Privacy policies as decision-making tools: an evaluation of online privacy notices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Financial Privacy Policies and the Need for Standardization
IEEE Security and Privacy
Keeping up appearances: understanding the dimensions of incidental information privacy
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy-enhanced personalization
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Globalisation vs. localisation in e-commerce: cultural-aware interaction design
Proceedings of the working conference on Advanced visual interfaces
Examining the content and privacy of web browsing incidental information
Proceedings of the 15th international conference on World Wide Web
Context-aware telephony: privacy preferences and sharing patterns
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Looking for trouble: understanding end-user security management
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Internet users' perceptions of 'privacy concerns' and 'privacy actions'
International Journal of Human-Computer Studies
P3P Adoption on E-Commerce Web sites: A Survey and Analysis
IEEE Internet Computing
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future
IEEE Transactions on Dependable and Secure Computing
Tracking website data-collection and privacy practices with the iWatch web crawler
Proceedings of the 3rd symposium on Usable privacy and security
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Experimental evaluation of a lightweight method for augmenting requirements analysis
Proceedings of the 1st ACM international workshop on Empirical assessment of software engineering languages and technologies: held in conjunction with the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE) 2007
From awareness to repartee: sharing location within social groups
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy and technology: folk definitions and perspectives
CHI '08 Extended Abstracts on Human Factors in Computing Systems
An empirical investigation of concerns of everyday tracking and recording technologies
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
An analysis of privacy signals on the World Wide Web: Past, present and future
Information Sciences: an International Journal
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
A Comparative Study of Online Privacy Policies and Formats
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Information privacy in institutional and end-user tracking and recording technologies
Personal and Ubiquitous Computing
Cookie confusion: do browser interfaces undermine understanding?
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Privacy-enhanced web personalization
The adaptive web
Do i do what i say?: observed versus stated privacy preferences
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction
It won't happen to me: Promoting secure behaviour among internet users
Computers in Human Behavior
A privacy-preserving architecture for the semantic web based on tag suppression
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
On-line privacy and consent: a dialogue, not a monologue
Proceedings of the 2010 workshop on New security paradigms
Barriers to the adoption and use of personal health record systems
Proceedings of the 2011 iConference
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study
Information Systems Research
Does privacy information influence users' online purchasing behavior?
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
Empowerment through seamfulness: smart phones in everyday life
Personal and Ubiquitous Computing
An improved privacy-preserving DWT-based collaborative filtering scheme
Expert Systems with Applications: An International Journal
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management
The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults
HRI '12 Proceedings of the seventh annual ACM/IEEE international conference on Human-Robot Interaction
Towards a similarity metric for comparing machine-readable privacy policies
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Rational security: Modelling everyday password use
International Journal of Human-Computer Studies
Android permissions: user attention, comprehension, and behavior
Proceedings of the Eighth Symposium on Usable Privacy and Security
Increasing service users' privacy awareness by introducing on-line interactive privacy features
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Understanding sharing preferences and behavior for mHealth devices
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
A PLA-based privacy-enhancing user modeling framework and its evaluation
User Modeling and User-Adapted Interaction
Are Online Privacy Policies Readable?
International Journal of Information Security and Privacy
Privacy policies and national culture on the internet
Information Systems Frontiers
A comparison of clustering-based privacy-preserving collaborative filtering schemes
Applied Soft Computing
Proceedings of the 5th Annual ACM Web Science Conference
Why do people seek anonymity on the internet?: informing policy and design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A scalable privacy-preserving recommendation scheme via bisecting k-means clustering
Information Processing and Management: an International Journal
Your browsing behavior for a big mac: economics of personal information online
Proceedings of the 22nd international conference on World Wide Web
"Little brothers watching you": raising awareness of data leaks on smartphones
Proceedings of the Ninth Symposium on Usable Privacy and Security
International Journal of Human-Computer Studies
Hi-index | 0.00 |
Several recent surveys conclude that people are concerned about privacy and consider it to be an important factor in their online decision making. This paper reports on a study in which (1) user concerns were analysed more deeply and (2) what users said was contrasted with what they did in an experimental e-commerce scenario. Eleven independent variables were shown to affect the online behavior of at least some groups of users. Most significant were trust marks present on web pages and the existence of a privacy policy, though users seldom consulted the policy when one existed. We also find that many users have inaccurate perceptions of their own knowledge about privacy technology and vulnerabilities, and that important user groups, like those similar to the Westin "privacy fundamentalists", do not appear to form a cohesive group for privacy-related decision making.In this study we adopt an experimental economic research paradigm, a method for examining user behavior which challenges the current emphasis on survey data. We discuss these issues and the implications of our results on user interpretation of trust marks and interaction design. Although broad policy implications are beyond the scope of this paper, we conclude by questioning the application of the ethical/legal doctrine of informed consent to online transactions in the light of the evidence that users frequently do not consult privacy policies.