skip to main content
10.1145/3643834.3661544acmconferencesArticle/Chapter ViewAbstractPublication PagesdisConference Proceedingsconference-collections
research-article

Motivating Users to Attend to Privacy: A Theory-Driven Design Study

Published: 01 July 2024 Publication History

Abstract

In modern technology environments, raising users’ privacy awareness is crucial. Existing efforts largely focused on privacy policy presentation and failed to systematically address a radical challenge of user motivation for initiating privacy awareness. Leveraging the Protection Motivation Theory (PMT), we proposed design ideas and categories dedicated to motivating users to engage with privacy-related information. Using these design ideas, we created a conceptual prototype, enhancing the current App Store product page. Results from an online experiment and follow-up interviews showed that our design effectively motivated participants to attend to privacy issues, raising both the threat appraisal and coping appraisal, two main factors in PMT. Our work indicated that effective design should consider combining PMT components, calibrating information content, and integrating other design elements, such as visual cues and user familiarity. Overall, our study contributes valuable design considerations driven by the PMT to amplify the motivational aspect of privacy communication.

Supplemental Material

PDF File
1_Online_Experiment_Questionnaire.pdf Description: This file is a PDF copy of the Google form that the participants filled in for the online experiment. It contains the general template of the online experiment along with the survey questions, in which the relevant links and images would be replaced for the treatment and control conditions respectively. 2_Interview_Script.pdf Description: This file is a copy of the interview script used for the follow-up interviews, containing the general questions and the post-interview questions. Questions customized to each participant would be added and the relevant links would be replaced for the treatment and control conditions.
PDF File
1_Online_Experiment_Questionnaire.pdf Description: This file is a PDF copy of the Google form that the participants filled in for the online experiment. It contains the general template of the online experiment along with the survey questions, in which the relevant links and images would be replaced for the treatment and control conditions respectively. 2_Interview_Script.pdf Description: This file is a copy of the interview script used for the follow-up interviews, containing the general questions and the post-interview questions. Questions customized to each participant would be added and the relevant links would be replaced for the treatment and control conditions.

References

[1]
Andrick Adhikari and Rinku Dewri. 2021. Towards Change Detection in Privacy Policies with Natural Language Processing. In 2021 18th International Conference on Privacy, Security and Trust (PST). Institute of Electrical and Electronics Engineers, New York, NY, 1–10. https://doi.org/10.1109/PST52912.2021.9647767
[2]
Icek Ajzen. 1985. From Intentions to Actions: A Theory of Planned Behavior. In Action Control: From Cognition to Behavior, Julius Kuhl and Jürgen Beckmann (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 11–39. https://doi.org/10.1007/978-3-642-69746-3_2
[3]
Bayan Al Muhander, Jason Wiese, Omer Rana, and Charith Perera. 2023. Interactive Privacy Management: Toward Enhancing Privacy Awareness and Control in the Internet of Things. ACM Trans. Internet Things 4, 3, Article 18 (sep 2023), 34 pages. https://doi.org/10.1145/3600096
[4]
Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, and Nhan Nguyen. 2017. "...Better to Use a Lock Screen than to Worry about Saving a Few Seconds of Time": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security(SOUPS ’17). USENIX Association, USA, 49–63. https://www.usenix.org/conference/soups2017/technical-sessions/presentation/albayram
[5]
Catherine Anderson and Ritu Agarwal. 2010. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions.MIS Quarterly 34 (09 2010), 613–643. https://doi.org/10.2307/25750694
[6]
Maxim Anikeev, Haya Shulman, and Hervais Simo. 2021. Privacy Policies of Mobile Apps - A Usability Study. In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). Institute of Electrical and Electronics Engineers, New York, NY, 1–2. https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484434
[7]
Roy F. Baumeister and Mark R. Leary. 1997. Writing Narrative Literature Reviews. Review of General Psychology 1, 3 (1997), 311–320. https://doi.org/10.1037/1089-2680.1.3.311
[8]
Jörg Becker, Marcel Heddier, Ayten Öksuz, and Ralf Knackstedt. 2014. The Effect of Providing Visualizations in Privacy Policies on Trust in Data Privacy and Security. In 2014 47th Hawaii International Conference on System Sciences. Institute of Electrical and Electronics Engineers, New York, NY, 3224–3233. https://doi.org/10.1109/HICSS.2014.399
[9]
Karen J. Bigrigg and Michael W. Bigrigg. 2017. Active Dissection of Privacy Policies: Why Johnny Doesn’t Read Privacy Policies. SIGCAS Comput. Soc. 46, 4 (jan 2017), 5–11. https://doi.org/10.1145/3040489.3040491
[10]
Wasja Brunotte, Larissa Chazette, Lukas Kohler, Jil Klunder, and Kurt Schneider. 2022. What About My Privacy?Helping Users Understand Online Privacy Policies. In Proceedings of the International Conference on Software and System Processes and International Conference on Global Software Engineering(ICSSP’22). ACM, New York, NY, USA, 56–65. https://doi.org/10.1145/3529320.3529327
[11]
Philip J. Cash. 2018. Developing theory-driven design research. Design Studies 56 (2018), 84–119. https://doi.org/10.1016/j.destud.2018.03.002
[12]
Anitha Chennamaneni and Babita Gupta. 2022. The privacy protection behaviours of the mobile app users: exploring the role of neuroticism and protection motivation theory. Behaviour & Information Technology 0, 0 (2022), 1–19. https://doi.org/10.1080/0144929X.2022.2106307
[13]
Christy M. K. Cheung and Dimple R. Thadani. 2012. The impact of electronic word-of-mouth communication: A literature analysis and integrative model. Decis. Support Syst. 54, 1 (dec 2012), 461–470. https://doi.org/10.1016/j.dss.2012.06.008
[14]
Lorrie Faith Cranor, Praveen Guduru, and Manjula Arjula. 2006. User Interfaces for Privacy Agents. ACM Trans. Comput.-Hum. Interact. 13, 2 (jun 2006), 135–178. https://doi.org/10.1145/1165734.1165735
[15]
Karel Dhondt, Victor Le Pochat, Alexios Voulimeneas, Wouter Joosen, and Stijn Volckaert. 2022. A Run a Day Won’t Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security(CCS ’22). ACM, New York, NY, USA, 801–814. https://doi.org/10.1145/3548606.3560616
[16]
Nico Ebert, Kurt Alexander Ackermann, and Björn Scheppler. 2021. Bolder is Better: Raising User Awareness through Salient and Concise Privacy Notices. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI ’21). ACM, New York, NY, USA, Article 67, 12 pages. https://doi.org/10.1145/3411764.3445516
[17]
European Parliament and Council of the European Union. 2016. General Data Protection Regulation. https://gdpr-info.eu
[18]
Yang Feng and Quan Xie. 2019. Privacy Concerns, Perceived Intrusiveness, and Privacy Controls: An Analysis of Virtual Try-On Apps. Journal of Interactive Advertising 19, 1 (2019), 43–57. https://doi.org/10.1080/15252019.2018.1521317
[19]
Yuanyuan Feng, Yaxing Yao, and Norman Sadeh. 2021. A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI ’21). ACM, New York, NY, USA, Article 64, 16 pages.
[20]
Leon Festinger. 1954. A Theory of Social Comparison Processes. Human Relations 7, 2 (1954), 117–140. https://doi.org/10.1177/001872675400700202
[21]
Donna L Floyd, Steven Prentice-Dunn, and Ronald W Rogers. 2000. A meta-analysis of research on protection motivation theory. Journal of applied social psychology 30, 2 (2000), 407–429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
[22]
Anirudh Ganesh, Chinenye Ndulue, and Rita Orji. 2022. Smartphone Security and Privacy – A Gamified Persuasive Approach with Protection Motivation Theory. In Persuasive Technology: 17th International Conference, PERSUASIVE 2022, Virtual Event, March 29–31, 2022, Proceedings. Springer-Verlag, Berlin, Heidelberg, 89–100. https://doi.org/10.1007/978-3-030-98438-0_7
[23]
Kambiz Ghazinour and Tahani Albalawi. 2016. A Usability Study on the Privacy Policy Visualization Model. In 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech). Institute of Electrical and Electronics Engineers, New York, NY, 578–585. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.109
[24]
Bart N. Green, Claire D. Johnson, and Alan Adams. 2006. Writing narrative literature reviews for peer-reviewed journals: secrets of the trade. Journal of Chiropractic Medicine 5, 3 (2006), 101–117. https://doi.org/10.1016/S0899-3467(07)60142-6
[25]
Hana Habib, Yixin Zou, Yaxing Yao, Alessandro Acquisti, Lorrie Cranor, Joel Reidenberg, Norman Sadeh, and Florian Schaub. 2021. Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI ’21). ACM, New York, NY, USA, Article 63, 25 pages. https://doi.org/10.1145/3411764.3445387
[26]
Chang-Dae Ham. 2017. Exploring how consumers cope with online behavioral advertising. International Journal of Advertising 36, 4 (2017), 632–658. https://doi.org/10.1080/02650487.2016.1239878
[27]
Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 531–548. https://www.usenix.org/conference/usenixsecurity18/presentation/harkous
[28]
Karen Holtzblatt and Hugh Beyer. 2017. 6 - The Affinity Diagram. In Contextual Design (Second Edition) (second edition ed.), Karen Holtzblatt and Hugh Beyer (Eds.). Morgan Kaufmann, Boston, 127–146. https://doi.org/10.1016/B978-0-12-800894-2.00006-5
[29]
Duha Ibdah, Nada Lachtar, Satya Meenakshi Raparthi, and Anys Bacha. 2021. “Why Should I Read the Privacy Policy, I Just Need the Service”: A Study on Attitudes and Perceptions Toward Privacy Policies. IEEE Access 9 (2021), 166465–166487. https://doi.org/10.1109/ACCESS.2021.3130086
[30]
Princely Ifinedo. 2012. Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory. Comput. Secur. 31, 1 (feb 2012), 83–95. https://doi.org/10.1016/j.cose.2011.10.007
[31]
Jeffrey Gainer Proudfoot Jeffrey L. Jenkins, Mark Grimes and Paul Benjamin Lowry. 2014. Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals. Information Technology for Development 20, 2 (2014), 196–213. https://doi.org/10.1080/02681102.2013.814040
[32]
Vitor Jesus and Harshvardhan J. Pandit. 2022. Consent Receipts for a Usable and Auditable Web of Personal Data. IEEE Access 10 (2022), 28545–28563. https://doi.org/10.1109/ACCESS.2022.3157850
[33]
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W. Reeder. 2009. A "Nutrition Label" for Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security(SOUPS ’09). ACM, New York, NY, USA, Article 4, 12 pages. https://doi.org/10.1145/1572532.1572538
[34]
Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, and Lorrie Faith Cranor. 2010. Standardizing privacy notices: an online study of the nutrition label approach. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI ’10). ACM, New York, NY, USA, 1573–1582. https://doi.org/10.1145/1753326.1753561
[35]
Guoyun Li, Yaozhi Zhang, Xianqi Yu, and Yuqing Sun. 2015. iPri: Context-Aware Access Control and Privacy Policy Recommendation. In 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). Institute of Electrical and Electronics Engineers, New York, NY, 370–370. https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.83
[36]
Tianshi Li, Kayla Reiman, Yuvraj Agarwal, Lorrie Faith Cranor, and Jason I. Hong. 2022. Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems(CHI ’22). ACM, New York, NY, USA, Article 588, 24 pages. https://doi.org/10.1145/3491102.3502012
[37]
Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun (Aerin) Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 27–41. https://www.usenix.org/conference/soups2016/technical-sessions/presentation/liu
[38]
Aleecia M. McDonald and Lorrie Faith Cranor. 2008. The Cost of Reading Privacy Policies. I/S: A Journal of Law and Policy for the Information Society, vol. 4, no. 3 (2008), 543-568. 4 (2008), 25 pages.
[39]
OECD. 2023. OECD Guidelines for Multinational Enterprises on Responsible Business Conduct., 79 pages. https://doi.org/10.1787/81f92357-en
[40]
Government of Canada. 2021. Canada’s Privacy Act. https://www.justice.gc.ca/eng/csj-sjc/pa-lprp/pa-lprp.html
[41]
James Pierce, Sarah Fox, Nick Merrill, Richmond Wong, and Carl DiSalvo. 2018. An Interface without A User: An Exploratory Design Study of Online Privacy Policies and Digital Legalese. In Proceedings of the 2018 Designing Interactive Systems Conference(DIS ’18). ACM, New York, NY, USA, 1345–1358. https://doi.org/10.1145/3196709.3196818
[42]
Clay Posey, Tom Roberts, Paul Benjamin Lowry, James Courtney, and Becky Bennett. 2011. Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations. In The Dewald Roode Workshop in Information Systems Security 2011. Social Science Research Network, Blacksburg, Virginia, USA, 1–51. https://ssrn.com/abstract=2273594
[43]
Elham Al Qahtani, Mohamed Shehab, and Abrar Aljohani. 2018. The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 31–46. https://www.usenix.org/conference/soups2018/presentation/qahtani
[44]
Abhilasha Ravichander, Alan W Black, Shomir Wilson, Thomas Norton, and Norman Sadeh. 2019. Question Answering for Privacy Policies: Combining Computational and Legal Perspectives. In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), Kentaro Inui, Jing Jiang, Vincent Ng, and Xiaojun Wan (Eds.). Association for Computational Linguistics, Hong Kong, China, 4947–4958. https://doi.org/10.18653/v1/D19-1500
[45]
Daniel Reinhardt, Johannes Borchard, and Jörn Hurtienne. 2021. Visual Interactive Privacy Policy: The Better Choice?. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI ’21). ACM, New York, NY, USA, Article 66, 12 pages. https://doi.org/10.1145/3411764.3445465
[46]
M. Athar Ali Robert W. Proctor and Kim-Phuong L. Vu. 2008. Examining Usability of Web Privacy Policies. International Journal of Human–Computer Interaction 24, 3 (2008), 307–328. https://doi.org/10.1080/10447310801937999
[47]
Ronald W. Rogers. 1975. A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology 91, 1 (1975), 93–114. https://doi.org/10.1080/00223980.1975.9915803
[48]
Ronald W. Rogers. 1983. Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social Psychology: A Source Book 1 (1983), 153–176.
[49]
Florian Schaub, Rebecca Balebako, and Lorrie Faith Cranor. 2017. Designing Effective Privacy Notices and Controls. IEEE Internet Computing 21, 3 (2017), 70–77. https://doi.org/10.1109/MIC.2017.75
[50]
Google Scholar. 2024. Human-Computer Interaction – Google Scholar Metrics. Retrieved May, 2024 from https://scholar.google.ca/citations?view_op=top_venues&hl=en&vq=eng_humancomputerinteraction
[51]
Himani Singh and Mamta Bhusry. 2017. Privacy policy inference of multiple user-uploaded images on social context websites (Automated generation of privacy policy). In 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT). Institute of Electrical and Electronics Engineers, New York, NY, 1–5. https://doi.org/10.1109/CIACT.2017.7977304
[52]
Daniel Smullen, Yuanyuan Feng, Shikun Zhang, and Norman Sadeh. 2020. The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences. Proceedings on Privacy Enhancing Technologies 2020 (01 2020), 195–215. https://doi.org/10.2478/popets-2020-0011
[53]
Daniel Solove. 2020. The Myth of the Privacy Paradox. SSRN Electronic Journal 89 (01 2020). https://doi.org/10.2139/ssrn.3536265
[54]
Teodor Sommestad, Henrik Karlzén, and Jonas Hallberg. 2014. A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behavior. In International Journal of Information Security and Privacy (IJISP), Vol. 9. IGI Global, Hershey, PA, 26–46. https://api.semanticscholar.org/CorpusID:189804062
[55]
Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2020. From Intent to Action: Nudging Users Towards Secure Mobile Payments. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, Berkeley, CA, 379–415. https://www.usenix.org/conference/soups2020/presentation/story
[56]
Peter Story, Daniel Smullen, Rex Chen, Yaxing Yao, Alessandro Acquisti, Lorrie Cranor, Norman Sadeh, and Florian Schaub. 2022. Increasing Adoption of Tor Browser Using Informational and Planning Nudges. Proceedings on Privacy Enhancing Technologies 2022 (04 2022), 152–183. https://doi.org/10.2478/popets-2022-0040
[57]
Shuhaili Talib, Sitti Munirah Abdul Razak, Akeem Olowolayemo, Melasari Salependi, Nur Fatihah Ahmad, Syakila Kunhamoo, and Siti Khalijah Bani. 2014. Perception analysis of social networks’ privacy policy: Instagram as a case study. In The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M). Institute of Electrical and Electronics Engineers, New York, NY, 1–5. https://doi.org/10.1109/ICT4M.2014.7020612
[58]
T.A.I. Thotawaththa, Y.T. Gamage, Damika Gamlath, Wei Chee, and D. Meedeniya. 2021. Automated Categorization of Privacy Policies Based on User Perspective. In 2021 10th International Conference on Information and Automation for Sustainability (ICIAfS). Institute of Electrical and Electronics Engineers, New York, NY, 54–59. https://doi.org/10.1109/ICIAfS52090.2021.9606158
[59]
Noriko Tomuro, Steven Lytinen, and Kurt Hornsburg. 2016. Automatic Summarization of Privacy Policies Using Ensemble Learning. In Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy(CODASPY ’16). ACM, New York, NY, USA, 133–135. https://doi.org/10.1145/2857705.2857741
[60]
Janice Y. Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. 2011. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research 22, 2 (2011), 254–268. http://www.jstor.org/stable/23015560
[61]
Mojtaba Vaismoradi, Hannele Turunen, and Terese Bondas. 2013. Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing & Health Sciences 15, 3 (2013), 398–405. https://doi.org/10.1111/nhs.12048
[62]
Anthony Vance, David Eargle, Kirk Ouimet, and Detmar Straub. 2013. Enhancing Password Security through Interactive Fear Appeals: A Web-Based Field Experiment. In 2013 46th Hawaii International Conference on System Sciences. Institute of Electrical and Electronics Engineers, New York, NY, 2988–2997. https://doi.org/10.1109/HICSS.2013.196
[63]
Lev Velykoivanenko, Kavous Salehzadeh Niksirat, Noé Zufferey, Mathias Humbert, Kévin Huguenin, and Mauro Cherubini. 2022. Are Those Steps Worth Your Privacy? Fitness-Tracker Users’ Perceptions of Privacy and Utility. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 4, Article 181 (dec 2022), 41 pages. https://doi.org/10.1145/3494960
[64]
Daricia Wilkinson and Bart Knijnenburg. 2022. Many Islands, Many Problems: An Empirical Examination of Online Safety Behaviors in the Caribbean. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems(CHI ’22). ACM, New York, NY, USA, Article 102, 25 pages. https://doi.org/10.1145/3491102.3517643
[65]
Shomir Wilson, Florian Schaub, Frederick Liu, Kanthashree Mysore Sathyendra, Daniel Smullen, Sebastian Zimmeck, Rohan Ramanath, Peter Story, Fei Liu, Norman Sadeh, and Noah A. Smith. 2018. Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations. ACM Trans. Web 13, 1, Article 1 (dec 2018), 29 pages. https://doi.org/10.1145/3230665
[66]
Shomir Wilson, Florian Schaub, Rohan Ramanath, Norman Sadeh, Fei Liu, Noah A. Smith, and Frederick Liu. 2016. Crowdsourcing Annotations for Websites’ Privacy Policies: Can It Really Work?. In Proceedings of the 25th International Conference on World Wide Web(WWW ’16). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 133–143. https://doi.org/10.1145/2872427.2883035
[67]
Maximiliane Windl, Niels Henze, Albrecht Schmidt, and Sebastian S. Feger. 2022. Automating Contextual Privacy Policies: Design and Evaluation of a Production Tool for Digital Consumer Privacy Awareness. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems(CHI ’22). ACM, New York, NY, USA, Article 34, 18 pages. https://doi.org/10.1145/3491102.3517688
[68]
Shao Yang, Yuehan Wang, Yuan Yao, Haoyu Wang, Yanfang Fanny Ye, and Xusheng Xiao. 2022. DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps. In 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE). Institute of Electrical and Electronics Engineers, New York, NY, 685–697. https://doi.org/10.1145/3510003.3510058
[69]
Siqi Yin, Xianling Cai, Ziyang Wang, Yuning Zhang, Shenghui Luo, and Jingdong Ma. 2022. Impact of gamification elements on user satisfaction in health and fitness applications: A comprehensive approach based on the Kano model. Computers in Human Behavior 128 (2022), 107106. https://doi.org/10.1016/j.chb.2021.107106
[70]
Shikun Zhang, Yuanyuan Feng, Yaxing Yao, Lorrie Faith Cranor, and Norman Sadeh. 2022. How Usable Are iOS App Privacy Labels?Proc. Priv. Enhancing Technol. 2022, 4 (2022), 204–228. https://doi.org/10.56553/popets-2022-0106
[71]
Shikun Zhang and Norman Sadeh. 2023. Do Privacy Labels Answer Users’ Privacy Questions?. In Workshop on Usable Security and Privacy (USEC 2023). Network and Distributed System Security (NDSS) Symposium, San Diego, CA. https://doi.org/10.14722/usec.2023.232482
[72]
Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman Sadeh, Steven Bellovin, and Joel Reidenberg. 2016. Automated analysis of privacy requirements for mobile apps. In 2016 AAAI Fall Symposium Series. Network and Distributed System Security (NDSS) Symposium, San Diego, CA, 15 pages. http://dx.doi.org/10.14722/ndss.2017.23034

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DIS '24: Proceedings of the 2024 ACM Designing Interactive Systems Conference
July 2024
3616 pages
ISBN:9798400705830
DOI:10.1145/3643834
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Privacy awareness
  2. privacy policy
  3. protection motivation theory
  4. theory-driven design

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

DIS '24
Sponsor:
DIS '24: Designing Interactive Systems Conference
July 1 - 5, 2024
Copenhagen, Denmark

Acceptance Rates

Overall Acceptance Rate 837 of 3,292 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 153
    Total Downloads
  • Downloads (Last 12 months)153
  • Downloads (Last 6 weeks)37
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media