Preserving Privacy – More Than Reading a Message

  • Susanne Furman
  • Mary Theofanos
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8516)


Social media has become a mainstream activity where people share all kinds of personal and intimate details about their lives. These social networking sites (SNS) allow users to conveniently authenticate to the third-party website by using their SNS credentials, thus eliminating the need of creating and remembering another username and password but at the same time agreeing to share their personal information with the SNS site. Often this is accomplished by presenting the user with a dialog box informing them that they will be sharing information. We were interested in determining if SNS users authenticating to a third-party website with their SNS credentials, were reading the informational message and if changing the message format would impact the choice to continue or cancel. Format type did not alter the participant’s choice to continue. Eye-tracking data suggests that the participants who chose to continue read some of the words in the message.


Access to the Web privacy eye tracking authentication 


  1. 1.
    Bahr, G.S., Ford, R.A.: How and why pop-ups don’t work: Pop-up prompted eye movements, user affect and decision making. Computers in Behavior 27(2), 776–783 (2010)CrossRefGoogle Scholar
  2. 2.
    Besmer, A., Lipford, H.R.: Users’ (mis)conceptions of social applications. In: Mould, D., Noël, S. (eds.) Graphics Interface, pp. 63–70. ACM, New York (2010), (retrieved )
  3. 3.
    Bitgood, S.: The role of attention in designing effective interpretive labels. Journal of Interpretation Research 5(2), 31–45 (2000), (retrieved )
  4. 4.
    Bohme, R., Kopsell, S.: Trained to accept?: a field experiment on consent dialogs. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, pp. 2403–2406. ACM (2010)Google Scholar
  5. 5.
    Egelman, S.: My profile is my password, verify me! The privacy/convenience tradeoff of facebook connect. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2369–2378. ACM (2013)Google Scholar
  6. 6.
    Good, N.S., Grossklags, J., Mulligan, D.K., Konstan, J.A.: Noticing notice: a large-scale experiment on the timing of software license agreements. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 607–616. ACM (April 2007)Google Scholar
  7. 7.
    Gross, R., Acquisiti, A.: Information revelation of the privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in Electronic Society, pp. 71–80. ACM, New York (2005), doi:10.1145/1102199.1102214CrossRefGoogle Scholar
  8. 8.
    Ko, M.N., Cheek, G.P., Shehab, M.: Social-networks connect services. Computer 43(8), 37–43 (2010), doi:10.1109/MC.2010.239; MacMillan, D.: FB connect: Your 8,000 hidden friends. Bloomburg BusinessWeek: Technology (April 2, 2009) (retrieved )
  9. 9.
    Maler, E., Reed, D.: The venn of identity, options and issues in federated identity management. IEEE Security & Privacy 6(2), 16–23 (2008), doi:10.1109/MSP.2008.50CrossRefGoogle Scholar
  10. 10.
    Morrow, D., Leirer, V., Altieri, P.: List formats improve medication instructions for older adults. Educational Gerontology: An International Quarterly 21(2), 151–166 (1995), doi:10.1080/0360127950210204CrossRefGoogle Scholar
  11. 11.
    Rayner, K., Juhasz, B.J., Pollatsek, A.: Eye Movements During Reading. In: Snowling, M.J., Hulme, C. (eds.) The Science of Reading: A Handbook, pp. 79–97. Blackwell Publishing Ltd., Oxford (2008), doi:10.1002/978047-757642.ch5Google Scholar
  12. 12.
    Roberts, K.K.: Privacy & perceptions: How facebook advertising affects its users. The Elon Journal of Undergraduate Research in Communications 1(1), 24–34 (2010), Google Scholar
  13. 13.
    Steel, E., Fowler, G.A.: Facebook in privacy breach: Top-ranked applications transmit personal IDs, a journal investigation finds. The Wall Street Journal (October 17, 2010), (retrieved)
  14. 14.
    Sun, S.T., Boshmaf, Y., Hawkey, K., Beznosov, K.: A billion keys, but few locks: The crisis of web single sign-on. In: Proceedings of the 2010 Workshop on New Security Paradigms, pp. 61–72. ACM, New York (2010), doi:10.1145/1900546.1900556CrossRefGoogle Scholar
  15. 15.
    Tow, W., Newk-Fon, H., Dell, P., Venable, J.: Understanding information disclosure behavior in Australian Facebook users. Journal of Information Technology 25(2), 126–136 (2010), doi:10.1057/jit.2010.18CrossRefGoogle Scholar
  16. 16.
    Tuunainen, V.K., Pitkanen, O., Hovi, M.: Users’ awareness of privacy on online social networking sites – case Facebook. In: BLED 2009 Proceedings (Paper 42) (2009), (retrieved)
  17. 17.
    Wang, N., Xu, H., Grossklags, J.: Third party apps on facebook: Privacy and the illusion of control. In: Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology (Article No. 4), ACM, New York (2011), doi:10.1145/2076444.2076448Google Scholar
  18. 18.
    West, R.: The psychology of security. Communications of the ACM 51(4), 34–40 (2008), doi:10.1145/1330311.1330320CrossRefGoogle Scholar
  19. 19.
    Wolgater, M.S., Shaver, E.F.: Evaluation of list vs. paragraph text format on search time for warnings symptoms in a product manual. Advances in Occupational Ergonomics and Safety 4, 434–438 (2001)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Susanne Furman
    • 1
  • Mary Theofanos
    • 1
  1. 1.National Institute of Standards and TechnologyGaithersburgUSA

Personalised recommendations