skip to main content
10.1145/3308558.3313451acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Studying Preferences and Concerns about Information Disclosure in Email Notifications

Published:13 May 2019Publication History

ABSTRACT

People receive dozens, or hundreds, of notifications per day and each notification poses some risk of accidental information disclosure in the presence of others; onlookers may see notifications on a mobile phone lock screen, on the periphery of a desktop or laptop display. We quantify the prevalence of these accidental disclosures in the context of email notifications, and we study people's relevant preferences and concerns. Our results are compiled from a retrospective survey of 131 respondents, and a contextual-labeling study where 169 participants labeled 1,040 meeting-email pairs. We find that, for 53% of people, at least 1 in 10 email notifications poses an information disclosure risk, and the real or perceived severity of these risks depend both on user characteristics and the meeting or email attributes. We conclude by exploring machine learning for predicting people's comfort levels, and we present implications for the design of future social-context aware notification systems.

References

  1. Mark S. Ackerman, Lorrie Faith Cranor, and Joseph Reagle. 1999. Privacy in e-Commerce: Examining User Scenarios and Privacy Preferences. In Proceedings of the 1st ACM Conference on Electronic Commerce(EC '99). ACM, New York, NY, USA, 1-8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International workshop on privacy enhancing technologies. Springer, 36-58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bettina Berendt, Oliver Günther, and Sarah Spiekermann. 2005. Privacy in e-commerce: stated preferences vs. actual behavior. Commun. ACM 48, 4 (2005), 101-106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Camille Cobb and Tadayoshi Kohno. 2017. How Public Is My Private Life?: Privacy in Online Dating. In Proceedings of the 26th International Conference on World Wide Web(WWW '17). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 1231-1240. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Sunny Consolvo, Ian E. Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location Disclosure to Social Relations: Why, when, & What People Want to Share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '05). ACM, New York, NY, USA, 81-90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Edward Cutrell, Mary Czerwinski, and Eric Horvitz. 2001. Notification, Disruption, and Memory: Effects of Messaging Interruptions on Memory and Performance. IOS Press, 263-269.Google ScholarGoogle Scholar
  7. Paul Dourish and Ken Anderson. 2006. Collective information practice: emploring privacy and security as social and cultural phenomena. Human-computer interaction 21, 3 (2006), 319-342. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Janna Lynn Dupree, Richard Devries, Daniel M. Berry, and Edward Lank. 2016. Privacy Personas: Clustering Users via Attitudes and Behaviors Toward Security Practices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems(CHI '16). ACM, New York, NY, USA, 5228-5239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Susan Farrell. 2016. Computer-Assisted Embarrassment. https://www.nngroup.com/articles/embarrassment.Google ScholarGoogle Scholar
  10. Jenny Rose Finkel, Trond Grenager, and Christopher Manning. 2005. Incorporating Non-local Information into Information Extraction Systems by Gibbs Sampling. In Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics(ACL '05). Association for Computational Linguistics, Stroudsburg, PA, USA, 363-370. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Joel E. Fischer, Chris Greenhalgh, and Steve Benford. 2011. Investigating Episodes of Mobile Phone Activity As Indicators of Opportune Moments to Deliver Notifications. In Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services(MobileHCI '11). ACM, New York, NY, USA, 181-190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Martin Fishbein and Icek Ajzen. 1975. Belief, attitude, intention and behavior: An introduction to theory and research.Google ScholarGoogle Scholar
  13. James Fogarty, Scott E. Hudson, Christopher G. Atkeson, Daniel Avrahami, Jodi Forlizzi, Sara Kiesler, Johnny C. Lee, and Jie Yang. 2005. Predicting Human Interruptibility with Sensors. ACM Trans. Comput.-Hum. Interact. 12, 1 (March 2005), 119-146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. The Radicati Group. 2015. Email Statistics Report, 2015-2019.Google ScholarGoogle Scholar
  15. Kirstie Hawkey and Kori M. Inkpen. 2006. Keeping Up Appearances: Understanding the Dimensions of Incidental Information Privacy. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '06). ACM, New York, NY, USA, 821-830. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Joyce Ho and Stephen S Intille. 2005. Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 909-918. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Eric Horvitz, Carl Kadie, Tim Paek, and David Hovel. 2003. Models of Attention in Computing and Communication: From Principles to Applications. Commun. ACM 46, 3 (March 2003), 52-59. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Eric Horvitz, Paul Koch, Carl M. Kadie, and Andy Jacobs. 2002. Coordinate: Probabilistic Forecasting of Presence and Availability. In Proceedings of the Eighteenth Conference on Uncertainty in Artificial Intelligence(UAI'02). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 224-233. http://dl.acm.org/citation.cfm?id=2073876.2073903 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Eric Horvitz, Paul Koch, Raman Sarin, Johnson Apacible, and Muru Subramani. 2005. Bayesphone: Precomputation of Context-Sensitive Policies for Inquiry and Action in Mobile Devices. In User Modeling 2005. Springer, Berlin, Heidelberg, 251-260. http://link.springer.com/chapter/10.1007/11527886_33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Shamsi T. Iqbal, Piotr D. Adamczyk, Xianjun Sam Zheng, and Brian P. Bailey. 2005. Towards an Index of Opportunity: Understanding Changes in Mental Workload During Task Execution. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '05). ACM, New York, NY, USA, 311-320. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Shamsi T Iqbal and Eric Horvitz. 2010. Notifications and awareness: a field study of alert usage and preferences. In Proceedings of the 2010 ACM conference on Computer supported cooperative work. ACM, 27-30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Harry Hochheiser Jonathan Lazar, Jinjuan Heidi Feng. 2010. Research Methods In Human-Computer Interaction (1 ed.). Wiley & Sons. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Dimensionality of information disclosure behavior. International Journal of Human-Computer Studies 71, 12 (Dec. 2013), 1144-1162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We'Re in It Together: Interpersonal Management of Disclosure in Social Network Services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '11). ACM, New York, NY, USA, 3217-3226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Yuan Li. 2012. Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems 54, 1 (2012), 471-481. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Patricia A. Norberg, Daniel R. Horne, and David A. Horne. 2007. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs 41, 1 (June 2007), 100-126.Google ScholarGoogle ScholarCross RefCross Ref
  27. Tadashi Okoshi, Julian Ramos, Hiroki Nozaki, Jin Nakazawa, Anind K. Dey, and Hideyuki Tokuda. 2015. Reducing Users' Perceived Mental Effort Due to Interruptive Notifications in Multi-device Mobile Environments. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing(UbiComp '15). ACM, New York, NY, USA, 475-486. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Judith S. Olson, Jonathan Grudin, and Eric Horvitz. 2005. A Study of Preferences for Sharing and Privacy. In CHI '05 Extended Abstracts on Human Factors in Computing Systems(CHI EA '05). ACM, New York, NY, USA, 1985-1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Veljko Pejovic and Mirco Musolesi. 2014. InterruptMe: Designing Intelligent Prompting Mechanisms for Pervasive Applications. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing(UbiComp '14). ACM, New York, NY, USA, 897-908. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Martin Pielot, Karen Church, and Rodrigo de Oliveira. 2014. An In-situ Study of Mobile Phone Notifications. In Proceedings of the 16th International Conference on Human-computer Interaction with Mobile Devices & Services(MobileHCI '14). ACM, New York, NY, USA, 233-242. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Alireza Sahami Shirazi, Niels Henze, Tilman Dingler, Martin Pielot, Dominik Weber, and Albrecht Schmidt. 2014. Large-scale Assessment of Mobile Notifications. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems(CHI '14). ACM, New York, NY, USA, 3055-3064. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Kim Bartel Sheehan. 2002. Toward a typology of Internet users and online privacy concerns. The Information Society 18, 1 (2002), 21-32.Google ScholarGoogle ScholarCross RefCross Ref
  33. Sarah Spiekermann, Jens Grossklags, and Bettina Berendt. 2001. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In Proceedings of the 3rd ACM conference on Electronic Commerce. ACM, 38-47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Milijana Surbatovich, Jassim Aljuraidan, Lujo Bauer, Anupam Das, and Limin Jia. 2017. Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes. In Proceedings of the 26th International Conference on World Wide Web(WWW '17). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 1501-1510. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Yla R. Tausczik and James W. Pennebaker. 2010. The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods. Journal of Language and Social Psychology 29, 1 (2010), 24-54. arXiv:https://doi.org/10.1177/0261927X09351676Google ScholarGoogle ScholarCross RefCross Ref
  36. Sadegh Torabi and Konstantin Beznosov. 2016. Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users. In Twelfth Symposium on Usable Privacy and Security (SOUPS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Jessica Vitak and Jinyoung Kim. 2014. ”You Can'T Block People Offline”: Examining How Facebook's Affordances Shape the Disclosure Process. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing(CSCW '14). ACM, New York, NY, USA, 461-474. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Dominik Weber, Sven Mayer, Alexandra Voit, Rodrigo Ventura Fierro, and Niels Henze. 2016. Design Guidelines for Notifications on Smart TVs. In Proceedings of the ACM International Conference on Interactive Experiences for TV and Online Video(TVX '16). ACM, New York, NY, USA, 13-24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Alan F Westin. 1991. Harris-Equifax consumer privacy survey 1991. Atlanta, GA: Equifax Inc(1991).Google ScholarGoogle Scholar
  40. Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Lauren Schmidt, Laura Brandimarte, and Alessandro Acquisti. 2014. Would a privacy fundamentalist sell their DNA for $1000... if nothing bad happened as a result? The Westin categories, behavioral intentions, and consequences. In Symposium on Usable Privacy and Security (SOUPS), Vol. 5. 1. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    WWW '19: The World Wide Web Conference
    May 2019
    3620 pages
    ISBN:9781450366748
    DOI:10.1145/3308558

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 13 May 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate1,899of8,196submissions,23%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format