Abstract
AbstractWhen browsing the Internet, web users tend to accept all cookies even though this may threaten their online security. We apply a salience nudge and a framing nudge to the design of a cookie banner and test their individual and combined effectiveness in fostering rejection of unnecessary cookies in an online experiment (N = 358). The salience nudge makes the rejection button more visible, and the framing nudge phrases button labels as negations. Compared to the control with no nudges, which elicited a rejection rate of 27%, the salience nudge increased rejection rate by 7 percentage points (but p = 0.305), the framing nudge by 18 pp (p = 0.009), and the combination of the two by 53 pp (p < 0.0001). We also find that, when users are offered a customization option rather than the rejection button, only 3% of them select the option and reject non-necessary cookies. Finally, we explore how cookie rejection is related to the time users spend making the decision and to their personality traits. Our findings suggest that cookie rejection can indeed be fostered by an appropriate design of cookie banners and that legislation for protecting the online security of users should introduce specific design guidelines.
Funder
Università degli Studi dell'Insubria
Publisher
Springer Science and Business Media LLC
Reference54 articles.
1. Acquisti A, Brandimarte L, Loewenstein G (2015) Privacy and human behavior in the age of information. Science 347(6221):509–514
2. Acquisti A, Adjerid I, Balebako R, Brandimarte L, Cranor LF, Komanduri S et al (2017) Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Comput Surv (CSUR) 50(3):1–41
3. Andreoni J (1995) Warm-glow versus cold-prickle: the effects of positive and negative framing on cooperation in experiments. Quart J Econ 110:1–21
4. Armel KC, Beaumel A, Rangel A (2008) Biasing simple choices by manipulating relative visual attention. Judgm Decis Mak 3:396–403
5. Bansal G (2011). Security concerns in the nomological network of trust and big 5: First order vs. second order. In: ICIS 2011 Proceedings, section 9. Available at: https://aisel.aisnet.org/icis2011/proceedings/ISsecurity/9. Accessed 31 May 2022