skip to main content
10.1145/1837110.1837127acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Textured agreements: re-envisioning electronic consent

Published:14 July 2010Publication History

ABSTRACT

Research indicates that less than 2% of the population reads license agreements during software installation [12]. To address this problem, we developed textured agreements, visually redesigned agreements that employ factoids, vignettes, and iconic symbols to accentuate information and highlight its personal relevance. Notably, textured agreements accomplish these goals without requiring modification of the underlying text. A between-subjects experimental study with 84 subjects indicates these agreements can significantly increase reading times. In our study, subjects spent approximately 37 seconds on agreement screens with textured agreements, compared to 7 seconds in the plain text control condition. A follow-up study examined retention of agreement content, finding that median scores on a comprehension quiz increased by 4 out of 16 points for textured agreements. These results provide convincing evidence of the potential for textured agreements to positively impact software agreement processes.

References

  1. Abrams, M., Eisenhauer, M. and Sotto, L. (2004). Response to the FTC request for public comments in the Advance Notice of Proposed Rulemaking on Alternative Forms of Privacy Notices under the Gramm-Leach-Bliley Act. Center for Information Policy Leadership.Google ScholarGoogle Scholar
  2. Amer, T. S. and Maris, J. (2004). Signal Words and Signal Icons in Information Technology Exception and Error Messages. Northern Arizona University.Google ScholarGoogle Scholar
  3. (2008). Aviary Terms of Use. Aviary. http://aviary.com/terms. Last checked April 5, 2009.Google ScholarGoogle Scholar
  4. Brustoloni, J. C. and Villamarin-Salomon, R. (2007). Improving security decisions with polymorphic and audited dialogs. SOUPS '07. 76--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Campbell, F. A., Goldman, B. D., Boccia, M. L. and Skinner, M. (2004). The effect of format modifications and reading comprehension on recall of informed consent information by low-income parents: a comparison of print, video, and computer-based presentations. Patient Education and Counseling. 53: 205--216.Google ScholarGoogle ScholarCross RefCross Ref
  6. Egelman, S., Tsai, J., Cranor, L. F. and Acquisti, A. (2009). Timing Is Everything? The Effects of Timing and Placement of Online Privacy Indicators. CHI '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Frascara, J. (2004). Communication design: principles, methods, and practice. Allworth Communications, Inc.Google ScholarGoogle Scholar
  8. Friedman, B., Lin, P. and Miller, J. K. (2005). Informed consent by design. Security and usability: designing secure systems that people can use. Ed. Cranor, L. F. and Garfinkel, S. O'Reilly Media, Inc.Google ScholarGoogle Scholar
  9. Friedman, B., Smith, I., Kahn, P., Consolvo, S. and Selawski, J. (2006). Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry. Lecture notes in computer science. 4206: 194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. (2007). GNU General Public License, version 3. Free Software Foundation. http://www.gnu.org/copyleft/gpl.html. Last checked May 13, 2010.Google ScholarGoogle Scholar
  11. Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D. and Konstan, J. (2005). Stopping spyware at the gate: a user study of privacy, notice and spyware. SOUPS '05. 43--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Good, N., Grossklags, J., Mulligan, D. K. and Konstan, J. A. (2007). Noticing notice: a large-scale experiment on the timing of software license agreements. CHI '07. 607--616. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Grossklags, J. and Good, N. (2008). Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. Financial Cryptography and Data Security. 341--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Hellier, E., Wright, D. B., Edworthy, J. and Newstead, S. (2000). On the stability of the arousal strength of warning signal words. Applied Cognitive Psychology, 14: 577--592.Google ScholarGoogle ScholarCross RefCross Ref
  15. (2003). HIPAA Highlights Privacy Notice. Center for Information Policy Leadership, Hunton and Williams. http://www.hunton.com/news/news.aspx?nws_pg=7&gen_H4ID=10102. Last checked Sep 19, 2008.Google ScholarGoogle Scholar
  16. Jensen, C. and Potts, C. (2004). Privacy policies as decision-making tools: an evaluation of online privacy notices. CHI '04. 471--478. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kelley, P. G., Bresee, J., Cranor, L. F. and Reeder, R. W. (2009). A "nutrition label" for privacy. SOUPS '09. 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kress, G. R. and Van Leeuwen, T. (2006). Reading images: the grammar of visual design. Routledge.Google ScholarGoogle Scholar
  19. McDonald, A., Reeder, R., Kelley, P. and Cranor, L. (2009). A Comparative Study of Online Privacy Policies and Formats. PETS '09: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies. 37--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Patrick, A. S. and Kenny, S. (2003). From privacy legislation to interface design: Implementing information privacy in human-computer interactions. Lecture Notes in Computer Science. 2760: 107--124.Google ScholarGoogle ScholarCross RefCross Ref
  21. (2007). Ten steps to develop a multilayered privacy notice. Center for Information Policy Leadership, Hunton and Williams. http://www.hunton.com/files/tbl_s47Details%5CFileUpload265%5C1405%5CTen_Steps_whitepaper.pdf. Last checked May 13, 2010.Google ScholarGoogle Scholar
  22. Terry, M., Kay, M., Vugt, B. van, Slack, B. and Park, T. (2008). Ingimp: introducing instrumentation to an end-user open source application. CHI '08. 607--616. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Tufte, E. R. (1995). Envisioning Information. Graphics Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. White, J. V. (1982). Editing by design. Bowker New York.Google ScholarGoogle Scholar
  25. Wogalter, M. S. and Laughery, K. R. (1996). WARNING! Sign and Label Effectiveness. Current Directions in Psychological Science. 5: 33--37.Google ScholarGoogle ScholarCross RefCross Ref
  26. Wright, P. (1977). Presenting technical information: a survey of research findings. Instructional Science. 6: 93--134.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Textured agreements: re-envisioning electronic consent

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security
          July 2010
          236 pages
          ISBN:9781450302647
          DOI:10.1145/1837110

          Copyright © 2010 Copyright is held by the author/owner.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 July 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of49submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader