How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior

作者: Elissa M. Redmiles , Sean Kross , Michelle L. Mazurek

DOI: 10.1145/2976749.2978307

关键词: Computer securitySocioeconomic statusDigital divideVulnerability (computing)VulnerabilityComputer scienceInternet privacyFilter (software)Advice (complexity)Quality (business)Digital securityDisadvantaged

摘要: Few users have a single, authoritative, source from whom they can request digital-security advice. Rather, skills are often learned haphazardly, as filter through an overwhelming quantity of security By understanding the factors that contribute to users' advice sources, beliefs, and behaviors, we help pare down improve quality provided users, streamlining process learning key behaviors. This paper rigorously investigates how knowledge, demographics correlate with their sources advice, all these influence Using carefully pre-tested, U.S.-census-representative survey 526 present overview prevalence respondents' reasons for accepting rejecting those impact demographic on behavior. We find evidence "digital divide" in security: higher skill levels socioeconomic status differ fewer resources. digital divide may add vulnerability already disadvantaged users. Additionally, confirm extend results prior small-sample studies about why accept certain (e.g., because trust rather than content) reject other it is inconvenient contains too much marketing material). conclude recommendations combating improving efficacy

参考文章(65)
Vaibhav Garg, L. Jean Camp, Katherine Connelly, Lesa Lorenzen-Huber, Risk communication design: video vs. text privacy enhancing technologies. pp. 279- 298 ,(2012) , 10.1007/978-3-642-31680-7_15
Tzipora Halevi, James Lewis, Nasir Memon, A pilot study of cyber security and privacy related behavior and personality traits the web conference. pp. 737- 744 ,(2013) , 10.1145/2487788.2488034
Jennifer Hess, Theresa J. DeMaio, Jennifer Rothgeb, IMPROVING SURVEY QUALITY THROUGH PRETESTING ,(1998)
Laura A. Dabbish, Jason I. Hong, Tiffany Hyun-Jin Kim, Sauvik Das, The Effect of Social Influence on Security Sensitivity symposium on usable privacy and security. pp. 143- 157 ,(2014)
Iulia Ion, Sunny Consolvo, Rob Reeder, “...No one Can Hack My Mind”: Comparing Expert and Non-Expert Security Practices symposium on usable privacy and security. pp. 327- 346 ,(2015)
Antonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, Tudor Dumitras, The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching 2015 IEEE Symposium on Security and Privacy. pp. 692- 708 ,(2015) , 10.1109/SP.2015.48
Eszter Hargittai, The Digital Divide and What to Do About It New Economy Handbook. pp. 822- 841 ,(2003)
Lorrie Faith Cranor, Neha Atri, Joshua Sunshine, Hazim Almuhimedi, Serge Egelman, Crying wolf: an empirical study of SSL warning effectiveness usenix security symposium. pp. 399- 416 ,(2009)