skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: "We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together
Digital resources are often collectively owned and shared by small social groups (e.g., friends sharing Netflix accounts, roommates sharing game consoles, families sharing WhatsApp groups). Yet, little is known about (i) how these groups jointly navigate cybersecurity and privacy (S&P) decisions for shared resources, (ii) how shared experiences influence individual S&P attitudes and behaviors, and (iii) how well existing S&P controls map onto group needs. We conducted group interviews and a supplemental diary study with nine social groups (n=34) of varying relationship types. We identified why, how and what resources groups shared, their jointly construed threat models, and how these factors influenced group strategies for securing shared resources. We also identified missed opportunities for cooperation and stewardship among group members that could have led to improved S&P behaviors, and found that existing S&P controls often fail to meet the needs of these small social groups.  more » « less
Award ID(s):
1755625
PAR ID:
10160147
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
Page Range / eLocation ID:
1 to 12
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    We present results from a qualitative study involving eight intergenerational families (27 participants) to understand how a family tracking intervention can help support care among intergenerational family members. Our findings show that family members communicate and stay aware of each other's' health through shared fitness data and conversations triggered by fitness sharing. We identified different challenges and preferences among the three age groups in our study: older adults enjoyed family fitness sharing but often encountered various technical challenges, the middle-aged group served as a key person to care for the rest of the family members, and the young generation could not fully engage in fitness sharing due to their busy schedule and privacy concerns. These findings suggest the design of family fitness sharing to account for the age differences in intergenerational families and support the unique needs of family fitness sharing. 
    more » « less
  2. Intraspecific variation in morphology and behavior is widespread, especially in species with large distribution ranges. This includes foraging which can vary according to the local resource landscape. How this may be linked to differences in social structure, especially in socially foraging species is less known. Greater spear-nosed bats are well known for their large repertoire of often highly complex social behaviors. In Trinidad, they form stable groups of unrelated females that recruit other members to temporally unpredictable flowering balsa trees. We compared these findings with a dataset of capture data, GPS tracks, and observations collected over six years in a colony in Panamá. We found profound differences in the foraging behavior and group stability ofPhyllostomus hastatusduring the dry season where social behaviors were expected. Female bats did not coordinate commutes to exploit distinct foraging resources as a group. Instead, females commuted individually to very distant foraging areas which overlapped between groups. Linked to this we found groups to be unstable in size over the short and long term. Our findings highlight the large intraspecific variation and indicate a strong influence of the local resource landscape and associated benefits of social foraging on the social structure in these bats and possibly many other animals. 
    more » « less
  3. What triggers end-user security and privacy (S&P) behaviors? How do those triggers vary across individuals? When and how do people share their S&P behavior changes? Prior work, in usable security and persuasive design, suggests that answering these questions is critical if we are to design systems that encourage pro-S&P behaviors. Accordingly, we asked 852 online survey respondents about their most recent S&P behaviors (n = 1947), what led up to those behaviors, and if they shared those behaviors. We found that social “triggers”, where people interacted with or observed others, were most common, followed by proactive triggers, where people acted absent of an external stimulus, and lastly by forced triggers, where people were forced to act. People from different age groups, nationalities, and levels of security behavioral intention (SBI) all varied in which triggers were dominant. Most importantly, people with low-to-medium SBI most commonly reported social triggers. Furthermore, participants were four times more likely to share their behavior changes with others when they, themselves, reported a social trigger. 
    more » « less
  4. Security design choices often fail to take into account users' social context. Our work is among the first to examine security behavior in romantic relationships. We surveyed 195 people on Amazon Mechanical Turk about their relationship status and account sharing behavior for a cross-section of popular websites and apps (e.g., Netflix, Amazon Prime). We examine differences in account sharing behavior at different stages in a relationship and for people in different age groups and income levels. We also present a taxonomy of sharing motivations and behaviors based on the iterative coding of open-ended responses. Based on this taxonomy, we present design recommendations to support end users in three relationship stages: when they start sharing access with romantic partners; when they are maintaining that sharing; and when they decide to stop. Our findings contribute to the field of usable privacy and security by enhancing our understanding of security and privacy behaviors and needs in intimate social relationships. 
    more » « less
  5. All foraging animals face a trade-off: how much time should they invest in exploitation of known resources versus exploration to discover new resources? For group-living central place foragers, this balance is challenging. Due to the nature of their movement patterns, exploration and exploitation are often mutually exclusive, while the availability of social information may discourage individuals from exploring. To examine these trade-offs, we GPS-tracked groups of greater spear-nosed bats (Phyllostomus hastatus) from three colonies on Isla Colón, Panamá. During the dry season, when these omnivores forage on the nectar of unpredictable balsa flowers, bats consistently travelled long distances to remote, colony-specific foraging areas, bypassing flowering trees closer to their roosts. They continued using these areas in the wet season, when feeding on a diverse, presumably ubiquitous diet, but also visited other, similarly distant foraging areas. Foraging areas were shared within but not always between colonies. Our longitudinal dataset suggests that bats from each colony invest in long-distance commutes to socially learned shared foraging areas, bypassing other available food patches. Rather than exploring nearby resources, these bats exploit colony-specific foraging locations that appear to be culturally transmitted. These results give insight into how social animals might diverge from optimal foraging. 
    more » « less