Abstract
Social media has become a mainstream activity where people share all kinds of personal and intimate details about their lives. These social networking sites (SNS) allow users to conveniently authenticate to the third-party website by using their SNS credentials, thus eliminating the need of creating and remembering another username and password but at the same time agreeing to share their personal information with the SNS site. Often this is accomplished by presenting the user with a dialog box informing them that they will be sharing information. We were interested in determining if SNS users authenticating to a third-party website with their SNS credentials, were reading the informational message and if changing the message format would impact the choice to continue or cancel. Format type did not alter the participant’s choice to continue. Eye-tracking data suggests that the participants who chose to continue read some of the words in the message.
Chapter PDF
Similar content being viewed by others
References
Bahr, G.S., Ford, R.A.: How and why pop-ups don’t work: Pop-up prompted eye movements, user affect and decision making. Computers in Behavior 27(2), 776–783 (2010)
Besmer, A., Lipford, H.R.: Users’ (mis)conceptions of social applications. In: Mould, D., Noël, S. (eds.) Graphics Interface, pp. 63–70. ACM, New York (2010), http://hci.uncc.edu/pubs/Misconceptions.pdf (retrieved )
Bitgood, S.: The role of attention in designing effective interpretive labels. Journal of Interpretation Research 5(2), 31–45 (2000), http://www.jsu.edu/psychology/docs/5.1-role_of_attention.pdf (retrieved )
Bohme, R., Kopsell, S.: Trained to accept?: a field experiment on consent dialogs. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, pp. 2403–2406. ACM (2010)
Egelman, S.: My profile is my password, verify me! The privacy/convenience tradeoff of facebook connect. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2369–2378. ACM (2013)
Good, N.S., Grossklags, J., Mulligan, D.K., Konstan, J.A.: Noticing notice: a large-scale experiment on the timing of software license agreements. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 607–616. ACM (April 2007)
Gross, R., Acquisiti, A.: Information revelation of the privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in Electronic Society, pp. 71–80. ACM, New York (2005), doi:10.1145/1102199.1102214
Ko, M.N., Cheek, G.P., Shehab, M.: Social-networks connect services. Computer 43(8), 37–43 (2010), doi:10.1109/MC.2010.239; MacMillan, D.: FB connect: Your 8,000 hidden friends. Bloomburg BusinessWeek: Technology (April 2, 2009) http://www.businessweek.com/technology/content/apr2009/tc2009041_649562.htm (retrieved )
Maler, E., Reed, D.: The venn of identity, options and issues in federated identity management. IEEE Security & Privacy 6(2), 16–23 (2008), doi:10.1109/MSP.2008.50
Morrow, D., Leirer, V., Altieri, P.: List formats improve medication instructions for older adults. Educational Gerontology: An International Quarterly 21(2), 151–166 (1995), doi:10.1080/0360127950210204
Rayner, K., Juhasz, B.J., Pollatsek, A.: Eye Movements During Reading. In: Snowling, M.J., Hulme, C. (eds.) The Science of Reading: A Handbook, pp. 79–97. Blackwell Publishing Ltd., Oxford (2008), doi:10.1002/978047-757642.ch5
Roberts, K.K.: Privacy & perceptions: How facebook advertising affects its users. The Elon Journal of Undergraduate Research in Communications 1(1), 24–34 (2010), http://www.elon.edu/docs/e-web/academics/communications/research/03RobertsEJSpring10.pdf
Steel, E., Fowler, G.A.: Facebook in privacy breach: Top-ranked applications transmit personal IDs, a journal investigation finds. The Wall Street Journal (October 17, 2010), http://online.wsj.com/article/SB10001424052702304772804575558484075236968.html (retrieved)
Sun, S.T., Boshmaf, Y., Hawkey, K., Beznosov, K.: A billion keys, but few locks: The crisis of web single sign-on. In: Proceedings of the 2010 Workshop on New Security Paradigms, pp. 61–72. ACM, New York (2010), doi:10.1145/1900546.1900556
Tow, W., Newk-Fon, H., Dell, P., Venable, J.: Understanding information disclosure behavior in Australian Facebook users. Journal of Information Technology 25(2), 126–136 (2010), doi:10.1057/jit.2010.18
Tuunainen, V.K., Pitkanen, O., Hovi, M.: Users’ awareness of privacy on online social networking sites – case Facebook. In: BLED 2009 Proceedings (Paper 42) (2009), http://aisel.aisnet.org/bled2009/42 (retrieved)
Wang, N., Xu, H., Grossklags, J.: Third party apps on facebook: Privacy and the illusion of control. In: Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology (Article No. 4), ACM, New York (2011), doi:10.1145/2076444.2076448
West, R.: The psychology of security. Communications of the ACM 51(4), 34–40 (2008), doi:10.1145/1330311.1330320
Wolgater, M.S., Shaver, E.F.: Evaluation of list vs. paragraph text format on search time for warnings symptoms in a product manual. Advances in Occupational Ergonomics and Safety 4, 434–438 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Furman, S., Theofanos, M. (2014). Preserving Privacy – More Than Reading a Message. In: Stephanidis, C., Antona, M. (eds) Universal Access in Human-Computer Interaction. Design for All and Accessibility Practice. UAHCI 2014. Lecture Notes in Computer Science, vol 8516. Springer, Cham. https://doi.org/10.1007/978-3-319-07509-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-07509-9_2
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07508-2
Online ISBN: 978-3-319-07509-9
eBook Packages: Computer ScienceComputer Science (R0)