Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
What makes Web sites credible?: a report on a large quantitative study
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Transactions on Internet Technology (TOIT)
Web Privacy with P3p
Automated analysis of P3P-enabled Web sites
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Do consumers understand the role of privacy seals in e-commerce?
Communications of the ACM - The disappearing computer
Gathering evidence: use of visual security cues in web browsers
GI '05 Proceedings of Graphics Interface 2005
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Power strips, prophylactics, and privacy, oh my!
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
An analysis of P3P-enabled web sites among top-20 search results
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Noticing notice: a large-scale experiment on the timing of software license agreements
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Tracking website data-collection and privacy practices with the iWatch web crawler
Proceedings of the 3rd symposium on Usable privacy and security
What's wrong with online privacy policies?
Communications of the ACM - ACM's plan to go online first
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Financial Privacy Policies and the Need for Standardization
IEEE Security and Privacy
Searching for privacy: design and implementation of a p3p-enabled search engine
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
A Comparative Study of Online Privacy Policies and Formats
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
Textured agreements: re-envisioning electronic consent
Proceedings of the Sixth Symposium on Usable Privacy and Security
Ethical concerns in computer security and privacy research involving human subjects
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
International Journal of Human-Computer Studies
All our messages are belong to us: usable confidentiality in social networks
Proceedings of the 21st international conference companion on World Wide Web
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
User Modeling and User-Adapted Interaction
TrustSplit: usable confidentiality for social network messaging
Proceedings of the 23rd ACM conference on Hypertext and social media
Measuring user confidence in smartphone security and privacy
Proceedings of the Eighth Symposium on Usable Privacy and Security
Helping Johnny 2.0 to encrypt his Facebook conversations
Proceedings of the Eighth Symposium on Usable Privacy and Security
Proceedings of the 2012 workshop on New security paradigms
Privacy as part of the app decision-making process
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems
ACM Transactions on Interactive Intelligent Systems (TiiS)
Hi-index | 0.01 |
Many commerce websites post privacy policies to address Internet shoppers' privacy concerns. However, few users read or understand them. Iconic privacy indicators may make privacy policies more accessible and easier for users to understand: in this paper, we examine whether the timing and placement of online privacy indicators impact Internet users' browsing and purchasing decisions. We conducted a laboratory study where we controlled the placement of privacy information, the timing of its appearance, the privacy level of each website, and the price and items being purchased. We found that the timing of privacy information had a significant impact on how much of a premium users were willing to pay for privacy. We also found that timing had less impact when users were willing to examine multiple websites. Finally, we found that users paid more attention to privacy indicators when purchasing privacy-sensitive items than when purchasing items that raised minimal privacy concerns.