skip to main content
10.1145/2808117.2808119acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open Access

The Impact of Timing on the Salience of Smartphone App Privacy Notices

Published:12 October 2015Publication History

ABSTRACT

In a series of experiments, we examined how the timing impacts the salience of smartphone app privacy notices. In a web survey and a field experiment, we isolated different timing conditions for displaying privacy notices: in the app store, when an app is started, during app use, and after app use. Participants installed and played a history quiz app, either virtually or on their phone. After a distraction or delay they were asked to recall the privacy notice's content. Recall was used as a proxy for the attention paid to and salience of the notice. Showing the notice during app use significantly increased recall rates over showing it in the app store. In a follow-up web survey, we tested alternative app store notices, which improved recall but did not perform as well as notices shown during app use. The results suggest that even if a notice contains information users care about, it is unlikely to be recalled if only shown in the app store.

References

  1. A. Acquisti. Nudging Privacy: The Behavioral Economics of Personal Information. Security & Privacy, IEEE, 7(6):82--85, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Acquisti and J. Grossklags. Privacy and Rationality in Individual Decision Making. Security & Privacy, IEEE, 3(1):26--33, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Adams and M. Sasse. Users Are Not the Enemy. Communications of the ACM, 42(12):40--46, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. I. Adjerid, A. Acquisti, L. Brandimarte, and G. Loewenstein. Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency. In Proc. of SOUPS. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. Almuhimedi, F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti, J. Gluck, L. Cranor, and Y. Agarwal. Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In Proc. of CHI. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. J. Argo and K. J. Main. Meta-analyses of the Effectiveness of Warning Labels. Journal of Public Policy and Marketing, 23(2):193--208, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  7. R. Balebako, J. Jung, W. Lu, L. Cranor, and C. Nguyen. "A Lot of Little Brothers:" Measuring User Confidence in Smartphone Security and Privacy. In Proc. of SOUPS, 2013.Google ScholarGoogle Scholar
  8. R. Balebako, A. Marsh, J. Lin, J. Hong, and L. F. Cranor. The Privacy and Security Behaviors of Smartphone App Developers. Workshop on Usable Security, 2014.Google ScholarGoogle Scholar
  9. R. Balebako, R. Shay, and L. F. Cranor. Is Your Inseam a Biometric? Evaluating the Understandability of Mobile Privacy Notice Categories. Cylab Tech. Report, 2013.Google ScholarGoogle Scholar
  10. R. Böhme and J. Grossklags. The Security Cost of Cheap User Interaction. In Workshop on New Security Paradigms, pages 67--82. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Böhme and S. Köpsell. Trained to Accept?: A Field Experiment on Consent Dialogs. In Proc. of CHI. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. F. Cranor. A Framework for Reasoning About the Human in the Loop. UPSEC, 8:1--15, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Egelman, A. Felt, and D. Wagner. Choice Architecture and Smartphone Privacy: There's A Price For That. In Proc. of WEIS, 2012.Google ScholarGoogle Scholar
  14. S. Egelman, J. Tsai, L. Cranor, and A. Acquisti. Timing is Everything?: The Effects of Timing and Placement of Online Privacy Indicators. In Proc. of CHI. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Felt, S. Egelman, M. Finifter, D. Akhawe, and D. Wagner. How to Ask For Permission. HOTSEC 2012, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android Permissions: User Attention, Comprehension, and Behavior. Proc. of SOUPS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. Fu, Y. Yang, N. Shingte, J. Lindqvist, and M. Gruteser. A Field Study of Run-Time Location Access Disclosures on Android Smartphones. In Workshop on Usable Security (USEC), 2014.Google ScholarGoogle ScholarCross RefCross Ref
  18. C. Gates, J. Chen, N. Li, and R. Proctor. Effective Risk Communication for Android Apps. IEEE Trans Depend. Sec. Comp., 11(3):252--265, May 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C. Gates, N. Li, H. Peng, B. Sarma, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Generating Summary Risk Scores for Mobile Applications. IEEE Trans. Depend. Sec. Comp., 11(3):238--251, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. N. S. Good, J. Grossklags, D. K. Mulligan, and J. A. Konstan. Noticing Notice: A Large-scale Experiment on the Timing of Software License Agreements. In Proc. of CHI. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. L. Hall. NTIA Multistakeholder Process Delivers Increased App Transparency. https://cdt.org/blog/ntia-multistakeholder-process-delivers-increased-app-transparency/.Google ScholarGoogle Scholar
  22. M. Harbach, M. Hettig, S. Weber, and M. Smith. Using Personal Examples to Improve Risk Communication for Security & Privacy Decisions. In Proc of CHI '14, pages 2647--2656. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. M. Jan Boyles, Aaron Smith. Privacy and Data Management on Mobile Devices. Pew Internet and American Life Project, August 2012.Google ScholarGoogle Scholar
  24. P. Kelley, L. F. Cranor, and N. Sadeh. Privacy as Part of the App Decision-Making Process. In Proc. of CHI. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. I. Liccardi, J. Pato, and D. J. Weitzner. Improving User Choice Through Better Mobile Apps Transparency and Permissions Analysis. Journal of Privacy and Confidentiality, 5(2):1, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  26. J. Lin. Understanding and Capturing People's Mobile App Privacy Preferences. Technical Report Ph.D Thesis Carnegie Mellon University-CS-13--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. Lin, S. Amini, J. Hong, N. Sadeh, J. Lindqvist, and J. Zhang. Expectation and Purpose: Understanding Users' Mental Models of Mobile App Privacy through Crowdsourcing. Proc. of UbiComp 2012, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. N. K. Malhotra, S. S. Kim, and J. Agarwal. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4):336--355, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. National Telecommunication and Information Administration. Privacy Multistakeholder Process: Mobile Application Transparency. http://www.ntia.doc.gov/category/privacy/u, Jul. 2013.Google ScholarGoogle Scholar
  30. F. Schaub, R. Balebako, A. L. Durity, and L. F. Cranor. A Design Space for Effective Privacy Notices. Proc. of SOUPS, 2015.Google ScholarGoogle Scholar
  31. J. Tan, K. Nguyen, M. Theodorides, H. Negrón-Arroyo, C. Thompson, S. Egelman, and D. Wagner. The Effect of Developer-Specified Explanations for Permission Requests on Smartphone User Behavior. In Proc. of CHI, pages 91--100. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M. S. Wogalter, D. DeJoy, and K. R. Laughery. Warnings and Risk Communication. CRC Press, 2005.Google ScholarGoogle Scholar

Index Terms

  1. The Impact of Timing on the Salience of Smartphone App Privacy Notices

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SPSM '15: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices
      October 2015
      106 pages
      ISBN:9781450338196
      DOI:10.1145/2808117

      Copyright © 2015 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 October 2015

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SPSM '15 Paper Acceptance Rate9of25submissions,36%Overall Acceptance Rate46of139submissions,33%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader