Skip to main content

Insights into Internet Privacy for Visually Impaired and Blind People

Part of the Lecture Notes in Computer Science book series (LNISA,volume 9758)

Abstract

Tracking blockers protect from and inform about hidden trackers and services that collect data in the background while the user is surfing the web. However, existing tracking blockers provide information and feedback visually and thus are barely accessible for visually impaired and blind users. In this paper we present insights about privacy concerns of visually impaired Internet users. Moreover we present feedback strategies and guidelines for an accessible tracking blocker developed in a user centered design process. The underlying feedback principles and guidelines can be used for the design of Privacy Enhancing Technology in other domains, and therefore serve as reference for designers and developers.

Keywords

  • Internet privacy
  • Visually impaired
  • Tracking blocker
  • Feedback
  • Design guidelines

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-41264-1_31
  • Chapter length: 8 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   69.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-41264-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   89.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.

Notes

  1. 1.

    https://www.prlog.org/12128262-internet-study-shows-users-are-unaware-of-threats-and-risks.html.

  2. 2.

    Ghostery: https://www.ghostery.com.

  3. 3.

    Privacy Badger: https://www.eff.org/de/node/73969.

  4. 4.

    DisconnectMe: https://disconnect.me.

  5. 5.

    Blur: https://www.abine.com/index.html.

References

  1. Akhter, F., Buzzi, M.C., Buzzi, M., Leporini, B.: Conceptual framework: how to engineer online trust for disabled users. In: 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, pp. 614–617 (2009)

    Google Scholar 

  2. Buzzi, M.C., Buzzi, M., Leporini, B., Akhter, F.: User trust in ecommerce services: perception via screen reader. In: Proceedings - 2009 International Conference on New Trends in Information and Service Science, NISS 2009, pp. 1166–1171. IEEE Computer Society (2009)

    Google Scholar 

  3. Dobias, J.: Privacy effects of web bugs amplified by web 2.0. In: Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol. 352, pp. 244–257. Springer, Heidelberg (2011)

    CrossRef  Google Scholar 

  4. Egelman, S., Cranor, L.F., Hong, J.: You’ve been warned. In: Proceeding of the Twenty-Sixth Annual CHI Conference on Human Factors in Computing Systems – CHI 2008, pp. 1065–1074. ACM Press (2008)

    Google Scholar 

  5. Egelman, S.: Trust me: design patterns for constructing trustworthy trust indicators. Doctoral thesis, School of Computer Science, Carnegie Mellon University (2009)

    Google Scholar 

  6. Felt, A.P., Reeder, R.W., Almuhimedi, H., Consolvo, S.: Experimenting at scale with Google Chrome’s SSL warning. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems - CHI 2014, pp. 2667–2670. ACM Press (2014)

    Google Scholar 

  7. Hochheiser, H., Feng, J., Lazar, J.: Challenges in universally usable privacy and security. In: Symposium on Usable Privacy and Security (SOUPS) 2008 (2008)

    Google Scholar 

  8. Lipford, H.R., Watson, J., Whitney, M., Froiland, K., Reeder, R.W.: Visual vs. compact. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems - CHI 2010, pp. 1111–1114. ACM Press (2010)

    Google Scholar 

  9. De Luca, A., Frauendienst, B., Maurer, M., et al.: Does MoodyBoard make internet use more secure? In: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems - CHI 2011, pp. 887–890. ACM Press (2011)

    Google Scholar 

  10. McDonald, A.M., Reeder, R.W., Kelley, P.G., Cranor, L.F.: A comparative study of online privacy policies and formats. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 37–55. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  11. Pemble, M.: Crying ‘Havoc’, Crying ‘Wolf’ or Just Howling at the Moon? Netw. Secur. 2001(9), 14–16 (2001)

    CrossRef  Google Scholar 

  12. Sauer, G., Holman, J., Lazar, J., Hochheiser, H., Feng, J.: Accessible privacy and security: a universally usable human-interaction proof tool. Univers. Access Inf. Soc. 9(3), 239–248 (2010)

    CrossRef  Google Scholar 

  13. Schmuntzsch, U., Sturm, C., Roetting, M.: The warning glove – development and evaluation of a multimodal action-specific warning prototype. Appl. Ergon. 45(5), 1297–1305 (2014)

    CrossRef  Google Scholar 

Download references

Acknowledgements

We would like to thank the Hilfsgemeinschaft (Austrian Association in Support of the Blind and Visually Impaired) for their support. This work has been partly funded within the project BlindFaith funded by the Internet Foundation Austria in the 9th netidee call and within BlindBits, a project conducted in the program Sparkling Science funded by the Austrian Federal Ministry of Science, Research and Economy.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Georg Regal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Regal, G., Mattheiss, E., Busch, M., Tscheligi, M. (2016). Insights into Internet Privacy for Visually Impaired and Blind People. In: Miesenberger, K., Bühler, C., Penaz, P. (eds) Computers Helping People with Special Needs. ICCHP 2016. Lecture Notes in Computer Science(), vol 9758. Springer, Cham. https://doi.org/10.1007/978-3-319-41264-1_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41264-1_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41263-4

  • Online ISBN: 978-3-319-41264-1

  • eBook Packages: Computer ScienceComputer Science (R0)