Abstract
Privacy policies are the state of the practice technique for data transparency. Oftentimes, however, they are presented in a non-prominent way, are lengthy, and are not written in the users’ language. As a result, their acceptance is rather low, even though users are generally interested in privacy. Thus, we need enhanced transparency approaches. In this paper, we present a taxonomy and models that allow to describe privacy-relevant information. These models are based on practical privacy policies and legal regulations, and enable automated processing of privacy-relevant information. Automated processing based on well-defined semantics is the baseline for new ways to represent privacy-relevant information, for example by filtering, step-wise refinement or contextualization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)
Choong, Y.-Y., Theofanos, M.: What 4,500+ people can tell you – employees’ attitudes toward organizational password policy do matter. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2015. LNCS, vol. 9190, pp. 299–310. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20376-8_27
Cranor, L., Garfinkel, S.: Security and Usability. O’Reilly Media, Inc., Newton (2005)
Eljetlawi, A.M., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008, vol. 2, pp. 1137–1143 (2008)
Feth, D.: Transparency through contextual privacy statements. In: Burghardt, M., Wimmer, R., Wolff, C., Womser-Hacker, C. (eds.) Mensch und Computer 2017 - Workshopband. Gesellschaft für Informatik e.V, Regensburg (2017)
Garfinkel, S., Lipford, H.R.: Usable security: history, themes, and challenges. Synthesis Lect. Inf. Secur. Priv. Trust 5, 1–124 (2014)
Good, N.S., Krekelberg, A.: Usability and privacy. In: Proceedings of the Conference on Human factors in Computing Systems - CHI 2003, vol. 5, p. 137 (2003)
IControl Networks: 2015 State of the Smart Home Report. Technical report (2015)
Inglesant, P., Sasse, M.: The true cost of unusable password policies: password use in the wild, pp. 383–392 (2010)
Milne, G.R., Culnan, M.J., Greene, H.: A longitudinal assessment of online privacy notice readability. J. Public Policy Mark. 25(2), 238–249 (2006)
Obar, J.A., Oeldorf-Hirsch, A.: The biggest lie on the internet: ignoring the privacy policies and terms of service policies of social networking services. In: The 44th Research Conference on Communication, Information and Internet Policy (2016)
Reidenberg, J.R., et al.: Disagreeable privacy policies: mismatches between meaning and users’ understanding. Berkeley Technol. Law J. 30, 39 (2014)
Rudolph, M., Feth, D., Polst, S.: Why users ignore privacy policies – a survey and intention model for explaining user privacy behavior. In: Kurosu, M. (ed.) HCI 2018. LNCS, vol. 10901, pp. 587–598. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91238-7_45
Symantec: State of Privacy Report 2015 (2015)
Tsai, J., Egelman, S., Cranor, L., Acquisti, A.: The effect of online privacy information on purchasing behavior: an experimental study (2007)
Waldman, A.E.: Privacy, notice, and design (2016)
Whitten, A.: Making Security Usable. Comput. Secur. 26(May), 434–443 (2004)
Whitten, A., Tygar, J.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th Conference on USENIX Security Symposium, vol. 8, p. 14. USENIX Association (1999)
Acknowledgements
The presented research is supported by the German Ministry of Education and Research (BMBF) projects Software Campus (01IS12053) and TrUSD (16KIS0898). The responsibility for the content of this document lies with the author.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Feth, D. (2020). Modelling and Presentation of Privacy-Relevant Information for Internet Users. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2020. Lecture Notes in Computer Science(), vol 12210. Springer, Cham. https://doi.org/10.1007/978-3-030-50309-3_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-50309-3_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50308-6
Online ISBN: 978-3-030-50309-3
eBook Packages: Computer ScienceComputer Science (R0)