The Effect of Social Influence on Security Sensitivity
Three barriers inhibiting lay people from using security and privacy tools:
They may not be aware of security threats or security tools.
(What is PGP? Or two-factor authentication?)
They may not be motivated to use these tools to protect themselves.
(Who would want to "hack" me?)
They may not have the knowledge to use security tools.
(How would I encrypt e-mail, anyway?)
In other words, they may have low security sensitivity.
We've tried hard to fix this in usable security.
What are we missing?
Core Observation
Introduction
We know that social influence is hugely important in the adoption of technology.
Introduction
We know that social influence can be powerfully effective at driving human behavior.
Introduction
Yet, we know little about how social processes affect security sensitivity.
Introduction
To explore this possibility, we set out to answer two questions:
Research Questions
Q1
What role does social influence play in security related behavior changes?
Research Questions > Q1
Q2
How and under what circumstances do people communicate about security and privacy?
Research Questions > Q2
To answer these questions, we conducted an interview study.
Method
We recruited:
Method > Demographics
For Q1, we asked about specific instances of security related behavior changes.
Method > Semi-Structured Interview
For Q2, we asked about specific conversations they had about privacy or security.
Method > Semi-Structured Interview
2 Major Findings
Finding 1
Social influence often triggered security related behavior changes by modulating security sensitivity.
Finding 1: Behaviors
Almost all of our participants made at least one change because of a social trigger.
Almost half of all security related changes were made because of a social trigger.
Finding 1: Behaviors
What is a social trigger?
Finding 1: Behaviors > Social Triggers
A social process that was explicitly stated to be the root of a behavior change.
Finding 1: Behaviors > Social Triggers
“When I first had a smartphone I didn’t have a code, but then I started using one because everyone around me I guess had a code so I kind of felt a group pressure to also use a code.”—(P6, Male, 29, Programmer)
Finding 1: Behaviors > Social Triggers
“Diversification of passwords. I had the same password for every service so I wanted to pick a stronger password”—(P6, Male, 29, Programmer)
Finding 1: Behaviors > Social Triggers
We found many distinct social triggers, each effective at modulating security sensitivity.
Finding 1: Behaviors > Social Triggers
Observing Friends
Finding 1: Behaviors > Social Triggers > Observing Friends
“My mother had an iPhone before I did, and she always had the block on hers… I think just because I saw her doing it, it kind of just felt like it was something I had to do too.”—(P3, Female, 22, English Student)
Finding 1: Behaviors > Social Triggers > Observing Friends
“So when I was an undergrad I’ve been using it since then. And this four digit PIN everybody started using it and it was a hype."—(P14, Male, 24, IT Graduate Student)
Finding 1: Behaviors > Social Triggers > Observing Friends
Observing Friends often raised awareness and motivation.
Related to the concept of "social proof"—we look to friends for cues on what to do.
Finding 1: Behaviors > Social Triggers > Observing Friends
Pranks and Demonstrations
Demonstrations of insecure behavior by friends and loved ones.
Finding 1: Behaviors > Social Triggers > Pranks and Demonstrations
“If I walk out of the room my friends just put up a funny status...or even just look through my messages or something like that... But once that happens, I usually change my password immediately”—(P19, Male, 20, Anthropology student)
Finding 1: Behaviors > Social Triggers > Pranks and Demonstrations
Pranks and demonstrations were very effective at raising motivation.
Finding 1: Behaviors > Social Triggers > Pranks and Demonstrations
Back to Q1: What role does social influence play in driving security behaviors?
Finding 1: Behaviors > Summary
Social processes play a pivotal role in modulating security sensitivity.
Finding 1: Behaviors > Summary
But, social triggers come from security related interactions or communications, which remain rare.
Finding 1: Behaviors > Summary
“That’s one thing I will never talk about.”—(P11, Male, 54, Chef)
Finding 1: Behaviors > Summary
“It depends on the context. It does become a boring subject.”—(P9, Male, 30, Programmer)
Finding 1: Behaviors > Summary
When do conversations about security or privacy actually occur?
Finding 1: Behaviors > Summary
Finding 2
People did not often communicate about security, but did so primarily to teach or to warn .
Finding 2: Communications
Warnings
Conversations focused on raising awareness of a threat that comes into the attention of the conversation initiator.
Finding 2: Communications > Warnings
Targeted Warnings
Finding 2: Communications > Warnings > Targeted Warnings
“I was having a conversation with somebody and they were saying, ‘Don’t you have your passcode on there anymore?’ And I said, ‘No, it’s a pain in the butt.’ And they said, ‘Well, it’d probably be a good idea especially if you like leave it lay around on your desk or something like that…’” (P7, Female, 54, Admin. Assistant)
Finding 2: Communications > Warnings > Targeted Warnings
Teachings
Conversations focused on sharing specific information about good security behaviors to solve an immediate problem or avoid a future threat.
Finding 2: Communications > Teachings
Social Learning
Finding 2: Communications > Teachings > Social Learning
“One of my co-workers told me about the whole algorithm thing...it just helps you I guess have different passwords...I guess you can...change your algorithm, depending on I guess what you want to be in it. But, ever since, I started using it.”—(P18, male, 22 years old)
Finding 2: Communications > Teachings > Social Learning
Back to Q2: Under what circumstances do people communicate about security and privacy?
Finding 2: Communications > Summary
People communicate about security and privacy to warn and to teach.
Finding 2: Communications > Summary
Thus, conversations about privacy and security tended to be educational experiences.
Finding 2: Communications > Summary
And, these educational conversations often led to heightened security sensitivity.
Finding 2: Communications > Summary
Observability was again a key driving force for security related conversations.
Finding 2: Communications > Summary
Discussion & Implications
3 Take-Aways
Conclusion > Take-Aways
1. Social processes play a pivotal role in modulating security sensitivity and triggering security related behavior change.
Conclusion > Take-Aways
2. Conversations about security and privacy are rare, but when they occur, they are primarily to warn or to teach.
Conclusion > Take-Aways
3. The observability of security tool usage is a key enabler of socially triggered behavior change and conversation.
Conclusion > Take-Aways
Unfortunately, security and privacy tools are markedly unobservable (often intentionally).
Finding 3: Observability
People have little social proof that security is important, and thus has little incentive to care about security.
Finding 3: Observability
Acknowledgements
Food for Thought
2. Conversations about security and privacy are rare, but when they occur, they are primarily to warn or to teach.
3. The observability of security tool usage is a key enabler of socially triggered behavior change and conversation.
“When I was interning…one of my friends and a fellow intern came to my desk and just unlocked my phone. I was surprised...He put it against the sunlight and he saw I guess the smudges my finger left. He just followed the direction. Yeah, he had access to my phone.” —(P18, Male, 20, Engineering student)
Finding 1: Behaviors > Social Triggers > Pranks and Demonstrations
Extra Slides
We've made learning about security more interesting and accessible to raise awareness.
We've built faster, cooler, and flashier security tools to increase motivation.
We've reduced the knowledge barrier by making security tools usable.
15 years ago, we learned that Johnny couldn't encrypt...
And we were shocked.
And confused.
And, just, sad.
We've used this understanding to do better.
But security sensitivity is still low.
Abbreviated The Effect of social influence on security sensitivity
By Sauvik Das
Abbreviated The Effect of social influence on security sensitivity
- 236