Preserving Privacy – More Than Reading a Message
Social media has become a mainstream activity where people share all kinds of personal and intimate details about their lives. These social networking sites (SNS) allow users to conveniently authenticate to the third-party website by using their SNS credentials, thus eliminating the need of creating and remembering another username and password but at the same time agreeing to share their personal information with the SNS site. Often this is accomplished by presenting the user with a dialog box informing them that they will be sharing information. We were interested in determining if SNS users authenticating to a third-party website with their SNS credentials, were reading the informational message and if changing the message format would impact the choice to continue or cancel. Format type did not alter the participant’s choice to continue. Eye-tracking data suggests that the participants who chose to continue read some of the words in the message.
KeywordsAccess to the Web privacy eye tracking authentication
Unable to display preview. Download preview PDF.
- 2.Besmer, A., Lipford, H.R.: Users’ (mis)conceptions of social applications. In: Mould, D., Noël, S. (eds.) Graphics Interface, pp. 63–70. ACM, New York (2010), http://hci.uncc.edu/pubs/Misconceptions.pdf (retrieved )
- 3.Bitgood, S.: The role of attention in designing effective interpretive labels. Journal of Interpretation Research 5(2), 31–45 (2000), http://www.jsu.edu/psychology/docs/5.1-role_of_attention.pdf (retrieved )
- 4.Bohme, R., Kopsell, S.: Trained to accept?: a field experiment on consent dialogs. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, pp. 2403–2406. ACM (2010)Google Scholar
- 5.Egelman, S.: My profile is my password, verify me! The privacy/convenience tradeoff of facebook connect. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2369–2378. ACM (2013)Google Scholar
- 6.Good, N.S., Grossklags, J., Mulligan, D.K., Konstan, J.A.: Noticing notice: a large-scale experiment on the timing of software license agreements. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 607–616. ACM (April 2007)Google Scholar
- 8.Ko, M.N., Cheek, G.P., Shehab, M.: Social-networks connect services. Computer 43(8), 37–43 (2010), doi:10.1109/MC.2010.239; MacMillan, D.: FB connect: Your 8,000 hidden friends. Bloomburg BusinessWeek: Technology (April 2, 2009) http://www.businessweek.com/technology/content/apr2009/tc2009041_649562.htm (retrieved )
- 11.Rayner, K., Juhasz, B.J., Pollatsek, A.: Eye Movements During Reading. In: Snowling, M.J., Hulme, C. (eds.) The Science of Reading: A Handbook, pp. 79–97. Blackwell Publishing Ltd., Oxford (2008), doi:10.1002/978047-757642.ch5Google Scholar
- 12.Roberts, K.K.: Privacy & perceptions: How facebook advertising affects its users. The Elon Journal of Undergraduate Research in Communications 1(1), 24–34 (2010), http://www.elon.edu/docs/e-web/academics/communications/research/03RobertsEJSpring10.pdf Google Scholar
- 13.Steel, E., Fowler, G.A.: Facebook in privacy breach: Top-ranked applications transmit personal IDs, a journal investigation finds. The Wall Street Journal (October 17, 2010), http://online.wsj.com/article/SB10001424052702304772804575558484075236968.html (retrieved)
- 16.Tuunainen, V.K., Pitkanen, O., Hovi, M.: Users’ awareness of privacy on online social networking sites – case Facebook. In: BLED 2009 Proceedings (Paper 42) (2009), http://aisel.aisnet.org/bled2009/42 (retrieved)
- 17.Wang, N., Xu, H., Grossklags, J.: Third party apps on facebook: Privacy and the illusion of control. In: Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology (Article No. 4), ACM, New York (2011), doi:10.1145/2076444.2076448Google Scholar
- 19.Wolgater, M.S., Shaver, E.F.: Evaluation of list vs. paragraph text format on search time for warnings symptoms in a product manual. Advances in Occupational Ergonomics and Safety 4, 434–438 (2001)Google Scholar