Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application

نویسندگان

  • Miguel Malheiros
  • Sacha Brostoff
  • Charlene Jennett
  • M. Angela Sasse
چکیده

To assess the risk of a loan applicant defaulting, lenders feed applicants‟ data into credit scoring algorithms. They are always looking to improve the effectiveness of their predictions, which means improving the algorithms and/or collecting different data. Research on financial behavior found that elements of a person‟s family history and social ties can be good predictors of financial responsibility and control. Our study investigated how loan applicants applying for a credit card would respond to questions such as “Did any of your loved ones die while you were growing up?” 48 participants were asked to complete a new type of credit card application form containing such requests as part of a “Consumer Acceptance Test” of a credit card with lower interest rates, but only available to “financially responsible customers.” This was a double-blind study – the experimenters processing participants were told exactly the same. We found that: (1) more sensitive items are disclosed less often e.g. friends‟ names and contact had only a 69% answer rate; (2) privacy fundamentalists are 5.6 times less likely to disclose data; and (3) providing a justification for a question has no effect on its answer rate. Discrepancies between acceptability and disclosure were observed – e.g. 43% provided names and contact of friends, having said they found the question unacceptable. We conclude that collecting data items not traditionally seen as relevant could be made acceptable if lenders can credibly establish relevance, and assure applicants they will be assessed fairly. More research needs to be done on how to best communicate these qualities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Suspicious Card Transactions in unlabeled data of bank Using Outlier Detection Techniqes

With the advancement of technology, the use of ATM and credit cards are increased. Cyber fraud and theft are the kinds of threat which result in using these Technologies. It is therefore inevitable to use fraud detection algorithms to prevent fraudulent use of bank cards. Credit card fraud can be thought of as a form of identity theft that consists of an unauthorized access to another person's ...

متن کامل

Self-surveillance: Should you worry or simply embrace your personal data?

H ave you ever wondered how much of your personal data is publicly available? What pictures are posted, what might be recorded, captured, documented, or stashed away in a database somewhere? Your internet browsing habits, travel patterns, online shopping, and credit card spending are just the most obvious information that someone else can access; what else could be knowable with a little effort...

متن کامل

Protect Your Data from Hackers in 5 Steps.

J. David Cox, president of the American Federal of Government Employees Union, believes "hackers stole military records and veterans' status information, address, birth date, job and pay history, health insurance, life insurance, and pension information; [as well as] age, gender, race data," according to the report. This would be all that is needed for cybercriminals to steal identities of the ...

متن کامل

Bagging Probit Models for Unbalanced Classification

The 11th Pacific-Asia Knowledge Discovery and Data Mining Conference (PAKDD 2007) hosted a data mining competition, co-organized by the Singapore Institute of Statistics. The data set is from a consumer finance company with the aim of finding solutions for a cross-selling business problem. The company currently has two databases, one for credit card holders and the other for home loan (mortgage...

متن کامل

Using TreeNet to Cross-Sell Home Loans to Credit Card Holders

Today’s credit card issuers are increasingly offering a broad range of products and services with separate lines of business responsible for different product groups. Too often, the separate lines of business operate independently and information available to one line of business may not be used productively by others. In this study, we examine the potential of using information from customers ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012