[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3406522.3446014acmconferencesArticle/Chapter ViewAbstractPublication PagesirConference Proceedingsconference-collections
research-article
Open access

The Effect of Nudges and Boosts on Browsing Privacy in a Naturalistic Environment

Published: 14 March 2021 Publication History

Abstract

During everyday web browsing and search users reveal many pieces of private information to third parties. Even though people report being concerned about their privacy online, they often do not take steps to protect it. This is known as the 'privacy paradox' in the literature. In this work we study two well-known strategies based on theories from the behavioral sciences, nudging and boosting, which encourage users to browse in a way that their private data are less exposed. First, an online survey (N=127) tested the comprehensibility and efficacy of various facts (boosts), before the most effective of these were evaluated against 'nudge' interventions previously shown to be efficacious in lab-studies. A three week naturalistic study (N=68) using a browser extension revealed that both nudges and boosts improve browsing privacy, as approximated by different measures. Boosts are also shown to improve user knowledge about privacy in the short term, but the benefit weakens over time.

References

[1]
Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson. 2017. Nudges for Privacy and Security: Understanding and Assisting Users? Choices Online. ACM Computing Surveys (CSUR) 50, 3, Article 44 (2017), 41 pages.
[2]
Johannes Aigner, Amelie Durchardt, Thiemo Kersting, Markus Kattenbeck, and David Elsweiler. 2017. Manipulating the perception of credibility in refugee related social media posts. In Proceedings of the 2017 Conference on Conference Human Information Interaction and Retrieval. 297--300.
[3]
Hunt Allcott. 2011. Social norms and energy conservation. Journal of Public Economics 95, 9 (2011), 1082--1095. Special Issue: The Role of Firms in Tax Systems.
[4]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Cranor, and Yuvraj Agarwal. 2015. Your Location Has Been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI '15). ACM, New York, 787--796.
[5]
Manar Alohaly and Hassan Takabi. 2016. Better Privacy Indicators: A New Approach to Quantification of Privacy Policies. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO.
[6]
Brooke Auxier, Lee Rainie, Monica Andersen, Andrew Perrin, Madhu Kumar, and Erica Turner. 2019. Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information. Technical Report. Pew Research Center.
[7]
Scott Bateman, Jaime Teevan, and Ryen W. White. 2012. The Search Dashboard: How Reflection and Comparison Impact Search Behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, 1785--1794.
[8]
Scott Bateman, Jaime Teevan, and Ryen W. White. 2012. The Search Dashboard: How Reflection and Comparison Impact Search Behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, 1785--1794.
[9]
Alastair R. Beresford, Dorothea Kübler, and Sören Preibusch. 2012. Unwillingness to pay for privacy: A field experiment. Economics Letters 117, 1 (2012), 25--27.
[10]
Annika Bergström. 2015. Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses. Computers in Human Behavior 53 (2015), 419--426.
[11]
Grant Blank, Gillian Bolsover, and Elizabeth Dubois. 2014. A New Privacy Paradox: Young People and Privacy on Social Network Sites. Technical Report. University of Oxford, Global Cyber Security Capacity Centre. https://ssrn.com/abstract= 2479938
[12]
Tomasz Bujlow, Valentin Carela-Español, Josep Solé-Pareta, and Pere Barlet-Ros. 2017. A Survey on Web Tracking: Mechanisms, Implications, and Defenses. Proc. IEEE 105, 8 (Aug 2017), 1476--1510.
[13]
Moritz Büchi, Natascha Just, and Michael Latzer. 2017. Caring is not enough: the importance of Internet skills for online privacy protection. Information, Communication & Society 20, 8 (2017), 1261--1278.
[14]
Juan Pablo Carrascal and Karen Church. 2015. An In-Situ Study of Mobile App & Mobile Search Interactions. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI '15). ACM, New York, 2739--2748.
[15]
Juan Pablo Carrascal, Christopher Riederer, Vijay Erramilli, Mauro Cherubini, and Rodrigo de Oliveira. 2013. Your Browsing Behavior for a Big Mac: Economics of Personal Information Online. In Proceedings of the 22nd International Conference on World Wide Web (Rio de Janeiro, Brazil) (WWW '13). ACM, New York, 189--200.
[16]
comscore. 2015. Number of Mobile-Only Internet Users Now Exceeds DesktopOnly in the U.S. https://www.comscore.com/Insights/Blog/Number-of-MobileOnly-Internet-Users-Now-Exceeds-Desktop-Only-in-the-U.S. Last accessed: 2020-07-13, archived at https://archive.st/elq5.
[17]
Lynne M. Coventry, Debora Jeske, John M. Blythe, James Turland, and Pam Briggs. 2016. Personality and Social Framing in Privacy Decision-Making: A Study on Cookie Acceptance. Frontiers in Psychology 7 (2016), 1341.
[18]
Stefany Coxe, Stephen G. West, and Leona S. Aiken. 2009. The Analysis of Count Data: A Gentle Introduction to Poisson Regression and Its Alternatives. Journal of Personality Assessment 91, 2 (2009), 121--136.
[19]
Lorrie Cranor, Praveen Guduru, and Manjula Arjula. 2006. User Interfaces for Privacy Agents. ACM Transactions on Computer-Human Interaction 13, 2 (June 2006), 135--178.
[20]
Amit Datta, Michael Carl Tschantz, and Anupam Datta. 2015. Automated experiments on ad privacy settings. Proceedings on privacy enhancing technologies 2015, 1 (2015), 92--112.
[21]
Anna de Visser-Amundson and Mirella Kleijnen. 2020. Nudging in Food Waste Management: Where Sustainability Meets Cost-Effectiveness. Springer International Publishing, Cham, 57--87.
[22]
Serge Egelman, Janice Tsai, Lorrie Cranor, and Alessandro Acquisti. 2009. Timing is Everything? The Effects of Timing and Placement of Online Privacy Indicators. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Boston, MA, USA) (CHI '09). ACM, New York, 319--328.
[23]
Steven Englehardt and Arvind Narayanan. 2016. Online Tracking: A 1-MillionSite Measurement and Analysis. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (Vienna, Austria) (CCS '16). ACM, New York, 1388--1401.
[24]
Tatiana Ermakova, Benjamin Fabian, Benedict Bender, and Kerstin Klimek. 2018. Web Tracking - A Literature Review on the State of Research. In Proceedings of the 51st Hawaii International Conference on System Sciences (Hilton Waikoloa Village, Hawaii, USA) (HICSS'18). 4732--4741. http://hdl.handle.net/10125/50485
[25]
European Commission. 2011. Attitudes on Data Protection and Electronic Identity in the European Union. Technical Report. Special Eurobarometer 359. https://ec.europa.eu/commfrontoffice/publicopinion/index.cfm/Survey/ getSurveyDetail/instruments/SPECIAL/surveyKy/864
[26]
Denis Feth. 2017. Transparency through Contextual Privacy Statements. In Mensch und Computer 2017-Workshopband, Manuel Burghardt, Raphael Wimmer, Christian Wolff, and Christa Womser-Hacker (Eds.).
[27]
Imane Fouad, Nataliia Bielova, Arnaud Legout, and Natasa Sarafijanovic-Djukic. 2020. Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels. Proceedings on Privacy Enhancing Technologies 2020, 2 (2020), 499--518.
[28]
Thomas Franke, Christiane Attig, and Daniel Wessel. 2019. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human--Computer Interaction 35, 6 (2019), 456--467.
[29]
Nathaniel Fruchter, Hsin Miao, Scott Stevenson, and Rebecca Balebako. 2015. Variations in Tracking in Relation to Geographic Location. In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015.
[30]
Xianyi Gao, Yulong Yang, Huiqing Fu, Janne Lindqvist, and Yang Wang. 2014. Private Browsing: An Inquiry on Usability and Privacy Protection. In Proceedings of the 13th Workshop on Privacy in the Electronic Society (Scottsdale, Arizona, USA) (WPES '14). ACM, New York, 97--106.
[31]
Michelle Geronimo. 2017. Online browsing: Can, should, and may companies combine online and offline data to learn about you. Hastings Science and Technology Law Journal 9, 2 (2017).
[32]
Arthur Gervais, Alexandros Filios, Vincent Lenders, and Srdjan Capkun. 2017. Quantifying Web Adblocker Privacy. In Computer Security -- ESORICS 2017, Simon N. Foley, Dieter Gollmann, and Einar Snekkenes (Eds.). Springer International Publishing, Cham, 21--42.
[33]
Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, and Vincent Lenders. 2014. Quantifying Web-Search Privacy. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (Scottsdale, Arizona, USA) (CCS '14). ACM, New York, 966--977.
[34]
Gerd Gigerenzer. 2006. Heuristics. MIT Press, Cambridge, MA, 17--44.
[35]
Till Grüne-Yanoff and Ralph Hertwig. 2016. Nudge Versus Boost: How Coherent are Policy and Theory? Minds and Machines 26, 1 (01 Mar 2016), 149--183.
[36]
Aniko Hannak, Gary Soeller, David Lazer, Alan Mislove, and Christo Wilson. 2014. Measuring Price Discrimination and Steering on E-Commerce Web Sites. In Proceedings of the 2014 Conference on Internet Measurement Conference (Vancouver, BC, Canada) (IMC '14). ACM, New York, 305--318.
[37]
David Harborth and Sebastian Pape. 2019. How Privacy Concerns and Trust and Risk Beliefs Influence Users? Intentions to Use Privacy-Enhancing Technologies - The Case of Tor. In Proceedings of the 52nd Hawaii International Conference on System Sciences. 10.
[38]
Morgan Harvey, Claudia Hauff, and David Elsweiler. 2015. Learning by Example: training users with high-quality query suggestions. In Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval. 133--142.
[39]
Ralph Hertwig. 2017. When to consider boosting: some rules for policy-makers. Behavioural Public Policy 1, 2 (2017), 143--161.
[40]
Ralph Hertwig and Till Grüne-Yanoff. 2017. Nudging and Boosting: Steering or Empowering Good Decisions. Perspectives on Psychological Science 12, 6 (2017), 973--986.
[41]
David C. Hoaglin. 1980. A Poissonness Plot. The American Statistician 34, 3 (1980), 146--149.
[42]
Jim Isaak and Mina J. Hanna. 2018. User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection. Computer 51, 8 (August 2018), 56--59.
[43]
Patrick Gage Kelley, Lorrie Cranor, and Norman Sadeh. 2013. Privacy as Part of the App Decision-Making Process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Paris, France) (CHI '13). ACM, New York, 3393--3402.
[44]
Simon Kemp. 2019. Digital trends 2019: Every single stat you need to know about the internet. https://thenextweb.com/contributors/2019/01/30/digital-trends2019-every-single-stat-you-need-to-know-about-the-internet/. Last accessed: 2020-07-13, archived at https://archive.st/hp33.
[45]
Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security 64 (2017), 122--134.
[46]
Georgios Kontaxis and Monica Chew. 2015. Tracking Protection in Firefox For Privacy and Performance. Computing Research Repository (CoRR) abs/1506.04104 (2015). arXiv:1506.04104
[47]
Jacob A. Long. 2019. interactions: Comprehensive, User-Friendly Toolkit for Probing Interactions. https://cran.r-project.org/package=interactions R package version 1.1.0.
[48]
Paul Benjamin Lowry, Tamara Dinev, and Robert Willison. 2017. Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. European Journal of Information Systems 26, 6 (2017), 546--563.
[49]
Christoph Lutz and Pepe Strathoff. 2014. Privacy concerns and online behavior -- Not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses.
[50]
Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. 2007. L-Diversity: Privacy beyond k-Anonymity. ACM Trans. Knowl. Discov. Data 1, 1 (March 2007), 3--es.
[51]
Dominique Machuletz and Rainer Böhme. 2020. Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR. Proceedings on Privacy Enhancing Technologies 2020, 2 (2020).
[52]
Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet Users? Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15, 4 (2004), 336--355.
[53]
Stephen T. Margulis. 1977. Conceptions of Privacy: Current Status and Next Steps. Journal of Social Issues 33, 3 (1977), 5--21.
[54]
Helia Marreiros, Mirco Tonin, Michael Vlassopoulos, and M.C. Schraefel. 2017. 'Now that you mention it': A survey experiment on information, inattention and online privacy. Journal of Economic Behavior & Organization 140 (2017), 1--17.
[55]
Philipp K. Masur, Doris Teutsch, and Sabine Trepte. 2017. Entwicklung und Validierung der Online-Privatheitskompetenzskala (OPLIS). Diagnostica 63, 4 (2017), 256--268.
[56]
Jonathan R. Mayer and John C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. In Proceedings of IEEE Symposium on Security and Privacy. 413--427.
[57]
Johan Mazel, Richard Garnier, and Kensuke Fukuda. 2019. A comparison of web privacy protection techniques. Computer Communications 144 (2019), 162--174.
[58]
MDN contributors. 2020. Browser Extensions. https://developer.mozilla.org/enUS/docs/Mozilla/Add-ons/WebExtensions. Last accessed: 2020-06-02.
[59]
Jakub Mikians, László Gyarmati, Vijay Erramilli, and Nikolaos Laoutaris. 2012. Detecting Price and Search Discrimination on the Internet. In Proceedings of the 11th ACM Workshop on Hot Topics in Networks (Redmond, Washington) (HotNetsXI). ACM, New York, 79--84.
[60]
Alexios Mylonas, Nikolaos Tsalis, and Dimitris Gritzalis. 2013. Evaluating the Manageability of Web Browsers Controls. In Security and Trust Management, Rafael Accorsi and Silvio Ranise (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 82--98.
[61]
Patricia A. Norberg, Daniel R. Horne, and David A. Horne. 2007. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs 41, 1 (2007), 100--126.
[62]
Anna-Marie Ortloff, Maximiliane Windl, Valentin Schwind, and Niels Henze. 2020. Implementation and In Situ Assessment of Contextual Privacy Policies. In Proceedings of the 2020 Conference on Designing Interactive Systems (Eindhoven, Netherlands) (DIS '20). ACM.
[63]
Sai Teja Peddinti and Nitesh Saxena. 2010. On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot. In Privacy Enhancing Technologies, Mikhail J. Atallah and Nicholas J. Hopper (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 19--37.
[64]
Prolific Team. 2018. Using attention checks as a measure of data quality. https://researcher-help.prolific.co/hc/en-gb/articles/360009223553-Usingattention-checks-as-a-measure-of-data-quality. Last accessed: 2020-06-01.
[65]
Gaston Pugliese. 2015. Web tracking: Overview and applicability in digital investigations. it - Information Technology 57, 6 (2015), 366--375.
[66]
R Core Team. 2019. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. https://www.R-project. org/
[67]
Samuli Reijula, Jaakko Kuorikoski, Timo Ehrig, Konstantinos Katsikopoulos, and Shyam Sunder. 2018. Nudge, Boost, or Design? Limitations of behaviorally informed policy under social interaction. Journal of Behavioral Economics for Policy (SABE) 2 (03 2018), 99--105.
[68]
Princiya Marina Sequeira. 2019. lightbeam-we. https://github.com/princiya/ lightbeam-we. Last accessed: 2020-07-13, archived at https://archive.st/i2cc.
[69]
Martin Shelton, Lee Rainie, and Mary Madden. 2015. American? Privacy Strategies Post-Snowden. Technical Report. Pew Research Center. http://www.pewinternet. org/2015/03/16/Americans-Privacy-Strategies-Post-Snowden/
[70]
Herbert A. Simon. 1955. A Behavioral Model of Rational Choice. The Quarterly Journal of Economics 69, 1 (1955), 99--118.
[71]
Barry Smyth, Jill Freyne, Maurice Coyle, Peter Briggs, and Evelyn Balfe. 2004. I-SPY ? Anonymous, Community-Based Personalization by Collaborative MetaSearch. In Research and Development in Intelligent Systems XX, Frans Coenen, Alun Preece, and Ann Macintosh (Eds.). Springer London, London, 367--380.
[72]
Maciej Sobolewski, Joanna Mazur, and Micha? Pali'ski. 2017. GDPR: A Step Towards a User-centric Internet? Intereconomics 52, 4 (01 Jul 2017), 207--213.
[73]
Andreas Sotirakopoulos, Kirstie Hawkey, and Konstantin Beznosov. 2011. On the Challenges in Usable Security Lab Studies: Lessons Learned from Replicating a Study on SSL Warnings. In Proceedings of the Seventh Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania) (SOUPS '11). ACM, New York, Article 3, 18 pages.
[74]
Tola St. Matthew and Daniel Thatcher. 2016. TRUSTe/NCSA Consumer Privacy Index Reveals Rising Consumer Concerns and a Significant Awareness Deficit; Businesses Pay as Privacy Concerns Discourage Consumers. https://trustarc.com/study-finds-more-americans-concerned-aboutdata-privacy-than-losing-their-income/ Last accessed: Oct 10, 2020.
[75]
Statcounter - GlobalStats. 2020. Desktop Browser Market Share Germany. April 2019 - May 2020. https://gs.statcounter.com/browser-market-share/desktop/ germany. Last accessed: 2020-06-02.
[76]
Latanya Sweeny. 2002. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, 05 (2002), 557--570.
[77]
Monika Taddicken. 2014. The 'Privacy Paradox' in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure. Journal of Computer-Mediated Communication 19, 2 (01 2014), 248--273.
[78]
Tageschau. 2020. Aktives Ja zu Cookies muss sein. https://www.tagesschau.de/ inland/cookies-bundesgerichtshof-101.html.
[79]
Yuuki Takano, Satoshi Ohta, Takeshi Takahashi, Ruo Ando, and Tomoya Inoue. 2014. MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust (Toronto, Ontario, Canada). IEEE, 48--56.
[80]
Richard H. Thaler and Cass R. Sunstein. 2008. Nudge: Improving Decisions about Health, Wealth, and Happiness. Yale University Press, New Haven & London.
[81]
Sabine Trepte, Doris Teutsch, Philipp K. Masur, Carolin Eicher, Mona Fischer, Alisa Hennhöfer, and Fabienne Lind. 2015. Do People Know About Privacy and Data Protection Strategies? Towards the ?Online Privacy Literacy Scale? (OPLIS). Springer Netherlands, Dordrecht, 333--365.
[82]
Janice Y. Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. 2011. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research 22, 2 (2011), 254--268.
[83]
Nikolaos Tsalis, Alexios Mylonas, Antonia Nisioti, Dimitris Gritzalis, and Vasilios Katos. 2017. Exploring the protection of private browsing in desktop browsers. Computers & Security 67 (2017), 181--197.
[84]
Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, and Lorrie Cranor. 2012. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, Bellevue, WA, 65--80.
[85]
Tobias Urban, Martin Degeling, Thorsten Holz, and Norbert Pohlmann. 2020. Beyond the Front Page:Measuring Third Party Dynamics in the Field. In Proceedings of The Web Conference 2020 (Taipei, Taiwan) (WWW ?20). ACM, New York, 1275--1286.
[86]
Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, and Thorsten Holz. 2019. (Un)Informed Consent: Studying GDPR Consent Notices in the Field. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (London, United Kingdom) (CCS '19). ACM, New York, 973--990.
[87]
René van Bavel, Nuria Rodríguez-Priego, José Vila, and Pam Briggs. 2019. Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human-Computer Studies 123 (2019), 29--39.
[88]
Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, and Lorrie Cranor. 2011. 'I Regretted the Minute I Pressed Share': A Qualitative Study of Regrets on Facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania) (SOUPS '11). ACM, New York, Article 10, 16 pages.
[89]
Jacob O. Wobbrock, Leah Findlater, Darren Gergle, and James J. Higgins. 2011. The Aligned Rank Transform for Nonparametric Factorial Analyses Using Only ANOVA Procedures. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI '11). ACM Press, New York, 143--146.
[90]
Steven Zimmerman, Alistair Thorpe, Chris Fox, and Udo Kruschwitz. 2019. Investigating the Interplay Between Searchers? Privacy Concerns and Their Search Behavior. In Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval (Paris) (SIGIR'19). ACM, New York, 953--956.
[91]
Steven Zimmerman, Alistair Thorpe, Chris Fox, and Udo Kruschwitz. 2019. Privacy Nudging in Search: Investigating Potential Impacts. In Proceedings of the 2019 Conference on Human Information Interaction and Retrieval (Glasgow, Scotland (CHIIR '19). ACM, New York, 283--287.

Cited By

View all
  • (2024)Balancing Act: Boosting Strategies for Informed Search on Controversial TopicsProceedings of the 2024 Conference on Human Information Interaction and Retrieval10.1145/3627508.3638329(254-265)Online publication date: 10-Mar-2024
  • (2024)Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and AwarenessInformation Systems Security10.1007/978-3-031-80020-7_20(338-358)Online publication date: 15-Dec-2024
  • (2024)Responsible Opinion Formation on Debated Topics in Web SearchAdvances in Information Retrieval10.1007/978-3-031-56066-8_32(437-465)Online publication date: 24-Mar-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CHIIR '21: Proceedings of the 2021 Conference on Human Information Interaction and Retrieval
March 2021
384 pages
ISBN:9781450380553
DOI:10.1145/3406522
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 March 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. boosts
  2. human information behavior
  3. nudges
  4. privacy
  5. web browsing

Qualifiers

  • Research-article

Funding Sources

Conference

CHIIR '21
Sponsor:

Acceptance Rates

Overall Acceptance Rate 55 of 163 submissions, 34%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)201
  • Downloads (Last 6 weeks)25
Reflects downloads up to 20 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Balancing Act: Boosting Strategies for Informed Search on Controversial TopicsProceedings of the 2024 Conference on Human Information Interaction and Retrieval10.1145/3627508.3638329(254-265)Online publication date: 10-Mar-2024
  • (2024)Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and AwarenessInformation Systems Security10.1007/978-3-031-80020-7_20(338-358)Online publication date: 15-Dec-2024
  • (2024)Responsible Opinion Formation on Debated Topics in Web SearchAdvances in Information Retrieval10.1007/978-3-031-56066-8_32(437-465)Online publication date: 24-Mar-2024
  • (2023)Investigating the Influence of Featured Snippets on User AttitudesProceedings of the 2023 Conference on Human Information Interaction and Retrieval10.1145/3576840.3578323(211-220)Online publication date: 19-Mar-2023
  • (2022)Reflection on future directions: a systematic review of reported limitations and solutions in interactive information retrieval user studiesAslib Journal of Information Management10.1108/AJIM-05-2022-0253Online publication date: 19-Dec-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media