Awareness and coordination in shared workspaces
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy
RE '02 Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
Toward a method for privacy vulnerability analysis
CHI '04 Extended Abstracts on Human Factors in Computing Systems
Enterprise privacy promises and enforcement
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Improving understanding of website privacy policies with fine-grained policy anchors
WWW '05 Proceedings of the 14th international conference on World Wide Web
Stopping spyware at the gate: a user study of privacy, notice and spyware
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Privacy in information technology: designing to enable privacy policy management in organizations
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Privacy practices of Internet users: self-reports versus observed behavior
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Evaluating interfaces for privacy policy rule authoring
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Sharing everyday places I go while preserving privacy
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Power strips, prophylactics, and privacy, oh my!
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Noticing notice: a large-scale experiment on the timing of software license agreements
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
P3P Adoption on E-Commerce Web sites: A Survey and Analysis
IEEE Internet Computing
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future
IEEE Transactions on Dependable and Secure Computing
Tracking website data-collection and privacy practices with the iWatch web crawler
Proceedings of the 3rd symposium on Usable privacy and security
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
An Organizational View of Pervasive Computing
Social Science Computer Review
Experimental evaluation of a lightweight method for augmenting requirements analysis
Proceedings of the 1st ACM international workshop on Empirical assessment of software engineering languages and technologies: held in conjunction with the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE) 2007
A user study of the expandable grid applied to P3P privacy policy visualization
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Proposal of privacy policy matching engine
Proceedings of the 4th ACM workshop on Digital identity management
An analysis of privacy signals on the World Wide Web: Past, present and future
Information Sciences: an International Journal
Designing a privacy label: assisting consumer understanding of online privacy practices
CHI '09 Extended Abstracts on Human Factors in Computing Systems
A "nutrition label" for privacy
Proceedings of the 5th Symposium on Usable Privacy and Security
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
Standardizing privacy notices: an online study of the nutrition label approach
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Communicating software agreement content using narrative pictograms
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Usability of user agents for privacy-preference specification
Proceedings of the 2007 conference on Human interface: Part II
Examining user privacy practices while shopping online: what are users looking for?
Proceedings of the 2007 conference on Human interface: Part II
How users read and comprehend privacy policies
Proceedings of the 2007 conference on Human interface: Part II
Privacy-enhanced web personalization
The adaptive web
Understanding compliance to privacy guidelines using text-and video-based scenarios
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Empirical studies on software notices to inform policy makers and usability designers
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Influence of the Privacy Bird® user agent on user trust of different web sites
Computers in Industry
A dynamic privacy model for web services
Computer Standards & Interfaces
Textured agreements: re-envisioning electronic consent
Proceedings of the Sixth Symposium on Usable Privacy and Security
Metrics for characterizing the form of security policies
The Journal of Strategic Information Systems
A practical generic privacy language
ICISS'10 Proceedings of the 6th international conference on Information systems security
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study
Information Systems Research
Does privacy information influence users' online purchasing behavior?
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
A user-centric evaluation of the readability of privacy policies in popular web sites
Information Systems Frontiers
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
Designing natural language and structured entry methods for privacy policy authoring
INTERACT'05 Proceedings of the 2005 IFIP TC13 international conference on Human-Computer Interaction
Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
What do online behavioral advertising privacy disclosures communicate to users?
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers
Decision Support Systems
Are Online Privacy Policies Readable?
International Journal of Information Security and Privacy
Privacy policies and national culture on the internet
Information Systems Frontiers
Consent for all: revealing the hidden complexity of terms and conditions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Your browsing behavior for a big mac: economics of personal information online
Proceedings of the 22nd international conference on World Wide Web
Sleights of privacy: framing, disclosures, and the limits of transparency
Proceedings of the Ninth Symposium on Usable Privacy and Security
Readability assessment of policies and procedures of social networking sites
OCSC'13 Proceedings of the 5th international conference on Online Communities and Social Computing
Hi-index | 0.03 |
Studies have repeatedly shown that users are increasingly concerned about their privacy when they go online. In response to both public interest and regulatory pressures, privacy policies have become almost ubiquitous. An estimated 77% of websites now post a privacy policy. These policies differ greatly from site to site, and often address issues that are different from those that users care about. They are in most cases the users' only source of information.This paper evaluates the usability of online privacy policies, as well as the practice of posting them. We analyze 64 current privacy policies, their accessibility, writing, content and evolution over time. We examine how well these policies meet user needs and how they can be improved. We determine that significant changes need to be made to current practice to meet regulatory and usability requirements.