selection bias. Although the sample is representative of an online population, it is not necessarily representative of the general population. Furthermore, the results from the sample may not be generalizable to other countries. It would be interesting to conduct further studies on samples from other countries and compare them with our results.</p>
<p>Our empirical study elicited users&#x00027; privacy expectations in a single, extreme-case, privacy-sensitive scenario. The choice of scenario supported the main goal of the study, which was to provide evidence for the existence of multiple types of privacy expectations. Generalizability of results, although an important endeavor, was not the primary focus of the study. The more important focus was transferability, and researchers can use the conceptual model as a guideline for designing their studies related to privacy expectation types.</p>
<p>As part of future work, it would be useful to study privacy expectation types in other scenarios. For example, in a less privacy-sensitive scenario, we hypothesize that there may be larger differences between users&#x00027; Desired expectation and Minimum expectation, but their Desired expectation may be more aligned with their Predicted expectation.</p>
</sec>
<sec>
<title>8.5. Reliability</title>
<p>Results from our main study (<italic>N</italic> &#x0003D; 1, 249) and two pilot studies (<italic>N</italic> &#x0003D; 130 and <italic>N</italic> &#x0003D; 60) are similar suggesting that results are repeatable. Further studies can provide higher degree of confidence in reliability.</p>
</sec>
</sec>
<sec id="s9">
<title>9. Implications and Conclusions</title>
<p>We proposed a conceptual model of privacy expectation with Desired, Deserved, Predicted, and Minimum types, and ordering among the types. Empirical results supported the conceptual model and showed that people have distinct types of privacy expectations. We tested the proposed conceptual model in an extreme or deviant case where existence of distinct types of privacy expectations was unlikely. However, we found significant differences among them even in an extreme case. Furthermore, we found this result repeatable under two different user samples and generalizable to the US population with access to the Internet.</p>
<p>As we note in the limitations section, we do not make broad claims related to generalizability of the proposed conceptual model for privacy expectation types. Although generalizability of results is important, our focus is on a related concept: transferability. While generalizability focuses on the applicability of results from one scenario in a different scenario, transferability focuses on the process of other researchers transferring our results to their own studies. We believe that the conceptual model of privacy expectation types is transferable, and researchers can use the model as a guideline for designing their studies related to privacy expectation types. Because we found support for the model in an extreme case, it is advisable that researchers account for different expectation types in their design. If not, researchers may measure privacy expectation incorrectly.</p>
<p>We hope our results will foster more research into privacy expectation types, and the proposed conceptual model can provide coherent guidance for future studies related to privacy expectations. Below, we conclude with important implications.</p>
<sec>
<title>9.1. Studies Must Explicitly Consider the Type of Privacy Expectation</title>
<p>To measure privacy expectations accurately, studies must identify and elicit the type relevant for the study. Studies in the past have inadvertently not done so (Earp et al., <xref ref-type="bibr" rid="B11">2005</xref>; Gomez et al., <xref ref-type="bibr" rid="B13">2009</xref>; Liu et al., <xref ref-type="bibr" rid="B19">2011</xref>; Lin et al., <xref ref-type="bibr" rid="B18">2012</xref>; Wijesekera et al., <xref ref-type="bibr" rid="B48">2015</xref>; Martin and Shilton, <xref ref-type="bibr" rid="B22">2016a</xref>,<xref ref-type="bibr" rid="B23">b</xref>). For example, one study used &#x0201C;would you <bold>expect</bold> it to access your precise location?&#x0201D; to measure what users think i.e., elicit expectations related to the Predicted type (Lin et al., <xref ref-type="bibr" rid="B18">2012</xref>). Another study used &#x0201C;how much did you <bold>expect</bold> this app to be accessing this resource?&#x0201D; to measure what users desire i.e., elicit expectations related to the Desired type (Wijesekera et al., <xref ref-type="bibr" rid="B48">2015</xref>). Two studies asked users to rate the statement &#x0201C;This application meets my <bold>privacy expectations</bold>&#x0201D; to elicit expectations related to the Deserved type (Martin and Shilton, <xref ref-type="bibr" rid="B22">2016a</xref>,<xref ref-type="bibr" rid="B23">b</xref>). To measure expectations accurately, these studies must make the privacy expectation type explicit. The design of our empirical study can inform the design of future studies.</p>
</sec>
<sec>
<title>9.2. Privacy Research Must Focus on All Privacy Expectation Types</title>
<p>By largely studying user preferences, research in the privacy domain has implicitly focused on the Desired type. It is important to study other types of privacy expectations. For instance, Turow et al. found that 66% of Americans do not desire websites to show them ads tailored to their interests (Turow et al., <xref ref-type="bibr" rid="B45">2009</xref>). However, Americans&#x00027; Desired level is different than their Minimum level even in a privacy sensitive-scenario. Hence, it is important to study whether tailored ads meet Americans&#x00027; minimum expectations.</p>
<p>Studies that measure the privacy paradox (Berendt et al., <xref ref-type="bibr" rid="B4">2005</xref>; Norberg et al., <xref ref-type="bibr" rid="B30">2007</xref>) i.e., the gap between stated privacy preferences and actual privacy behavior may benefit from considering the Minimum expectation type in addition to preferences or the Desired type. If the studies also measured the Minimum expectation, they may find that the gap is smaller and the stated behavior is more aligned with the actual behavior.</p>
<p>Research in the Consumer Satisfaction/ Dissatisfaction (CS/D) domain shows that the gap between expected performance, based on a type, and perceived actual performance can significantly predict satisfaction. In the privacy domain, gap between expected privacy, based on a type, and perceived actual privacy may predict both satisfaction and privacy concerns. For example, the gap between the Desired level and reality may better predict satisfaction than the gap between the Minimum level and reality. People may be better satisfied when their desires more closely match reality than when minimum tolerable expectations match reality. Conversely, the gap between the Minimum level and reality may better predict privacy concern than the gap between the Desired level and reality. People may be more concerned when even minimum tolerable expectations do not match reality.</p>
</sec>
<sec>
<title>9.3. Studying Privacy Expectation Types Can Benefit Regulators</title>
<p>Consumer privacy protection agencies (Council of The European Union, <xref ref-type="bibr" rid="B9">2016</xref>; The U.S. Federal Trade Commission, <xref ref-type="bibr" rid="B44">2019</xref>) can identify scenarios that have a stronger need for intervention e.g., scenarios where data practices fail to meet even Minimum privacy expectations. Studying multiple expectation types provides a more nuanced view of users&#x00027; privacy expectations. Regulators can identify whether users desire, understand, feel that they deserve or tolerate data privacy practices.</p>
</sec>
</sec>
<sec sec-type="data-availability-statement" id="s10">
<title>Data Availability Statement</title>
<p>The dataset is publicly available in the <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.7910/DVN/WJQAXT">https://doi.org/10.7910/DVN/WJQAXT</ext-link> (Rao and Pfeffer, <xref ref-type="bibr" rid="B37">2020</xref>).</p>
</sec>
<sec id="s11">
<title>Ethics Statement</title>
<p>Ethical review and approval was not required for the study on human participants in accordance with the local legislation and institutional requirements. Basic principles of ethical research were followed in conducting this study. The participants provided their written informed consent to participate in the study.</p>
</sec>
<sec id="s12">
<title>Author Contributions</title>
<p>AR and JP designed the study and wrote the manuscript. AR conducted the study and analyzed the result.</p>
<sec>
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
</sec>
</body>
<back>
<ack><p>Some of the research in this article was originally published in the first author&#x00027;s doctoral dissertation (Rao, <xref ref-type="bibr" rid="B36">2018</xref>). The authors are grateful to the reviewers for their insightful comments. The authors thank Florian Schaub and Birendra Jha for their helpful feedback.</p>
</ack>
<sec sec-type="supplementary-material" id="s13">
<title>Supplementary Material</title>
<p>The Supplementary Material for this article can be found online at: <ext-link ext-link-type="uri" xlink:href="https://www.frontiersin.org/articles/10.3389/fdata.2020.00007/full#supplementary-material">https://www.frontiersin.org/articles/10.3389/fdata.2020.00007/full#supplementary-material</ext-link></p>
<supplementary-material xlink:href="Data_Sheet_1.PDF" id="SM1" mimetype="application/pdf" xmlns:xlink="http://www.w3.org/1999/xlink"/>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Altman</surname> <given-names>I.</given-names></name></person-group> (<year>1975</year>). <source>The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding</source>. <publisher-loc>Monterey, CA</publisher-loc>: <publisher-name>Brooks Cole</publisher-name>.</citation></ref>
<ref id="B2">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Anduiza</surname> <given-names>E</given-names></name> <name><surname>Galais</surname> <given-names>C</given-names></name></person-group>. (<year>2017</year>). <article-title>Answering without reading: IMCs strong satisficing in online surveys</article-title> <source>Int. J. Public Opin. Res</source>. <volume>29</volume> <fpage>497</fpage>&#x02013;<lpage>519</lpage>. <pub-id pub-id-type="doi">10.1093/ijpor/edw007</pub-id></citation></ref>
<ref id="B3">
<citation citation-type="book"><person-group person-group-type="author"><collab>Bank of America</collab></person-group> (<year>2019</year>). <source>Bank of America U.S. Online Privacy Notice</source>. Available online at: https://www.bankofamerica.com/privacy/online-privacy-notice.go (accessed September 2, 2019).</citation></ref>
<ref id="B4">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Berendt</surname> <given-names>B.</given-names></name> <name><surname>Gunther</surname> <given-names>O.</given-names></name> <name><surname>Spiekermann</surname> <given-names>S.</given-names></name></person-group> (<year>2005</year>). <article-title>Privacy in e-commerce: stated preferences vs. actual behavior</article-title>. <source>Commun. ACM</source> <volume>48</volume>, <fpage>101</fpage>&#x02013;<lpage>106</lpage>. <pub-id pub-id-type="doi">10.1145/1053291.1053295</pub-id></citation></ref>
<ref id="B5">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Berinsky</surname> <given-names>A. J.</given-names></name> <name><surname>Adam</surname> <given-names>J.</given-names></name> <name><surname>Margolis</surname> <given-names>M. F.</given-names></name> <name><surname>Sances</surname> <given-names>M. W.</given-names></name></person-group> (<year>2014</year>). <article-title>Separating the shirkers from the workers? making sure respondents pay attention on self-administered surveys</article-title>. <source>Am. J. Political Sci.</source> <volume>58</volume>, <fpage>739</fpage>&#x02013;<lpage>753</lpage>. <pub-id pub-id-type="doi">10.1111/ajps.12081</pub-id></citation></ref>
<ref id="B6">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Bradburn</surname> <given-names>N. M.</given-names></name> <name><surname>Sudman</surname> <given-names>S.</given-names></name> <name><surname>Wansink</surname> <given-names>B.</given-names></name></person-group> (<year>2004</year>). <source>Asking Questions: The Definitive Guide to Questionnaire Design - For Market Research, Political Polls, and Social and Health Questionnaires</source>. <publisher-loc>San Francisco, CA</publisher-loc>: <publisher-name>Jossey-Bass</publisher-name>.</citation></ref>
<ref id="B7">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Clifford</surname> <given-names>S.</given-names></name> <name><surname>Jerit</surname> <given-names>J.</given-names></name></person-group> (<year>2015</year>). <article-title>Do attempts to improve respondent attention increase social desirability bias?</article-title> <source>Public Opin. Qtly.</source> <volume>79</volume>, <fpage>790</fpage>&#x02013;<lpage>802</lpage>. <pub-id pub-id-type="doi">10.1093/poq/nfv027</pub-id></citation></ref>
<ref id="B8">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Conover</surname> <given-names>W. J.</given-names></name></person-group> (<year>1999</year>). <source>Practical Nonparametric Statistics</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>John Wiley &#x00026; Sons</publisher-name>.</citation></ref>
<ref id="B9">
<citation citation-type="book"><person-group person-group-type="author"><collab>Council of The European Union</collab></person-group> (<year>2016</year>). <source>General Data Protection Regulation (GDPR)</source>. Available online at: http://data.consilium.europa.eu/doc/document/ST-5419-2016-INIT/en/pdf (accessed September 7, 2019).</citation></ref>
<ref id="B10">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dinev</surname> <given-names>T.</given-names></name> <name><surname>Hart</surname> <given-names>P. J.</given-names></name></person-group> (<year>2006</year>). <article-title>An extended privacy calculus model for e-commerce transactions</article-title>. <source>Inf. Syst. Res.</source> <volume>17</volume>, <fpage>61</fpage>&#x02013;<lpage>80</lpage>. <pub-id pub-id-type="doi">10.1287/isre.1060.0080</pub-id></citation></ref>
<ref id="B11">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Earp</surname> <given-names>J. B.</given-names></name> <name><surname>Anton</surname> <given-names>A. I.</given-names></name> <name><surname>Aiman-Smith</surname> <given-names>L.</given-names></name> <name><surname>Stufflebeam</surname> <given-names>W. H.</given-names></name></person-group> (<year>2005</year>). <article-title>Examining internet privacy policies within the context of user privacy values</article-title>. <source>Trans. Eng. Manage.</source> <volume>52</volume>, <fpage>227</fpage>&#x02013;<lpage>237</lpage>. <pub-id pub-id-type="doi">10.1109/TEM.2005.844927</pub-id></citation></ref>
<ref id="B12">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Gilly</surname> <given-names>M. C.</given-names></name> <name><surname>Cron</surname> <given-names>W. L.</given-names></name> <name><surname>Barry</surname> <given-names>T. E.</given-names></name></person-group> (<year>1983</year>). <article-title>The expectations-performance comparison process: an investigation of expectation types,</article-title> in <source>International Fare in Consumer Satisfaction and Complaining Behavior: Papers From the Seventh Annual Conference on Consumer Satisfaction, Dissatisfaction, and Complaining Behavior, The University of Tennessee, Knoxville, Tennessee</source>, eds <person-group person-group-type="editor"><name><surname>Day</surname> <given-names>R. L.</given-names></name> <name><surname>Hunt</surname> <given-names>H. K.</given-names></name></person-group> (<publisher-loc>Bloomington, IN</publisher-loc>: <publisher-name>Indiana University</publisher-name>), <fpage>10</fpage>&#x02013;<lpage>16</lpage>.</citation></ref>
<ref id="B13">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Gomez</surname> <given-names>J.</given-names></name> <name><surname>Pinnick</surname> <given-names>T.</given-names></name> <name><surname>Soltani</surname> <given-names>A.</given-names></name></person-group> (<year>2009</year>). <source>Know Privacy. Technical report, UC Berkeley School of Information</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://knowprivacy.org/report/KnowPrivacy_Final_Report.pdf">http://knowprivacy.org/report/KnowPrivacy_Final_Report.pdf</ext-link></citation></ref>
<ref id="B14">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Hogarth</surname> <given-names>R. M.</given-names></name></person-group> (<year>1987</year>). <source>Judgement and Choice: The Psychology of Decision</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>John Wiley &#x00026; Sons</publisher-name>.</citation></ref>
<ref id="B15">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Kumaraguru</surname> <given-names>P.</given-names></name> <name><surname>Cranor</surname> <given-names>L. F.</given-names></name></person-group> (<year>2005</year>). <source>Privacy Indexes: A Survey of Westin&#x00027;s Studies.</source> <publisher-name>Institute for Software Research International Technical Report, Carnegie Mellon University</publisher-name>, <publisher-loc>Pittsburgh, PA</publisher-loc>.</citation></ref>
<ref id="B16">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Leon</surname> <given-names>P. G.</given-names></name> <name><surname>Ur</surname> <given-names>B.</given-names></name> <name><surname>Wang</surname> <given-names>Y.</given-names></name> <name><surname>Sleeper</surname> <given-names>M.</given-names></name> <name><surname>Balebako</surname> <given-names>R.</given-names></name> <name><surname>Shay</surname> <given-names>R.</given-names></name> <etal/></person-group>. (<year>2013</year>). <article-title>What matters to users? factors that affect users&#x00027; willingness to share information with online advertisers,</article-title> in <source>Proceedings of the Ninth Symposium on Usable Privacy and Security</source> (<publisher-loc>New York, NY</publisher-loc>), <fpage>1</fpage>&#x02013;<lpage>12</lpage>. <pub-id pub-id-type="doi">10.1145/2501604.2501611</pub-id></citation></ref>
<ref id="B17">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Leung</surname> <given-names>S. O.</given-names></name></person-group> (<year>2011</year>). <article-title>A comparison of psychometric properties and normality in 4-, 5-, 6-, and 11-point likert scales</article-title>. <source>J. Soc. Ser. Res</source>. <volume>37</volume>, <fpage>412</fpage>&#x02013;<lpage>421</lpage>. <pub-id pub-id-type="doi">10.1080/01488376.2011.580697</pub-id></citation></ref>
<ref id="B18">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Lin</surname> <given-names>J.</given-names></name> <name><surname>Amini</surname> <given-names>S.</given-names></name> <name><surname>Hong</surname> <given-names>J. I.</given-names></name> <name><surname>Sadeh</surname> <given-names>N.</given-names></name> <name><surname>Lindqvist</surname> <given-names>J.</given-names></name> <name><surname>Zhang</surname> <given-names>J.</given-names></name></person-group> (<year>2012</year>). <article-title>Expectation and purpose: understanding users&#x00027; mental models of mobile app privacy through crowdsourcing,</article-title> in <source>Proceedings of the 2012 ACM Conference on Ubiquitous Computing</source> (<publisher-loc>New York, NY</publisher-loc>), <fpage>501</fpage>&#x02013;<lpage>510</lpage>. <pub-id pub-id-type="doi">10.1145/2370216.2370290</pub-id></citation></ref>
<ref id="B19">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>Y.</given-names></name> <name><surname>Gummadi</surname> <given-names>K. P.</given-names></name> <name><surname>Krishnamurthy</surname> <given-names>B.</given-names></name> <name><surname>Mislove</surname> <given-names>A.</given-names></name></person-group> (<year>2011</year>). <article-title>Analyzing facebook privacy settings: user expectations vs. reality,</article-title> in <source>Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference</source> (<publisher-loc>New York, NY</publisher-loc>), <fpage>61</fpage>&#x02013;<lpage>70</lpage>. <pub-id pub-id-type="doi">10.1145/2068816.2068823</pub-id></citation></ref>
<ref id="B20">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Martin</surname> <given-names>D. W.</given-names></name></person-group> (<year>2007</year>). <source>Doing Psychology Experiments</source>. <publisher-loc>Belmont, CA</publisher-loc>: <publisher-name>Wadsworth Cengage Learning</publisher-name>.</citation></ref>
<ref id="B21">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Martin</surname> <given-names>K.</given-names></name></person-group> (<year>2016</year>). <article-title>Understanding privacy online: development of a social contract approach to privacy</article-title>. <source>J. Bus. Ethics</source> <volume>137</volume>, <fpage>551</fpage>&#x02013;<lpage>569</lpage>. <pub-id pub-id-type="doi">10.1007/s10551-015-2565-9</pub-id></citation></ref>
<ref id="B22">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Martin</surname> <given-names>K.</given-names></name> <name><surname>Shilton</surname> <given-names>K.</given-names></name></person-group> (<year>2016a</year>). <article-title>Putting mobile application privacy in context: an empirical study of user privacy expectations for mobile devices</article-title>. <source>Inf. Soc.</source> <volume>32</volume>, <fpage>200</fpage>&#x02013;<lpage>216</lpage>. <pub-id pub-id-type="doi">10.1080/01972243.2016.1153012</pub-id></citation></ref>
<ref id="B23">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Martin</surname> <given-names>K.</given-names></name> <name><surname>Shilton</surname> <given-names>K.</given-names></name></person-group> (<year>2016b</year>). <article-title>Why experience matters to privacy: how context-based experience moderates consumer privacy expectations for mobile applications</article-title>. <source>J. Assoc. Inf. Sci. Tech.</source> <volume>67</volume>, <fpage>1871</fpage>&#x02013;<lpage>1882</lpage>. <pub-id pub-id-type="doi">10.1002/asi.23500</pub-id></citation></ref>
<ref id="B24">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Martin</surname> <given-names>K. E.</given-names></name></person-group> (<year>2013</year>). <article-title>Transaction costs, privacy, and trust: the laudable goals and ultimate failure of notice and choice to respect privacy online</article-title>. <source>First Monday</source> 18. <pub-id pub-id-type="doi">10.5210/fm.v18i12.4838</pub-id></citation></ref>
<ref id="B25">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Micinski</surname> <given-names>K.</given-names></name> <name><surname>Votipka</surname> <given-names>D.</given-names></name> <name><surname>Stevens</surname> <given-names>R.</given-names></name> <name><surname>Kofinas</surname> <given-names>N.</given-names></name> <name><surname>Mazurek</surname> <given-names>M. L.</given-names></name> <name><surname>Foster</surname> <given-names>J. S.</given-names></name></person-group> (<year>2017</year>). <article-title>User interactions and permission use on android,</article-title> in <source>Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems</source> (<publisher-loc>New York, NY</publisher-loc>). <pub-id pub-id-type="doi">10.1145/3025453.3025706</pub-id></citation></ref>
<ref id="B26">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Miller</surname> <given-names>J. A.</given-names></name></person-group> (<year>1977</year>). <article-title>Studying satisfaction, modifying models, eliciting expectations, posing problems, and making meaningful measurements,</article-title> in <source>Conceptualization and Measurement of Consumer Satisfaction and Dissatisfaction: Proceedings of Conference Conducted by Marketing Science Institute, with Support of National Science Foundation</source>, ed <person-group person-group-type="editor"><name><surname>Hunt</surname> <given-names>H. K.</given-names></name></person-group> (<publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>Marketing Science Institute</publisher-name>), <fpage>10</fpage>&#x02013;<lpage>16</lpage>.</citation></ref>
<ref id="B27">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Milne</surname> <given-names>G. R.</given-names></name> <name><surname>Bahl</surname> <given-names>S.</given-names></name></person-group> (<year>2010</year>). <article-title>Are there differences between consumers&#x00027; and marketers&#x00027; privacy expectations? A segment- and technology-level analysis</article-title>. <source>Public Policy Mark.</source> <volume>29</volume>, <fpage>138</fpage>&#x02013;<lpage>149</lpage>. <pub-id pub-id-type="doi">10.1509/jppm.29.1.138</pub-id></citation></ref>
<ref id="B28">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Naeini</surname> <given-names>P. E.</given-names></name> <name><surname>Bhagavatula</surname> <given-names>S.</given-names></name> <name><surname>Habib</surname> <given-names>H.</given-names></name> <name><surname>Degeling</surname> <given-names>M.</given-names></name> <name><surname>Bauer</surname> <given-names>L.</given-names></name> <name><surname>Cranor</surname> <given-names>L. F.</given-names></name> <etal/></person-group>. (<year>2017</year>). <article-title>Privacy expectations and preferences in an IoT world,</article-title> in <source>Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)</source> (<publisher-loc>Santa Clara, CA</publisher-loc>), <fpage>399</fpage>&#x02013;<lpage>412</lpage>.</citation></ref>
<ref id="B29">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Nissenbaum</surname> <given-names>H.</given-names></name></person-group> (<year>2009</year>). <source>Privacy in Context: Technology, Policy, and the Integrity of Social Life</source>. <publisher-loc>Stanford, CA</publisher-loc>: <publisher-name>Stanford University Press</publisher-name>.</citation></ref>
<ref id="B30">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Norberg</surname> <given-names>P. A.</given-names></name> <name><surname>Horne</surname> <given-names>D. R.</given-names></name> <name><surname>Horne</surname> <given-names>D. A.</given-names></name></person-group> (<year>2007</year>). <article-title>The privacy paradox: personal information disclosure intentions versus behaviors</article-title>. <source>J. Cons. Aff.</source> <volume>41</volume>, <fpage>100</fpage>&#x02013;<lpage>126</lpage>. <pub-id pub-id-type="doi">10.1111/j.1745-6606.2006.00070.x</pub-id></citation></ref>
<ref id="B31">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Olson</surname> <given-names>J. S.</given-names></name> <name><surname>Grudin</surname> <given-names>J.</given-names></name> <name><surname>Horvitz</surname> <given-names>E.</given-names></name></person-group> (<year>2005</year>). <source>A Study of Preferences for Sharing and Privacy, CHI &#x00027;05 Extended Abstracts on Human Factors in Computing Systems</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>, <fpage>1985</fpage>&#x02013;<lpage>1988</lpage>. <pub-id pub-id-type="doi">10.1145/1056808.1057073</pub-id></citation></ref>
<ref id="B32">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Palen</surname> <given-names>L.</given-names></name> <name><surname>Dourish</surname> <given-names>P.</given-names></name></person-group> (<year>2003</year>). <article-title>Unpacking &#x0201C;privacy&#x0201D; for a networked world,</article-title> in <source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source> (<publisher-loc>New York, NY</publisher-loc>), <fpage>129</fpage>&#x02013;<lpage>136</lpage>. <pub-id pub-id-type="doi">10.1145/642611.642635</pub-id></citation></ref>
<ref id="B33">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pedersen</surname> <given-names>D. M.</given-names></name></person-group> (<year>1999</year>). <article-title>Model for types of privacy by privacy functions</article-title>. <source>J. Environ. Psychol.</source> <volume>19</volume>, <fpage>397</fpage>&#x02013;<lpage>405</lpage>. <pub-id pub-id-type="doi">10.1006/jevp.1999.0140</pub-id></citation></ref>
<ref id="B34">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Phelps</surname> <given-names>J.</given-names></name> <name><surname>Nowak</surname> <given-names>G.</given-names></name> <name><surname>Ferrell</surname> <given-names>E.</given-names></name></person-group> (<year>2000</year>). <article-title>Privacy concerns and consumer willingness to provide personal information</article-title>. <source>J. Public Policy Mark.</source> <volume>19</volume>, <fpage>27</fpage>&#x02013;<lpage>41</lpage>. <pub-id pub-id-type="doi">10.1509/jppm.19.1.27.16941</pub-id></citation></ref>
<ref id="B35">
<citation citation-type="web"><person-group person-group-type="author"><collab>PNC Bank</collab></person-group> (<year>2017</year>). <source>PNC Privacy Policy</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.pnc.com/en/privacy-policy.html">https://www.pnc.com/en/privacy-policy.html</ext-link> (accessed September 8, 2017).</citation></ref>
<ref id="B36">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Rao</surname> <given-names>A.</given-names></name></person-group> (<year>2018</year>). <source>Assessing the Impact of Data Practices on User Privacy. Technische Universit at Munchen</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://mediatum.ub.tum.de/doc/1439446/file.pdf">https://mediatum.ub.tum.de/doc/1439446/file.pdf</ext-link></citation></ref>
<ref id="B37">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Rao</surname> <given-names>A.</given-names></name> <name><surname>Pfeffer</surname> <given-names>J.</given-names></name></person-group> (<year>2020</year>). <source>Replication Data for: Types of Privacy Expectations, V1.</source> <publisher-name>Harvard Dataverse</publisher-name>. <pub-id pub-id-type="doi">10.7910/DVN/WJQAXT</pub-id></citation></ref>
<ref id="B38">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Rao</surname> <given-names>A.</given-names></name> <name><surname>Schaub</surname> <given-names>F.</given-names></name> <name><surname>Sadeh</surname> <given-names>N.</given-names></name></person-group> (<year>2014</year>). <article-title>What do they know about me? Contents and concerns of online behavioral profiles,</article-title> in <source>Proceedings of the Sixth ASE International Conference on Privacy, Security, Risk and Trust</source> (<publisher-loc>Greensboro, NC</publisher-loc>).</citation></ref>
<ref id="B39">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Rao</surname> <given-names>A.</given-names></name> <name><surname>Schaub</surname> <given-names>F.</given-names></name> <name><surname>Sadeh</surname> <given-names>N.</given-names></name> <name><surname>Acquisti</surname> <given-names>A.</given-names></name> <name><surname>Kang</surname> <given-names>R.</given-names></name></person-group> (<year>2016</year>). <article-title>Expecting the unexpected: understanding mismatched privacy expectations online,</article-title> in <source>Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)</source> (<publisher-loc>Denver, CO</publisher-loc>: <publisher-name>USENIX Association</publisher-name>), <fpage>77</fpage>&#x02013;<lpage>96</lpage>.</citation></ref>
<ref id="B40">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Senarath</surname> <given-names>A. R.</given-names></name> <name><surname>Arachchilage</surname> <given-names>N. A. G.</given-names></name></person-group> (<year>2018</year>). <article-title>Understanding user privacy expectations: a software developer&#x00027;s perspective</article-title>. <source>Telemat. Inform</source>. <volume>35</volume>, <fpage>1845</fpage>&#x02013;<lpage>1862</lpage>. <pub-id pub-id-type="doi">10.1016/j.tele.2018.05.012</pub-id></citation></ref>
<ref id="B41">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Smith</surname> <given-names>H. J.</given-names></name> <name><surname>Milberg</surname> <given-names>S. J.</given-names></name> <name><surname>Burke</surname> <given-names>S. J.</given-names></name></person-group> (<year>1996</year>). <article-title>Information privacy: measuring individuals&#x00027; concerns about organizational practices</article-title>. <source>MIS Quarterly</source> <volume>20</volume>, <fpage>167</fpage>&#x02013;<lpage>196</lpage>. <pub-id pub-id-type="doi">10.2307/249477</pub-id></citation></ref>
<ref id="B42">
<citation citation-type="web"><person-group person-group-type="author"><collab>SurveyMonkey</collab></person-group> (<year>2019</year>). <source>SurveyMonkey Audience</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.surveymonkey.com/mp/audience/">https://www.surveymonkey.com/mp/audience/</ext-link> (accessed September 7, 2019).</citation></ref>
<ref id="B43">
<citation citation-type="web"><person-group person-group-type="author"><collab>The Federal Reserve</collab></person-group> (<year>2019</year>). <source>Large Commercial Banks</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.federalreserve.gov/releases/lbr/current/default.htm">https://www.federalreserve.gov/releases/lbr/current/default.htm</ext-link> (accessed December 17, 2019).</citation></ref>
<ref id="B44">
<citation citation-type="web"><person-group person-group-type="author"><collab>The U.S. Federal Trade Commission</collab></person-group> (<year>2019</year>). <source>FTC Announces Agenda for PrivacyCon 2017</source>. Availble online at: <ext-link ext-link-type="uri" xlink:href="https://www.ftc.gov/news-events/press-releases/2016/12/ftc-announces-agenda-privacycon-2017">https://www.ftc.gov/news-events/press-releases/2016/12/ftc-announces-agenda-privacycon-2017</ext-link> (accessed September 2, 2019).</citation></ref>
<ref id="B45">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Turow</surname> <given-names>J.</given-names></name> <name><surname>King</surname> <given-names>J.</given-names></name> <name><surname>Hoofnagle</surname> <given-names>C. J.</given-names></name> <name><surname>Bleakley</surname> <given-names>A.</given-names></name> <name><surname>Hennessy</surname> <given-names>M.</given-names></name></person-group> (<year>2009</year>). <article-title>Americans reject tailored advertising and three activities that enable it</article-title>. <source>SSRN</source> <pub-id pub-id-type="doi">10.2139/ssrn.1478214</pub-id></citation></ref>
<ref id="B46">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>Y.</given-names></name> <name><surname>Xia</surname> <given-names>H.</given-names></name> <name><surname>Huang</surname> <given-names>Y.</given-names></name></person-group> (<year>2016</year>). <article-title>Examining American and Chinese internet users&#x00027; contextual privacy preferences of behavioral advertising,</article-title> in <source>Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work &#x00026; Social Computing</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>539</fpage>&#x02013;<lpage>552</lpage>. <pub-id pub-id-type="doi">10.1145/2818048.2819941</pub-id></citation></ref>
<ref id="B47">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Westin</surname> <given-names>A. F.</given-names></name></person-group> (<year>2003</year>). <article-title>Social and political dimensions of privacy</article-title>. <source>J. Soc. Issues</source> <volume>59</volume>, <fpage>431</fpage>&#x02013;<lpage>453</lpage>. <pub-id pub-id-type="doi">10.1111/1540-4560.00072</pub-id></citation></ref>
<ref id="B48">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Wijesekera</surname> <given-names>P.</given-names></name> <name><surname>Baokar</surname> <given-names>A.</given-names></name> <name><surname>Hosseini</surname> <given-names>A.</given-names></name> <name><surname>Egelman</surname> <given-names>S.</given-names></name> <name><surname>Wagner</surname> <given-names>D.</given-names></name> <name><surname>Beznosov</surname> <given-names>K.</given-names></name></person-group> (<year>2015</year>). <article-title>Android permissions remystified: a field study on contextual integrity,</article-title> in <source>24th USENIX Security Symposium (USENIX Security 2015)</source> (<publisher-loc>Washington, DC</publisher-loc>: <publisher-name>USENIX Association</publisher-name>), <fpage>499</fpage>&#x02013;<lpage>514</lpage>.</citation></ref>
<ref id="B49">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Willis</surname> <given-names>G. B.</given-names></name></person-group> (<year>2004</year>). <source>Cognitive Interviewing: A Tool for Improving Questionnaire Design</source>. <publisher-loc>Thousand Oaks, California</publisher-loc>: <publisher-name>Sage Publications</publisher-name>.</citation></ref>
<ref id="B50">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zeithaml</surname> <given-names>V. A.</given-names></name> <name><surname>Berry</surname> <given-names>L. L.</given-names></name> <name><surname>Parasuraman</surname> <given-names>A.</given-names></name></person-group> (<year>1993</year>). <article-title>The nature and determinants of customer expectations of service</article-title>. <source>J. Acad. Mark. Sci.</source> <volume>21</volume>, <fpage>1</fpage>&#x02013;<lpage>12</lpage>. <pub-id pub-id-type="doi">10.1177/0092070393211001</pub-id></citation></ref>
</ref-list> 
</back>
</article>