skip to main content
10.1145/1837110.1837125acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Folk models of home computer security

Published:14 July 2010Publication History

ABSTRACT

Home computer systems are insecure because they are administered by untrained users. The rise of botnets has amplified this problem; attackers compromise these computers, aggregate them, and use the resulting network to attack third parties. Despite a large security industry that provides software and advice, home computer users remain vulnerable. I identify eight 'folk models' of security threats that are used by home computer users to decide what security software to use, and which expert security advice to follow: four conceptualizations of 'viruses' and other malware, and four conceptualizations of 'hackers' that break into computers. I illustrate how these models are used to justify ignoring expert security advice. Finally, I describe one reason why botnets are so difficult to eliminate: they cleverly take advantage of gaps in these models so that many home computer users do not take steps to protect against them.

References

  1. A. Adams and M. A. Sasse. Users are not the enemy. Communications of the ACM, 42(12):40--46, December 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Anderson. Why cryptosystems fail. In CCS '93: Proceedings of the 1st ACM conference on Computer and communications security, pages 215--227. ACM Press, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F. Asgharpour, D. Liu, and L. J. Camp. Mental models of computer security risks. In Workshop on the Economics of Information Security (WEIS), 2007.Google ScholarGoogle Scholar
  4. P. Bacher, T. Holz, M. Kotter, and G. Wicherski. Know your enemy: Tracking botnets. from the Honeynet Project, March 2005.Google ScholarGoogle Scholar
  5. P. Barford and V. Yegneswaran. An inside look at botnets. In Special Workshop on Malware Detection, Advances in Information Security. Springer-Verlag, 2006.Google ScholarGoogle Scholar
  6. J. L. Camp. Mental models of privacy and security. Available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=922735, August 2006.Google ScholarGoogle Scholar
  7. L. J. Camp and C. Wolfram. Pricing security. In Proceedings of the Information Survivability Workshop, 2000.Google ScholarGoogle Scholar
  8. A. Collins and D. Gentner. How people construct mental models. In D. Holland and N. Quinn, editors, Cultural Models in Language and Thought. Cambridge University Press, 1987.Google ScholarGoogle ScholarCross RefCross Ref
  9. R. Contu and M. Cheung. Market share: Security market, worldwide 2008. Gartner Report: http://www.gartner.com/it/page.jsp?id=1031712, June 2009.Google ScholarGoogle Scholar
  10. L. F. Cranor. A framework for reasoning about the human in the loop. In Usability, Psychology, and Security Workshop. USENIX, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. D'Andrade. The Development of Cognitive Anthropology. Cambridge University Press, 2005.Google ScholarGoogle Scholar
  12. P. Dourish, R. Grinter, J. D. de la Flor, and M. Joseph. Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6):391--401, November 2004. Google ScholarGoogle ScholarCross RefCross Ref
  13. D. M. Downs, I. Ademaj, and A. M. Schuck. Internet security: Who is leaving the 'virtual door' open and why? First Monday, 14(1--5), January 2009.Google ScholarGoogle Scholar
  14. R. E. Grinter, W. K. Edwards, M. W. Newman, and N. Ducheneaut. The work to make a home network work. In Proceedings of the 9th European Conference on Computer Supported Cooperative Work (ECSCW '05), pages 469--488, September 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Gross and M. B. Rosson. Looking for trouble: Understanding end user security management. In Symposium on Computer Human Interaction for the Management of Information Technology (CHIMIT), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Herley. So long, and no thanks for all the externalities: The rational rejection of security advice by users. In Proceedings of the New Security Paradigms Workshop (NSPW), September 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Johnson-Laird, V. Girotto, and P. Legrenzi. Mental models: a gentle guide for outsiders. Available at http://www.si.umich.edu/ICOS/gentleintro.html, 1998.Google ScholarGoogle Scholar
  18. P. N. Johnson-Laird. Mental models in cognitive science. Cognitive Science: A Multidisciplinary Journal, 4(1):71--115, 1980.Google ScholarGoogle ScholarCross RefCross Ref
  19. W. Kempton. Two theories of home heat control. Cognitive Science: A Multidisciplinary Journal, 10(1):75--90, 1986.Google ScholarGoogle ScholarCross RefCross Ref
  20. A. J. Kuzel. Sampling in qualitative inquiry. In B. Crabtree and W. L. Miller, editors, Doing Qualitative Research, chapter 2, pages 31--44. Sage Publications, Inc., 1992.Google ScholarGoogle Scholar
  21. J. Markoff. Attack of the zombie computers is a growing threat, experts say. New York Times, January 7 2007.Google ScholarGoogle Scholar
  22. D. Medin, N. Ross, S. Atran, D. Cox, J. Coley, J. Proffitt, and S. Blok. Folkbiology of freshwater fish. Cognition, 99(3):237--273, April 2006.Google ScholarGoogle ScholarCross RefCross Ref
  23. M. B. Miles and M. Huberman. Qualitative Data Analysis: An Expanded Sourcebook. Sage Publications, Inc., 2nd edition edition, 1994. MilesHuberman 1994.Google ScholarGoogle Scholar
  24. A. J. Onwuegbuzie and N. L. Leech. Validity and qualitative research: An oxymoron? Quality and Quantity, 41:233--249, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  25. D. Russell, S. Card, P. Pirolli, and M. Stefik. The cost structure of sensemaking. In Proceedings of the INTERACT '93 and CHI '93 conference on Human factors in computing system, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Trend Micro. Taxonomy of botnet threats. Whitepaper, November 2006.Google ScholarGoogle Scholar

Index Terms

  1. Folk models of home computer security

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security
          July 2010
          236 pages
          ISBN:9781450302647
          DOI:10.1145/1837110

          Copyright © 2010 Copyright is held by the author/owner.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 July 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of49submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader