Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems 2018
DOI: 10.1145/3173574.3173575
|View full text |Cite
|
Sign up to set email alerts
|

Breaking! A Typology of Security and Privacy News and How It's Shared

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 14 publications
1
12
0
Order By: Relevance
“…These parents decided not to purchase smart cameras, avoided brands implicated in news of data breaches, or only used security cameras in public areas at home but not in children's bedrooms. In line with prior work that shows the influence of news coverage on people's security and privacy behaviors [20,21,112], parents in our study tended to be cautious about smart home devices and brands that were featured in news negatively, and considered them unsafe or untrustworthy. 4.4.6 Device characteristics.…”
Section: 44supporting
confidence: 84%
“…These parents decided not to purchase smart cameras, avoided brands implicated in news of data breaches, or only used security cameras in public areas at home but not in children's bedrooms. In line with prior work that shows the influence of news coverage on people's security and privacy behaviors [20,21,112], parents in our study tended to be cautious about smart home devices and brands that were featured in news negatively, and considered them unsafe or untrustworthy. 4.4.6 Device characteristics.…”
Section: 44supporting
confidence: 84%
“…For example, Terry started conversations about passwords with other grandparents in the school yard while waiting for grandchildren, while Ken raised it at the pub while with friends. This method appears to be one of the most effective for communicating with CyberCitizens and subsequently driving behaviour change, something which is not surprising given that we know that most people learn about cybersecurity in an opportunistic manner, rather than actively seeking information [13]. Terry's acquaintance changed a number of his passwords after three conversations in the school yard, while Ken's friends began to forward him potential scam emails.…”
Section: Opportunistic Information Sharingmentioning
confidence: 98%
“…It is important for older adults to feel safe when using online technologies. While cybersecurity protective information is typically not sought out by individuals [13], older adults may be more motivated to learn about protecting themselves due to their high fear of crime [15]. It is also well established that stress brought on by fear of cyberattacks engenders an emotion-focused coping response, which can lead to disengagement with cybersecurity behaviours [11] and/or lower interactions with online services.…”
Section: Cybersecurity Advocatesmentioning
confidence: 99%
“…Sauerwein1a et al compared public sources of security information [16]. Das et al studied how different users gain different information from security news [29]. Shillair and Meng compared the impact of different sources in changing users' security behaviours [17].…”
Section: Related Workmentioning
confidence: 99%