[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3328529.3328557acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmsocietyConference Proceedingsconference-collections
research-article

Overwhelming, Important, Irrelevant: Terms of Service and Privacy Policy Reading among Older Adults

Published: 19 July 2019 Publication History

Abstract

Social media users often ignore terms of service and privacy policies, but limited empirical evidence explains why, especially for older adults. This survey study reveals three specific attitudes that older adults (50+) hold about these policies: 1) they are overwhelming; 2) they are important but time-consuming; and 3) they are irrelevant. These attitudes differentially predict how long these users spend reading terms of service and privacy policies when signing up for different social media services and when policies change. Online privacy literacy was also negatively related to time spent reading policies. Results are discussed in terms of practical implications regarding how terms of service and privacy policies are presented to users.

References

[1]
Yannis Bakos, Florencia Marotta-Wurgler, and David R. Trossen. 2014. Does anyone read the fine print? Consumer attention to standard-form contracts. J. Legal Stud. 43, 1 (2014), 1--35.
[2]
Casey Fiesler, Cliff Lampe, and Amy S Bruckman. 2016. Reality and perception of copyright terms of service for online content creation. Proc. 19th ACM Conf. Comput. Coop. Work Soc. Comput. - CSCW '16 (2016), 1448--1459.
[3]
Carlos Jensen and Colin Potts. 2004. Privacy policies as decision-making tools. Proc. 2004 Conf. Hum. factors Comput. Syst. - CHI '04 6, 1 (2004), 471--478.
[4]
Adam N Joinson. 2008. 'Looking at', 'looking up' or 'keeping up with' people? Motives and uses of Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '08), 1027--1036.
[5]
Thomas J. Maronick. 2014. Do consumers read terms of service agreements when installing software? A two-study empirical analysis. Int. J. Bus. Soc. Res. 4, 6 (2014), 137--145. Retrieved from http://thejournalofbusiness.org/index.php/site/article/view/535
[6]
Philipp K Masur, Doris Teutsch, and Sabine Trepte. 2017. Entwicklung und validierung der online-privatheitskompetenzskala (OPLIS). Diagnostica 63, (2017), 256--268.
[7]
Aleecia M. McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. A J. Law Policy Inf. Soc. 4, 3 (2008), 1--22. Retrieved from http://lorrie.cranor.org/pubs/readingPolicyCost-authorDraft.pdf
[8]
George R. Milne and Mary J. Culnan. 2004. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices. J. Interact. Mark. 18, 3 (January 2004), 15--29.
[9]
Patricia A Norberg, Daniel R Horne, and David A Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. J. Consum. Aff. 41, 1 (June 2007), 100--126.
[10]
Jonathan A. Obar and Andrew Hatelt. 2019. TL;DR and TC;DU: An assessment of the length and complexity of social media policies. In The 102nd Annual Conference of the Association for Education in Journalism and Mass Communication (AEJMC 2019). Toronto, ON.
[11]
Jonathan A. Obar and Anne Oeldorf-Hirsch. 2018. The biggest lie on the Internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Commun. Soc. (July 2018), 1--20.
[12]
Jonathan A. Obar and Anne Oeldorf-Hirsch. 2018. The clickwrap: A political economic mechanism for manufacturing consent on social media. Soc. Media + Soc. 4, 3 (July 2018), 205630511878477.
[13]
Pew Research Center. 2017. Mobile fact sheet. (2017). Retrieved from http://www.pewinternet.org/fact-sheet/mobile/
[14]
Pew Research Center. 2017. Social media fact sheet. (2017). Retrieved from http://www.pewinternet.org/fact-sheet/social-media/
[15]
Pew Research Center. 2018. Internet/broadband fact sheet. (2018). Retrieved from https://www.pewinternet.org/fact-sheet/internet-broadband/
[16]
Kelly Quinn and Dmitry Epstein. 2018. #MyPrivacy. Proc. 9th Int. Conf. Soc. Media Soc. - SMSociety '18 (2018), 360--364.
[17]
Daniel J. Solove. 2007. "I've got nothing to hide" and other misunderstandings of privacy. San Diego Law Rev. 44, May (2007), 1--23.
[18]
U.S. Census Bureau. 2017. Educational attainment. (2017). Retrieved from https://www.census.gov/topics/education/educational-attainment.html

Cited By

View all
  • (2024)The Online Identity Help Center: Designing and Developing a Content Moderation Policy Resource for Marginalized Social Media UsersProceedings of the ACM on Human-Computer Interaction10.1145/36374068:CSCW1(1-30)Online publication date: 26-Apr-2024
  • (2024)"Why is Everything in the Cloud?": Co-Designing Visual Cues Representing Data Processes with ChildrenProceedings of the 23rd Annual ACM Interaction Design and Children Conference10.1145/3628516.3655819(517-532)Online publication date: 17-Jun-2024
  • (2023)'Don't Fall for This': Communications about Cybersafety from the AARPProceedings of the ACM on Human-Computer Interaction10.1145/36100397:CSCW2(1-21)Online publication date: 4-Oct-2023
  • Show More Cited By

Index Terms

  1. Overwhelming, Important, Irrelevant: Terms of Service and Privacy Policy Reading among Older Adults

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SMSociety '19: Proceedings of the 10th International Conference on Social Media and Society
    July 2019
    247 pages
    ISBN:9781450366519
    DOI:10.1145/3328529
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Ryerson Univeristy: Ryerson Univeristy

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 July 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Terms of service
    2. consent
    3. online privacy literacy
    4. policy reading attitudes
    5. policy reading behavior
    6. privacy policy
    7. social media

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    SMSociety '19

    Acceptance Rates

    Overall Acceptance Rate 78 of 189 submissions, 41%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)83
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 19 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)The Online Identity Help Center: Designing and Developing a Content Moderation Policy Resource for Marginalized Social Media UsersProceedings of the ACM on Human-Computer Interaction10.1145/36374068:CSCW1(1-30)Online publication date: 26-Apr-2024
    • (2024)"Why is Everything in the Cloud?": Co-Designing Visual Cues Representing Data Processes with ChildrenProceedings of the 23rd Annual ACM Interaction Design and Children Conference10.1145/3628516.3655819(517-532)Online publication date: 17-Jun-2024
    • (2023)'Don't Fall for This': Communications about Cybersafety from the AARPProceedings of the ACM on Human-Computer Interaction10.1145/36100397:CSCW2(1-21)Online publication date: 4-Oct-2023
    • (2023)Understanding and Mitigating Technology-Facilitated Privacy Violations in the Physical WorldProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580909(1-16)Online publication date: 19-Apr-2023
    • (2023)Exploring Smart Commercial Building Occupants’ Perceptions and Notification Preferences of Internet of Things Data Collection in the United States2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP57164.2023.00064(1030-1046)Online publication date: Jul-2023
    • (2023)The data subject and the myth of the ‘black box’ data communication and critical data literacy as a resistant practice to platform exploitationInformation, Communication & Society10.1080/1369118X.2023.220550427:2(333-349)Online publication date: 26-Apr-2023
    • (2023)Thematic exploration of online privacy literacy and examination of its future agendaBehaviour & Information Technology10.1080/0144929X.2023.228828543:15(3893-3921)Online publication date: 3-Dec-2023
    • (2022)Demographic-Reliant Algorithmic Fairness: Characterizing the Risks of Demographic Data Collection in the Pursuit of FairnessProceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency10.1145/3531146.3533226(1709-1721)Online publication date: 21-Jun-2022
    • (2022)Online Terms and Conditions: Improving User Engagement, Awareness, and Satisfaction through UI DesignProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3517720(1-22)Online publication date: 29-Apr-2022
    • (2021)Open Communication about Network Neutrality? Assessing the Internet Traffic Management Transparency of Canadian Internet CarriersCanadian Journal of Communication10.22230/cjc.2021v46n3a392146:3(629-644)Online publication date: 9-Sep-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media