[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1280680.1280695acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

An honest man has nothing to fear: user perceptions on web-based information disclosure

Published: 18 July 2007 Publication History

Abstract

In today's era of the global ubiquitous use of free online tools and business models that depend on data retention and customized advertising, we face a growing tension between the privacy concerns of individuals and the financial motivations of organizations. As a critical foundation step to address this problem, we must first understand the attitudes, beliefs, behaviors, and expectations of web users in order to create an environment where user privacy needs are met while still allowing online companies to innovate and provide functionality that users desire. As security and usability professionals we must identify areas where misperceptions exist and seek solutions, either by raising awareness, changing policy, or through technical means. In this paper, we explore these issues and report the results from a survey of 352 college undergraduates and a comparison group of 25 middle aged adults The results were at times surprising and even contradictory to the views held by security professionals. To summarize our findings, the students we surveyed believe that "an honest man has nothing to fear."

References

[1]
G. Gilder. The Information Factories. Wired, 10.2006, pp. 178--202.
[2]
Gregory Conti, "Googling Considered Harmful." New Security Paradigms Workshop, 2006.
[3]
Edward Sobiesk and Gregory Conti. "The Cost of Free Web Tools." IEEE Security and Privacy, vol. 5, no. 3, pp. 66--68, May/Jun, 2007.
[4]
Dawn Kawamoto. "Google CEO speaks out on future of search." CNET News.com. October 7, 2003. http://news.com.com/2100-1024_3-5088153.html, last accessed 30 January 2007.
[5]
Gregory Piatetsky-Shapiro. "Interview with Usama Fayyad, Yahoo Chief Data Officer." ACM Special Interest Group on Knowledge Discovery and Data Mining (SIGKDD) Explorations, December 2005. http://www.acm.org/sigs/sigkdd/explorations/issues/7-2-2005-12/fayyad.html, last accessed 6 February 2007.
[6]
Robert Cailliau. "A Little History of the World Wide Web." World Wide Web Consortium, circa 1995. http://www.w3.org/History.html, last accessed 16 November 2006.
[7]
Electronic Frontier Foundation. http://www.eff.org/, last accessed 6 March 2007.
[8]
Electronic Privacy Information Center. http://www.epic.org/, last accessed 6 March 2007.
[9]
John Battelle. "The Database of Intentions." Searchblog, 13 November 2003. http://battellemedia.com/archives/000063.php, last accessed 16 November 2006.
[10]
John Battelle. The Search. Portfolio: New York, 2005.
[11]
Johnny Long. "Google Hacking for Penetration Testers." Syngress, 2004.
[12]
Ryan Singel. "FAQ: AOL's Search Gaffe and You." Wired News, 11 August 2006. http://www.wired.com/news/politics/privacy/0,71579-0.html, last accessed 6 February 2007.
[13]
Michael Barbaro and Tom Zeller. "A Face is Exposed for AOL Searcher No. 4417749." The New York Times, 9 August 2006.
[14]
AOL Stalker. http://www.aolstalker.com/, last accessed 6 February 2007.
[15]
AOL Search Logs. http://data.aolsearchlogs.com/, last accessed 6 February 2007.
[16]
AOLpsycho. http://www.aolpsycho.com/, last accessed 6 February 2007.
[17]
Facebook. http://www.facebook.com/, last accessed 13 February 2007.
[18]
My Space: A Space for Friends. http://www.myspace.com/, last accessed 13 February 2007.
[19]
Statewatch News Online. "EU -- Majority of Governments Introducing Data Retention." January 2003. http://www.statewatch.org/news/2003/jan/12eudatret.htm, last accessed 18 February 2007.
[20]
Deloitte. "2005 Global Security Survey." 22 June 2005. available online at http://www.deloitte.com/dtt/research/0,1015,sid=1013&cid=85452,00.html.
[21]
ISP-Planet. "Managed Security Provider Survey." 27 January 2007. available online at http://www.enterpriseitplanet.com/security/features/article.php/3656046.
[22]
Cisco. "Understanding Remote Worker Security: A Survey of User Awareness vs. Behavior." 2006. Available online at http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns413/net working_solutions_white_paper0900aecd8054581d.shtml.
[23]
TRUSTe. "TRUSTe/TNS Survey Press Release." 6 December 2006. http://www.truste.org/about/press_release/12_06_06.php, last accessed 24 February 2007.
[24]
Joseph Turow, Lauren Feldman, and Kimberly Meltzer. "Open to Exploitation: American Shoppers Online and Offline." Annenberg Public Policy Center, June 2005. Available online at http://www.annenbergpublicpolicycenter.org/04_info_society/Sev enteen_Facts_WEB_FINAL.pdf
[25]
Anonymizer. http://www.anonymizer.com/, last accessed 13 February 2007.
[26]
SpyNOT Anonymous Proxy and Web Browsing Privacy Protection. http://www.spynot.com/, last accessed 13 February 2007.
[27]
The Free Network Project: A Distributed Anonymous Information Storage and Retrieval System. http://freenetprotject.org/, last accessed 13 February 2007.
[28]
I2P. http://www.i2p.net/, last accessed 13 February 2007.
[29]
Tor: Anonymity Online. http://tor.eff.org/, last accessed 13 February 2007.
[30]
Privoxy. http://www.privoxy.org/, last accessed 13 February 2007.
[31]
The Web Hitchhiker's Guide to Proxomitron. http://www.proxomitron.info/, last accessed 13 February 2007.
[32]
Collin Jackson. "Safe History Firefox Add-on." https://addons.mozilla.org/firefox/1502/, last accessed 18 February 2007.
[33]
Collin Jackson. "Safe Cache Firefox Add-on." https://addons.mozilla.org/firefox/1474/, last accessed 18 February 2007.
[34]
PC World. "Top 5 Cookie Managers." 18 March 2001. http://www.pcworld.com/article/id,44745-page,1/article.html, last accessed 18 February 2007.
[35]
Lauren Weinstein. "An Open Letter to Google: Concepts for a Google Privacy Initiative." 9 May 2006. http://www.vortex.com/google-privacy-initiative, last accessed 28 February 2007.

Cited By

View all
  • (2024)What Role Do Disease Avoidance Motives Play in Prejudice? Assessing Implicit, Explicit, and Google Search DataEvolutionary Psychological Science10.1007/s40806-024-00407-1Online publication date: 25-Sep-2024
  • (2023)Vision: Supporting Citizens in Adopting Privacy Enhancing TechnologiesProceedings of the 2023 European Symposium on Usable Security10.1145/3617072.3617105(253-259)Online publication date: 16-Oct-2023
  • (2022)The COVID-19 Pandemic Disrupted Both School Bullying and CyberbullyingAmerican Economic Review: Insights10.1257/aeri.202104564:3(353-370)Online publication date: 1-Sep-2022
  • Show More Cited By

Index Terms

  1. An honest man has nothing to fear: user perceptions on web-based information disclosure

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security
        July 2007
        188 pages
        ISBN:9781595938015
        DOI:10.1145/1280680
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        • CyLab

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 18 July 2007

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. AOL
        2. Google
        3. MSN
        4. Yahoo!
        5. anonymity
        6. anonymization
        7. data retention
        8. fingerprinting
        9. googling
        10. information disclosure
        11. privacy
        12. usable security
        13. web search

        Qualifiers

        • Article

        Conference

        SOUPS '07
        Sponsor:
        SOUPS '07: The third Symposium on Usable Privacy and Security
        July 18 - 20, 2007
        Pennsylvania, Pittsburgh, USA

        Acceptance Rates

        Overall Acceptance Rate 15 of 49 submissions, 31%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)26
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 13 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)What Role Do Disease Avoidance Motives Play in Prejudice? Assessing Implicit, Explicit, and Google Search DataEvolutionary Psychological Science10.1007/s40806-024-00407-1Online publication date: 25-Sep-2024
        • (2023)Vision: Supporting Citizens in Adopting Privacy Enhancing TechnologiesProceedings of the 2023 European Symposium on Usable Security10.1145/3617072.3617105(253-259)Online publication date: 16-Oct-2023
        • (2022)The COVID-19 Pandemic Disrupted Both School Bullying and CyberbullyingAmerican Economic Review: Insights10.1257/aeri.202104564:3(353-370)Online publication date: 1-Sep-2022
        • (2022)A Taxonomy of Privacy, Trust, and Security Breach Incidents of Internet-of-Things Linked to F(M).A.A.N.G. Corporations2022 IEEE World AI IoT Congress (AIIoT)10.1109/AIIoT54504.2022.9817225(591-596)Online publication date: 6-Jun-2022
        • (2022)Privacy of AI-Based Voice Assistants: Understanding the Users’ PerspectiveDesign, Operation and Evaluation of Mobile Communications10.1007/978-3-031-05014-5_26(309-321)Online publication date: 26-Jun-2022
        • (2022)Privacy and Vulnerable PopulationsModern Socio-Technical Perspectives on Privacy10.1007/978-3-030-82786-1_15(337-363)Online publication date: 9-Feb-2022
        • (2021)Hidden internet-based measure of discrimination and mental health of Black peopleSocial Science & Medicine10.1016/j.socscimed.2021.113776(113776)Online publication date: Feb-2021
        • (2021)Does scientific interest in the nature impacts of food align with consumer information-seeking behavior?Sustainability Science10.1007/s11625-021-00920-316:3(1029-1043)Online publication date: 15-Feb-2021
        • (2020)Enhancing privacy through the visual design of privacy noticesProceedings of the Sixteenth USENIX Conference on Usable Privacy and Security10.5555/3488905.3488928(437-456)Online publication date: 10-Aug-2020
        • (2020)Addressing Anonymous AbusesProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376690(1-14)Online publication date: 21-Apr-2020
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media