Skip to main content

Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook

  • Conference paper
  • First Online:
Data Privacy Management and Security Assurance (DPM 2016, QASA 2016)

Abstract

Third party applications play an important role in enhancing a social network user’s online experience. These applications request various permissions from the users at install-time. However, these permissions are often ignored, and the users end up granting access to sensitive information. This motivates the need for techniques that can attract user attention towards the requested permissions and make users read and understand the permissions before authorizing them.

We investigate the animation of application permission dialogs. Using a real-life analogy of luggage screening at airport security checkpoints, we attempt to draw user attention towards application’s requested permissions. We map the various elements involved at an airport security checkpoint to our context through the use of avatars, and present the permissions one by one. The user makes decision on a permission based on its provided details. The permission details include its description, type, and the user’s personal information example to communicate the potential information disclosure in the event of its authorization. We developed a prototype of our proposed animated dialog design for Facebook applications, and compared it with Facebook’s existing dialog designs. Our preliminary evaluation on 16 participants with the help of their eye-tracking data shows that the use of animation and personal information examples on a permission authorization dialog is effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Approved IRB Protocol #13-03-30.

  2. 2.

    https://theeyetribe.com.

References

  1. Power of visual communication (2014). http://blog.wyzowl.com/power-visual-communication-infographic

  2. Permissions with facebook login (2016). https://developers.facebook.com/docs/facebook-login/permissions/v2.2

  3. Bravo-Lillo, C., Komanduri, S., Cranor, L.F., Reeder, R.W., Sleeper, M., Downs, J., Schechter, S.: Your attention please: Designing security-decision uis to make genuine risks harder to ignore. In: SOUPS. New York, USA, July 2013

    Google Scholar 

  4. Brooke, J.: Sus-a quick and dirty usability scale. Usability evaluation in industry (1996)

    Google Scholar 

  5. Conzola, V.C., Wogalter, M.S.: A communication-human information processing (c-hip) approach to warning effectiveness in the workplace. J. Risk Res. 4(4), 309–322 (2001)

    Article  Google Scholar 

  6. Egelman, S.: My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect. In: SIGCHI, pp. 2369–2378. ACM (2013)

    Google Scholar 

  7. Furman, Susanne, Theofanos, Mary: Preserving privacy – more than reading a message. In: Stephanidis, Constantine, Antona, Margherita (eds.) UAHCI 2014. LNCS, vol. 8516, pp. 14–25. Springer, Heidelberg (2014). doi:10.1007/978-3-319-07509-9_2

    Chapter  Google Scholar 

  8. Harbach, M., Hettig, M., Weber, S., Smith, M.: Using personal examples to improve risk communication for security and privacy decisions. In: CHI. ACM, Toronto, Canada (2014)

    Google Scholar 

  9. Mobile, C.: Facebook security issue: Facebook color scam (2014). http://www.cmcm.com/blog/2014-08-07/348.html

  10. Pratt, J., Radulescu, P.V., Guo, R.M., Abrams, R.A.: It’s alive! animate motion captures visual attention. Psychol. Sci. 21, 1724–1730 (2010)

    Article  Google Scholar 

  11. Špakov, O., Miniotas, D.: Visualization of eye gaze data using heat maps (2007)

    Google Scholar 

  12. Steel, E., Fowler, G.A.: Facebook in privacy breach (2010). http://www.wsj.com/articles/SB10001424052702304772804575558484075236968

  13. Wang, N., Grossklags, J., Xu, H.: An online experiment of privacy authorization dialogues for social applications. In: ACM CSCW, pp. 261–272 (2013)

    Google Scholar 

  14. Wang, N., Xu, H., Grossklags, J.: Third-party apps on facebook: Privacy and the illusion of control. In: ACM CHIMIT. New York, NY (2011)

    Google Scholar 

  15. Xu, H., Wang, N., Grossklags, J.: Privacy by redesign: Alleviating privacy concerns for third-party apps (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Shehab .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Javed, Y., Shehab, M. (2016). Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds) Data Privacy Management and Security Assurance. DPM QASA 2016 2016. Lecture Notes in Computer Science(), vol 9963. Springer, Cham. https://doi.org/10.1007/978-3-319-47072-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47072-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47071-9

  • Online ISBN: 978-3-319-47072-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics