Proceedings of the Eighth Symposium on Usable Privacy and Security 2012
DOI: 10.1145/2335356.2335364
|View full text |Cite
|
Sign up to set email alerts
|

Stories as informal lessons about security

Abstract: Non-expert computer users regularly need to make securityrelevant decisions; however, these decisions tend not to be particularly good or sophisticated. Nevertheless, their choices are not random. Where does the information come from that these non-experts base their decisions upon? We argue that much of this information comes from stories they hear from other people. We conducted a survey to ask open-and closed-ended questions about security stories people hear from others. We found that most people have lear… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

7
67
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 123 publications
(80 citation statements)
references
References 23 publications
7
67
2
Order By: Relevance
“…To the extent that security awareness and corresponding mitigation strategies are contingent on stories exchanged in communities [63], the exposure of a homogenous community would be lower. While it is difficult to test this relationship on a country level, it may be possible by looking at indicators of income inequality, e.g., GINI index.…”
Section: Availabilitymentioning
confidence: 99%
“…To the extent that security awareness and corresponding mitigation strategies are contingent on stories exchanged in communities [63], the exposure of a homogenous community would be lower. While it is difficult to test this relationship on a country level, it may be possible by looking at indicators of income inequality, e.g., GINI index.…”
Section: Availabilitymentioning
confidence: 99%
“…However, individuals may not be aware of these resources, or know where to look for information about an emergent threat, leaving many individuals to rely on hearsay [5]. Using search engines to find help is often challenging.…”
Section: Strength and Weakness Of Individual Sourcesmentioning
confidence: 99%
“…Media, government, businesses, educational institutions, and non-profit organizations offer everything from breaking news to advanced technical training. Friends and family who may know more about technology offer advice or stories about experiences with security violations [5]. Even though all these groups have the same general goal of helping individuals improve their online safety habits, little is known how different sources affect security beliefs and behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, dialogue implies: (i) openness and creativity in how we engage with others; (ii) responsiveness to another's needs, aspirations and concerns; (iii) actively listening and withholding judgment [43]. Storytelling is a common vehicle to engage someone in dialogue-indeed, recent research has even suggested the value of user storytelling in relation to security issues [28]. Considering these three facets and the notion of storytelling, we can see how an interview protocol that runs through a list of pre-determined questions is not dialogue.…”
Section: Experience-centered Design and Security And Privacymentioning
confidence: 99%
“…Storytelling is an important feature of experience-centered design, and there are already examples of using stories to elicit insights from users in relation to security and privacy (e.g. [28]). But we may also think about the ways technologies may be explicitly designed and deployed to provoke reaction and reflection upon personal practices.…”
Section: Probing Security and Privacy Experiencesmentioning
confidence: 99%