I think they're trying to tell me something: Advice sources and selection for digital security

EM Redmiles, AR Malone… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
2016 IEEE Symposium on Security and Privacy (SP), 2016ieeexplore.ieee.org
Users receive a multitude of digital-and physical-security advice every day. Indeed, if we
implemented all the security advice we received, we would never leave our houses or use
the Internet. Instead, users selectively choose some advice to accept and some (most) to
reject, however, it is unclear whether they are effectively prioritizing what is most important or
most useful. If we can understand from where and why users take security advice, we can
develop more effective security interventions. As a first step, we conducted 25 semi …
Users receive a multitude of digital-and physical-security advice every day. Indeed, if we implemented all the security advice we received, we would never leave our houses or use the Internet. Instead, users selectively choose some advice to accept and some (most) to reject, however, it is unclear whether they are effectively prioritizing what is most important or most useful. If we can understand from where and why users take security advice, we can develop more effective security interventions. As a first step, we conducted 25 semi-structured interviews of a demographically broad pool of users. These interviews resulted in several interesting findings: (1) participants evaluated digital-security advice based on the trustworthiness of the advice source, but evaluated physical-security advice based on their intuitive assessment of the advice content, (2) negative-security events portrayed in well-crafted fictional narratives with relatable characters (such as those shown in TV or movies) may be effective teaching tools for both digital-and physical-security behaviors, and (3) participants rejected advice for many reasons, including finding that the advice contains too much marketing material or threatens their privacy.
ieeexplore.ieee.org