[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1073001.1073006acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Stopping spyware at the gate: a user study of privacy, notice and spyware

Published: 06 July 2005 Publication History

Abstract

Spyware is a significant problem for most computer users. The term "spyware" loosely describes a new class of computer software. This type of software may track user activities online and offline, provide targeted advertising and/or engage in other types of activities that users describe as invasive or undesirable.While the magnitude of the spyware problem is well documented, recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. As opposed to viruses and other malicious code, users themselves often have a choice whether they want to install these programs.In this paper, we discuss an ecological study of users installing five real world applications. In particular, we seek to understand the influence of the form and content of notices (e.g., EULAs) on user's installation decisions.Our study indicates that while notice is important, notice alone may not be enough to affect users' decisions to install an application. We found that users have limited understanding of EULA content and little desire to read lengthy notices. Users found short, concise notices more useful, and noticed them more often, yet they did not have a significant effect on installation for our population. When users were informed of the actual contents of the EULAs to which they agreed, we found that users often regret their installation decisions.We discovered that regardless of the bundled content, users will often install an application if they believe the utility is high enough. However, we discovered that privacy and security become important factors when choosing between two applications with similar functionality. Given two similar programs (e.g. KaZaA and Edonkey), consumers will choose the one they believe to be less invasive and more stable. We also found that providing vague information in EULAs and short notices can create an unwarranted impression of increased security. In these cases, it may be helpful to have a standardized format for assessing the possible options and trade-offs between applications.

References

[1]
Abrams, M., Eisenhauer, M. and Sotto, L. (2004) "Response to the FTC request for public comments in the Advance Notice of Proposed Rulemaking on Alternative Forms of Privacy Notices under the Gramm-Leach-Bliley Act", Center for Information Policy Leadership, March 2004. Available at: http://www.hunton.com/files/tbl_s47Details/FileUpload265/685/CIPL-Notices_ANPR_Comments_3.29.04.pdf]]
[2]
Ackerman, M., and Cranor, L. (1999) "Privacy Critics: UI components to safeguard users' privacy," Proceedings of CHI '99, extended abstracts.]]
[3]
Acquisti, A. and Grossklags, J. (2005) Privacy and Rationality in Individual Decision Making, IEEE Security and Privacy, IEEE Computer Society, Vol. 3, No. 1, January/February 2005, pp. 26--33.]]
[4]
Acquisti, A. and Grossklags, J. (2005) "Uncertainty, Ambiguity and Privacy", Fourth Annual Workshop Economics and Information Security (WEIS 2005), MA, 2--3 June, 2005.]]
[5]
AOL/NSCA Online Safety Study, America Online and National Cyber Security Alliance, October 2004. Available at: http://www.staysafeonline.info/news/safety_study_v04.pdf]]
[6]
Bartram, L., Ware, C., Calvert, T., (2003) "Moticons: detection, distraction and task", International Journal of Human-Computer Studies 58: 515--545, Issue 5 (May 2003).]]
[7]
Berthold, O., Köhntopp, M. (2000) "Identity Management based on P3P", in: Federrath, H. "Designing Privacy Enhancing Technologies", Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Springer, pp. 141--160.]]
[8]
Cranor, L., Reagle, J., and Ackerman, M. (1999) "Beyond Concern: Understanding Net Users' Attitudes About Online Privacy", AT&T Labs-Research, April, 1999.]]
[9]
Dourish, P. and Redmiles, D. (2002) "An approach to usable security based on event monitoring and visualization", Proceedings of the 2002 workshop on New security paradigms, September 2002.]]
[10]
Earthlink (2005) "Results complied from Webroot's and EarthLink's Spy Audit programs". Available at: http://www.earthlink.net/spyaudit/press/ (last accessed February 25, 2005)]]
[11]
Gilbert, D., Morewedge, C., Risen, J. and Wilson, T. (2004) "Looking Forward to Looking Backward: The Misprediction of Regret", Psychological Science, Vol. 15, No. 5, pp. 346--350.]]
[12]
Good, N. S., Krekelberg. A. J. (2003) "Usability and Privacy: A study of Kazaa P2P file-sharing", in: Proceedings of CHI 2003.]]
[13]
HIPAA Highlights Privacy Notice, Press Release, Center for Information Policy Leadership, Hunton and Williams http://www.hunton.com/news/news.aspx?nws_pg=7&gen_H4ID=10 102 (last accessed May 24, 2005)]]
[14]
Bettman, J. R., Payne, J. W. and Staelin, R. (1986) "Cognitive Considerations in Designing Effective Labels for Presenting Risk Information," J. Pub. Pol'y & Marketing, 5, pp. 1--28.]]
[15]
Jensen, C. and Potts, C. (2004) "Privacy policies as decision-making tools: an evaluation of online privacy notices", in: Proceedings of ACM CHI 2004, Vienna, Austria, pages 471--478.]]
[16]
PC Pitstop (2005) "It pays to read EULAs". Available at http://www.pcpitstop.com/spycheck/eula.asp (last accessed May 24, 2005)]]
[17]
Platform for Privacy Preferences Project (P3P). http://www.w3.org/P3P/]]
[18]
Spiekermann, S., Grossklags, J. and Berendt, B. (2001) "E-privacy in 2nd generation E-Commerce: privacy preferences versus actual behavior", in: Proceedings of the Third ACM Conference on Electronic Commerce, Association for Computing Machinery (ACM EC'01), Tampa, Florida, US, pp. 38--47.]]
[19]
Trafton, J. G., Altmann, E. M., Brock, D. P., Mintz, F. E. (2003). "Preparing to resume an interrupted task: effects of prospective goal encoding and retrospective rehearsal", International Journal of Human-Computer Studies 58: 583--603.]]
[20]
Van Dantzich, M., Robbins, D., Horvitz, E. and Czerwinski, M. (2002) "Scope: Providing awareness of multiple notifications at a glance", in: Proceedings of Advanced Visual Interfaces 2002, Trento, Italy.]]
[21]
Wired. "Spyware on My Machine? So What?":http://www.wired.com/news/technology/0,1282,65906,00.html]]

Cited By

View all
  • (2024)Demystifying the Privacy-Realism Dilemma in the MetaverseProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops10.1145/3691621.3694958(245-250)Online publication date: 27-Oct-2024
  • (2024)Farsight: Fostering Responsible AI Awareness During AI Application PrototypingProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642335(1-40)Online publication date: 11-May-2024
  • (2024)Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practicesInternational Journal of Information Security10.1007/s10207-024-00824-023:3(1913-1926)Online publication date: 6-Mar-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security
July 2005
123 pages
ISBN:1595931783
DOI:10.1145/1073001
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 July 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. EULA
  2. ToS
  3. end user license agreement
  4. notice
  5. privacy
  6. security and usability
  7. spyware
  8. terms of service

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 15 of 49 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)56
  • Downloads (Last 6 weeks)4
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Demystifying the Privacy-Realism Dilemma in the MetaverseProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops10.1145/3691621.3694958(245-250)Online publication date: 27-Oct-2024
  • (2024)Farsight: Fostering Responsible AI Awareness During AI Application PrototypingProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642335(1-40)Online publication date: 11-May-2024
  • (2024)Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practicesInternational Journal of Information Security10.1007/s10207-024-00824-023:3(1913-1926)Online publication date: 6-Mar-2024
  • (2023)Murky Consent: An Approach to the Fictions of Consent in Privacy LawSSRN Electronic Journal10.2139/ssrn.4333743Online publication date: 2023
  • (2023)Towards Improving the Efficacy of Windows Security Notifier for Apps from Unknown Publishers: The Role of RhetoricHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-35822-7_8(101-121)Online publication date: 9-Jul-2023
  • (2022)It’s Long and Complicated! Enhancing One-Pager Privacy Policies in Smart Home ApplicationsNordic Human-Computer Interaction Conference10.1145/3546155.3546657(1-13)Online publication date: 8-Oct-2022
  • (2022)Rushed to crack – On the perceived effectiveness of cybersecurity measures for secure behaviour under time pressureBehaviour & Information Technology10.1080/0144929X.2022.209203042:10(1568-1589)Online publication date: 6-Jul-2022
  • (2022)End-User License Agreements (EULAs)Information Design Journal10.1075/idj.20018.eri26:3(193-215)Online publication date: 23-May-2022
  • (2021)Visual Interactive Privacy Policy: The Better Choice?Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445465(1-12)Online publication date: 6-May-2021
  • (2021)Empowering ResignationProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445293(1-18)Online publication date: 6-May-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media