skip to main content
10.1145/3357236.3395549acmconferencesArticle/Chapter ViewAbstractPublication PagesdisConference Proceedingsconference-collections
research-article

Implementation and In Situ Assessment of Contextual Privacy Policies

Published:03 July 2020Publication History

ABSTRACT

Online services collect an increasing amount of data about their users. Privacy policies are currently the only common way to inform users about the kinds of data collected, stored and processed by online services. Previous work showed that users do not read and understand privacy policies, due to their length, difficult language, and often non-prominent location. Embedding privacy-relevant information directly in the context of use could help users understand the privacy implications of using online services. We implemented Contextual Privacy Policies (CPPs) as a browser extension and provide it to the community to make privacy information accessible for end-users. We evaluated CPPs through a one-week deployment and in situ questionnaires as well as pre- and post-study interviews. We found that CPPs were well received by participants. The analysis revealed that provided information should be as compact as possible, be adjusted to user groups and enable users to take action.

References

  1. Tousif Ahmed, Roberto Hoyle, Kay Connelly, David Crandall, and Apu Kapadia. 2015. Privacy Concerns and Behaviors of People with Visual Impairments. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 3523--3532. DOI: http://dx.doi.org/10.1145/2702123.2702334Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Tousif Ahmed, Roberto Hoyle, Patrick Shaffer, Kay Connelly, David Crandall, and Apu Kapadia. 2017. Understanding Physical Safety, Security, and Privacy Concerns of People with Visual Impairments. IEEE Internet Computing (2017), 1--1. DOI: http://dx.doi.org/10.1109/MIC.2017.265103316Google ScholarGoogle ScholarCross RefCross Ref
  3. Alexa Internet. 2019. Top Sites in Germany. https://www.alexa.com/topsites/countries/DE. (2019). Last accessed: 2019-05--30.Google ScholarGoogle Scholar
  4. Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location Has Been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). Association for Computing Machinery, New York, NY, USA, 787--796. DOI:http://dx.doi.org/10.1145/2702123.2702210Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bonnie Anderson, Tony Vance, Brock Kirwan, David Eargle, and Seth Howard. 2014. Users Aren't (Necessarily) Lazy: Using NeuroIS to Explain Habituation to Security Warnings. In Proceedings of the 35th International Conference on Information Systems. https://aisel.aisnet.org/icis2014/proceedings/ISSecurity/13Google ScholarGoogle Scholar
  6. Kelvin Balcombe, Iain Fraser, and Salvatore Di Falco. 2010. Traffic lights and food choice: A choice experiment examining the relationship between nutritional food labels and price. Food Policy 35, 3 (2010), 211--220. DOI:http://dx.doi.org/https://doi.org/10.1016/j.foodpol.2009.12.005Google ScholarGoogle ScholarCross RefCross Ref
  7. Solon Barocas and Helen Nissenbaum. 2009. On notice: The trouble with Notice and Consent. In Proceedings of the engaging data forum: The first international forum on the application and management of personal electronic information. 7. https://ssrn.com/abstract=2567409Google ScholarGoogle Scholar
  8. Mike Bergmann. 2009. Testing Privacy Awareness. In The Future of Identity in the Information Society, Vashek Matyá?, Simone Fischer-Hübner, Daniel Cvr? cek, and Petr ?venda (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 237--253.Google ScholarGoogle Scholar
  9. Danah Boyd. 2012. Networked privacy. Surveillance & Society 10, 3/4 (2012), 348.Google ScholarGoogle ScholarCross RefCross Ref
  10. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (2006), 77--101. DOI: http://dx.doi.org/10.1191/1478088706qp063oaGoogle ScholarGoogle ScholarCross RefCross Ref
  11. Ryan Calo. 2011. Against notice skepticism in privacy (and elsewhere). Notre Dame Law Review 87 (2011), 1027--1072.Google ScholarGoogle Scholar
  12. Jean Camp and Kay Connelly. 2007. Beyond consent: privacy in ubiquitous computing (Ubicomp). In Digital Privacy -- Theory, Technologies, and Practices (1 ed.), Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, and Sabrina di Vimercati (Eds.). Taylor and Francis, New York, Chapter 16. DOI:https://dx.doi.org/https://doi.org/10.1201/9781420052183Google ScholarGoogle ScholarCross RefCross Ref
  13. John Edward Campbell and Matt Carlson. 2002. Panopticon.com: Online Surveillance and the Commodification of Privacy. Journal of Broadcasting & Electronic Media 46, 4 (2002), 586--606. DOI: http://dx.doi.org/10.1207/s15506878jobem4604_6Google ScholarGoogle ScholarCross RefCross Ref
  14. F. H. Cate. 2010. The Limits of Notice and Choice. IEEE Security Privacy 8, 2 (March 2010), 59--62. DOI: http://dx.doi.org/10.1109/MSP.2010.84Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ann Cavoukian. 2012. Privacy by Design. IEEE Technology and Society Magazine 31, 4 (2012), 18--19.Google ScholarGoogle ScholarCross RefCross Ref
  16. Sushain K. Cherivirala. 2018. UsablePrivacy.org Explore Google.com. https://explore.usableprivacy. org/youtube.com/?view=machine. (2018). Last accessed: 2019-06-02.Google ScholarGoogle Scholar
  17. Kay Connelly, Ashraf Khalil, and Yong Liu. 2007. Do I Do What I Say?: Observed Versus Stated Privacy Preferences. In Human-Computer Interaction -- INTERACT 2007, Cécilia Baranauskas, Philippe Palanque, Julio Abascal, and Simone Diniz Junqueira Barbosa (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 620--623.Google ScholarGoogle ScholarCross RefCross Ref
  18. Lorrie Faith Cranor. 2012. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. Journal on Telecommunications and High Technology Law 10 (2012), 273.Google ScholarGoogle Scholar
  19. Lorrie Faith Cranor, Praveen Guduru, and Manjula Arjula. 2006a. User Interfaces for Privacy Agents. ACM Trans.comput.-Hum. Interact. 13, 2 (June 2006), 135--178. DOI: http://dx.doi.org/10.1145/1165734.1165735Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Lorrie Faith Cranor, Praveen Guduru, and Manjula Arjula. 2006b. User Interfaces for Privacy Agents. ACM Transactions on Computer-Human Interaction (TOCHI) 13, 2 (June 2006), 135--178. DOI: http://dx.doi.org/10.1145/1165734.1165735Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Android Developers. n.d. Request App Permissions. https://developer.android.com/training/permissions/requesting.html. (n.d.). Last accessed: 2019-05-10.Google ScholarGoogle Scholar
  22. Denis Feth. 2017. Transparency through Contextual Privacy Statements. In Mensch und Computer 2017-Workshopband, Manuel Burghardt, Raphael Wimmer, Christian Wolff, and Christa Womser-Hacker (Eds.). DOI: http://dx.doi.org/10.18420/muc2017-ws05-0406Google ScholarGoogle ScholarCross RefCross Ref
  23. Carlos Flavián and Miguel Guinalíu. 2006. Consumer trust, perceived security and privacy policy. Industrial Management and Data Systems 106, 5 (2006), 601--620. DOI:http://dx.doi.org/10.1108/02635570610666403Google ScholarGoogle ScholarCross RefCross Ref
  24. Martin Gisch, Alexander De Luca, and Markus Blanchebarbe. 2007. The Privacy Badge: A Privacy-awareness User Interface for Small Devices. In Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology (Mobility '07). ACM, New York, NY, USA, 583--586. DOI: http://dx.doi.org/10.1145/1378063.1378159Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 531--548. https://www.usenix.org/conference/usenixsecurity18/presentation/harkousGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  26. Instagram Inc. n.d. Help Center - How do I post a photo? https://help.instagram.com/442418472487929. (n.d.). Last accessed: 2019-06-02.Google ScholarGoogle Scholar
  27. Jim Isaak and Mina J. Hanna. 2018. User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection.computer 51, 08 (aug 2018), 56--59. DOI: http://dx.doi.org/10.1109/MC.2018.3191268Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Timo Jakobi, Sameer Patil, Dave Randall, Gunnar Stevens, and Volker Wulf. 2019. It Is About What They Could Do with the Data: A User Perspective on Privacy in Smart Metering. ACM Trans.comput.-Hum. Interact. 26, 1, Article 2 (Jan. 2019), 44 pages. DOI: http://dx.doi.org/10.1145/3281444Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Carlos Jensen and Colin Potts. 2004. Privacy Policies As Decision-making Tools: An Evaluation of Online Privacy Notices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '04). ACM, New York, NY, USA, 471--478. DOI: http://dx.doi.org/10.1145/985692.985752Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Apu Kapadia, Tristan Henderson, Jeffrey J. Fielding, and David Kotz. 2007. Virtual Walls: Protecting Digital Privacy in Pervasive Environments. In Pervasive Computing, Anthony LaMarca, Marc Langheinrich, and Khai N. Truong (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 162--179.Google ScholarGoogle Scholar
  31. David J. Kaufman, Juli Murphy-Bollinger, Joan Scott, and Kathy L. Hudson. 2009. Public Opinion about the Importance of Privacy in Biobank Research. The American Journal of Human Genetics 85, 5 (2009), 643--654. DOI:http://dx.doi.org/https://doi.org/10.1016/j.ajhg.2009.10.002Google ScholarGoogle ScholarCross RefCross Ref
  32. Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W. Reeder. 2009. A "Nutrition Label" for Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09). ACM, New York, NY, USA, Article 4, 12 pages. DOI: http://dx.doi.org/10.1145/1572532.1572538Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, and Lorrie Faith Cranor. 2010. Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, USA, 1573--1582. DOI: http://dx.doi.org/10.1145/1753326.1753561Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Marc Langheinrich. 2001. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In Ubicomp 2001: Ubiquitous Computing, Gregory D. Abowd, Barry Brumitt, and Steven Shafer (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 273--291.Google ScholarGoogle Scholar
  35. Scott Lederer, Jason I. Hong, Anind K. Dey, and James A. Landay. 2004. Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing 8, 6 (2004), 440--454.Google ScholarGoogle ScholarCross RefCross Ref
  36. Shaun Alexander Macdonald and Stephen Brewster. 2019. Gamification of a To-Do List with Emotional Reinforcement. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19). Association for Computing Machinery, New York, NY, USA, Article Paper LBW1621, 6 pages. DOI:http://dx.doi.org/10.1145/3290607.3313060Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Elena Maris, Timothy Libert, and Jennifer Henrichsen. 2019. Tracking sex: The implications of widespread sexual data leakage and tracking on porn websites. (2019). https://arxiv.org/abs/1907.06520Google ScholarGoogle Scholar
  38. Arunesh Mathur, Jessica Vitak, Arvind Narayanan, and Marshini Chetty. 2018. Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 103--116. https://www.usenix.org/conference/soups2018/presentation/mathurGoogle ScholarGoogle Scholar
  39. Matthew Louis Mauriello, Brenna McNally, and Jon E. Froehlich. 2019. Thermporal: An Easy-To-Deploy Temporal Thermographic Sensor System to Support Residential Energy Audits. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19). Association for Computing Machinery, New York, NY, USA, Article Paper 113, 14 pages. DOI:http://dx.doi.org/10.1145/3290605.3300343Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society 4 (2008), 543--568. http://hdl.handle.net/1811/72839Google ScholarGoogle Scholar
  41. MDN Web Docs. 2019. Browser Extensions. (Jun 2019). https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensionsGoogle ScholarGoogle Scholar
  42. George R. Milne, Mary J. Culnan, and Henry Greene. 2006. A Longitudinal Assessment of Online Privacy Notice Readability. Journal of Public Policy & Marketing 25, 2 (2006), 238--249. DOI: http://dx.doi.org/10.1509/jppm.25.2.238Google ScholarGoogle ScholarCross RefCross Ref
  43. Mozilla. 2019. Building a cross-browser extension. https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/Build_a_cross_browser_extension. (2019). Last accessed: 2019-05-30.Google ScholarGoogle Scholar
  44. Kanthashree Mysore Sathyendra, Shomir Wilson, Florian Schaub, Sebastian Zimmeck, and Norman Sadeh. 2017. Identifying the Provision of Choices in Privacy Policy Text. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, Copenhagen, Denmark, 2774-2779. DOI: http://dx.doi.org/10.18653/v1/D17-1294Google ScholarGoogle ScholarCross RefCross Ref
  45. Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79 (2004), 119--158.Google ScholarGoogle Scholar
  46. Patricia A. Norberg, Dan Horne, and David Horne. 2007. The Privacy Paradox: Personal Information Disclosure Intentions Versus Behaviors. Journal of Consumer Affairs 41, 1 (2007), 100--126. DOI: http://dx.doi.org/10.1111/j.1745-6606.2006.00070.xGoogle ScholarGoogle ScholarCross RefCross Ref
  47. Jonathan A. Obar. 2016. The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services. SSRN Electronic Journal (2016). DOI: http://dx.doi.org/10.2139/ssrn.2757465Google ScholarGoogle ScholarCross RefCross Ref
  48. Jason D. O'Grady. 2014. New privacy enhancements coming to iOS 8 in the fall. https://www.zdnet.com/article/new-privacy-enhancements-coming-to-ios-8-in-the-fall/. (2014). Last accessed: 2019-05-10.Google ScholarGoogle Scholar
  49. Anna-Marie Ortloff, Lydia Güntner, Maximiliane Windl, Denis Feth, and Svenja Polst. 2018. Evaluation kontextueller Datenschutzerklärungen. In Mensch und Computer 2018 - Workshopband, Raimund Dachselt and Gerhard Weber (Eds.). Gesellschaft für Informatik e.V., Bonn.Google ScholarGoogle Scholar
  50. Sameer Patil, Roberto Hoyle, Roman Schlegel, Apu Kapadia, and Adam J. Lee. 2015. Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 1415--1418. DOI: http://dx.doi.org/10.1145/2702123.2702165Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Sameer Patil, Yann Le Gall, Adam J. Lee, and Apu Kapadia. 2012. My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules. In Financial Cryptography and Data Security, Jim Blyth, Sven Dietrich, and L. Jean Camp (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 86--97.Google ScholarGoogle Scholar
  52. Andrew S. Patrick and Steve Kenny. 2003. From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions. In Privacy Enhancing Technologies, Roger Dingledine (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 107--124.Google ScholarGoogle Scholar
  53. Sabine Pötzsch. 2009. Privacy Awareness: A Means to Solve the Privacy Paradox?. In The Future of Identity, V. Matyá?, S. Fischer-Hübner, D. Cvrček, and P. ?venda (Eds.). IFIP International Federation for Information Processing, 226--236. DOI: http://dx.doi.org/10.1007/978-3-642-03315-5_17Google ScholarGoogle ScholarCross RefCross Ref
  54. Robert W. Proctor, M. Athar Ali, and Kim-Phuong L. Vu. 2008. Examining Usability of Web Privacy Policies. International Journal of Human-Computer Interaction 24, 3 (2008), 307--328. DOI: http://dx.doi.org/10.1080/10447310801937999Google ScholarGoogle ScholarCross RefCross Ref
  55. Joseph Reagle and Lorrie Faith Cranor. 1999. The Platform for Privacy Preferences.commun. ACM 42, 2 (Feb. 1999), 48--55. DOI: http://dx.doi.org/10.1145/293411.293455Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Joel R. Reidenberg, Travis Breaux, Lorrie Faith Carnor, Brian French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia McDonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, and Florian Schaub. 2014. Disagreeable Privacy Policies: Mismatches Between Meaning and Users Understanding. Berkeley Technology Law Journal 30, 1 (2014). DOI:http://dx.doi.org/10.15779/Z384K33Google ScholarGoogle ScholarCross RefCross Ref
  57. Huang Ronggui. 2016. RQDA: R-based Qualitative Data Analysis. R package version 0.2-8. http://rqda.r-forge.r-project.org/. (2016). Last accessed: 2019-07-14.Google ScholarGoogle Scholar
  58. Florian Schaub, Rebecca Balebako, and Lorrie Faith Cranor. 2017. Designing Effective Privacy Notices and Controls. IEEE Internet Computing 21, 3 (2017), 70--77. DOI:http://dx.doi.org/10.1109/MIC.2017.75Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Faith Cranor. 2015a. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 1--17. https://www.usenix.org/conference/soups2015/proceedings/presentation/schaubGoogle ScholarGoogle Scholar
  60. F. Schaub, B. Konings, and M. Weber. 2015b. Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making. IEEE Pervasive Computing 14, 01 (jan 2015), 34--43. DOI: http://dx.doi.org/10.1109/MPRV.2015.5Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Florian Schaub, Aditya Marella, Pranshu Kalvani, Blase Ur, Chao Pan, Emily Forney, and Lorrie Faith Cranor. 2016. Watching them watching me: Browser extensions impact on user privacy awareness and concern. In NDSS workshop on usable security.Google ScholarGoogle ScholarCross RefCross Ref
  62. Paul M Schwartz and Daniel Solove. 2009. Notice & Choice. In The Second NPLAN/BMSG Meeting on Digital Media and Marketing to Children. 7.Google ScholarGoogle Scholar
  63. Andreas Sotirakopoulos, Kirstie Hawkey, and Konstantin Beznosov. 2011. On the Challenges in Usable Security Lab Studies: Lessons Learned from Replicating a Study on SSL Warnings. In Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS '11). Association for Computing Machinery, New York, NY, USA, Article Article 3, 18 pages. DOI: http://dx.doi.org/10.1145/2078827.2078831Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Janice Y. Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. 2011. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research 22, 2 (2011), 254--268. DOI: http://dx.doi.org/10.1287/isre.1090.0260Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, and Konstantin Beznosov. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 499--514. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wijesekeraGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  66. Daricia Wilkinson, Saadhika Sivakumar, David Cherry, Bart P Knijnenburg, Elaine M Raybourn, Pamela Wisniewski, and Henry Sloan. 2017. User-tailored privacy by design. In Proceedings of the Usable Security Mini Conference. https://www.ndss-symposium.org/wp-content/uploads/2017/09/usec2017_03_4_Wilkinson_paper.pdfGoogle ScholarGoogle Scholar
  67. Craig E Wills and Mihajlo Zeljkovic. 2011. A personalized approach to web privacy: awareness, attitudes and actions. Information Management & Computer Security 19, 1 (2011), 53--73.Google ScholarGoogle ScholarCross RefCross Ref
  68. Shomir Wilson, Florian Schaub, Frederick Liu, Kanthashree Mysore Sathyendra, Daniel Smullen, Sebastian Zimmeck, Rohan Ramanath, Peter Story, Fei Liu, Norman Sadeh, and others. 2018. Analyzing privacy policies at scale: From crowdsourcing to automated annotations. ACM Transactions on the Web (TWEB) 13, 1 (2018), 1.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Jochen Wirtz, May O. Lwin, and Jerome D. Williams. 2007. Causes and consequences of consumer online privacy concern. International Journal of Service Industry Management 18, 4 (2007), 326--348.Google ScholarGoogle ScholarCross RefCross Ref
  70. Kuang-Wen Wu, Shaio Yan Huang, David C. Yen, and Irina Popova. 2012. The effect of online privacy policy on consumer privacy concern and trust.computers in Human Behavior 28, 3 (2012), 889--897. DOI: http://dx.doi.org/10.1016/j.chb.2011.12.008Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Shaomei Wu, Lindsay Reynolds, Xian Li, and Francisco Guzmán. 2019. Design and Evaluation of a Social Media Writing Support Tool for People with Dyslexia. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19). Association for Computing Machinery, New York, NY, USA, Article Paper 516, 14 pages. DOI: http://dx.doi.org/10.1145/3290605.3300746Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article Article 200 (18 2018), 20 pages. DOI: http://dx.doi.org/10.1145/3274469Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Sebastian Zimmeck and Steven M. Bellovin. 2014. Privee: An Architecture for Automatically Analyzing Web Privacy Policies. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 1--16. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/zimmeckGoogle ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Implementation and In Situ Assessment of Contextual Privacy Policies

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        DIS '20: Proceedings of the 2020 ACM Designing Interactive Systems Conference
        July 2020
        2264 pages
        ISBN:9781450369749
        DOI:10.1145/3357236

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 July 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,158of4,684submissions,25%

        Upcoming Conference

        DIS '24
        Designing Interactive Systems Conference
        July 1 - 5, 2024
        IT University of Copenhagen , Denmark

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader