An evaluation of three designs to engage users when providing their consent on smartphones

The graphical and interactive design of a consent form helps individuals to keep control and pay attention to the information that they are disclosing. In the context of mobile apps we propose and ...

[1]  Lujo Bauer,et al.  A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality , 2013, Digital Identity Management.

[2]  Andrew Sears,et al.  International Aspects of World Wide Web Usability and the Role of High-End Graphical Enhancements , 2000, Int. J. Hum. Comput. Interact..

[3]  Ya-li Wu,et al.  [null]. , 2019, Zhongguo ying yong sheng li xue za zhi = Zhongguo yingyong shenglixue zazhi = Chinese journal of applied physiology.

[4]  John Sören Pettersson,et al.  Towards the Adoption of Secure Cloud Identity Services , 2017, ARES.

[5]  Serge Egelman,et al.  My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect , 2013, CHI.

[6]  Matthew Chalmers,et al.  Improving consent in large scale mobile HCI through personalised representations of data , 2014, NordiCHI.

[7]  S. Shyam Sundar,et al.  Power of the Swipe: Why Mobile Websites Should Add Horizontal Swiping to Tapping, Clicking, and Scrolling Interaction Techniques , 2016, Int. J. Hum. Comput. Interact..

[8]  Mohamed Shehab,et al.  Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook , 2016, DPM/QASA@ESORICS.

[9]  Yi Wu,et al.  Swiping vs. Scrolling in Mobile Shopping Applications , 2016, HCI.

[10]  Qian Xu,et al.  User Experience of On-Screen Interaction Techniques: An Experimental Investigation of Clicking, Sliding, Zooming, Hovering, Dragging, and Flipping , 2014, Hum. Comput. Interact..

[11]  Scott Ruoti,et al.  Authentication Melee: A Usability Analysis of Seven Web Authentication Systems , 2015, WWW.

[12]  John Sören Pettersson,et al.  Making PRIME usable , 2005, SOUPS '05.

[13]  Lorrie Faith Cranor,et al.  Your attention please: designing security-decision UIs to make genuine risks harder to ignore , 2013, SOUPS.

[14]  Scott Ruoti,et al.  Standard Metrics and Scenarios for Usable Authentication , 2016, WAY@SOUPS.

[15]  Barry Werth,et al.  How short is too short? , 1991, The New York times magazine.

[16]  Bernd Zwattendorfer,et al.  CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[17]  John Sören Pettersson,et al.  Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood , 2018, ARES.

[18]  Surajit Ghosh Dastidar,et al.  Impact of the Factors Influencing Website Usability on User Satisfaction , 2009 .

[19]  Melanie Volkamer,et al.  Helping john to make informed decisions on using social login , 2018, SAC.

[20]  Andrew S. Patrick,et al.  From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions , 2003, Privacy Enhancing Technologies.

[21]  Alan Cooper,et al.  About Face 3: the essentials of interaction design , 1995 .

[22]  Blase Ur,et al.  Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption , 2015 .

[23]  Alfred Kobsa,et al.  Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior , 2004, Privacy Enhancing Technologies.

[24]  D. Norman The Design of Everyday Things: Revised and Expanded Edition , 2013 .

[25]  José Carlos Brustoloni,et al.  Improving security decisions with polymorphic and audited dialogs , 2007, SOUPS '07.

[26]  Philip T. Kortum,et al.  Determining what individual SUS scores mean: adding an adjective rating scale , 2009 .

[27]  J. B. Brooke,et al.  SUS: a retrospective , 2013 .

[28]  Janet Horowitz Murray,et al.  Inventing the Medium: Principles of Interaction Design as a Cultural Practice , 2011 .

[29]  John Sören Pettersson,et al.  User Evaluations of an App Interface for Cloud-Based Identity Management , 2018 .

[30]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[31]  Oriana Riva,et al.  Taking data exposure into account: how does it affect the choice of sign-in accounts? , 2013, CHI.

[32]  Mohamed Shehab,et al.  Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions , 2017, Proc. Priv. Enhancing Technol..

[33]  Jens Grossklags,et al.  An online experiment of privacy authorization dialogues for social applications , 2013, CSCW.

[34]  Heather Richter Lipford,et al.  Increasing User Attention with a Comic-based Policy , 2018, CHI.