skip to main content
10.1145/2665943.2665953acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Private Browsing: an Inquiry on Usability and Privacy Protection

Published: 03 November 2014 Publication History

Abstract

Private browsing is a feature in web browsers to prevent local users from gaining information about browsing sessions. However, it is not clear how well people interpret private browsing's functionalities and what are the privacy gains from using it. Towards studying people's understanding of private browsing, we conducted a survey on Amazon Mechanical Turk. Our survey results show that (1) one third of our participants were not aware of this privacy-enhancing feature, and (2) for people who knew or even used this feature, they had various misconceptions which could put them at risk. In the end, we provide design suggestions to help address these misconceptions.

References

[1]
G. Aggarwal, E. Bursztein, C. Jackson, and D. Boneh. An analysis of private browsing modes in modern browsers. In USENIX Security'10, 2010.
[2]
C. Bravo-Lillo, L. F. Cranor, J. Downs, and S. Komanduri. Bridging the gap in computer security warnings: A mental model approach. IEEE SP '11, 2011.
[3]
K. Charmaz. Constructing Grounded Theory, 2nd Edition. SAGE Publications Ltd, Mar. 2014.
[4]
S. Chiasson, P. C. van Oorschot, and R. Biddle. A usability study and critique of two password managers. In 15th USENIX Security Symposium, 2006.
[5]
B. Friedman, D. Hurley, D. C. Howe, E. Felten, and H. Nissenbaum. Users' conceptions of web security: A comparative study. In CHI EA '02, 2002.
[6]
V. Ha, K. Inkpen, F. Al Shaar, and L. Hdeib. An examination of user perception and misconception of internet cookies. In CHI EA '06, 2006.
[7]
R. Kang, S. Brown, L. Dabbish, and S. Kiesler. Privacy attitudes of mechanical turk workers and the u.s. public. In SOUPS '14, 2014.
[8]
P. Leon, B. Ur, R. Shay, Y. Wang, R. Balebako, and L. Cranor. Why johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising. In CHI '12, 2012.
[9]
B. S. Lerner, L. Elberty, N. Poole, and S. Krishnamurthi. Verifying web browser extensions' compliance with private-browsing mode. In ESORICS'13. 2013.
[10]
Browser Statistics and Trends. What is the trend in browser usage? http://www.w3schools.com/browsers/browsers_stats.asp, 2013--10.
[11]
Google Chrome Incognito Browsing. Browse in private (incognito mode). https://support.google.com/chrome/answer/95464?hl=en, 2014.
[12]
Internet Explorer InPrivate Browsing. What is inprivate browsing? http://windows.microsoft.com/en-us/windows/what-is-inprivate-browsing#1TC=windows-7, 2014.
[13]
Mozilla Firefox Private Browsing. Browse the web without saving information about the sites you visit. https://support.mozilla.org/en-US/kb/private-browsing-browse-web-without-saving-info, 2014.
[14]
Opera Private Browsing. Stay secure with private browsing. http://help.opera.com/opera/Windows/1471/en/private.html, 2014.
[15]
Safari Private Browsing. Safari 5.1: Browser privately. http://support.apple.com/kb/ph5000, 2014.
[16]
D. J. Ohana and N. Shashidhar. Do private and portable web browsers leave incriminating evidence? a forensic analysis of residual artifacts from private and portable web browsing sessions. IEEE SPW '12, 2012.
[17]
H. Said, N. Al Mutawa, I. Al Awadhi, and M. Guimaraes. Forensic analysis of private browsing artifacts. In IIT '11, 2011.
[18]
K. Satvat, M. Forshaw, F. Hao, and E. Toreini. On the privacy of private browsing{a forensic approach. In the 8th international Workshop on DPM'13, 2013.
[19]
K. Satvat, M. Forshaw, F. Hao, and E. Toreini. On the privacy of private browsing{a forensic approach. Journal of Information Security and Applications, 2014.
[20]
S. Schnorf, A. Sedley, M. Ortlieb, and A. Woodru. A comparison of six sample providers regarding online privacy benchmarks. In SOUPS Workshop on Privacy Personas and Segmentation, 2014.
[21]
C. Soghoian. Why private browsing modes do not deliver real privacy. Technical report, 2010.
[22]
R. Wash. Folk models of home computer security. In SOUPS '10, 2010

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic Society
November 2014
218 pages
ISBN:9781450331487
DOI:10.1145/2665943
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. incognito browsing
  2. inprivate browsing
  3. private browsing
  4. user privacy
  5. web privacy

Qualifiers

  • Research-article

Funding Sources

Conference

CCS'14
Sponsor:

Acceptance Rates

WPES '14 Paper Acceptance Rate 26 of 67 submissions, 39%;
Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)5
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Creepy or convenient?: Consumer perceptions of privacy and ad exposure on social mediaItalian Journal of Marketing10.1007/s43039-025-00107-zOnline publication date: 26-Feb-2025
  • (2024)Compartmentalization-by-Design: Usability-Aware Web PrivacyComputer10.1109/MC.2023.334105057:7(39-52)Online publication date: 1-Jul-2024
  • (2023)Pool-partyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620634(7091-7105)Online publication date: 9-Aug-2023
  • (2023)User awareness and behaviors concerning encrypted DNS settings in web browsersProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620412(3117-3133)Online publication date: 9-Aug-2023
  • (2023)Investigating Security Folklore: A Case Study on the Tor over VPN PhenomenonProceedings of the ACM on Human-Computer Interaction10.1145/36101937:CSCW2(1-26)Online publication date: 4-Oct-2023
  • (2023)Accounting for Privacy Pluralism: Lessons and Strategies from Community-Based Privacy GroupsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581331(1-12)Online publication date: 19-Apr-2023
  • (2023)Contextual Integrity, Explained: A More Usable Privacy DefinitionIEEE Security & Privacy10.1109/MSEC.2022.320158521:1(58-65)Online publication date: Jan-2023
  • (2023)User Motivations of Secure Web BrowsingHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-35822-7_28(419-434)Online publication date: 23-Jul-2023
  • (2022)Toppling top listsProceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3561444(374-387)Online publication date: 25-Oct-2022
  • (2022)A world wide view of browsing the world wide webProceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3561418(317-336)Online publication date: 25-Oct-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media