All Article Summaries
These article summaries are written by TAP staff members. TAP’s purpose for this section of the site is to present information, points of view, research, and debates.
Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels
Apple’s privacy nutrition labels require app developers to complete a form to make data collection processes more transparent to users. Developers support more transparency, but found the labelling process challenging.
Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts
Websites often use icons to guide consumers to privacy choices. Designing effective icons can be difficult. Sites could improve results by testing icons before use.
Informing the Design of a Personalized Privacy Assistant for the Internet of Things
Personalized Privacy Assistant (PPAs) will help users manage Internet of Things (IoT) device data collection. The best PPAs will learn from users and offer suggestions from unbiased sources.
“It’s a scavenger hunt”: Usability of Websites’ Opt-Out and Data Deletion Choices
Privacy laws require websites to offer consumers options such as the choice to opt out of advertising or to delete account data. On many sites, these options are poorly labelled and hard to find.
Usable and Useful Privacy Interfaces
Designing privacy interfaces for devices, software, and websites that are easy for people to understand and control is difficult. Designers should shift focus from information to people and their privacy needs.
The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios
People find making privacy decisions about Internet of Things (IoT) devices difficult. Users’ decisions about privacy can be swayed by experts and friends.
Design and Evaluation of a Data-Driven Password Meter
Password meters, which measure the strength of computer users’ passwords, are not always accurate or helpful. This paper describes a meter that measures strength accurately and gives users detailed feedback on how to improve their password.
A Design Space for Effective Privacy Notices
This paper surveys the literature on “best practices” for privacy policy design, and describes how to design useable privacy policies. Most policies are ineffective. Privacy policies should consist of multiple layers, offering information when it becomes relevant.
Location-Sharing Technologies: Privacy Risks and Controls
This article attempts to gauge user opinions about the risks and benefits of location-sharing technologies.
Who Falls for Phish? A Demographic Analysis of Phishing
This paper presents research on how gender, age, and availability of educational materials affect responses to phishing.