Title: Interface Application Comprehensive Analysis of Ghostery
Year of Publication: 2018
Publisher: International Journal of Computer Systems (IJCS)
ISSN: 2394-1065
Series: Volume 05, Number 3, March 2018
Authors: Dan Bouhnik, Golan Carmi


Dan Bouhnik, Golan Carmi, "Interface Application Comprehensive Analysis of Ghostery", In International Journal of Computer Systems (IJCS), pp: 4-10, Volume 5, Issue 3, March 2018. BibTeX

	author = {Dan Bouhnik, Golan Carmi},
	title = {Interface Application Comprehensive Analysis of Ghostery},
	journal = {International Journal of Computer Systems (IJCS)},
	year = {2018},
	volume = {5},
	number = {3},
	pages = {4-10},
	month = {March}


The object of this study is to analyze the Ghostery extension's interface. This app is a browser extension, which allows users to block tracking mechanisms found on web pages. The interface analysis will be performed in two parts:At first, a general overview of the extension’s implementation and usage. The second level will be a heuristic analysis according to Shneiderman’s 'Eight Golden Rules of Interface Design'. The overall analysis will show that despite having a high level of aesthetics and minimalism, the app is not accessible to the end user and contains too many options to choose from. Moreover, the analysis shows that without prior knowledge or an ardent desire to learn using the app may cause frustration for the end user and possibly lead to errors.


[1] Abdulhayoglu, M. (2008). Would have been much easier to build an ad blocker without caring for Publishers. Retrieved from
[2] Ajdari, D., Hoofnagle, C., Stocksdale, T., & Good, N. (2013) Web Privacy Tools and Their Effect on Tracking and User Experience on the Internet. Retrieved from
[3] Birnhack, M. (2009). Who Owns Bratz? The Integration of Copyright Law and Employment Law, 20 FORDHAM INTELLECTUAL PROPERTY, MEDIA & ENTERTAINMENT LAW JOURNAL 95-163.
[4] Carmi, G. & Bouhnik, D. (2016). Functional Analysis of Applications for Data Security and for Surfing Privacy Protection in the Internet. International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC) ISSN: 2321-8169, 201-208, 4(7).
[5] Gafni, R., &Nissim, D. (2014). To Social Login or not Login? Exploring Factors Affecting the Decision. Issues in Informing Science and Information Technology, 11, 57-72.
[6] Constantin, L. (2015). Worse than Superfish? Comodo-affiliated PrivDog compromises web security too. PC World. Retrieved from:
[7] Grysiuk, M., C.I.P. (2015). The cookie trail: Why IG pros must follow the crumbs. Information Management, 49(2), 24-28,47. Retrieved from
[8] Hormozi, A. M. (2005). Cookies and privacy. EDPACS, 32(9), 1-13.
[9] Leon, P., Ur, B., Shay, R., Wang, Y., Balebako, R., &Cranor, L. (2012, May). Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 589-598).ACM.
[10] Mansfield-Devine, S. (2014). The dark side of advertising. Computer Fraud & Security, 2014(11), 5-8.
[11] Marella, A., Pan, C., Hu, Z., Schaub, F., Ur, B., &Cranor, L. F. (2014) Assessing Privacy Awareness from Browser Plugins. Retrieved from
[12] Mayer, J. R., & Mitchell, J. C. (2012). Third-party web tracking: Policy and technology. In Security and Privacy (SP), 2012 IEEE Symposium on (pp. 413-427).
[13] Shneiderman, Ben. Designing the User Interface: Strategies for Effective Human–Computer Interaction, 1st edition. Addison-Wesley, 1986; 2nd ed. 1992; 3rd ed. 1998; 4th ed. 2005; 5th ed. 2010; 6th ed., 2016.
[14] Shwartz-Altshuler, T., Ed. (2012). Privacy in Era of Changes. Jerusalem. Grapus Print [Hebrew].


Ghostery, Interface Application.