skip to main content
10.1145/3196709.3196818acmconferencesArticle/Chapter ViewAbstractPublication PagesdisConference Proceedingsconference-collections
research-article
Public Access

An Interface without A User: An Exploratory Design Study of Online Privacy Policies and Digital Legalese

Published: 08 June 2018 Publication History

Abstract

Privacy policies are critical to understanding one's rights on online platforms, yet few users read them. In this pictorial, we approach this as a systemic issue that is part a failure of interaction design. We provided a variety of people with printed packets of privacy policies, aiming to tease out this form's capabilities and limitations as a design interface, to understand people's perception and uses, and to critically imagine pragmatic revisions and creative alternatives to existing privacy policies.

References

[1]
Idris Adjerid, Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2013. Sleights of Privacy : Framing, Disclosures, and the Limits of Transparency. In Symposium on Usable Privacy and Security (SOUPS) 2013.
[2]
Citron, Danielle Keats. Hate Crimes in Cyberspace. Harvard University Press, 2014.
[3]
Chen Daizhuo, Fraiberger Samuel P., Moakler Robert, and Provost Foster. "Enhancing Transparency and Control When Drawing Data-Driven Inferences About Individuals." Big Data. September 2017, 5(3): 197--212.
[4]
Elsden, Chris, David Chatting, Abigail C. Durrant, Andrew Garbett, Bettina Nissen, John Vines, and David S. Kirk. "On Speculative Enactments." In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 5386--5399. ACM
[5]
Robert Gellman. 2017. Fair Information Practices: A Basic History (Version 2.18). https://bobgellman.com/rg-docs/rg-FIPshistory.pdf
[6]
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W. Reeder. 2009. A "nutrition label" for privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS '09, 1.
[7]
Gaver, William. "What Should We Expect from Research through Design?" In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 937--946. ACM, 2012.
[8]
Gaver, Bill, Tony Dunne, and Elena Pacenti. "Design: Cultural Probes." Interactions 6, no. 1 (1999): 21--29.
[9]
Hanington, Bruce, and Bella Martin. Universal Methods of Design: 100 Ways to Research Complex Problems, Develop Innovative Ideas, and Design Effective Solutions. Rockport Publishers, 2012.
[10]
Hill, Kashmir. "How Target Figured out a Teen Girl Was Pregnant before Her Father Did." Forbes, February 16 (2012): 2012.
[11]
Carlos Jensen and Colin Potts. 2004. Privacy policies as decision-making tools: An evaluation of online privacy notices. In Proceedings of the 2004 conference on Human factors in computing systems - CHI '04, 471--478.
[12]
Carlos Jensen, Colin Potts, and Christian Jensen. 2005. Privacy practices of Internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies 63, 1--2: 203--227.
[13]
Aleecia M McDonald and Lorrie Faith Cranor. 2008. The Cost of Reading Privacy Policies. I/S: A Journal of Law and Policy for the Information Society 4, 3: 543--568.
[14]
O'Neil, Cathy. Weapons of Math Destruction. Broadway Books, 2016.
[15]
Pasquale, Frank. The Black Box Society: The Secret Algorithms That Control Money and Information. Harvard University Press, 2015.
[16]
Pierce, James, Phoebe Sengers, Tad Hirsch, Tom Jenkins, William Gaver, and Carl DiSalvo. "Expanding and Refining Design and Criticality in HCI." In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2083--2092. ACM, 2015.
[17]
Margaret Jane Radin. 2004. Regulation by Contract, Regulation by Machine. Journal of Institutional and Theoretical Economics JITE 160: 142--156.
[18]
Daniel J Solove. 2013. Privacy Self-Management and the Consent Dilemma. Harvard Law Review 126: 1880--1903.
[19]
Janice Y. Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. 2011. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research 22, 2: 254--268.
[20]
Vertesi, Janet. "My Experiment Opting Out of Big Data Made Me Look Like a Criminal." Time. May 1, 2014. Accessed January 7, 2018. http://time.com/83200/privacy-internet-big-data-opt-out/.
[21]
Wang, Amy B. "A Lawyer Rewrote Instagram's Terms of Use 'in Plain English' so Kids Would Know Their Privacy Rights." Washington Post, January 8, 2017, sec. On Parenting. https://www.washingtonpost.com/news/parenting/wp/2017/01/08/a-lawyer-rewrote-instagrams-terms-of-use-in-plain-english-so-kids-would-know-their-privacy-rights/.
[22]
"McAfee | Privacy Notice." Accessed January 1, 2018. https://web.archive.org/web/20150905234840/http://www.mcafee.com/common/privacy/english/slide.htm.
[23]
"Growing-Up-Digital-Taskforce-Report-January-2017_0.pdf." Accessed January 1, 2018. https://www.childrenscommissioner.gov.uk/wp-content/uploads/2017/06/Growing-Up-Digital-Taskforce-Report-January-2017_0.pdf.
[24]
Wakkary, Ron, William Odom, Sabrina Hauser, Garnet Hertz, and Henry Lin. "Material Speculation: Actual Artifacts for Critical Inquiry." In Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, 97--108. Aarhus University Press, 2015.

Cited By

View all

Index Terms

  1. An Interface without A User: An Exploratory Design Study of Online Privacy Policies and Digital Legalese

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    DIS '18: Proceedings of the 2018 Designing Interactive Systems Conference
    June 2018
    1418 pages
    ISBN:9781450351980
    DOI:10.1145/3196709
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 June 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. interaction design
    2. privacy
    3. privacy policy
    4. security
    5. terms of service

    Qualifiers

    • Research-article

    Funding Sources

    • NSF
    • Center for Long-Term Cybersecurity

    Conference

    DIS '18
    Sponsor:

    Acceptance Rates

    DIS '18 Paper Acceptance Rate 107 of 487 submissions, 22%;
    Overall Acceptance Rate 1,158 of 4,684 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)137
    • Downloads (Last 6 weeks)27
    Reflects downloads up to 21 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media