2010
DOI: 10.1016/j.compind.2009.12.001
|View full text |Cite
|
Sign up to set email alerts
|

Influence of the Privacy Bird® user agent on user trust of different web sites

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
1

Year Published

2011
2011
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 4 publications
0
7
0
1
Order By: Relevance
“…Although we focused on only two areas, decision making and choice are also central to other areas in the domain of cybersecurity: Individual users must make decisions about passwords to use (Das, Bonneau, Caesar, Borisov, & Wang, 2014) and the privacy offered by Web sites (Vu, Chambers, Creekmur, Cho, & Proctor, 2010), which involve processes similar to those of phishing detection and app selection. System administrators must configure access control policies, detect intrusions, and take appropriate actions (Corchado & Herrero, 2011), and security analysts need to anticipate adversaries' reactions to particular security actions (Proctor, Vu, & Schultz, 2009;Schultz, 2012).…”
Section: Resultsmentioning
confidence: 99%
“…Although we focused on only two areas, decision making and choice are also central to other areas in the domain of cybersecurity: Individual users must make decisions about passwords to use (Das, Bonneau, Caesar, Borisov, & Wang, 2014) and the privacy offered by Web sites (Vu, Chambers, Creekmur, Cho, & Proctor, 2010), which involve processes similar to those of phishing detection and app selection. System administrators must configure access control policies, detect intrusions, and take appropriate actions (Corchado & Herrero, 2011), and security analysts need to anticipate adversaries' reactions to particular security actions (Proctor, Vu, & Schultz, 2009;Schultz, 2012).…”
Section: Resultsmentioning
confidence: 99%
“…Privacy Bird [29] is a browser plug-in that compares a user's stated preferences to the P3P-defined data use terms of a privacy policy. An icon in the browser informs the user whether the policy matches their preferences: a green bird indicates a match, a red bird indicates a conflict between the organization's policy and the user's preferences, and a yellow bird indicates that the organization has not published a P3P policy.…”
Section: Related Workmentioning
confidence: 99%
“…People do not read privacy policies [2,14,23], the number of policies and frequency of updates make it infeasible to keep up to date [4,17], and policies are difficult to understand [18,22,25]. To address these problems, alternate representations of privacy policies have been designed [15,19,27,29]. However, despite evidence that visualizations can effectively convey actual data collection and dissemination [5,10], there is limited work investigating tools for visualizing privacy policies.…”
Section: Introductionmentioning
confidence: 99%
“…Some works on inspiring trust through user interface design [47], industrial web sites [63], and the credibility of health-advice services [55,1]. Recent developments are the webs of trust for sharing experiences on products and services [29], peer production systems [35], and service-oriented systems [56].…”
Section: Fields Of Applicationmentioning
confidence: 99%