Abstract
The General Data Protection Regulation (GDPR) requires, except for some predefined scenarios (e.g., contract performance, legal obligations, vital interests, etc.), obtaining consent from the data subjects for the processing of their personal data. Companies that want to process personal data of the European Union (EU) citizens but are located outside the EU also have to comply with the GDPR. Existing mechanisms for obtaining consent involve presenting the data subject with a document where all possible data processing, done by the entire service, is described in very general terms. Such consent is neither specific nor informed. In order to address this challenge, we introduce a consent request (CoRe) user interface (UI) with maximum control over the data processing and a simplified CoRe UI with reduced control options. Our CoRe UI not only gives users more control over the processing of their personal data but also, according to the usability evaluations reported in the paper, improves their comprehension of consent requests.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
In GDPR such cases are defined in Article 6(1)(b-f).
- 2.
The online version of the prototype is available at: https://bit.ly/2Z1yrKs.
- 3.
The online version of the prototype is available at: https://bit.ly/2U6TkQw.
- 4.
Norwegian Consumer Council Report. https://bit.ly/2N1TRRC.
- 5.
Our questionnaire is available at: http://tiny.cc/z6d14y.
- 6.
The online version of the prototype is available at: https://bit.ly/2Z1yrKs.
- 7.
The source code of the maximum control UI is available at: http://tiny.cc/rh2z4y.
- 8.
Welie.com, Patterns in interaction design. https://bit.ly/2uWvFsf.
- 9.
Usability evaluation tasks are available at: https://bit.ly/2IaRUDk.
- 10.
English version of the prototype is available at: https://bit.ly/2U6TkQw.
- 11.
German version of the prototype is available at: https://bit.ly/2G2V6gR.
- 12.
The source code of the simplified UI is available at: https://bit.ly/2uWtHYM.
- 13.
Usability evaluation tasks are available at: https://bit.ly/2KChPpF.
References
Acquisti, A., Adjerid, I., Brandimarte, L.: Gone in 15 seconds: The limits of privacy transparency and control. IEEE Secur. Priv. 11(4), 72–74 (2013)
Bastien, J.C.: Usability testing: some current practices and research questions. Int. J. Med. Inform. (2010)
Benedek, J., Miner, T.: Measuring desirability: New methods for evaluating desirability in a usability lab setting. In: Proceedings of UPA (2002)
Borgesius, F.Z.: Informed consent: We can do better to defend privacy. IEEE Secur. Priv. 13(2), 103–107 (2015)
Brewer, M.B., Crano, W.D.: Research design and issues of validity. In: Handbook of Research Methods in Social and Personality Psychology, pp. 3–16 (2000)
Charters, E.: The use of think-aloud methods in qualitative research: An introduction to think-aloud methods. Brock Educ. J. 12(2) (2003)
Checkland, P., Holwell, S.: Action research. In: Kock, N. (ed.) Information Systems Action Research. ISIS, vol. 13, pp. 3–17. Springer, Boston (2007). https://doi.org/10.1007/978-0-387-36060-7_1
Costante, E., Sun, Y., Petković, M., den Hartog, J.: A machine learning solution to assess privacy policy completeness: (short paper). In: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, pp. 91–96. ACM (2012)
Friedman, B., Howe, D.C., Felten, E.: Informed consent in the Mozilla browser: Implementing value-sensitive design. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 10–pp. IEEE (2002)
Hartson, H.R., Castillo, J.C., Kelso, J., Neale, W.C.: Remote evaluation: the network as an extension of the usability laboratory. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 228–235. ACM (1996)
Ivory, M.Y., Hearst, M.A.: The state of the art in automating usability evaluation of user interfaces. ACM Comput. Surv. (CSUR) 33(4), 470–516 (2001)
Kelley, P.G., Bresee, J., Cranor, L.F., Reeder, R.W.: A nutrition label for privacy. In: Proceedings of the 5th Symposium on Usable Privacy and Security. ACM (2009)
Liccardi, I., Pato, J., Weitzner, D.J.: Improving mobile app selection through transparency and better permission analysis. J. Priv. Confidentiality 5(2), 1–55 (2014)
MacKenzie, I.S.: User studies and usability evaluations: from research to products. In: Proceedings of the 41st Graphics Interface Conference, pp. 1–8. Canadian Information Processing Society (2015)
McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. ISJLP 4 (2008)
McDonald, A.M., Reeder, R.W., Kelley, P.G., Cranor, L.F.: A comparative study of online privacy policies and formats. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 37–55. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03168-7_3
Nielsen, J.: Enhancing the explanatory power of usability heuristics. In: Proceedings of the SIGCHI CHI, pp. 152–158. ACM, New York (1994)
Schaub, F., Balebako, R., Durity, A.L., Cranor, L.F.: A design space for effective privacy notices. In: 11 Symposium on Usable Privacy and Security (2015)
Seidman, I.: Interviewing as Qualitative Research: A Guide for Researchers in Education and the Social Sciences. Teachers College Press (2013)
Steinsbekk, K.S., Myskja, B.K., Solberg, B.: Broad consent versus dynamic consent in biobank research: Is passive participation an ethical problem? EJHG 21 (2013)
Tidwell, J.: Designing Interfaces: Patterns for Effective Interaction Design. O’Reilly Media Inc. (2010)
Tullis, T., Fleischman, S., McNulty, M., Cianchette, C., Bergel, M.: An empirical comparison of lab and remote usability testing of web sites. In: UPAC (2002)
Wijesekera, P., et al.: The feasibility of dynamically granted permissions: aligning mobile privacy with user preferences. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 1077–1093. IEEE (2017)
Acknowledgments
This paper is supported by the European Union’s Horizon 2020 research and innovation programme under grant 731601. We would like to thank our colleagues from SPECIAL and WU for their legal support and help with the user studies.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Drozd, O., Kirrane, S. (2019). I Agree: Customize Your Personal Data Processing with the CoRe User Interface. In: Gritzalis, S., Weippl, E., Katsikas, S., Anderst-Kotsis, G., Tjoa, A., Khalil, I. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2019. Lecture Notes in Computer Science(), vol 11711. Springer, Cham. https://doi.org/10.1007/978-3-030-27813-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-27813-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27812-0
Online ISBN: 978-3-030-27813-7
eBook Packages: Computer ScienceComputer Science (R0)