skip to main content
10.1145/2335356.2335364acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Stories as informal lessons about security

Published:11 July 2012Publication History

ABSTRACT

Non-expert computer users regularly need to make security-relevant decisions; however, these decisions tend not to be particularly good or sophisticated. Nevertheless, their choices are not random. Where does the information come from that these non-experts base their decisions upon? We argue that much of this information comes from stories they hear from other people. We conducted a survey to ask open- and closed- ended questions about security stories people hear from others. We found that most people have learned lessons from stories about security incidents informally from family and friends. These stories impact the way people think about security, and their subsequent behavior when making security-relevant decisions. In addition, many people retell these stories to others, indicating that a single story has the potential to influence multiple people. Understanding how non-experts learn from stories, and what kinds of stories they learn from, can help us figure out new methods for helping these people make better security decisions.

References

  1. Microsoft Security: The Latest in Computer Security. http://www.microsoft.com/security/default.aspx.Google ScholarGoogle Scholar
  2. Symantec Internet Security Threat Report: Trends for January 06--June 06. Technical report, Symantec, 2006.Google ScholarGoogle Scholar
  3. I. Ajzen. The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50:179--211, 1991.Google ScholarGoogle ScholarCross RefCross Ref
  4. E. Albrechtsen and J. Hovden. Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers & Security, 29(4):432--445, June 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Anderson. Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions. Citeseer, 34(3):613--643, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Asgharpour, D. Liu, and L. Camp. Mental models of computer security risks. In Workshop on the Economics of Information Security (WEIS), 2007.Google ScholarGoogle Scholar
  7. R. F. Baumeister, L. Zhang, and K. D. Vohs. Gossip as Cultural Learning. Review of General Psychology, 8(2):111--121, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  8. J. Bruner. The narrative construction of reality. Critical inquiry, 18(1):1--21, 1991.Google ScholarGoogle ScholarCross RefCross Ref
  9. R. B. Cialdini. Influence: Science and Practice. Prentice Hall, 5th edition, 2008.Google ScholarGoogle Scholar
  10. L. F. Cranor. A Framework for Reasoning About the Human in the Loop. In Proceedings of the 1st Conference on Usability, Psychology, and Security (UPSec), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. N. F. Doherty, L. Anastasakis, and H. Fulford. The information security policy unpacked: A critical study of the content of university policies. International Journal of Information Management, 29(6):449--457, Dec. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. Dourish, R. E. Grinter, J. Delgado De La Flor, and M. Joseph. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6):391--401, Sept. 2004. Google ScholarGoogle ScholarCross RefCross Ref
  13. S. Furnell, P. Bryant, and A. Phippen. Assessing the security perceptions of personal Internet users. Computers & Security, 26(5):410--417, Aug. 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. J. Goldstein, R. B. Cialdini, and V. Griskevicius. A Room with a Viewpoint: Using Social Norms to Motivate Environmental Conservation in Hotels. Journal of Consumer Research, 35(3):472--482, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  15. J. Gross and M. Rosson. Looking for Trouble: Understanding End-User Security Management. In Proceedings of the 2007 Symposium on Computer Human interaction For the Management of information Technology, pages 30--31, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Heath, C. Bell, and E. Steinberg. Emotional Selection in Memes: The Case of Urban Legends. Journal of Personality, 81(6):1028--1041, 2001.Google ScholarGoogle Scholar
  17. C. Herley. So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users. In NSPW '09 Proceedings of the 2009 New Security Paradigms Workshop, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Johnson-Laird, V. Girotto, and P. Legrenzi. Mental Models: A Gentle Guide for Outsiders, 1998. http://icos.groups.si.umich.edu/gentleintro.html.Google ScholarGoogle Scholar
  19. R. Kay and S. Loverock. Assessing emotions related to learning new software: The computer emotion scale. Computers in Human Behavior, 24(4):1605--1623, July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. N. Kumar, K. Mohan, and R. Holowczak. Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls. Decision Support Systems, 46(1):254--264, Dec. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. F. T. McAndrew and M. A. Milenkovic. Of Tabloids and Family Secrets: The Evolutionary Psychology of Gossip. Journal of Applied Social Psychology, 32(5):1064--1082, May 2002.Google ScholarGoogle ScholarCross RefCross Ref
  22. K. Peters, Y. Kashima, and A. Clark. Talking about others: Emotionality and the dissemination of social information. European Journal of Social Psychology, 39(2):207--222, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  23. L. Steg. Promoting household energy conservation. Energy Policy, 36(12):4449--4453, Dec. 2008.Google ScholarGoogle ScholarCross RefCross Ref
  24. US Census. Current Population Survey, Computer Use and Ownership Supplement, 2009. http://www.census.gov/population/www/socdemo/computer.html.Google ScholarGoogle Scholar
  25. R. Wash. Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security, pages 1--16. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. Workman, W. Bommer, and D. Straub. Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6):2799--2816, Sept. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. M. E. Zurko. User-Centered Security: Stepping Up to the Grand Challenge. In 21st Annual Computer Security Applications Conference (ACSAC'05), pages 187--202. Ieee, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Stories as informal lessons about security

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security
      July 2012
      216 pages
      ISBN:9781450315326
      DOI:10.1145/2335356

      Copyright © 2012 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 July 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate15of49submissions,31%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader