Abstract
Third party applications play an important role in enhancing a social network user’s online experience. These applications request various permissions from the users at install-time. However, these permissions are often ignored, and the users end up granting access to sensitive information. This motivates the need for techniques that can attract user attention towards the requested permissions and make users read and understand the permissions before authorizing them.
We investigate the animation of application permission dialogs. Using a real-life analogy of luggage screening at airport security checkpoints, we attempt to draw user attention towards application’s requested permissions. We map the various elements involved at an airport security checkpoint to our context through the use of avatars, and present the permissions one by one. The user makes decision on a permission based on its provided details. The permission details include its description, type, and the user’s personal information example to communicate the potential information disclosure in the event of its authorization. We developed a prototype of our proposed animated dialog design for Facebook applications, and compared it with Facebook’s existing dialog designs. Our preliminary evaluation on 16 participants with the help of their eye-tracking data shows that the use of animation and personal information examples on a permission authorization dialog is effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Approved IRB Protocol #13-03-30.
- 2.
References
Power of visual communication (2014). http://blog.wyzowl.com/power-visual-communication-infographic
Permissions with facebook login (2016). https://developers.facebook.com/docs/facebook-login/permissions/v2.2
Bravo-Lillo, C., Komanduri, S., Cranor, L.F., Reeder, R.W., Sleeper, M., Downs, J., Schechter, S.: Your attention please: Designing security-decision uis to make genuine risks harder to ignore. In: SOUPS. New York, USA, July 2013
Brooke, J.: Sus-a quick and dirty usability scale. Usability evaluation in industry (1996)
Conzola, V.C., Wogalter, M.S.: A communication-human information processing (c-hip) approach to warning effectiveness in the workplace. J. Risk Res. 4(4), 309–322 (2001)
Egelman, S.: My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect. In: SIGCHI, pp. 2369–2378. ACM (2013)
Furman, Susanne, Theofanos, Mary: Preserving privacy – more than reading a message. In: Stephanidis, Constantine, Antona, Margherita (eds.) UAHCI 2014. LNCS, vol. 8516, pp. 14–25. Springer, Heidelberg (2014). doi:10.1007/978-3-319-07509-9_2
Harbach, M., Hettig, M., Weber, S., Smith, M.: Using personal examples to improve risk communication for security and privacy decisions. In: CHI. ACM, Toronto, Canada (2014)
Mobile, C.: Facebook security issue: Facebook color scam (2014). http://www.cmcm.com/blog/2014-08-07/348.html
Pratt, J., Radulescu, P.V., Guo, R.M., Abrams, R.A.: It’s alive! animate motion captures visual attention. Psychol. Sci. 21, 1724–1730 (2010)
Špakov, O., Miniotas, D.: Visualization of eye gaze data using heat maps (2007)
Steel, E., Fowler, G.A.: Facebook in privacy breach (2010). http://www.wsj.com/articles/SB10001424052702304772804575558484075236968
Wang, N., Grossklags, J., Xu, H.: An online experiment of privacy authorization dialogues for social applications. In: ACM CSCW, pp. 261–272 (2013)
Wang, N., Xu, H., Grossklags, J.: Third-party apps on facebook: Privacy and the illusion of control. In: ACM CHIMIT. New York, NY (2011)
Xu, H., Wang, N., Grossklags, J.: Privacy by redesign: Alleviating privacy concerns for third-party apps (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Javed, Y., Shehab, M. (2016). Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds) Data Privacy Management and Security Assurance. DPM QASA 2016 2016. Lecture Notes in Computer Science(), vol 9963. Springer, Cham. https://doi.org/10.1007/978-3-319-47072-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-47072-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47071-9
Online ISBN: 978-3-319-47072-6
eBook Packages: Computer ScienceComputer Science (R0)