skip to main content
10.1145/1073001.1073006acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Stopping spyware at the gate: a user study of privacy, notice and spyware

Authors Info & Claims
Published:06 July 2005Publication History

ABSTRACT

Spyware is a significant problem for most computer users. The term "spyware" loosely describes a new class of computer software. This type of software may track user activities online and offline, provide targeted advertising and/or engage in other types of activities that users describe as invasive or undesirable.While the magnitude of the spyware problem is well documented, recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. As opposed to viruses and other malicious code, users themselves often have a choice whether they want to install these programs.In this paper, we discuss an ecological study of users installing five real world applications. In particular, we seek to understand the influence of the form and content of notices (e.g., EULAs) on user's installation decisions.Our study indicates that while notice is important, notice alone may not be enough to affect users' decisions to install an application. We found that users have limited understanding of EULA content and little desire to read lengthy notices. Users found short, concise notices more useful, and noticed them more often, yet they did not have a significant effect on installation for our population. When users were informed of the actual contents of the EULAs to which they agreed, we found that users often regret their installation decisions.We discovered that regardless of the bundled content, users will often install an application if they believe the utility is high enough. However, we discovered that privacy and security become important factors when choosing between two applications with similar functionality. Given two similar programs (e.g. KaZaA and Edonkey), consumers will choose the one they believe to be less invasive and more stable. We also found that providing vague information in EULAs and short notices can create an unwarranted impression of increased security. In these cases, it may be helpful to have a standardized format for assessing the possible options and trade-offs between applications.

References

  1. Abrams, M., Eisenhauer, M. and Sotto, L. (2004) "Response to the FTC request for public comments in the Advance Notice of Proposed Rulemaking on Alternative Forms of Privacy Notices under the Gramm-Leach-Bliley Act", Center for Information Policy Leadership, March 2004. Available at: http://www.hunton.com/files/tbl_s47Details/FileUpload265/685/CIPL-Notices_ANPR_Comments_3.29.04.pdf]]Google ScholarGoogle Scholar
  2. Ackerman, M., and Cranor, L. (1999) "Privacy Critics: UI components to safeguard users' privacy," Proceedings of CHI '99, extended abstracts.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Acquisti, A. and Grossklags, J. (2005) Privacy and Rationality in Individual Decision Making, IEEE Security and Privacy, IEEE Computer Society, Vol. 3, No. 1, January/February 2005, pp. 26--33.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Acquisti, A. and Grossklags, J. (2005) "Uncertainty, Ambiguity and Privacy", Fourth Annual Workshop Economics and Information Security (WEIS 2005), MA, 2--3 June, 2005.]]Google ScholarGoogle Scholar
  5. AOL/NSCA Online Safety Study, America Online and National Cyber Security Alliance, October 2004. Available at: http://www.staysafeonline.info/news/safety_study_v04.pdf]]Google ScholarGoogle Scholar
  6. Bartram, L., Ware, C., Calvert, T., (2003) "Moticons: detection, distraction and task", International Journal of Human-Computer Studies 58: 515--545, Issue 5 (May 2003).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Berthold, O., Köhntopp, M. (2000) "Identity Management based on P3P", in: Federrath, H. "Designing Privacy Enhancing Technologies", Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Springer, pp. 141--160.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cranor, L., Reagle, J., and Ackerman, M. (1999) "Beyond Concern: Understanding Net Users' Attitudes About Online Privacy", AT&T Labs-Research, April, 1999.]]Google ScholarGoogle Scholar
  9. Dourish, P. and Redmiles, D. (2002) "An approach to usable security based on event monitoring and visualization", Proceedings of the 2002 workshop on New security paradigms, September 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Earthlink (2005) "Results complied from Webroot's and EarthLink's Spy Audit programs". Available at: http://www.earthlink.net/spyaudit/press/ (last accessed February 25, 2005)]]Google ScholarGoogle Scholar
  11. Gilbert, D., Morewedge, C., Risen, J. and Wilson, T. (2004) "Looking Forward to Looking Backward: The Misprediction of Regret", Psychological Science, Vol. 15, No. 5, pp. 346--350.]]Google ScholarGoogle ScholarCross RefCross Ref
  12. Good, N. S., Krekelberg. A. J. (2003) "Usability and Privacy: A study of Kazaa P2P file-sharing", in: Proceedings of CHI 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. HIPAA Highlights Privacy Notice, Press Release, Center for Information Policy Leadership, Hunton and Williams http://www.hunton.com/news/news.aspx?nws_pg=7&gen_H4ID=10 102 (last accessed May 24, 2005)]]Google ScholarGoogle Scholar
  14. Bettman, J. R., Payne, J. W. and Staelin, R. (1986) "Cognitive Considerations in Designing Effective Labels for Presenting Risk Information," J. Pub. Pol'y & Marketing, 5, pp. 1--28.]]Google ScholarGoogle ScholarCross RefCross Ref
  15. Jensen, C. and Potts, C. (2004) "Privacy policies as decision-making tools: an evaluation of online privacy notices", in: Proceedings of ACM CHI 2004, Vienna, Austria, pages 471--478.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. PC Pitstop (2005) "It pays to read EULAs". Available at http://www.pcpitstop.com/spycheck/eula.asp (last accessed May 24, 2005)]]Google ScholarGoogle Scholar
  17. Platform for Privacy Preferences Project (P3P). http://www.w3.org/P3P/]]Google ScholarGoogle Scholar
  18. Spiekermann, S., Grossklags, J. and Berendt, B. (2001) "E-privacy in 2nd generation E-Commerce: privacy preferences versus actual behavior", in: Proceedings of the Third ACM Conference on Electronic Commerce, Association for Computing Machinery (ACM EC'01), Tampa, Florida, US, pp. 38--47.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Trafton, J. G., Altmann, E. M., Brock, D. P., Mintz, F. E. (2003). "Preparing to resume an interrupted task: effects of prospective goal encoding and retrospective rehearsal", International Journal of Human-Computer Studies 58: 583--603.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Van Dantzich, M., Robbins, D., Horvitz, E. and Czerwinski, M. (2002) "Scope: Providing awareness of multiple notifications at a glance", in: Proceedings of Advanced Visual Interfaces 2002, Trento, Italy.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Wired. "Spyware on My Machine? So What?":http://www.wired.com/news/technology/0,1282,65906,00.html]]Google ScholarGoogle Scholar

Index Terms

  1. Stopping spyware at the gate: a user study of privacy, notice and spyware

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security
              July 2005
              123 pages
              ISBN:1595931783
              DOI:10.1145/1073001

              Copyright © 2005 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 6 July 2005

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate15of49submissions,31%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader