Visible to the public Why Do We Reveal or Withhold Private Information? Exploring Heuristics and Designing Interface Cues for Secure Computing