Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices 2015
DOI: 10.1145/2808117.2808119
|View full text |Cite
|
Sign up to set email alerts
|

The Impact of Timing on the Salience of Smartphone App Privacy Notices

Abstract: In a series of experiments, we examined how the timing impacts the salience of smartphone app privacy notices. In a web survey and a field experiment, we isolated different timing conditions for displaying privacy notices: in the app store, when an app is started, during app use, and after app use. Participants installed and played a history quiz app, either virtually or on their phone. After a distraction or delay they were asked to recall the privacy notice's content. Recall was used as a proxy for the atten… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
39
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(40 citation statements)
references
References 25 publications
(28 reference statements)
1
39
0
Order By: Relevance
“…Such networked business models have substantial implications for data privacy because personal information is shared between and processed by a high number of actors (Wohlgemuth et al 2014). Mobile operating systems feature safeguards against unauthorized access to personal information, and apps must request permission from users for these services prior to installation or at runtime (Aydin et al 2017;Balebako et al 2015). App providers can enrich runtime permission requests with custom explanations by adding a textual description to the mobile operating systems' inbuilt formal request dialogues (Tan et al 2014).…”
Section: Introductionmentioning
confidence: 99%
“…Such networked business models have substantial implications for data privacy because personal information is shared between and processed by a high number of actors (Wohlgemuth et al 2014). Mobile operating systems feature safeguards against unauthorized access to personal information, and apps must request permission from users for these services prior to installation or at runtime (Aydin et al 2017;Balebako et al 2015). App providers can enrich runtime permission requests with custom explanations by adding a textual description to the mobile operating systems' inbuilt formal request dialogues (Tan et al 2014).…”
Section: Introductionmentioning
confidence: 99%
“…Recently researchers have started to study nudging in the context of security and privacy decision making [9] [14], [15], [16]; the case study in this paper is an example of nudging from [9]. In security, nudging is potentially a soft and flexible alternative to the more common approach of strict compliance to a security policy.…”
Section: Influencing Decision Makingmentioning
confidence: 99%
“…That is, it is not always obvious in which direction to nudge. However, as shown in [15] for WiFi selection and in [14], [16] for privacy, if an objective is agreed, then influencing can be an effective approach to improving security and privacy without restricting the user's choices.…”
Section: Influencing Decision Makingmentioning
confidence: 99%
“…When the consequences of lax privacy were illustrated, over half the participants changed their permissions. Balebako et al [7] explored the timing of privacy notices through an Android field experiment. They found salience was increased more by in-app dialogs than those shown before installation.…”
Section: Platform Taxonomymentioning
confidence: 99%