skip to main content
10.1145/2976749.2978307acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior

Published:24 October 2016Publication History

ABSTRACT

Few users have a single, authoritative, source from whom they can request digital-security advice. Rather, digital-security skills are often learned haphazardly, as users filter through an overwhelming quantity of security advice. By understanding the factors that contribute to users' advice sources, beliefs, and security behaviors, we can help to pare down the quantity and improve the quality of advice provided to users, streamlining the process of learning key behaviors. This paper rigorously investigates how users' security beliefs, knowledge, and demographics correlate with their sources of security advice, and how all these factors influence security behaviors. Using a carefully pre-tested, U.S.-census-representative survey of 526 users, we present an overview of the prevalence of respondents' advice sources, reasons for accepting and rejecting advice from those sources, and the impact of these sources and demographic factors on security behavior. We find evidence of a "digital divide" in security: the advice sources of users with higher skill levels and socioeconomic status differ from those with fewer resources. This digital security divide may add to the vulnerability of already disadvantaged users. Additionally, we confirm and extend results from prior small-sample studies about why users accept certain digital-security advice (e.g., because they trust the source rather than the content) and reject other advice (e.g., because it is inconvenient and because it contains too much marketing material). We conclude with recommendations for combating the digital divide and improving the efficacy of digital-security advice.

References

  1. Microsoft safety and security center.Google ScholarGoogle Scholar
  2. US-CERT:Tips.Google ScholarGoogle Scholar
  3. American community survey 5-year estimates, 2014.Google ScholarGoogle Scholar
  4. Adams, A., and Sasse, M. A. Users are not the enemy.Google ScholarGoogle Scholar
  5. Akaike, H. A new look at the statistical model identification.Google ScholarGoogle Scholar
  6. Akhawe, D., and Felt, A. P. Alice in warningland: A large-scale field study of browser security warning effectiveness. In USENIX Sec. (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Arachchilage, N. A. G., and Love, S. A game design framework for avoiding phishing attacks. Comput. Hum. Behav. (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Baker, R., Blumberg, S., and et al. AAPOR report on online panels. The Public Opinion Quarterly (2010).Google ScholarGoogle Scholar
  9. Beautement, A., Sasse, M. A., and Wonham, M. The compliance budget: Managing security behaviour in organisations. In workshop on new security paradigms (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bravo-Lillo, C., Komanduri, S., Cranor, L. F., Reeder, R. W., Sleeper, M., Downs, J., and Schechter, S. Your attention please: Designing security-decision UIs to make genuine risks harder to ignore. In SOUPS (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ciampa, M. A comparison of password feedback mechanisms and their impact on password entropy. Information Management & Computer Security (2013).Google ScholarGoogle Scholar
  12. D., B., K., L., and A., A. The Networked Nature of Algorithmic Discrimination. Data and Discrimination: Collected Essays.Google ScholarGoogle Scholar
  13. Das, S., Kim, T. H., Dabbish, L., and Hong, J. The effect of social influence on security sensitivity. In SOUPS (2014).Google ScholarGoogle Scholar
  14. Das, S., Kramer, A. D., Dabbish, L. A., and Hong, J. I. Increasing security sensitivity with social proof: A large-scale experimental confirmation. In CCS (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. DeMaio, T. J., Rothgeb, J., and Hess, J. Improving survey quality through pretesting. U.S. Bureau of the Census (2003).Google ScholarGoogle Scholar
  16. Egelman, S., Cranor, L. F., and Hong, J. You've been warned: An empirical study of the effectiveness of web browser phishing warnings. In CHI (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Egelman, S., and Peer, E. Scaling the security wall: Developing a security behavior intentions scale (sebis). In CHI (2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. F.R.S., K. P. X. on the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. Philosophical Magazine Series 5 (1900).Google ScholarGoogle Scholar
  19. Fujita, M., Yamada, M., Arimura, S., Ikeya, Y., and Nishigaki, M. An attempt to memorize strong passwords while playing games. In NBIS (2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Furman, S. M., Theofanos, M. F., Choong, Y.-Y., and Stanton, B. Basing cybersecurity training on user perceptions. IEEE S&P (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Furnell, S., Bryant, P., and Phippen, A. Assessing the security perceptions of personal internet users. Computers & Security (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Garg, V., Camp, L. J., Connelly, K., and Lorenzen-Huber, L. Risk communication design: Video vs. text. In PETS (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Halevi, T., Lewis, J., and Memon, N. A pilot study of cyber security and privacy related behavior and personality traits. In WWW (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Hargittai, E. Second-level digital divide: Mapping differences in people's online skills. First Monday (2002).Google ScholarGoogle Scholar
  25. Hargittai, E. The Digital Divide and What to Do About It. 2003, pp. 822--841.Google ScholarGoogle Scholar
  26. Hargittai, E., and Hsieh, Y. P. Succinct survey measures of web-use skills. Soc. Sci. Comput. Rev. (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Herley, C. So long, and no thanks for the externalities: The rational rejection of security advice by users. In NPSW (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Herley, C. More is not the answer. IEEE Security & Privacy magazine (2014).Google ScholarGoogle ScholarCross RefCross Ref
  29. Hinyard, L. J., and Kreuter, M. W. Using narrative communication as a tool for health behavior change: a conceptual, theoretical, and empirical overview. Health Educ Behav (2007).Google ScholarGoogle Scholar
  30. Hosmer, D. W., and Lemeshow, S. Applied logistic regression. 2000.Google ScholarGoogle ScholarCross RefCross Ref
  31. Howe, A. E., Ray, I., Roberts, M., Urbanska, M., and Byrne, Z. The psychology of security for the home computer user. In IEEE S&P (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Hu, X. Assessing source credibility on social media-- An electronic word-of-mouth communication perspective. PhD thesis, Bowling Green State University, 2015.Google ScholarGoogle Scholar
  33. Ion, I., Reeder, R., and Consolvo, S. "...no one can hack my mind": Comparing expert and non-expert security practices. In SOUPS (2015).Google ScholarGoogle Scholar
  34. Ipeirotis, P. Demographics of mechanical turk. NYU Center for Digital Economy (2010).Google ScholarGoogle Scholar
  35. Jerome, J. Buying and Selling Privacy: Big Data's Different Burdens and Benefits. Stanford Law Review (2013).Google ScholarGoogle Scholar
  36. Kang, M. Measuring social media credibility: A study on a measure of blog credibility. Institute for Public Relations (2009).Google ScholarGoogle Scholar
  37. Kang, R., Brown, S., Dabbish, L., and Kiesler, S. Privacy attitudes of mechanical turk workers and the u.s. public. In SOUPS (2014).Google ScholarGoogle Scholar
  38. Kelley, T., and Bertenthal, B. I. Attention and past behavior, not security knowledge, modulate users' decisions to login to insecure websites. Information and Computer Security (2016).Google ScholarGoogle Scholar
  39. Kentaro Toyama, A. R. Kelsa+: Digital literacy for low-income office workers. In International Conference on Information and Communication Technologies and Development (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Krosnick, J. A. The threat of satisficing in surveys: the shortcuts respondents take in answering questions. Survey Methods Centre Newsletter, 2000.Google ScholarGoogle Scholar
  41. Krosnick, J. A. Handbook of Survey Research. 2010.Google ScholarGoogle Scholar
  42. Lin, E., Greenberg, S., Trotter, E., Ma, D., and Aycock, J. Does domain highlighting help people identify phishing sites? In CHI (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Mann, H. B., and Whitney, D. R. On a test of whether one of two random variables is stochastically larger than the other. Ann. Math. Statist. (1947).Google ScholarGoogle Scholar
  44. Nappa, A., Johnson, R., Bilge, L., Caballero, J., and Dumitras, T. The attack of the clones: A study of the impact of shared code on vulnerability patching. In IEEE S&P (2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Poole, E. S., Chetty, M., Morgan, T., Grinter, R. E., and Edwards, W. K. Computer help at home: Methods and motivations for informal technical support. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Presser, S., Couper, M. P., Lessler, J. T., Martin, E., Martin, J., Rothgeb, J. M., and Singer, E. Methods for testing and evaluating survey questions. Public Opinion Quarterly (2004).Google ScholarGoogle ScholarCross RefCross Ref
  47. Rader, E., and Wash, R. Identifying patterns in informal sources of security information. J. Cybersecurity (2015).Google ScholarGoogle Scholar
  48. Rader, E., Wash, R., and Brooks, B. Stories as informal lessons about security. In SOUPS (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Redmiles, E., Malone, A. R., and Mazurek, M. L. How i learned to be secure: Advice sources and selection in digital security. In IEEE S&P (2016).Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Rice, R. E. Influences, usage, and outcomes of internet health information searching: Multivariate results from the pew surveys. International J. Medical Informatics (2006). Health and the Internet for All.Google ScholarGoogle ScholarCross RefCross Ref
  51. Robila, S. A., and Ragucci, J. W. Don't be a phish: Steps in user education. In SIGCSE (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Ross, J., Irani, L., Silberman, M. S., Zaldivar, A., and Tomlinson, B. Who are the crowdworkers?: Shifting demographics in mechanical turk. In CHI (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Schaeffer, N. C., and Presser, S. The science of asking questions. Annual Review of Sociology (2003).Google ScholarGoogle Scholar
  54. Schechter, S., and Bonneau, J. Learning assigned secrets for unlocking mobile devices. In SOUPS (2015).Google ScholarGoogle Scholar
  55. Schechter, S. E., Dhamija, R., Ozment, A., and Fischer, I. The Emperor's New Security Indicators. IEEE S&P (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., and Downs, J. Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions. In CHI (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L. F., Hong, J., and Nunge, E. Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish. In SOUPS (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Siciliano, R. 17 percent of pcs are exposed.Google ScholarGoogle Scholar
  59. Smith, S. 4 ways to ensure valid responses for your online survey. Qualtrics.Google ScholarGoogle Scholar
  60. Sole, D., and Wilson, D. G. Storytelling in Organizations : The power and traps of using stories to share knowledge in organizations. Training and Development (1999).Google ScholarGoogle Scholar
  61. Stanley, L. D. Beyond access: Psychosocial barriers to computer literacy special issue: Icts and community networking. The Information Society (2003).Google ScholarGoogle ScholarCross RefCross Ref
  62. Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., and Cranor, L. F. Crying wolf: An empirical study of ssl warning effectiveness. In USENIX Sec. (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Tourangeau, R., and Yan, T. Sensitive Questions in Surveys. Psychological Bulletin (2007).Google ScholarGoogle Scholar
  64. Ur, B., Kelley, P. G., Komanduri, S., Lee, J., Maass, M., Mazurek, M. L., Passaro, T., Shay, R., Vidas, T., Bauer, L., Christin, N., and Cranor, L. F. How does your password measure up? the effect of strength meters on password creation. In USENIX Sec. (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. van Dijk, J., and Hacker, K. The digital divide as a complex and dynamic phenomenon. The Information Society (2003).Google ScholarGoogle ScholarCross RefCross Ref
  66. Wash, R. Folk models of home computer security. In SOUPS (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Wash, R., and Rader, E. Too much knowledge? security beliefs and protective behaviors among united states internet users. In SOUPS (2015).Google ScholarGoogle Scholar
  68. Whitman, M. E. Enemy at the gate: Threats to information security. Commun. ACM (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Willis, G. B. Cognitive Interviewing: A Tool for Improving Questionnaire Design. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  70. Wu, M., Miller, R. C., and Garfinkel, S. L. Do security toolbars actually prevent phishing attacks? In CHI (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Yuan, M., and Lin, Y. Model selection and estimation in regression with grouped variables. J. Royal Statistical Society (2006).Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
        October 2016
        1924 pages
        ISBN:9781450341394
        DOI:10.1145/2976749

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 24 October 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCS '16 Paper Acceptance Rate137of831submissions,16%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader