skip to main content
10.1145/1518701.1518752acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Timing is everything?: the effects of timing and placement of online privacy indicators

Published:04 April 2009Publication History

ABSTRACT

Many commerce websites post privacy policies to address Internet shoppers' privacy concerns. However, few users read or understand them. Iconic privacy indicators may make privacy policies more accessible and easier for users to understand: in this paper, we examine whether the timing and placement of online privacy indicators impact Internet users' browsing and purchasing decisions. We conducted a laboratory study where we controlled the placement of privacy information, the timing of its appearance, the privacy level of each website, and the price and items being purchased. We found that the timing of privacy information had a significant impact on how much of a premium users were willing to pay for privacy. We also found that timing had less impact when users were willing to examine multiple websites. Finally, we found that users paid more attention to privacy indicators when purchasing privacy-sensitive items than when purchasing items that raised minimal privacy concerns.

References

  1. Ackerman, M.S., Cranor, L.F., and Reagle, J. Privacy in e-commerce: examining user scenarios and privacy preferences. In EC '99: Proceedings of the 1st ACM conference on Electronic Commerce (New York, NY, USA, 1999), ACM, pp. 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Adkinson, W., Eisenbach, J., and Lenard, T. Privacy online: A report on the information practices and policies of commercial web sites. Tech. rep., Progress&Freedom Foundation, 2002.Google ScholarGoogle Scholar
  3. Anton, A., Earp, J., He, Q., Stufflebeam, W., Bolchini, D., and Jensen, C. Financial privacy policies and the need for standardization. IEEE Security&Privacy 2, 2 (Mar-Apr 2004), 36--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Byers, S., Cranor, L.F., and Kormann, D. Automated Analysis of P3P-Enabled Web Sites. In Proceedings of the Fifth International Conference on Electronic Commerce (ICEC2003) (October 1-3, 2003), pp. 197--207. http://lorrie.cranor.org/pubs/icec03.html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cranor, L.F. Web Privacy with P3P. O'Reilly and Associates, Sebastopol, CA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cranor, L.F., Byers, S., Kormann, D., and McDaniel, P. Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. In Proceedings of the 2004 Workshop on Privacy Enhancing Technologies (PET2004) (May 26-26, 2004), pp. 314--328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cranor, L.F., Guduru, P., and Arjula, M. User Interfaces for Privacy Agents. ACM Transactions on Computer-Human Interaction 13, 2 (June, 2006), 135--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Earp, J., Anton, A., Aiman-Smith, L., and Stufflebeam, W. Examining internet privacy policies within the context of user privacy values. Engineering Management, IEEE Transactions on 52, 2 (May 2005), 227--237.Google ScholarGoogle ScholarCross RefCross Ref
  9. Edelman, B. Adverse selection in online 'trust' certifications. In Proceedings of the 2006 Workshop on the Economics of Information Security (WEIS'06) (Cambridge, UK, 2006).Google ScholarGoogle Scholar
  10. Egelman, S., Cranor, L.F., and Chowdhury, A. An analysis of p3p-enabled web sites among top-20 search results. In Proceedings of the Eighth International Conference on Electronic Commerce (August 14-16, 2006). http://lorrie.cranor.org/pubs/icec06.html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Egelman, S., Cranor, L.F., and Hong, J. You've been warned: An empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the ACM Computer-Human Interaction Conference (New York, NY, USA, April 2008), ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Fogg, B., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangekar, A., Shon, J., Swani, P., and Treinen, M. What Makes Web Sites Credible? A Report on a Large Quantitative Study. In Proceedings of the ACM Computer-Human Interaction Conference (Seattle, WA, March 31 - April 4, 2001), ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Gideon, J., Egelman, S., Cranor, L., and Acquisti, A. Power Strips, Prophylactics, and Privacy, Oh My! In Proceedings of the 2006 Symposium on Usable Privacy and Security (12-14, July 2006), pp. 133--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Good, N.S., Grossklags, J., Mulligan, D.K., and Konstan, J.A. Noticing notice: a large-scale experiment on the timing of software license agreements. In CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems (New York, NY, USA, 2007), ACM, pp. 607--616. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Hochheiser, H. The platform for privacy preference as a social protocol: An examination within the U.S. policy context. ACM Transactions on Internet Technology (TOIT) 2, 4 (2002), 276--306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jensen, C., Sarkar, C., Jensen, C., and Potts, C. Tracking Website Data-Collection and Privacy Practices with the iWatch Web Crawler. In Proceedings of the 2007 Symposium On Usable Privacy and Security (SOUPS) (Pittsburgh, PA, 2007), ACM Press, pp. 29--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Milne, G.R., and Culnan, M.J. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices. Journal of Interactive Marketing 18, 3 (Summer 2004), 54--61.Google ScholarGoogle ScholarCross RefCross Ref
  18. Moores, T. Do consumers understand the role of privacy seals in e-commerce? Communications of the ACM 48, 3 (2005), 86--91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Pollach, I. What's wrong with online privacy policies? Communications of the ACM 50, 9 (2007), 103--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Sherman, E. Privacy policies are great-for phds, September 4, 2008. http://industry.bnet.com/technology/1000391/privacy-policies-are-great-for-phds/.Google ScholarGoogle Scholar
  21. Sobey, J., Biddle, R., van Oorschot, P., and Patrick, A. Exploring user reactions to browser cues for extended validation certificates. In Proceedings of the European Symposium on Research in Computer Security (ESORICS'08) (October 2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. TRUSTE. TRUSTe Fact Sheet, 2008. http://www.truste.org/about/fact_sheet.php.Google ScholarGoogle Scholar
  23. Tsai, J., Egelman, S., Cranor, L., and Acquisti, A. The effect of online privacy information on purchasing behavior: An experimental study. In Proceedings of the 2007 Workshop on the Economics of Information Security (WEIS'07) (Pittsburgh, PA, USA, 2007).Google ScholarGoogle Scholar
  24. Whalen, T., and Inkpen, K.M. Gathering Evidence: Use of Visual Security Cues in Web Browsers. In Proceedings of the 2005 Conference on Graphics Interface (Victoria, British Columbia, 2005), pp. 137--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Wu, M., Miller, R.C., and Garfinkel, S.L. Do Security Toolbars Actually Prevent Phishing Attacks? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Held in Montreal (2006), ACM Press, pp. 601--610. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Timing is everything?: the effects of timing and placement of online privacy indicators

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '09: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2009
      2426 pages
      ISBN:9781605582467
      DOI:10.1145/1518701

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 April 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '09 Paper Acceptance Rate277of1,130submissions,25%Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader