E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Usability and privacy: a study of Kazaa P2P file-sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
International Journal of Human-Computer Studies - Notification user interfaces
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8 - Volume 8
Privacy policies as decision-making tools: an evaluation of online privacy notices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Stopping spyware at the gate: a user study of privacy, notice and spyware
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Evaluating interfaces for privacy policy rule authoring
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Keeping up appearances: understanding the dimensions of incidental information privacy
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Polaris: virus-safe computing for Windows XP
Communications of the ACM - Privacy and security in highly dynamic systems
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Scope: providing awareness of multiple notifications at a glance
Proceedings of the Working Conference on Advanced Visual Interfaces
Experimental economics and experimental computer science: a survey
Proceedings of the 2007 workshop on Experimental computer science
Timing is everything?: the effects of timing and placement of online privacy indicators
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Trained to accept?: a field experiment on consent dialogs
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Communicating software agreement content using narrative pictograms
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Empirical studies on software notices to inform policy makers and usability designers
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Textured agreements: re-envisioning electronic consent
Proceedings of the Sixth Symposium on Usable Privacy and Security
Users' (mis)conceptions of social applications
Proceedings of Graphics Interface 2010
We challenge you to certify your updates
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Proceedings of the 13th international conference on Ubiquitous computing
Contextual gaps: privacy issues on Facebook
Ethics and Information Technology
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
Third-party apps on Facebook: privacy and the illusion of control
CHIMIT '11 Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology
Use of ratings from personalized communities for trustworthy application installation
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
An online experiment of privacy authorization dialogues for social applications
Proceedings of the 2013 conference on Computer supported cooperative work
My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Hi-index | 0.01 |
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report on a study of software installation to assess the effectiveness of different notices for helping people make better decisions on which software to install. Our study of 222 users showed that providing a short summary notice, in addition to the End User License Agreement (EULA), before the installation reduced the number of software installations significantly. We also found that providing the short summary notice after installation led to a significant number of uninstalls. However, even with the short notices, many users installed the program and later expressed regret for doing so. These results, along with a detailed analysis of installation, regret, and survey data about user behaviors informs our recommendations to policymakers and designers for assessing the "adequacy" of consent in the context of software that exhibits behaviors associated with spyware.