Advertisement

Do You Really Trust “Privacy Policy” or “Terms of Use” Agreements Without Reading Them?

  • Abbas Moallem
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 593)

Abstract

An online survey was administered to college students asking them whether they read the terms of use and privacy policy when using services or applications, and if not, why. Also, when apps ask to have access to their location, contacts, or camera, do the students allow access or not, due to security concerns. One hundred and seventy students have completed the survey. Results suggest that 62% of participants “Agree” to not reading the terms of use or privacy policies, with the most common explanation being that the text is “too long.” For the question “Have you ever rejected a mobile app request for accessing your contacts, camera or location?” the answers are more encouraging. Ninety-two percent of those surveyed express that they “Yes,” have rejected access if they believe the app does not need to access the camera or contacts.

Keywords

Privacy policy Trust Application design User behavior 

References

  1. 1.
  2. 2.
    Attorney General Kamala D. Harris Announces Privacy Enforcement and Protection Unit, 9 July 2012. https://oag.ca.gov/news/press-releases/attorney-general-kamala-d-harris-announces-privacy-enforcement-and-protection
  3. 3.
    L0046, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML
  4. 4.
    tHobson’s Choice. Wikipedia. https://en.wikipedia.org/wiki/Hobson%27s_choice
  5. 5.
    Terms of Services, Didn’t Read. https://tosdr.org/
  6. 6.
    Morey, T., Forbath, T.H., Schoop, A.: Customer data: designing for transparency and trust. Harv. Bus. Rev. (2015). https://hbr.org/2015/05/customer-data-designing-for-transparency-and-trust
  7. 7.
    Haggerty, J., Hughes-Roberts, T., Hegarty, R.: Hobson’s choice: security and privacy permissions in Android and iOS devices. In: Tryfonas, T., Askoxylakis, I. (eds.) Human Aspects of Information Security, Privacy, and Trust, HAS 2015. LNCS, vol. 9190. Springer, Cham (2015)Google Scholar
  8. 8.
    Karat, C.M., Karat, J., Brodie, C., Feng, J.: Evaluating interfaces for privacy policy rule authoring. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006, pp. 83–92 (2006)Google Scholar
  9. 9.
    Kumaraguru, P., Cranor, L.F., Lobo, J., Calo, S.B.: A survey of privacy policy languages. In: Workshop on Usable IT (2007). http://precog.iiitd.edu.in/Publications_files/Privacy_Policy_Languages.pdf

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.UX Experts, LLCCupertinoUSA

Personalised recommendations