{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:02:55Z","timestamp":1775023375443,"version":"3.50.1"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2020,2,8]],"date-time":"2020-02-08T00:00:00Z","timestamp":1581120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Horizon 2020","award":["653454"],"award-info":[{"award-number":["653454"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2020,2,29]]},"abstract":"<jats:p>Privacy notices and consent forms are the means of conveying privacy policy information to users. In Europe, a valid consent needs to be confirmed by a clear affirmative action. Despite previous research, it is not yet clear whether user engagement with consent forms via different types of interactions for confirming consent may play a significant role in effectively drawing user attention to the content, even after repeated exposure. We investigate, in a laboratory study, how different types of interactions that engage users with consent forms differ in terms of their effectiveness, efficiency, and user satisfaction. In addition, we examine if and how habituation affects user attention and satisfaction, and the time they spend on giving their consent. We conducted a controlled experiment with 80 participants in four different groups where people either were engaged actively with the policy content via Drag and Drop (DAD), Swipe, or Checkboxes, or were not actively engaged with the content (as the control condition) in a first-exposure phase and in a habituation phase. We measured user attention to consent forms along multiple dimensions, including direct, objective measurements and indirect, self-reported measures. Our results show that the different types of interactions may affect user attention to certain parts of policy information. In particular, the DAD action results in significantly more user attention to the data items compared to other groups. However, with repeated exposure to consent forms, the difference disappears. We conclude that user engagement with policy content needs to be designed with care, so that attention to substantial policy information is increased and not negatively affected.<\/jats:p>","DOI":"10.1145\/3372296","type":"journal-article","created":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T07:59:17Z","timestamp":1585987157000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["The Dilemma of User Engagement in Privacy Notices"],"prefix":"10.1145","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2823-3837","authenticated-orcid":false,"given":"Farzaneh","family":"Karegar","sequence":"first","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]},{"given":"John S\u00f6ren","family":"Pettersson","sequence":"additional","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2020,2,8]]},"reference":[{"key":"e_1_2_2_1_1","volume-title":"C","author":"Anderson Bonnie Brinton","year":"2016"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702322"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435362"},{"key":"e_1_2_2_4_1","volume-title":"Revised and Adopted on","author":"Data Protection Working Party Article","year":"2018"},{"key":"e_1_2_2_5_1","volume-title":"Adopted on","author":"Data Protection Working Party Article","year":"2004"},{"key":"e_1_2_2_6_1","volume-title":"Revised and Adopted on","author":"Data Protection Working Party Article","year":"2018"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.57.12.1060"},{"key":"e_1_2_2_8_1","volume-title":"Advances in Information Systems Development","author":"Bergmann Mike"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753689"},{"key":"e_1_2_2_10_1","unstructured":"Aga Bojko. 2013. Eye Tracking the User Experience: A Practical Guide to Research. Rosenfeld Media.  Aga Bojko. 2013. Eye Tracking the User Experience: A Practical Guide to Research. Rosenfeld Media."},{"key":"e_1_2_2_11_1","volume-title":"Proceedings of the SOUPS. USENIX Association","author":"Bravo-Lillo Cristian","year":"2014"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501610"},{"key":"e_1_2_2_13_1","unstructured":"John Brooke et al. 1996. SUS-A Quick and Dirty Usability Scale. Taylor 8 Francis.  John Brooke et al. 1996. SUS-A Quick and Dirty Usability Scale. Taylor 8 Francis."},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.84"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPCC.2006.320355"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1021\/acs.jchemed.5b00529"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2481655.2481657"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1964.10490181"},{"key":"e_1_2_2_20_1","unstructured":"European Union Agency for Fundamental Rights and Council of Europe. May 2018. Handbook on European data protection law. Retrieved from https:\/\/fra.europa.eu\/en\/publication\/2018\/handbook-european-data-protection-law.  European Union Agency for Fundamental Rights and Council of Europe. May 2018. Handbook on European data protection law. Retrieved from https:\/\/fra.europa.eu\/en\/publication\/2018\/handbook-european-data-protection-law."},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07509-9_2"},{"key":"e_1_2_2_22_1","volume-title":"Lorrie Faith Cranor, and Yuvraj Agarwal","author":"Gluck Joshua","year":"2016"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X00013066"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_2_2_25_1","volume-title":"Eye Tracking: A Comprehensive Guide to Methods and Measures","author":"Holmqvist Kenneth","year":"2011"},{"key":"e_1_2_2_26_1","volume-title":"Privacy Policy Icons","author":"Holtz Leif-Erik"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2019.1573501"},{"key":"e_1_2_2_28_1","volume-title":"Karn","author":"Jacob Robert J. K.","year":"2003"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47072-6_10"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0014"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167259"},{"key":"e_1_2_2_32_1","volume-title":"John S\u00f6ren Pettersson, and Simone Fischer-H\u00fcbner","author":"Karegar Farzaneh","year":"2018"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_2_2_34_1","volume-title":"Hong","author":"Lin Jialiu","year":"2014"},{"key":"e_1_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Daniel Lindegren Farzaneh Karegar Bridget Kane and John S\u00f6ren Pettersson. 2019. An evaluation of three designs to engage users when providing their consent on smartphones. Behav. Info. Technol. (2019) 1--17. DOI:https:\/\/doi.org\/10.1080\/0144929X.2019.1697898  Daniel Lindegren Farzaneh Karegar Bridget Kane and John S\u00f6ren Pettersson. 2019. An evaluation of three designs to engage users when providing their consent on smartphones. Behav. Info. Technol. (2019) 1--17. DOI:https:\/\/doi.org\/10.1080\/0144929X.2019.1697898","DOI":"10.1080\/0144929X.2019.1697898"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481371"},{"key":"e_1_2_2_37_1","volume-title":"Patrick Gage Kelley, and Lorrie Faith Cranor","author":"Mcdonald Aleecia M.","year":"2009"},{"key":"e_1_2_2_38_1","volume-title":"1--88","author":"Council of the European Union and European Parliament. 2016. Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (General Data Protection Regulation). Offic. J. Eur. Union L119","year":"2016"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043424"},{"key":"e_1_2_2_40_1","volume-title":"Patrick and Steve Kenny","author":"Andrew","year":"2003"},{"key":"e_1_2_2_41_1","volume-title":"Privacy and Identity Management for the Future Internet in the Age of Globalisation","author":"Pettersson John S\u00f6ren"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073007"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1284621.1284627"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.nlm.2008.09.012"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.124.3.372"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174086"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9280.00288"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.75"},{"key":"e_1_2_2_49_1","volume-title":"Proceedings of the SOUPS. USENIX Association.","author":"Schaub Florian","year":"2015"},{"key":"e_1_2_2_50_1","first-page":"171","article-title":"The crisis of consent: How stronger legal protection may lead to weaker consent in data protection. Ethics Info","volume":"16","author":"Schermer Bart W.","year":"2014","journal-title":"Technol."},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/VL.1996.545307"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370008.2010.507318"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2013.789347"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173774"},{"key":"e_1_2_2_55_1","article-title":"Eye movement patterns in solving science ordering problems","volume":"9","author":"Tang Hui","year":"2016","journal-title":"J. Eye Move. Res."},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0022681"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/14124"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441807"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0003-6870(02)00009-1"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.046"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:25Z","timestamp":1750199605000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372296"}},"subtitle":["Effects of Interaction Modes and Habituation on User Attention"],"short-title":[],"issued":{"date-parts":[[2020,2,8]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2,29]]}},"alternative-id":["10.1145\/3372296"],"URL":"https:\/\/doi.org\/10.1145\/3372296","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,8]]},"assertion":[{"value":"2019-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}