Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Stopping spyware at the gate: a user study of privacy, notice and spyware
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Noticing notice: a large-scale experiment on the timing of software license agreements
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
IEEE Transactions on Software Engineering
A "nutrition label" for privacy
Proceedings of the 5th Symposium on Usable Privacy and Security
On the leakage of personally identifiable information via online social networks
Proceedings of the 2nd ACM workshop on Online social networks
Empirical studies on software notices to inform policy makers and usability designers
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Users' (mis)conceptions of social applications
Proceedings of Graphics Interface 2010
Adverse selection in online "trust" certifications and search results
Electronic Commerce Research and Applications
Bridging the Gap in Computer Security Warnings: A Mental Model Approach
IEEE Security and Privacy
The effectiveness of application permissions
WebApps'11 Proceedings of the 2nd USENIX conference on Web application development
A survey of mobile malware in the wild
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Contextual gaps: privacy issues on Facebook
Ethics and Information Technology
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
Third-party apps on Facebook: privacy and the illusion of control
CHIMIT '11 Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology
Privacy: is there an app for that?
Proceedings of the Seventh Symposium on Usable Privacy and Security
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Third-party applications' data practices on facebook
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Android permissions: user attention, comprehension, and behavior
Proceedings of the Eighth Symposium on Usable Privacy and Security
My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The policy knot: re-integrating policy, practice and design in cscw studies of social computing
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Designing the default privacy settings for facebook applications
Proceedings of the companion publication of the 17th ACM conference on Computer supported cooperative work & social computing
Hi-index | 0.00 |
Several studies have documented the constantly evolving privacy practices of social networking sites and users' misunderstandings about them. Researchers have criticized the interfaces to "configure" privacy preferences as opaque, uninformative, and ineffective. The same problems have also plagued the constant growth of third-party applications and their troubling privacy authorization dialogues. In this paper, we report the results of an experimental study examining the limitations of current privacy authorization dialogues on Facebook as well as four new designs which we developed based on the Fair Information Practice Principles (FIPPs). Through an online experiment with 250 users, we study and document the effectiveness of installation-time configuration and awareness-enhancing interface changes.