ABSTRACT
People receive dozens, or hundreds, of notifications per day and each notification poses some risk of accidental information disclosure in the presence of others; onlookers may see notifications on a mobile phone lock screen, on the periphery of a desktop or laptop display. We quantify the prevalence of these accidental disclosures in the context of email notifications, and we study people's relevant preferences and concerns. Our results are compiled from a retrospective survey of 131 respondents, and a contextual-labeling study where 169 participants labeled 1,040 meeting-email pairs. We find that, for 53% of people, at least 1 in 10 email notifications poses an information disclosure risk, and the real or perceived severity of these risks depend both on user characteristics and the meeting or email attributes. We conclude by exploring machine learning for predicting people's comfort levels, and we present implications for the design of future social-context aware notification systems.
- Mark S. Ackerman, Lorrie Faith Cranor, and Joseph Reagle. 1999. Privacy in e-Commerce: Examining User Scenarios and Privacy Preferences. In Proceedings of the 1st ACM Conference on Electronic Commerce(EC '99). ACM, New York, NY, USA, 1-8. Google ScholarDigital Library
- Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International workshop on privacy enhancing technologies. Springer, 36-58. Google ScholarDigital Library
- Bettina Berendt, Oliver Günther, and Sarah Spiekermann. 2005. Privacy in e-commerce: stated preferences vs. actual behavior. Commun. ACM 48, 4 (2005), 101-106. Google ScholarDigital Library
- Camille Cobb and Tadayoshi Kohno. 2017. How Public Is My Private Life?: Privacy in Online Dating. In Proceedings of the 26th International Conference on World Wide Web(WWW '17). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 1231-1240. Google ScholarDigital Library
- Sunny Consolvo, Ian E. Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location Disclosure to Social Relations: Why, when, & What People Want to Share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '05). ACM, New York, NY, USA, 81-90. Google ScholarDigital Library
- Edward Cutrell, Mary Czerwinski, and Eric Horvitz. 2001. Notification, Disruption, and Memory: Effects of Messaging Interruptions on Memory and Performance. IOS Press, 263-269.Google Scholar
- Paul Dourish and Ken Anderson. 2006. Collective information practice: emploring privacy and security as social and cultural phenomena. Human-computer interaction 21, 3 (2006), 319-342. Google ScholarDigital Library
- Janna Lynn Dupree, Richard Devries, Daniel M. Berry, and Edward Lank. 2016. Privacy Personas: Clustering Users via Attitudes and Behaviors Toward Security Practices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems(CHI '16). ACM, New York, NY, USA, 5228-5239. Google ScholarDigital Library
- Susan Farrell. 2016. Computer-Assisted Embarrassment. https://www.nngroup.com/articles/embarrassment.Google Scholar
- Jenny Rose Finkel, Trond Grenager, and Christopher Manning. 2005. Incorporating Non-local Information into Information Extraction Systems by Gibbs Sampling. In Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics(ACL '05). Association for Computational Linguistics, Stroudsburg, PA, USA, 363-370. Google ScholarDigital Library
- Joel E. Fischer, Chris Greenhalgh, and Steve Benford. 2011. Investigating Episodes of Mobile Phone Activity As Indicators of Opportune Moments to Deliver Notifications. In Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services(MobileHCI '11). ACM, New York, NY, USA, 181-190. Google ScholarDigital Library
- Martin Fishbein and Icek Ajzen. 1975. Belief, attitude, intention and behavior: An introduction to theory and research.Google Scholar
- James Fogarty, Scott E. Hudson, Christopher G. Atkeson, Daniel Avrahami, Jodi Forlizzi, Sara Kiesler, Johnny C. Lee, and Jie Yang. 2005. Predicting Human Interruptibility with Sensors. ACM Trans. Comput.-Hum. Interact. 12, 1 (March 2005), 119-146. Google ScholarDigital Library
- The Radicati Group. 2015. Email Statistics Report, 2015-2019.Google Scholar
- Kirstie Hawkey and Kori M. Inkpen. 2006. Keeping Up Appearances: Understanding the Dimensions of Incidental Information Privacy. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '06). ACM, New York, NY, USA, 821-830. Google ScholarDigital Library
- Joyce Ho and Stephen S Intille. 2005. Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 909-918. Google ScholarDigital Library
- Eric Horvitz, Carl Kadie, Tim Paek, and David Hovel. 2003. Models of Attention in Computing and Communication: From Principles to Applications. Commun. ACM 46, 3 (March 2003), 52-59. Google ScholarDigital Library
- Eric Horvitz, Paul Koch, Carl M. Kadie, and Andy Jacobs. 2002. Coordinate: Probabilistic Forecasting of Presence and Availability. In Proceedings of the Eighteenth Conference on Uncertainty in Artificial Intelligence(UAI'02). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 224-233. http://dl.acm.org/citation.cfm?id=2073876.2073903 Google ScholarDigital Library
- Eric Horvitz, Paul Koch, Raman Sarin, Johnson Apacible, and Muru Subramani. 2005. Bayesphone: Precomputation of Context-Sensitive Policies for Inquiry and Action in Mobile Devices. In User Modeling 2005. Springer, Berlin, Heidelberg, 251-260. http://link.springer.com/chapter/10.1007/11527886_33. Google ScholarDigital Library
- Shamsi T. Iqbal, Piotr D. Adamczyk, Xianjun Sam Zheng, and Brian P. Bailey. 2005. Towards an Index of Opportunity: Understanding Changes in Mental Workload During Task Execution. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '05). ACM, New York, NY, USA, 311-320. Google ScholarDigital Library
- Shamsi T Iqbal and Eric Horvitz. 2010. Notifications and awareness: a field study of alert usage and preferences. In Proceedings of the 2010 ACM conference on Computer supported cooperative work. ACM, 27-30. Google ScholarDigital Library
- Harry Hochheiser Jonathan Lazar, Jinjuan Heidi Feng. 2010. Research Methods In Human-Computer Interaction (1 ed.). Wiley & Sons. Google ScholarDigital Library
- Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Dimensionality of information disclosure behavior. International Journal of Human-Computer Studies 71, 12 (Dec. 2013), 1144-1162. Google ScholarDigital Library
- Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We'Re in It Together: Interpersonal Management of Disclosure in Social Network Services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '11). ACM, New York, NY, USA, 3217-3226. Google ScholarDigital Library
- Yuan Li. 2012. Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems 54, 1 (2012), 471-481. Google ScholarDigital Library
- Patricia A. Norberg, Daniel R. Horne, and David A. Horne. 2007. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs 41, 1 (June 2007), 100-126.Google ScholarCross Ref
- Tadashi Okoshi, Julian Ramos, Hiroki Nozaki, Jin Nakazawa, Anind K. Dey, and Hideyuki Tokuda. 2015. Reducing Users' Perceived Mental Effort Due to Interruptive Notifications in Multi-device Mobile Environments. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing(UbiComp '15). ACM, New York, NY, USA, 475-486. Google ScholarDigital Library
- Judith S. Olson, Jonathan Grudin, and Eric Horvitz. 2005. A Study of Preferences for Sharing and Privacy. In CHI '05 Extended Abstracts on Human Factors in Computing Systems(CHI EA '05). ACM, New York, NY, USA, 1985-1988. Google ScholarDigital Library
- Veljko Pejovic and Mirco Musolesi. 2014. InterruptMe: Designing Intelligent Prompting Mechanisms for Pervasive Applications. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing(UbiComp '14). ACM, New York, NY, USA, 897-908. Google ScholarDigital Library
- Martin Pielot, Karen Church, and Rodrigo de Oliveira. 2014. An In-situ Study of Mobile Phone Notifications. In Proceedings of the 16th International Conference on Human-computer Interaction with Mobile Devices & Services(MobileHCI '14). ACM, New York, NY, USA, 233-242. Google ScholarDigital Library
- Alireza Sahami Shirazi, Niels Henze, Tilman Dingler, Martin Pielot, Dominik Weber, and Albrecht Schmidt. 2014. Large-scale Assessment of Mobile Notifications. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems(CHI '14). ACM, New York, NY, USA, 3055-3064. Google ScholarDigital Library
- Kim Bartel Sheehan. 2002. Toward a typology of Internet users and online privacy concerns. The Information Society 18, 1 (2002), 21-32.Google ScholarCross Ref
- Sarah Spiekermann, Jens Grossklags, and Bettina Berendt. 2001. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In Proceedings of the 3rd ACM conference on Electronic Commerce. ACM, 38-47. Google ScholarDigital Library
- Milijana Surbatovich, Jassim Aljuraidan, Lujo Bauer, Anupam Das, and Limin Jia. 2017. Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes. In Proceedings of the 26th International Conference on World Wide Web(WWW '17). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 1501-1510. Google ScholarDigital Library
- Yla R. Tausczik and James W. Pennebaker. 2010. The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods. Journal of Language and Social Psychology 29, 1 (2010), 24-54. arXiv:https://doi.org/10.1177/0261927X09351676Google ScholarCross Ref
- Sadegh Torabi and Konstantin Beznosov. 2016. Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users. In Twelfth Symposium on Usable Privacy and Security (SOUPS). Google ScholarDigital Library
- Jessica Vitak and Jinyoung Kim. 2014. ”You Can'T Block People Offline”: Examining How Facebook's Affordances Shape the Disclosure Process. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing(CSCW '14). ACM, New York, NY, USA, 461-474. Google ScholarDigital Library
- Dominik Weber, Sven Mayer, Alexandra Voit, Rodrigo Ventura Fierro, and Niels Henze. 2016. Design Guidelines for Notifications on Smart TVs. In Proceedings of the ACM International Conference on Interactive Experiences for TV and Online Video(TVX '16). ACM, New York, NY, USA, 13-24. Google ScholarDigital Library
- Alan F Westin. 1991. Harris-Equifax consumer privacy survey 1991. Atlanta, GA: Equifax Inc(1991).Google Scholar
- Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Lauren Schmidt, Laura Brandimarte, and Alessandro Acquisti. 2014. Would a privacy fundamentalist sell their DNA for $1000... if nothing bad happened as a result? The Westin categories, behavioral intentions, and consequences. In Symposium on Usable Privacy and Security (SOUPS), Vol. 5. 1. Google ScholarDigital Library
Recommendations
Exploring Privacy Aspects of Smartphone Notifications
MobileHCI '21: Proceedings of the 23rd International Conference on Mobile Human-Computer InteractionNotifications are one of the most important features of mobile devices. Users receive multitudes of notifications every day. These notifications often carry sensitive content such as private messages, financial information, authentication tokens, etc. ...
Preventing sensitive relationships disclosure for better social media preservation
A fundamental aspect of all social networks is information sharing. It is one of the most common forms of online interaction that is tightly associated with social media preservation and information disclosure. As such, information sharing is commonly ...
Analysis of Information Disclosure on a Social Networking Site
OCSC '09: Proceedings of the 3d International Conference on Online Communities and Social Computing: Held as Part of HCI International 2009We present a small study about information disclosure and awareness of disclosure implications on Couchsurfing.com. Couchsurfing is an online social networking site where users connect with others interested in traveling and staying at each other's ...
Comments