Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1785594.1785641guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Mental models of security risks

Published: 12 February 2007 Publication History

Abstract

In computer security, risk communication refers to informing computer users about the likelihood and magnitude of a threat. Efficacy of risk communication depends not only on the nature of the risk, but also on the alignment between the conceptual model embedded in the risk communication and the user's mental model of the risk. The gap between the mental models of security experts and non-experts could lead to ineffective risk communication. Our research shows that for a variety of the security risks self-identified security experts and non-experts have different mental models. We propose that the design of the risk communication methods should be based on the non-expert mental models.

References

[1]
Morgan, M.G., Fischhoff, B., Bostrom, A., Atman, C.J.: Risk Communication: A Mental Models Approach. Cambridge University Press, Cambridge (2001)
[2]
Ronnfeldt, C.F.: Three Generations of Environment and Security. Journal of Peace Research 34(4), 473-482 (1997)
[3]
Jungermann, H., Schutz, H., Thuring, M.: Mental models in risk assessment: Informing people about drugs. In: Risk Analysis, Blackwell, Oxford (1981)
[4]
Kumaraguru, P., Cranor, L.F., Newton, E.: Privacy Perceptions in India and the United States: An Interview Study. In: 33rd Research Conference on Communication, The National Center for Technology & Law, George Mason University School of Law, USA (September 2005)
[5]
Camp, L.J.: Mental Models of Security. IEEE Computer Society Press, Los Alamitos (2006)
[6]
Byrd, T.A., Cossick, K.L., Zumd, R.W.: A Synthesis of Research on Requirements Analysis and Knowledge Acquisition Techniques. MIS Quarterly 16(1), 117-138 (1992)
[7]
Hudson, W.: Playing Your Cards Right, Getting the Most from Card Sorting for Navigation Design. HCI & Higher Education Column: People: HCI & the web 12(5), 56-58 (2005)
[8]
Kruskal, J., Wish, M.: Multidimensional Scaling. Sage Publication, Thousand Oaks (1978)

Cited By

View all
  • (2022)ReplicationProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563610(1-18)Online publication date: 8-Aug-2022
  • (2021)A Visual Exploration of Cybersecurity ConceptsProceedings of the 13th Conference on Creativity and Cognition10.1145/3450741.3465252(1-10)Online publication date: 22-Jun-2021
  • (2019)"Pretty Close to a Must-Have"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300381(1-12)Online publication date: 2-May-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
February 2007
389 pages
ISBN:3540773657
  • Editors:
  • Sven Dietrich,
  • Rachna Dhamija

Sponsors

  • Bibit Global Payment Services
  • Google Inc.
  • nCipher
  • EverBank
  • PGP Corporation

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 12 February 2007

Author Tags

  1. card sorting
  2. mental model
  3. risk communication

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)ReplicationProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563610(1-18)Online publication date: 8-Aug-2022
  • (2021)A Visual Exploration of Cybersecurity ConceptsProceedings of the 13th Conference on Creativity and Cognition10.1145/3450741.3465252(1-10)Online publication date: 22-Jun-2021
  • (2019)"Pretty Close to a Must-Have"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300381(1-12)Online publication date: 2-May-2019
  • (2019)A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support ChatsProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300308(1-12)Online publication date: 2-May-2019
  • (2018)The Password Life CycleACM Transactions on Privacy and Security10.1145/318334121:3(1-32)Online publication date: 16-Apr-2018
  • (2018)How Do We Talk Ourselves Into These Things?Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems10.1145/3170427.3188578(1-6)Online publication date: 20-Apr-2018
  • (2017)The importance of visibility for folk theories of sensor dataProceedings of the Thirteenth USENIX Conference on Usable Privacy and Security10.5555/3235924.3235945(257-270)Online publication date: 12-Jul-2017
  • (2017)"...Better to use a lock screen than to worry about saving a few seconds of time"Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security10.5555/3235924.3235929(49-63)Online publication date: 12-Jul-2017
  • (2017)Dissecting Spear Phishing Emails for Older vs Young AdultsProceedings of the 2017 CHI Conference on Human Factors in Computing Systems10.1145/3025453.3025831(6412-6424)Online publication date: 2-May-2017
  • (2017)Folk Models of Online Behavioral AdvertisingProceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing10.1145/2998181.2998316(1957-1969)Online publication date: 25-Feb-2017
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media