메뉴 건너뛰기




Volumn , Issue , 2007, Pages 607-616

Noticing notice: A large-scale experiment on the timing of software license agreements

Author keywords

End user license agreement; Notice; Privacy; Security; Spyware; Timing

Indexed keywords

END USER LICENSE AGREEMENT (EULA); SPYWARE; TIMING;

EID: 35348905154     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1240624.1240720     Document Type: Conference Paper
Times cited : (77)

References (29)
  • 1
    • 35348903218 scopus 로고    scopus 로고
    • Abrams, M., M. P. Eisenhauer, and L.J. Sotto Letter to Federal Trade Commission. March 29, 2004. Re: alternative forms of privacy notices, project no. P034815. Hunton & Williams: The Center for Information Policy Leadership.
    • Abrams, M., M. P. Eisenhauer, and L.J. Sotto Letter to Federal Trade Commission. March 29, 2004. Re: alternative forms of privacy notices, project no. P034815. Hunton & Williams: The Center for Information Policy Leadership.
  • 2
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision making
    • Acquisti, A., and J. Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1): 26-33.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 3
    • 84858360184 scopus 로고    scopus 로고
    • Coalition, Anti Spyware Coalition Definitions and Supporting Documents
    • June 29, available at
    • Anti Spyware Coalition, Anti Spyware Coalition Definitions and Supporting Documents, Working Report (June 29, 2006), available at http://www. antispywarecoalition.org/documents/documents/ ASCDefinitionsWorkingReport20060622.pdf
    • (2006) Working Report
    • Anti Spyware1
  • 4
    • 19944402322 scopus 로고    scopus 로고
    • AOL and National Cyber Security Alliance, October
    • AOL and National Cyber Security Alliance. 2004. AOL/NCSA online safety study, (October). http://www.security.iia.net.au/downloads/safety_study_v04.pdf
    • (2004) AOL/NCSA online safety study
  • 5
    • 35348822490 scopus 로고    scopus 로고
    • Bellia, P. L. Spyware and the Limits of Surveillance Law, 20 Berkeley Tech. L.J. 1283 (2005)
    • Bellia, P. L. Spyware and the Limits of Surveillance Law, 20 Berkeley Tech. L.J. 1283 (2005)
  • 7
    • 35348927490 scopus 로고    scopus 로고
    • Blanke, J. M. Robust Notice and informed Consent: the Keys to Successful Spyware Legilsation, 7 Coum. Sci & Tech. L. Rev. 2 (2006)
    • Blanke, J. M. "Robust Notice" and "informed Consent:" the Keys to Successful Spyware Legilsation, 7 Coum. Sci & Tech. L. Rev. 2 (2006)
  • 8
    • 35348894997 scopus 로고    scopus 로고
    • Buenaventura, M. A. Teaching a Man to Fish: Why National Legislation Anchored in Notice and Consent Provisions is the Most Effective Solution to the Spyware Problem, 13 Rich. J.L. & Tech. 1 (2006)
    • Buenaventura, M. A. Teaching a Man to Fish: Why National Legislation Anchored in Notice and Consent Provisions is the Most Effective Solution to the Spyware Problem, 13 Rich. J.L. & Tech. 1 (2006)
  • 9
    • 84972893020 scopus 로고
    • A Dendrite Method for Cluster Analysis
    • Calinski, R.B. and Harabasz, J. 1974. "A Dendrite Method for Cluster Analysis," Comm. in Statistics, vol. 3, pp. 1-27.
    • (1974) Comm. in Statistics , vol.3 , pp. 1-27
    • Calinski, R.B.1    Harabasz, J.2
  • 10
    • 0012376630 scopus 로고    scopus 로고
    • Beyond concern: Understanding net users' attitudes about online privacy
    • Ingo Vogelsang and Benjamin M. Compaine, eds, Cambridge, Massachusetts: The MIT Press, p
    • Cranor, L.F., J. Reagle, and M. S. Ackerman.1999. Beyond concern: Understanding net users' attitudes about online privacy. In Ingo Vogelsang and Benjamin M. Compaine, eds. The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy. Cambridge, Massachusetts: The MIT Press, p. 47-70
    • (1999) The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy , pp. 47-70
    • Cranor, L.F.1    Reagle, J.2    Ackerman, M.S.3
  • 14
    • 84858345674 scopus 로고    scopus 로고
    • Federal Trade Commission, Monitoring Software on Your PC:, Adware, and Other Software
    • Federal Trade Commission, Monitoring Software on Your PC: Spyware, Adware, and Other Software, http:www.ftc.gov/os/2005/03/050307spywarerpt.pdf
    • Spyware
  • 15
    • 35348901992 scopus 로고    scopus 로고
    • Friedman, B., Howe, D., and Feiten, E. 2002. Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design. In Proceedings of the 35th Annual Hawaii international Conference on System Sciences (Hicss'02)-8 - 8 (January 07 - 10, 2002). HICSS. IEEE Computer Society, Washington, DC, 247.
    • Friedman, B., Howe, D., and Feiten, E. 2002. Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design. In Proceedings of the 35th Annual Hawaii international Conference on System Sciences (Hicss'02)-Volume 8 - Volume 8 (January 07 - 10, 2002). HICSS. IEEE Computer Society, Washington, DC, 247.
  • 17
    • 0038713945 scopus 로고    scopus 로고
    • Good, N. S. and Krekelberg, A. 2003. Usability and privacy: a study of KaZaA P2P file-sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Ft. Lauderdale, Florida, USA, April 05 - 10, 2003). CHI '03. ACM Press, New York, NY, 137-144.
    • Good, N. S. and Krekelberg, A. 2003. Usability and privacy: a study of KaZaA P2P file-sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Ft. Lauderdale, Florida, USA, April 05 - 10, 2003). CHI '03. ACM Press, New York, NY, 137-144.
  • 18
    • 77953767524 scopus 로고    scopus 로고
    • Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., and Konstan, J. 2005. Stopping spyware at the gate: a user study of privacy, notice and spyware. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06 - 08, 2005). SOUPS '05, 93. ACM Press, New York, NY, 43-52
    • Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., and Konstan, J. 2005. Stopping spyware at the gate: a user study of privacy, notice and spyware. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06 - 08, 2005). SOUPS '05, vol. 93. ACM Press, New York, NY, 43-52
  • 19
    • 33745843365 scopus 로고    scopus 로고
    • Keeping up appearances: Understanding the dimensions of incidental information privacy
    • Montréal, Québec, Canada, April 22, 27, ACM Press, New York, NY
    • Hawkey, K. and Inkpen, K. M. 2006. Keeping up appearances: understanding the dimensions of incidental information privacy. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). ACM Press, New York, NY.
    • (2006) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    • Hawkey, K.1    Inkpen, K.M.2
  • 21
    • 33745812093 scopus 로고    scopus 로고
    • Karat, C., Karat, J., Brodie, C., and Feng, J. 2006. Evaluating interfaces for privacy policy rule authoring. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 83-92.
    • Karat, C., Karat, J., Brodie, C., and Feng, J. 2006. Evaluating interfaces for privacy policy rule authoring. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 83-92.
  • 24
    • 33748549923 scopus 로고    scopus 로고
    • Polaris: Virus-safe computing for Windows XP
    • Sep
    • Stiegler, M., Karp, A. H., Yee, K., Close, T., and Miller, M. S. 2006. Polaris: virus-safe computing for Windows XP. Commun. ACM 49, 9 (Sep. 2006), 83-88.
    • (2006) Commun. ACM , vol.49 , Issue.9 , pp. 83-88
    • Stiegler, M.1    Karp, A.H.2    Yee, K.3    Close, T.4    Miller, M.S.5
  • 25
    • 0038341777 scopus 로고    scopus 로고
    • Preparing to resume an interrupted task: Effects of prospective goal encoding and retrospective rehearsal
    • Trafton, J. G., E. M. Altmann, D. P. Brock, and F. E. Mintz. 2003. Preparing to resume an interrupted task: Effects of prospective goal encoding and retrospective rehearsal. International Journal of Human Computer Studies 58(4): 583-603.
    • (2003) International Journal of Human Computer Studies , vol.58 , Issue.4 , pp. 583-603
    • Trafton, J.G.1    Altmann, E.M.2    Brock, D.P.3    Mintz, F.E.4
  • 27
    • 35348826145 scopus 로고    scopus 로고
    • Vila, T., R. Greenstadt, and D. Molnar. 2004. Why we can't be bothered to read privacy policies: Models of privacy economics as a lemons market. In Economics of Information Security. 12 of Advances in Information Security, eds. L.J. Camp and S. Lewis, 143-154. Boston: Kluwer Academic Publishers.
    • Vila, T., R. Greenstadt, and D. Molnar. 2004. Why we can't be bothered to read privacy policies: Models of privacy economics as a lemons market. In Economics of Information Security. Vol 12 of Advances in Information Security, eds. L.J. Camp and S. Lewis, 143-154. Boston: Kluwer Academic Publishers.
  • 28
    • 35348844022 scopus 로고    scopus 로고
    • Wayne R. Barnes, Rethinking Spyware: Questioning the Propriety of Contractual Consent to Online Surveillance, 39 U.C. Davis L. Rev 1545 (2006)
    • Wayne R. Barnes, Rethinking Spyware: Questioning the Propriety of Contractual Consent to Online Surveillance, 39 U.C. Davis L. Rev 1545 (2006)
  • 29
    • 35348910183 scopus 로고    scopus 로고
    • Winn, J. Contracting Spyware by Contract, 20 Berkeley Tech. L.J. 1345 (2005)
    • Winn, J. Contracting Spyware by Contract, 20 Berkeley Tech. L.J. 1345 (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.