833 research outputs found

    Investigating loan applicants' perceptions of alternative data items and the effect of incentives on disclosure

    Get PDF
    Lenders use information about loan applicants to predict whether a person is a good or bad credit risk; however borrowers express reservations about disclosing their personal information. In this paper we describe the design of a study in which we try to identify which data items have bigger privacy costs for individuals and whether it is possible to adjust lenders' data collection procedures in order to improve the privacy of the borrowers while maintaining or improving the accuracy of risk assessment methods. We aim to explore whether consumers could be equitably encouraged to give different information than they do presently, by offering incentives for disclosures. These incentives are: an uncertain long term financial gain; a certain short term financial gain. We also explore an inequitable manipulation using peer pressure. The advantages and disadvantages of this methodological approach are also discussed

    Vertebrate Natural History Notes from Arkansas, 2017

    Get PDF
    Because meaningful observations of natural history are not always part of larger studies, important pieces of information often are unreported. Small details, however, can fills gaps in understanding and also lead to interesting questions about ecological relationships or environmental change. We have compiled recent observations of foods, reproduction, record size, parasites, and distribution of 30 species of fishes, new records of distribution and parasites of 2 species of amphibians, and new records of distribution, parasites, reproduction and anomalies of 11 species of mammals

    Federated identity to access e-government services - are citizens ready for this?

    Get PDF
    Both the US & UK government have decided that citizens will to authenticate to government using Federated Identity (FedID) solutions: governments do not want to be Identity providers (IdPs), but leverage accounts that citizens have with other service providers instead. We investigated how citizens react to their first encounter FedID authentication in this context. We performed 2 studies using low fidelity prototypes with: in study 1, 44 citizen participants, & in study 2, 22 small business owners, employees & agents. We recorded their reactions during their user journey authenticating with 3rd party providers they already had accounts with. In study 1, 50% of participants said they would not continue to use the system on reaching the hub page, & 45% believed they were being asked to make a payment. 25% of those continuing said they would stop when they reached the consent page, where they were asked by their IdP to authorise the release of their identifying information to the government service. 34% of the participants felt threatened rather than reassured by the privacy protection statement. With study 2's improved prototype, only 14% of participants said they would not continue on reaching the hub page, & 6% abandoned at the consent page. Our results show that usability & acceptance of FedID can be greatly improved by the application of standard HCI techniques, but trust in the ID Provider is essential. We finally report results from a survey of which ID providers UK citizens would trust, & found significant differences between age groups. © 2013 ACM

    Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application.

    Get PDF
    To assess the risk of a loan applicant defaulting, lenders feed applicants‟ data into credit scoring algorithms. They are always looking to improve the effectiveness of their predictions, which means improving the algorithms and/or collecting different data. Research on financial behavior found that elements of a person‟s family history and social ties can be good predictors of financial responsibility and control. Our study investigated how loan applicants applying for a credit card would respond to questions such as “Did any of your loved ones die while you were growing up?” 48 participants were asked to complete a new type of credit card application form containing such requests as part of a “Consumer Acceptance Test” of a credit card with lower interest rates, but only available to “financially responsible customers.” This was a double-blind study – the experimenters processing participants were told exactly the same. We found that: (1) more sensitive items are disclosed less often - e.g. friends‟ names and contact had only a 69% answer rate; (2) privacy fundamentalists are 5.6 times less likely to disclose data; and (3) providing a justification for a question has no effect on its answer rate. Discrepancies between acceptability and disclosure were observed – e.g. 43% provided names and contact of friends, having said they found the question unacceptable. We conclude that collecting data items not traditionally seen as relevant could be made acceptable if lenders can credibly establish relevance, and assure applicants they will be assessed fairly. More research needs to be done on how to best communicate these qualities

    Adding insult to injury: consumer experiences of being denied credit

    Get PDF
    To inspire confidence in consumer credit and improve outcomes for consumers, negative experiences such as being denied credit must be handled appropriately. We conducted an online survey with 298 UK citizens who had a credit application denied to gain a better understanding of their experience of being denied credit. We found that privacy issues make this experience more upsetting for consumers than necessary. When being denied credit, respondents are most concerned about (1) being denied credit ‘in public’; and (2) not being informed about the reasons why they are denied. Only 23% of our respondents knew why they had been denied; 116 (62%) believed they had been denied credit because of their credit record, but 28% had never checked it. Out of the 194 respondents who had checked their record, 38 identified errors in their credit reports, and in 14 of these cases (38%) debts that they had paid off were incorrectly listed as outstanding. Based on our findings, we propose several changes to the credit application process: (1) providing sensitive but helpful information in a private manner, e.g. a preview of their credit score before they commit a loan application; (2) credit denial notifications with information on what to do next; and (3) giving applicants more information about checking their credit report and who to contact for correcting errors

    Persona-driven information security awareness.

    Get PDF
    Because human factors are a root cause of security breaches in many organisations, security awareness activities are often used to address problematic behaviours and improve security culture. Previous work has found that personas are useful for identifying audience needs and goals, when designing and implementing awareness campaigns. We present a six-step security awareness process both driven by and centred around the use of personas. This can be embedded into business-as-usual activities, with 90-day cycles of awareness themes. We evaluated this process by using it to devise a security awareness campaign for a digital agency. Our results suggest a persona-centred security awareness approach is adaptable to business constraints, and contributes towards addressing security risks
    • 

    corecore