Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2014
DOI: 10.1145/2556288.2556978
|View full text |Cite
|
Sign up to set email alerts
|

Using personal examples to improve risk communication for security & privacy decisions

Abstract: IT security systems often attempt to support users in taking a decision by communicating associated risks. However, a lack of efficacy as well as problems with habituation in such systems are well known issues. In this paper, we propose to leverage the rich set of personal data available on smartphones to communicate risks using personalized examples. Examples of private information that may be at risk can draw the users' attention to relevant information for a decision and also improve their response. We pres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
76
0
2

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 134 publications
(82 citation statements)
references
References 17 publications
2
76
0
2
Order By: Relevance
“…From the answers the following type of statements were deduced: "95% of users were surprised this app sent their approximate location to mobile ad providers". The corresponding interface is displayed in Figure 6 (A)) Harbach et al [8] present the permissions together with personal information such as photos stored on the particular Smartphone or the owner's actual location (see Figure 6 (B)). The idea is to help people to imagine the consequences of requested permissions, rather than merely listing them.…”
Section: Alternative Interfacesmentioning
confidence: 99%
See 3 more Smart Citations
“…From the answers the following type of statements were deduced: "95% of users were surprised this app sent their approximate location to mobile ad providers". The corresponding interface is displayed in Figure 6 (A)) Harbach et al [8] present the permissions together with personal information such as photos stored on the particular Smartphone or the owner's actual location (see Figure 6 (B)). The idea is to help people to imagine the consequences of requested permissions, rather than merely listing them.…”
Section: Alternative Interfacesmentioning
confidence: 99%
“…whether they are risky and/or needed, and the interaction between different permissions. [7] (B) on the right an example of the 'Your location' permission as it was used by Harbach et al [8] Since the interface proposed by Lin et al [7] already listed all permissions, and accompanied this with an assessment thereof we based our own proposal on theirs. However, we included even more information about the permission-requesting behavior to enhance comprehensiveness.…”
Section: The Coping Interfacementioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, the information concern is related to the flow of data between the user and involved data processors. The online privacy research recognized various antecedents of privacy concerns such as trust, risk perception, previous privacy experience, privacy awareness, personality traits and demographic differences [31,46,8,52,21,26]. Some of this research investigated the influence of concerns on privacy behaviors but the results are inconsistent.…”
Section: Introductionmentioning
confidence: 99%