skip to main content
10.1145/2858036.2858265acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
note
Public Access
Honorable Mention

Behavior Ever Follows Intention?: A Validation of the Security Behavior Intentions Scale (SeBIS)

Authors Info & Claims
Published:07 May 2016Publication History

ABSTRACT

The Security Behavior Intentions Scale (SeBIS) measures the computer security attitudes of end-users. Because intentions are a prerequisite for planned behavior, the scale could therefore be useful for predicting users' computer security behaviors. We performed three experiments to identify correlations between each of SeBIS's four sub-scales and relevant computer security behaviors. We found that testing high on the awareness sub-scale correlated with correctly identifying a phishing website; testing high on the passwords sub-scale correlated with creating passwords that could not be quickly cracked; testing high on the updating sub-scale correlated with applying software updates; and testing high on the securement sub-scale correlated with smartphone lock screen usage (e.g., PINs). Our results indicate that SeBIS predicts certain computer security behaviors and that it is a reliable and valid tool that should be used in future research.

References

  1. A. Acquisti and R. Gross. 2006. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In Privacy Enhancing Technologies Workshop (PET '06) (Lecture Notes in Computer Science), Vol. 4258. Springer-Verlag, Berlin / Heidelberg, Germany, 36--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Icek Ajzen. 1991. The theory of planned behavior. Organizational behavior and human decision processes 50, 2 (1991), 179--211.Google ScholarGoogle Scholar
  3. Tom Buchanan, Carina Paine, Adam N Joinson, and Ulf-Dietrich Reips. 2007. Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology 58, 2 (2007), 157--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Serge Egelman and Eyal Peer. 2015. Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 2873--2882. DOI: http://dx.doi.org/10.1145/2702123.2702249 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Serge Egelman, Janice Tsai, Lorrie Faith Cranor, and Alessandro Acquisti. 2009. Timing is Everything?: The Effects of Timing and Placement of Online Privacy Indicators. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '09). ACM, New York, NY, USA, 319--328. DOI: http://dx.doi.org/10.1145/1518701.1518752 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ponnurangam Kumaraguru and Lorrie Faith Cranor. December, 2005. Privacy Indexes: A Survey of Westin's Studies. Technical Report Carnegie Mellon University-ISRI-5--138. Carnegie Mellon University. http://reports-archive.adm.cs. cmu.edu/anon/isri2005/abstracts/05--138.html.Google ScholarGoogle Scholar
  7. Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet Users' Information Privacy Concerns (IUIPC): The Construct, The Scale, and A Causal Model. Information Systems Research 15, 4 (December 2004), 336--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Anandatirtha Nandugudi, Anudipa Maiti, Taeyeon Ki, Fatih Bulut, Murat Demirbas, Tevfik Kosar, Chunming Qiao, Steven Y. Ko, and Geoffrey Challen. 2013. PhoneLab: A Large Programmable Smartphone Testbed. In Proceedings of First International Workshop on Sensing and Big Data Mining (SENSEMINE'13). ACM, New York, NY, USA, Article 4, 6 pages. DOI: http://dx.doi.org/10.1145/2536714.2536718 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Donald A. Norman. 1986. Cognitive Engineering. In User Centered System Design: New Perspectives on Human-Computer Interaction, Donald A. Norman and Stephen W. Draper (Eds.). Lawrence Erlbaum Associates, London, Chapter 3, 31--62.Google ScholarGoogle Scholar
  10. Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior Research Methods 46, 4 (December 2014), 1023--1031.Google ScholarGoogle ScholarCross RefCross Ref
  11. Sören Preibusch. 2013. Guide to Measuring Privacy Concern: Review of Survey and Observational Instruments. International Journal of Human-Computer Studies 71, 12 (Dec. 2013), 1133--1143. DOI: http://dx.doi.org/10.1016/j.ijhcs.2013.09.002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, and Richard Shay. 2015. Measuring Real-World Accuracies and Biases in Modeling Password Guessability. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 463--481. https: //www.usenix.org/conference/usenixsecurity15/ technical-sessions/presentation/ur Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Behavior Ever Follows Intention?: A Validation of the Security Behavior Intentions Scale (SeBIS)

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems
          May 2016
          6108 pages
          ISBN:9781450333627
          DOI:10.1145/2858036

          Copyright © 2016 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 May 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • note

          Acceptance Rates

          CHI '16 Paper Acceptance Rate565of2,435submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

          Upcoming Conference

          CHI '24
          CHI Conference on Human Factors in Computing Systems
          May 11 - 16, 2024
          Honolulu , HI , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader