(What is PGP? Or two-factor authentication?)
(Who would want to "hack" me?)
(How would I encrypt e-mail, anyway?)
Introduction
Introduction
Introduction
Introduction
Research Questions
Research Questions > Q1
Research Questions > Q2
Method
Method > Demographics
Method > Semi-Structured Interview
Method > Semi-Structured Interview
Finding 1: Behaviors
Finding 1: Behaviors
Finding 1: Behaviors > Social Triggers
Finding 1: Behaviors > Social Triggers
“When I first had a smartphone I didn’t have a code, but then I started using one because everyone around me I guess had a code so I kind of felt a group pressure to also use a code.”—(P6, Male, 29, Programmer)
Finding 1: Behaviors > Social Triggers
“Diversification of passwords. I had the same password for every service so I wanted to pick a stronger password”—(P6, Male, 29, Programmer)
Finding 1: Behaviors > Social Triggers
Finding 1: Behaviors > Social Triggers
Finding 1: Behaviors > Social Triggers > Observing Friends
“My mother had an iPhone before I did, and she always had the block on hers… I think just because I saw her doing it, it kind of just felt like it was something I had to do too.”—(P3, Female, 22, English Student)
Finding 1: Behaviors > Social Triggers > Observing Friends
“So when I was an undergrad I’ve been using it since then. And this four digit PIN everybody started using it and it was a hype."—(P14, Male, 24, IT Graduate Student)
Finding 1: Behaviors > Social Triggers > Observing Friends
Finding 1: Behaviors > Social Triggers > Observing Friends
Demonstrations of insecure behavior by friends and loved ones.
Finding 1: Behaviors > Social Triggers > Pranks and Demonstrations
“If I walk out of the room my friends just put up a funny status...or even just look through my messages or something like that... But once that happens, I usually change my password immediately”—(P19, Male, 20, Anthropology student)
Finding 1: Behaviors > Social Triggers > Pranks and Demonstrations
Finding 1: Behaviors > Social Triggers > Pranks and Demonstrations
Finding 1: Behaviors > Summary
Finding 1: Behaviors > Summary
Finding 1: Behaviors > Summary
“That’s one thing I will never talk about.”—(P11, Male, 54, Chef)
Finding 1: Behaviors > Summary
“It depends on the context. It does become a boring subject.”—(P9, Male, 30, Programmer)
Finding 1: Behaviors > Summary
Finding 1: Behaviors > Summary
Finding 2: Communications
Conversations focused on raising awareness of a threat that comes into the attention of the conversation initiator.
Finding 2: Communications > Warnings
Finding 2: Communications > Warnings > Targeted Warnings
“I was having a conversation with somebody and they were saying, ‘Don’t you have your passcode on there anymore?’ And I said, ‘No, it’s a pain in the butt.’ And they said, ‘Well, it’d probably be a good idea especially if you like leave it lay around on your desk or something like that…’” (P7, Female, 54, Admin. Assistant)
Finding 2: Communications > Warnings > Targeted Warnings
Conversations focused on sharing specific information about good security behaviors to solve an immediate problem or avoid a future threat.
Finding 2: Communications > Teachings
Finding 2: Communications > Teachings > Social Learning
“One of my co-workers told me about the whole algorithm thing...it just helps you I guess have different passwords...I guess you can...change your algorithm, depending on I guess what you want to be in it. But, ever since, I started using it.”—(P18, male, 22 years old)
Finding 2: Communications > Teachings > Social Learning
Finding 2: Communications > Summary
Finding 2: Communications > Summary
Finding 2: Communications > Summary
Finding 2: Communications > Summary
Finding 2: Communications > Summary
Conclusion > Take-Aways
Conclusion > Take-Aways
Conclusion > Take-Aways
Conclusion > Take-Aways
Finding 3: Observability
Finding 3: Observability
2. Conversations about security and privacy are rare, but when they occur, they are primarily to warn or to teach.
3. The observability of security tool usage is a key enabler of socially triggered behavior change and conversation.
“When I was interning…one of my friends and a fellow intern came to my desk and just unlocked my phone. I was surprised...He put it against the sunlight and he saw I guess the smudges my finger left. He just followed the direction. Yeah, he had access to my phone.” —(P18, Male, 20, Engineering student)
Finding 1: Behaviors > Social Triggers > Pranks and Demonstrations