ABSTRACT
We first provide criteria for assessing informed consent online. Then we examine how cookie technology and Web browser designs have responded to concerns about informed consent. Specifically, we document relevant design changes in Netscape Navigator and Internet Explorer over a 5-year period, starting in 1995. Our retrospective analyses leads us to conclude that while cookie technology has improved over time regarding informed consent, some startling problems remain. We specify six of these problems and offer design remedies. This work fits within the emerging field of Value-Sensitive Design.
- 1.The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research. The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. 1978.Google Scholar
- 2.Cookie Central. All copyright 1997, 1998, Cookie Central. http://www.cookiecentral.com .Google Scholar
- 3.Faden, R, and Beauchamp, T. A History and Theory of Informed Consent. Oxford University Press, New York NY, 1986.Google Scholar
- 4.Friedman, B. (Ed.) Human Values and the Design of Computer Technology. Cambridge University Press, New York NY, 1997. Google ScholarDigital Library
- 5.Friedman, B. Value-Sensitive Design: A Research Agenda for Information Technology. (Contract No: SBR-9729633). National Science Foundation, Arlington, VA, 1999.Google Scholar
- 6.Friedman, B., Felten, E., and Millett, L. I. Informed Consent Online: A Conceptual Model and Design Principles. UW-CSE Technical Report Number 2000- 12-2, 2000.Google Scholar
- 7.Friedman, B., Kahn, P. H., Jr., & Howe, D. C. Trust online. Communications of the ACM, 43(12), (2000), 34-40. Google ScholarDigital Library
- 8."IE5 release data announced as March 18 th , 1999." Thread in uk.comp.os.win95.Google Scholar
- 9.Internet Explorer Products Download. http://www.microsoft.com/windows/ie/download/ie5all. htm .Google Scholar
- 10.Mayer-Schonberg, V. The Internet and privacy legislation: Cookies for a treat? West Virginia Journal of Law and Technology 1(1), 1997.Google Scholar
- 11.http://www.wvjolt.wvu.edu/wvjolt/current/issues1/articl es/mayer/mayer.htm .Google Scholar
- 12.Nass, C. I., Moon, Y., Morkes, J., Kim, E., & Fogg, B. J. Computers are social actors: A review of current research. In B. Friedman (ed.), Human Values and the Design of Computer Technology (pp. 137-162). Cambridge University Press, New York NY, 1997. Google ScholarDigital Library
- 13."Netscape 4.6 is out.." Thread in visi.general.Google Scholar
- 14.Netscape Products: Archived Products. http://home.netscape.com/download/archive/index.htmlGoogle Scholar
- 15.Nissenbaum, H. Accountability in a computerized society. Science and Engineering Ethics, 2 (1996), 25-42.Google ScholarCross Ref
- 16.Reeves, B., & Nass, C. The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places. Cambridge University Press, New York NY, 1996. Google ScholarDigital Library
- 17."Relese {sic} date for NSC4?" Thread in comp.infosystems.www.browsers.ms-windows.Google Scholar
- 18.Thomas, J. C. Steps toward universal access in a communications company. In B. Friedman (ed.), Human Values and the Design of Computer Technology (1997), Cambridge University Press, New York NY, 271-287. Google ScholarDigital Library
- 19.Whalen, D. The Unofficial Cookie FAQ V. 2.53. http://www.cookiecentral.com/faq/. May, 1999.Google Scholar
- 20.Wilson, B. Browser History, Internet Explorer. http://kempelen.inf.bme.hu/htmlhelp/history/ie.htmGoogle Scholar
- 21.Wilson, B. Browser History, Netscape. http://kempelen.inf.bme.hu/htmlhelp/history/netscape.htmGoogle Scholar
Index Terms
- Cookies and Web browser design: toward realizing informed consent online
Recommendations
Cookies That Give You Away: The Surveillance Implications of Web Tracking
WWW '15: Proceedings of the 24th International Conference on World Wide WebWe study the ability of a passive eavesdropper to leverage "third-party" HTTP tracking cookies for mass surveillance. If two web pages embed the same tracker which tags the browser with a unique cookie, then the adversary can link visits to those pages ...
An examination of user perception and misconception of internet cookies
CHI EA '06: CHI '06 Extended Abstracts on Human Factors in Computing SystemsProper cookie management methods have long been the source of frustration to consumers and researchers alike. A primary reason for this challenge is the ability for cookies to be both beneficial and malicious. Because of this duality, a subjective ...
HTTP Cookies: Standards, privacy, and politics
How did we get from a world where cookies were something you ate and where "nontechies" were unaware of "Netscape cookies" to a world where cookies are a hot-button privacy issue for many computer users? This article describes how HTTP "cookies" work ...
Comments