skip to main content
10.1145/3411764.3445465acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Visual Interactive Privacy Policy: The Better Choice?

Authors Info & Claims
Published:07 May 2021Publication History

ABSTRACT

Online privacy policies should enable users to make informed decisions. Current text policies, however, lack usability: users often miss crucial information and consent to them without reading. Visual representation formats may increase comprehension, but are rarely used in practice. In an iterative design process we gathered qualitative feedback on typical policy contents and on existing and newly designed representation formats. We developed design guidelines and a Visual Interactive Privacy Policy based on the Privacy Policy Nutrition Label enriched with control options and further interactive elements. In an empirical evaluation, both visual representations received higher ratings of attractiveness, stimulation, novelty and transparency compared to a standard policy long text. Interactivity improved time spent with the policy. There were no effects on conversion rate, perceived control or perceived trust, efficiency and perspicuity. More research is needed, especially with regard to the cost-benefit ratio of visual privacy policies.

Skip Supplemental Material Section

Supplemental Material

References

  1. Michiel de Jong Abdullah Diaa, Hugo. 2012. Terms of Service; Didn’t read. https://tosdr.org/Google ScholarGoogle Scholar
  2. Manon Arcand, Jacques Nantel, Mathieu Arles-Dufour, and Anne Vincent. 2007. The impact of reading a web site’s privacy statement on perceived control over privacy and perceived trust. Online Information Review 31, 5 (2007), 661–681.Google ScholarGoogle ScholarCross RefCross Ref
  3. Naveen Farag Awad and M. S. Krishnan. 2006. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization. MIS Quarterly 30, 1 (2006), 13–28. http://www.jstor.org/stable/25148715Google ScholarGoogle ScholarCross RefCross Ref
  4. John EG Bateson and Michael K Hui. 1992. The ecological validity of photographic slides and videotapes in simulating the service setting. Journal of Consumer Research 19, 2 (1992), 271–281.Google ScholarGoogle ScholarCross RefCross Ref
  5. Annika Baumann, Johannes Haupt, Fabian Gebert, and Stefan Lessmann. 2019. The price of privacy. Business & Information Systems Engineering 61, 4 (2019), 413–431.Google ScholarGoogle ScholarCross RefCross Ref
  6. Enrique P Becerra and Pradeep K Korgaonkar. 2011. Effects of trust beliefs on consumers’ online intentions. European Journal of marketing 45, 6 (2011), 936–962.Google ScholarGoogle Scholar
  7. Ann Blandford, Dominic Furniss, and Stephann Makri. 2016. Qualitative HCI research: Going behind the scenes. Synthesis Lectures on Human-Centered Informatics 9, 1(2016), 1–115.Google ScholarGoogle ScholarCross RefCross Ref
  8. Rainer Böhme and Stefan Köpsell. 2010. Trained to Accept? A Field Experiment on Consent Dialogs. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Atlanta, Georgia, USA) (CHI ’10). Association for Computing Machinery, New York, NY, USA, 2403–2406.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Cylab Usable Privacy and Security Lab. 2002. Privacy Bird. http://www.privacyfinder.org/Google ScholarGoogle Scholar
  10. Jennifer Dapko. 2012. Perceived firm transparency: Scale and model development. Ph.D. Dissertation. University of South Florida, Tampa, FL 33620, USA.Google ScholarGoogle Scholar
  11. Narges Delafrooz, Laily Hj Paim, and Ali Khatibi. 2010. Students’ online shopping behavior: An empirical study. Journal of American Science 6, 1 (2010), 137–147.Google ScholarGoogle Scholar
  12. Pouyan Esmaeilzadeh. 2019. The Impacts of the Perceived Transparency of Privacy Policies and Trust in Providers for Building Trust in Health Information Exchange: Empirical Study. JMIR medical informatics 7, 4 (2019), e14050.Google ScholarGoogle ScholarCross RefCross Ref
  13. Simone Fischer-Hübner, Julio Angulo, Farzaneh Karegar, and Tobias Pulls. 2016. Transparency, Privacy and Trust – Technology for Tracking and Controlling My Data Disclosures: Does This Work?. In Trust Management X, Sheikh Mahbub Habib, Julita Vassileva, Sjouke Mauw, and Max Mühlhäuser (Eds.). Springer International Publishing, Cham, 3–14.Google ScholarGoogle Scholar
  14. Nathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre Mulligan, and Joseph Konstan. 2005. Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, USA) (SOUPS ’05). Association for Computing Machinery, New York, NY, USA, 43–52. https://doi.org/10.1145/1073001.1073006Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Donna L Hoffman, Thomas P Novak, and Marcos Peralta. 1999. Building consumer trust online. Commun. ACM 42, 4 (1999), 80–85.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Hotjar.2020. https://www.hotjar.com/Google ScholarGoogle Scholar
  17. Yong Hu, Xin Sun, Jing Zhang, Xiangzhou Zhang, Fanghao Luo, and Lijun Huang. 2009. A University Student Behavioral Intention Model of Online Shopping. In Proceedings of the 2009 International Conference on Information Management, Innovation Management and Industrial Engineering - Volume 01(ICIII ’09). IEEE Computer Society, USA, 625–628. https://doi.org/10.1109/ICIII.2009.156Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. International Organization for Standardization. 2010. Human-centred design for interactive systems. https://www.iso.org/standard/52075.htmlGoogle ScholarGoogle Scholar
  19. Carlos Jensen and Colin Potts. 2004. Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Vienna, Austria) (CHI ’04). Association for Computing Machinery, New York, NY, USA, 471–478. https://doi.org/10.1145/985692.985752Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Matthew Kay and Michael Terry. 2010. Textured Agreements: Re-Envisioning Electronic Consent. In Proceedings of the Sixth Symposium on Usable Privacy and Security (Redmond, Washington, USA) (SOUPS ’10). Association for Computing Machinery, New York, NY, USA, Article 13, 13 pages. https://doi.org/10.1145/1837110.1837127Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W. Reeder. 2009. A ”Nutrition Label” for Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security (Mountain View, California, USA) (SOUPS ’09). Association for Computing Machinery, New York, NY, USA, Article 4, 12 pages. https://doi.org/10.1145/1572532.1572538Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, and Lorrie Faith Cranor. 2010. Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Atlanta, Georgia, USA) (CHI ’10). Association for Computing Machinery, New York, NY, USA, 1573–1582. https://doi.org/10.1145/1753326.1753561Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. ABW Kennedy and HR Sankey. 1898. The thermal efficiency of steam engines. Report of the committee appointed to the council upon the subject of the definition of a standard or standards of thermal efficiency for steam engines: With an introductory note.. In Minutes of the Proceedings, Vol. 134. Thomas Telford-ICE Virtual Library, Institution of Civil Engineers, London, UK, 278–312.Google ScholarGoogle Scholar
  24. Bettina Laugwitz, Theo Held, and Martin Schrepp. 2008. Construction and Evaluation of a User Experience Questionnaire. In HCI and Usability for Education and Work, Andreas Holzinger (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 63–76.Google ScholarGoogle Scholar
  25. Matthew KO Lee and Efraim Turban. 2001. A trust model for consumer internet shopping. International Journal of electronic commerce 6, 1 (2001), 75–91.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] LimeSurvey 3.14.8.2020. https://www.limesurvey.org/de/Google ScholarGoogle Scholar
  27. Ewa Luger, Stuart Moran, and Tom Rodden. 2013. Consent for All: Revealing the Hidden Complexity of Terms and Conditions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Paris, France) (CHI ’13). Association for Computing Machinery, New York, NY, USA, 2687–2696. https://doi.org/10.1145/2470654.2481371Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Fran Maier. 2010. More on The Problem with P3P. https://www.truste.com/blog/?p=879Google ScholarGoogle Scholar
  29. Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. ISJLP 4(2008), 543.Google ScholarGoogle Scholar
  30. Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, and Lorrie Faith Cranor. 2009. A Comparative Study of Online Privacy Policies and Formats. In Privacy Enhancing Technologies, Ian Goldberg and Mikhail J. Atallah (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 37–55.Google ScholarGoogle Scholar
  31. D Harrison McKnight, Vivek Choudhury, and Charles Kacmar. 2002. Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research 13, 3 (2002), 334–359.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Anthony D Miyazaki and Ana Fernandez. 2000. Internet privacy and security: An examination of online retailer disclosures. Journal of Public Policy & Marketing 19, 1 (2000), 54–61.Google ScholarGoogle ScholarCross RefCross Ref
  33. Mozilla Addons. 2019. Lightbeam 3.0. https://addons.mozilla.org/de/firefox/addon/lightbeam-3-0/Google ScholarGoogle Scholar
  34. Mozilla Blog. 2019. Firefox Now Available with Enhanced Tracking Protection by Default Plus Updates to Facebook Container, Firefox Monitor and Lockwise. https://blog.mozilla.org/blog/2019/06/04/firefox-now-available-with-enhanced-tracking-protection-by-default/Google ScholarGoogle Scholar
  35. Mozilla Support. 2019. Lightbeam extension for Firefox is no longer supported. https://support.mozilla.org/en-US/kb/lightbeam-extension-firefox-no-longer-supportedGoogle ScholarGoogle Scholar
  36. Jonathan A Obar and Anne Oeldorf-Hirsch. 2018. The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society 23, 1 (2018), 128–147.Google ScholarGoogle ScholarCross RefCross Ref
  37. Yue Pan and George M Zinkhan. 2006. Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing 82, 4 (2006), 331–338.Google ScholarGoogle ScholarCross RefCross Ref
  38. Ilias O Pappas. 2018. User experience in personalized online shopping: A fuzzy-set analysis. European Journal of Marketing 52, 7/8 (2018), 1679–1703.Google ScholarGoogle ScholarCross RefCross Ref
  39. Louise E Parker and Richard H Price. 1994. Empowered managers and empowered workers: The effects of managerial support and managerial perceived control on workers’ sense of control over decision making. Human Relations 47, 8 (1994), 911–928.Google ScholarGoogle ScholarCross RefCross Ref
  40. Paul A Pavlou. 2003. Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International journal of electronic commerce 7, 3 (2003), 101–134.Google ScholarGoogle Scholar
  41. Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Faith Cranor. 2015. A Design Space for Effective Privacy Notices. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (Ottawa, Canada) (SOUPS ’15). USENIX Association, USA, 1–17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Paul M Schwartz and Daniel Solove. 2009. Notice & Choice. In The Second NPLAN/BMSG Meeting on Digital Media and Marketing to Children.Google ScholarGoogle Scholar
  43. Rachel Smith, George Deitz, Marla B Royne, John D Hansen, Marko Grünhagen, and Carl Witte. 2013. Cross-cultural examination of online shopping behavior: A comparison of Norway, Germany, and the United States. Journal of Business Research 66, 3 (2013), 328–335.Google ScholarGoogle ScholarCross RefCross Ref
  44. Spiegel Online. 2019. Datenschutzerklärung – So gehen wir mit Ihren Daten um. https://www.spiegel.de/datenschutz-spiegel Layout der Website und der Datenschutzerklärung hat sich seit der Durchführung der Vorstudie geändert und sie wurde um eine Opt-Out-Option ergänzt.Google ScholarGoogle Scholar
  45. Madiha Tabassum, Abdulmajeed Alqhatani, Marran Aldossari, and Heather Richter Lipford. 2018. Increasing User Attention with a Comic-Based Policy. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI ’18). Association for Computing Machinery, New York, NY, USA, 1–6. https://doi.org/10.1145/3173574.3173774Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Stefano Taddei and Bastianina Contena. 2013. Privacy, trust and control: Which relationships with online self-disclosure?Computers in Human Behavior 29, 3 (2013), 821–826.Google ScholarGoogle Scholar
  47. Terms of Service; Didn’t read Blog. 2018. Duckduckgo and ToS;DR to fuel Internet transparency. https://blog.tosdr.org/duckduckgo-and-tosdr-to-fuel-internet-transparency/Google ScholarGoogle Scholar
  48. Janice Y Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. 2011. The effect of online privacy information on purchasing behavior: An experimental study. Information systems research 22, 2 (2011), 254–268.Google ScholarGoogle Scholar
  49. World Wide Web Consortium. 2002. The platform for Privacy Preferences 1.0 (P3P1.0) Specification.https://www.w3.org/TR/P3P/Google ScholarGoogle Scholar
  50. X. Jessie Yang, Vaibhav V. Unhelkar, Kevin Li, and Julie A. Shah. 2017. Evaluating Effects of User Experience and System Transparency on Trust in Automation. In Proceedings of the 2017 ACM/IEEE International Conference on Human-Robot Interaction (Vienna, Austria) (HRI ’17). Association for Computing Machinery, New York, NY, USA, 408–416. https://doi.org/10.1145/2909824.3020230Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Visual Interactive Privacy Policy: The Better Choice?
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
      May 2021
      10862 pages
      ISBN:9781450380966
      DOI:10.1145/3411764

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 May 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format