Hiding personal information reveals the worst.
نویسندگان
چکیده
Seven experiments explore people's decisions to share or withhold personal information, and the wisdom of such decisions. When people choose not to reveal information--to be "hiders"--they are judged negatively by others (experiment 1). These negative judgments emerge when hiding is volitional (experiments 2A and 2B) and are driven by decreases in trustworthiness engendered by decisions to hide (experiments 3A and 3B). Moreover, hiders do not intuit these negative consequences: given the choice to withhold or reveal unsavory information, people often choose to withhold, but observers rate those who reveal even questionable behavior more positively (experiments 4A and 4B). The negative impact of hiding holds whether opting not to disclose unflattering (drug use, poor grades, and sexually transmitted diseases) or flattering (blood donations) information, and across decisions ranging from whom to date to whom to hire. When faced with decisions about disclosure, decision-makers should be aware not just of the risk of revealing, but of what hiding reveals.
منابع مشابه
A survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملIdentification and Prioritization of Factors Contributing in Cloud Service Selection Using Fuzzy Best-worst Method (FBWM)
The introduction of cloud computing techniques revolutionized the current of information processing and storing. Cloud computing as a competitive edge provides easy and automated access to the vast ocean of resources through standard network mechanisms to businesses and organizations. Due to the vast diversity of service providers and their respective variety of available services with differen...
متن کاملSecure Steganography for Digital Images
The degree of imperceptibility of hidden image in the ‘Digital Image Steganography’ is mostly defined in relation to the limitation of Human Visual System (HVS), its chances of detection using statistical methods and its capacity to hide maximum information inside its body. Whereas, a tradeoff does exist between data hiding capacity of the cover image and robustness of underlying information hi...
متن کاملA Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition
This paper proposes an internet-based personal identity verification system using lossless data hiding and fingerprint recognition technologies. At the client side, the SHA-256 hash of the original fingerprint image and sensitive personal information are encrypted and embedded into the fingerprint image using an advanced lossless data hiding scheme. At the service provider side, after the hidde...
متن کاملDistributed Data Federation without Disclosure of User Existence
Service providers collect user’s personal information relevant to their businesses. Personal information stored by different service providers is expected to be combined to make new services. However, specific user records risk being identified from the combined personal information, and the user’s sensitive information may be revealed. Also, personal information collected by a service provider...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Proceedings of the National Academy of Sciences of the United States of America
دوره 113 4 شماره
صفحات -
تاریخ انتشار 2016